By Topic

Information Reuse and Integration, 2008. IRI 2008. IEEE International Conference on

Date 13-15 July 2008

Filter Results

Displaying Results 1 - 25 of 94
  • Message from Program Co-Chairs

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Forward

    Publication Year: 2008, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (98 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • International Technical Program Committee

    Publication Year: 2008, Page(s):iv - vii
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • Computation with imprecise probabilities

    Publication Year: 2008, Page(s):viii - ix
    Cited by:  Papers (5)
    Request permission for commercial reuse | PDF file iconPDF (115 KB) | HTML iconHTML
    Freely Available from IEEE
  • Inventing the future of neurology: Integrated wavelet-chaos-neural network models for knowledge discovery and automated EEG-based diagnosis of neurological disorders

    Publication Year: 2008, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Panel: The role of information search and retrieval in economic stimulation

    Publication Year: 2008, Page(s): xii
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):xiii - xxii
    Request permission for commercial reuse | PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2008, Page(s):xxiii - xxix
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • [Copypright notice]

    Publication Year: 2008, Page(s): xxx
    Request permission for commercial reuse | PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • Reengineering XML into object-oriented database

    Publication Year: 2008, Page(s):1 - 6
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (127 KB) | HTML iconHTML

    This paper handles the conversion from an existing XML-Schema into object-oriented database. The major motivation for this work is to store XML-Schema into object oriented database. There are more common features between the object-oriented model and XML, and thus it is more attractive to map from XML into object-oriented database; such mapping preserves database specifics. To achieve the mapping,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling role-based access control using a relational database tool

    Publication Year: 2008, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Traditional access control schemes have certain inherent weaknesses. As a promising alternative to traditional access control schemes, role-based access control has received special attention for its unique flexibility. In this paper, we use a database tool called WinRDBI to study the behavior of a role-based access control model. A detailed discussion of the role-based access control behaviors an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using a search engine to query a relational database

    Publication Year: 2008, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    While search engines are the most popular way to find information on the web, they are generally not used to query relational databases (RDBs). This paper describes a technique for making the data in an RDB accessible to standard search engines. The technique involves using a URL to express queries and creating a wrapper that can then process the URL-query and generate web pages that contain the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Route selection algorithm based on integer operation Ant Colony Optimization

    Publication Year: 2008, Page(s):17 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    This paper discusses a new route selection algorithm which combines the integer operation Ant Colony Optimization (ACO) with Dijkstra algorithm. Regarding calculation of selection probability, local update rule, and global update rule, the proposed ACO adopts new integer arithmetic instead of conventional floating point arithmetic. As compared with conventional floating point arithmetic approach, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of controllers in the thermal system using initial pheromone distribution in Ant Colony Optimization

    Publication Year: 2008, Page(s):22 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB) | HTML iconHTML

    Ant Colony Optimization (ACO) , an intelligent swarm algorithm, proves effective in various fields. However, the choice of the first route and the initial distribution of pheromone are among the toughest yet most crucial factors in determining the performance of process optimization. According to the materials we referred to, almost all the existing methods of ACO set the same constant in all rout... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Portfolio selection using an artificial immune system

    Publication Year: 2008, Page(s):28 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5533 KB) | HTML iconHTML

    This paper presents a novel heuristic method for solving a generalized Markowitz mean-variance portfolio selection model. The generalized model includes two types of constraints; bounds-on-holdings and cardinality constraints. The former guarantee that the amount invested (if any) in each asset is between its predetermined upper and lower bounds while the latter ensures that the total selected ass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web service composition based on integrated substitution and adaptation

    Publication Year: 2008, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    Traditional web service composition is often statically generated using knowledge available at the design time. However, in practice, composed web services must cope with changing environment at run time to maintain the usability of current composition plan. In this paper, we propose a solution for web service composition based on adaptation to avoid the problem of such invalidated running composi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reachability analysis of Web service interfaces

    Publication Year: 2008, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB) | HTML iconHTML

    We use WCFA (Web Service Interface Control Flow Automata) to model web service interfaces. Global behaviors of web service compositions are captured by abstract reachability graph(ARG). A polynomial time algorithm for the construction of ARG is presented. The algorithm uses a reachability analysis to verify both safety and call stack inspection properties. Both kinds of properties are expressed by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and synthesis of service composition using tree automata

    Publication Year: 2008, Page(s):46 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    We revisit the problem of synthesis of service composition in the context of service oriented architecture from a tree automata perspective. Comparing to existing finite state machine and graph-based approaches to the problem of service composition, tree automata offers a more flexible and faithful modeling of multi-input services and their admissible compositions. In our framework, tree automata ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMSQM: Adaptive multiple super-page queue management

    Publication Year: 2008, Page(s):52 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB) | HTML iconHTML

    Super-Pages have been wandering around for more than a decade. There are some particular operating systems that support Super-Paging and there are some recent research papers that show interesting ideas how to intelligently integrate them; however, nowadays Operating System’s page replacement mechanism still uses the old Clock algorithm which gives the same priority to small and large pages... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data warehouse architecture and design

    Publication Year: 2008, Page(s):58 - 63
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB) | HTML iconHTML

    A data warehouse is attractive as the main repository of an organization’s historical data and is optimized for reporting and analysis. In this paper, we present a data warehouse the process of data warehouse architecture development and design. We highlight the different aspects to be considered in building a data warehouse. These range from data store characteristics to data modeling and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining knowledge flow for modeling the information needs of task-based groups

    Publication Year: 2008, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Knowledge is the most important resource to create core competitive advantages for an organization. Such knowledge is circulated and accumulated by a knowledge flow (KF) in an organization to support worker’s tasks. Workers may cooperate and participate in several task-based groups to fulfill their needs. In this paper, we propose a group-based knowledge flow mining algorithm which integrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical study of supervised learning for biological sequence profiling and microarray expression data analysis

    Publication Year: 2008, Page(s):70 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    Recent years have seen increasing quantities of high-throughput biological data available for genetic disease profiling, protein structure and function prediction, and new drug and therapy discovery. High-throughput biological experiments output high volume and/or high dimensional data, which impose significant challenges for molecular biologists and domain experts to properly and rapidly digest a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An unsupervised protein sequences clustering algorithm using functional domain information

    Publication Year: 2008, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    In this paper, we present an unsupervised novel approach for protein sequences clustering by incorporating the functional domain information into the clustering process. In the proposed framework, the domain boundaries predicated by ProDom database are used to provide a better measurement in calculating the sequence similarity. In addition, we use an unsupervised clustering algorithm as the kernel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outcome prediction in traumatic pelvic injuries using maximum similarity and quality measures

    Publication Year: 2008, Page(s):82 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Traumatic pelvic injury is frequently life-threatening due to its association with severe hemorrhage and the high risk of complications. Immediate medical treatment is therefore of utmost importance; however, decisions regarding treatment are often very difficult to make due to the amount and complexity of patient information. The use of a computer-aided decision making system to help trauma surge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.