2009 First Asian Conference on Intelligent Information and Database Systems

1-3 April 2009

Filter Results

Displaying Results 1 - 25 of 97
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2227 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (245 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (68 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference organization

    Publication Year: 2009, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2009, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Intelligent Distributed Intrusion Detection Systems of Computer Communication Systems

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    The paper is devoted to present various intelligent, distributed network-based intrusion detection systems architectures and quality measures. Moreover an impact of network and their intrusion detection system architectures parameters on the intrusion detection systems quality is discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Scheduling Problems with an Intelligent Use of the Learning Effect

    Publication Year: 2009, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    This paper is devoted to scheduling problems with the learning effect, which is understood as a process of acquiring experience that increases the efficiency of a processor. To bring closer the considered phenomenon, a short survey on results concerning scheduling problems with the learning effect is provided. In particular, the existing models of the experience are presented along with a discussi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Algorithm for Mining High Utility Itemsets

    Publication Year: 2009, Page(s):13 - 17
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    The utility based itemset mining approach has been discussed widely in recent years. There are many algorithms mining high utility itemsets by pruning candidates based on estimated utility values, and based on transaction-weighted utilization values. These algorithms aim to reduce search space. Besides, candidate pruning based on transaction-weighted utilization value is better than other strategi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Argument Based Machine Learning from Examples and Text

    Publication Year: 2009, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    We introduce a novel approach to cross-media learning based on argument based machine learning (ABML). ABML is a recent method that combines argumentation and machine learning from examples, and its main idea is to use arguments for some of the learning examples. Arguments are usually provided by a domain expert. In this paper, we present an alternative approach, where arguments used in ABML are a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Structural Sampling Technique for Better Decision Trees

    Publication Year: 2009, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Since data mining problems contain a large amount of data, sampling is a necessity for the success of the task. Decision trees have been developed for prediction, and finding decision trees with smaller error rates has been a major task for their success. This paper suggests a structural sampling technique that is based on a generated decision tree, where the tree is generated based on fast and di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Transfer Regression to TCP Throughput Prediction

    Publication Year: 2009, Page(s):28 - 33
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    In this paper we present the application of the transform regression (TR) algorithm to predict file transfer time. We consider the files that are transferred from Web servers using HTTP protocol. We identify parameters having impact on file transfer time and use them as inputs to transform regression. We compare the results of TR-based prediction with the moving averages methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motif-Based Analysis of Social Position Influence on Interconnection Patterns in Complex Social Network

    Publication Year: 2009, Page(s):34 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (541 KB) | HTML iconHTML

    Motifs are small subgraphs showing statistically significant occurrence in given network. Motif analysis helps to insight into the local topology and functions of complex networks. The social position measure is interpreted as the importance of the node (user) within the network. We propose to fuse motif analysis with the social position assessment by colouring the nodes according to the measured ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving Conceptual Schema from XML Databases

    Publication Year: 2009, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    In this paper, two concepts from different research areas are addressed together, namely functional dependency (FD) and multidimensional association rule (MAR). FD is a class of integrity constraints that have gained fundamental importance in relational database design. MAR is a class of patterns which has been studied rigorously in data mining. We employ MAR to mine the interesting rules from XML... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Multilevel Association Rules on RFID Data

    Publication Year: 2009, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB) | HTML iconHTML

    In SCM, the problem with RFID data is that the volume increases according to time and location, thus, resulting in an enormous degree of data duplication. Therefore it is difficult to extract useful knowledge hidden in data using existing association rule mining techniques, or analyze data using statistical techniques or queries. However, strong associations discovered at high concept levels may r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach to Keyword Extraction for Contextual Advertising

    Publication Year: 2009, Page(s):51 - 56
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    Online advertising has now turned to be one of the major revenue sources for today's Internet companies. Among the different channels of advertising, contextual advertising takes the great part. There are already lots of studies done for the keyword extraction problem in contextual advertising for English, however, little has been conducted for Chinese, which is mainly different from English lingu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Class Prediction and Pattern Discovery in Microarray Data - Artificial Intelligence and Algebraic Methods

    Publication Year: 2009, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB) | HTML iconHTML

    In the paper we present a brief survey of our results in processing of data from DNA microarray experiments obtained in our collaborative research with M.C. Sklodowska Centre of Oncology. Our experience therefore is strictly connected with problems resulting from cancer diagnosis and therapy but many results have more general issue. We focus our attention on three important stages of microarray da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Classification Problems via a Data Mining Approach Based on a Cerebellar Model Articulation Controller

    Publication Year: 2009, Page(s):61 - 66
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    Although applied to classification, neural network (NN) classifiers have certain limitations, including slow training time, complex interpretation and difficult implementation in terms of optimal network topology. To overcome these disadvantages, this study presents an efficient and simple classifier based on the cerebellar model articulation controller NN (CMAC NN), which has the advantages of ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Page Element Classification Based on Visual Features

    Publication Year: 2009, Page(s):67 - 72
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    When applying the traditional data mining methods to World Wide Web documents, the typical problem is that a normal Web page contains a variety of information of different kinds in addition to its main content. This additional information such as navigation, advertisement or copyright notices negatively influences the results of the data mining methods as for example the content classification. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Select-Response Grouping Proof for RFID Tags

    Publication Year: 2009, Page(s):73 - 77
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    In this paper, we investigate a scenario of RFID applications referred to enable a group of RFID tags which have been scanned simultaneously by a reading device, is literally called grouping proof problems. After examining the existing ldquoYoking Proofrdquo protocols of RFID, this paper proposes a protocol called ldquoSelect-Responserdquo Grouping Proof. Instead of waiting the computation result ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Identity Theft Detection Using Social Network Analysis

    Publication Year: 2009, Page(s):78 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    The paper presents a method of automatic detection of identity theft related event. The method is based on the social network analysis. The protection of electronic identity in contemporary information society is one of the greatest challenges in security research. The main idea about method of identity theft detection described in the paper is that identity theft events are related to change of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.