By Topic

Semantic Computing and Systems, 2008. WSCS '08. IEEE International Workshop on

Date 14-15 July 2008

Filter Results

Displaying Results 1 - 25 of 39
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2008, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (56 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • A Context Awareness Non-functional Requirements Metamodel Based on Domain Ontology

    Publication Year: 2008, Page(s):1 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Networked software (NS) is a kind of online software produced by linking information resources on the Web with the help of intercommunication and cooperation between networks and users. Due to the complexity of NS, requirements engineering is now emerging as a critical issue in it. In the user-driven and networked-resources oriented environment, how to capture highly variable non-functional requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Semantic Similarities Based on Machine-Readable Dictionaries

    Publication Year: 2008, Page(s):8 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    The measurement of semantic similarity is a foundation work in semantic computing. In this paper the authors study the similarity measure between two words. Different from previous works, this paper suggests a novel method that relies on machine-readable dictionaries for measuring similarities. Machine-readable dictionaries are more widely available than other kinds of lexical resources. If two wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-Media Annotation Based on Semantic Network

    Publication Year: 2008, Page(s):15 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    The traditional information annotation technology is usually based on text description methods. With the ever increasing multimedia resources and the rapid progress of cross-media technology, the annotation between different modalities of media information is becoming possible. This paper presents a study of a cross-media annotation technology. In this technology, some multimedia examples expresse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Gaps between ERP Software and Organizational Needs: A Semantic Similarity Based Approach

    Publication Year: 2008, Page(s):21 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (131 KB) | HTML iconHTML

    Gap analysis is one of the most important phases in implementation of enterprise resource planning (ERP) system. In this paper, an approach is proposed to automatically detect gaps between software capacities and organizational needs based on semantic similarity computation. The approach takes two business process models as input, and one specifies software capacities and the other describes organ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology & Agent-Based Information Processing in Network Centric Warfare

    Publication Year: 2008, Page(s):27 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    This paper analyzes the feasibility of agent application in the network centric Warfare (NCW), and points out the difficulties in this process as well. The Semantic Web-based information processing framework is constructed, so that we can process information based on agent, effectively translate information superiority into knowledge superiority and finally build the decision superiority. At the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology Based Knowledge Modeling of Chinese Genealogical Record

    Publication Year: 2008, Page(s):33 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    This paper presents an ontology based knowledge modeling approach for Chinese Genealogical Record (CGR). Ontology (RDF/OWL) is introduced to modeling static knowledge of CGR, while Ontology Molecule is intended to solve dynamic and multi-granular knowledge modeling problem. Ontology inference and ontology visualization technologies are adopted for more effective and efficient knowledge mining and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Generalization Refactoring to Java Generic Programs

    Publication Year: 2008, Page(s):35 - 39
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    In generalization refactoring, preconditions and allowable source code modifications depend on type constraints of the refactored program. Type constraints of parameterized types should be considered when applying the refactoring to generic programs, otherwise type errors may be brought into the refactored program. Some type constraint rules for Java generic programs are presented to verify the pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Research on Connectivity of Undirected Basic Element Complex Network of Topic-Related Documents

    Publication Year: 2008, Page(s):40 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    A research on the connectivity of undirected version Basic Element complex network generated from topic-related document set is carried out. Key properties of the network are obtained. The networks are mainly connected except some components involving very small ratio of nodes of the whole network. And the key semantic units do not exist in these small components. The properties will simplify the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Network Analysis on TCM Language System

    Publication Year: 2008, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    TCMLS is the largest traditional Chinese medicine ontology all over the world. This paper surveys the topology of TCMLS sub-ontologies in complex networks way. The result indicates that the network, composed of concepts and instances, displays both patterns of small-world and scale-free. Moreover, three centrality indices of nodes tend to covary in the network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust Factors in P2P Networks

    Publication Year: 2008, Page(s):49 - 54
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    P2P networks have become a popular way to share large volumes of data due to its open and anonymous nature. P2P network model is designed with the targets of decentralization, well-scaling, fault-tolerance and low cost. Meanwhile however, new targets bring new challenges. P2P network expose more security threats due to its open and anonymous nature. P2P networks are vulnerable to attacks by malici... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representation and Evolution of User Profile in Web Activity

    Publication Year: 2008, Page(s):55 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1130 KB) | HTML iconHTML

    In the Web personalization of Web service and construction of adaptive Web site, how to represent uses profile is one of the key issues. Aiming at solving the existing problems in representation of user profile includes incapability of effectively representing userpsilas recent interest, lack in dynamically effectively updating. This paper presents a new method of representation of user profile. B... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transforming Business Requirements into BPEL: A MDA-Based Approach to Web Application Development

    Publication Year: 2008, Page(s):61 - 66
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (533 KB) | HTML iconHTML

    As our dependence on online services has steadily grown, the development of Web applications is becoming crucial to commercial success of organizations. However, adjusting business vision to new market conditions leads to high volatility in requirements of Web applications. Thus, the organizations require Web systems to update and/or grow at a rate of business requirements change. To address the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Semantic Requirement Engineering

    Publication Year: 2008, Page(s):67 - 71
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    It is widely acknowledged that most of problems occurring in requirement engineering activities mainly results from the lack of a semantic agreement among stakeholders. It implies to find an effective mechanism to integrate existing theory, techniques and resources accumulated in requirement engineering, and furthermore to provide a favorable base to develop novel theory and techniques. This paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative Analysis of Genetic Algorithm and Ant Colony Algorithm on Solving Traveling Salesman Problem

    Publication Year: 2008, Page(s):72 - 75
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Ant Colony Algorithm and Genetic Algorithm (GA), two bionic-inspired optimization algorithms, have great potentials to solve the combination optimization problems, respectively used in solving traveling salesman problem, but there are some shortcomings if only one of them is used to solve TSP. Performance comparative analysis have been done by using ACA and GA respectively in solving TSP in this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Acquisition of Semantic Elements Based on Statistical Decomposition

    Publication Year: 2008, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    The implement of machine translation system based on semantic element (SE) requires a large scale semantic element base. An automatic acquisition method for SEs based on statistical decomposition was proposed in this paper. Firstly, .analogical decomposition was applied to decompose abandonable SE and two conditions are found to assure the correctness of decomposition. Secondly, three statistics w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic System Modeling Approach Based on Semantic Association

    Publication Year: 2008, Page(s):82 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Domain model, an important asset retrieved from domain analysis, can provide a problem-oriented solution for modeling the domain applications. The focus of this research is to automatically modeling specific domain application according to user requirements with the support of domain models. In this paper, it proposes an association method to establish the semantic association between expected goa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of Web Services Based on Collaborated Semantic Link Network

    Publication Year: 2008, Page(s):89 - 94
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Web service becomes an important paradigm for internet application. To realize userspsila complex requirements, services with different functions, but sharing common features, should be selected quickly from a huge number of services on internet to be collaborated. Researches on the discovery of services have put the emphasis on the finding out of services with similar functions, which is unable t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RDF4S Based Semantic Web Service Matchmaking Framework

    Publication Year: 2008, Page(s):95 - 100
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Semantic Web service matchmaking is the process of searching the space of possible matches between demands and supplies, and finds the best available ones. To achieve this, the semantic Web service matchmaking framework is one of the absolutely necessary components of service oriented architecture. This paper proposes a matchmaking framework based on Description Logic for semantic Web service desc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.