Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

2010 Second International Conference on Information, Process, and Knowledge Management

10-15 Feb. 2010

Filter Results

Displaying Results 1 - 25 of 30
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (836 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):viii - ix
    Request permission for commercial reuse | PDF file iconPDF (62 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Ontology-Driven Relation Extraction by Pattern Discovery

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1188 KB) | HTML iconHTML

    With this paper we describe an ontology-driven system that performs relation extraction over textual data. The system exploits expert knowledge of the domain, including lexical resources, in the form of an ontology to drive the extraction of patterns using manually annotated texts. Such patterns are then applied in order to identify candidates for relation extraction. Paired with basic, reliable n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimedia Ontology-Driven Architecture for Multimedia Systems

    Publication Year: 2010, Page(s):7 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1713 KB) | HTML iconHTML

    Diversity of standards, languages, protocols, and hardware components leads to important incompatibility issues when designing and developing multiplatform multimedia systems. Furthermore, user and community requirements and preferences should be taken into account when instantiating and configuring these kind of systems. This work introduces an ontology framework for distributed multimedia system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identification and Assimilation of Knowledge for Real-Time Control of Enterprise Processes in Manufacturing

    Publication Year: 2010, Page(s):13 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (558 KB) | HTML iconHTML

    Today's enterprises are operating in a complex and volatile business environment. To address this situation, enterprises try to realize horizontal and vertical integration of business and engineering processes leading to real-time enterprise. Enterprise data model assists in integrating data generated from automation systems in (milli) seconds and data from business applications referring to long ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Process Automation Based on Dependencies

    Publication Year: 2010, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    Given a business language, this study presents a dependency-based mapping approach to automate the process of generating a workflow. First, the classification of various operators is carried out in terms of their usage in generating different flows. Second, an internally developed backward flow generating algorithm is used. In order to measure the effectiveness and accuracy of the approach, a forw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation Environment for IT Service Support Processes: Supporting Service Providers in Estimating Service Levels for Incident Management

    Publication Year: 2010, Page(s):23 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Because of a steadily increasing market for IT services, providers need to set apart from their competitors in order to successfully assert with their service offerings in the market. As compliance with negotiated service levels is becoming more and more important for service providers, the improvement of the quality of operational IT service support processes is coming to the fore. In this paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimisation-Based on Simulation: A Diagnostic Imaging Department Case-Study

    Publication Year: 2010, Page(s):32 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1576 KB) | HTML iconHTML

    The growing influx of patients in healthcare providers is the result of an aging population and emerging self-consciousness about health. Thus, it is necessary to implement methodologies that optimize the healthcare provider's efficiency while increasing patient throughput and reducing patient's total waiting time. This paper presents a case study of a conventional radiology workflow analysis in a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Context into a Criminal Case-Based Reasoning Model

    Publication Year: 2010, Page(s):37 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (697 KB) | HTML iconHTML

    The enormous quantity of available information in penal justice systems and the urgent need for judges to accomplish their tasks in due time present a new challenge for juridical applications: to reduce explicit computer system interactions, filtering out information needed for a desired result. Context is knowledge that enables the definition of what is or is not relevant in a given situation. Ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classifying RSS Feeds with an Artificial Immune System

    Publication Year: 2010, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (683 KB) | HTML iconHTML

    Artificial Immune Systems (AIS) have been used in a number of applications from autonomous navigation to computer security because of their ability to rapidly adapt and evolve. In this paper we examine the application of an AIS for the purpose of determining which news articles from a set of RSS feeds are relevant. Because the articles we are examining come from RSS feeds, the articles can vary gr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Path Planning for Multi-agent Systems Situated in Informed Virtual Geographic Environments

    Publication Year: 2010, Page(s):48 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2291 KB) | HTML iconHTML

    Multi-Agent Geo-Simulation (MAGS) is a modelling and simulation paradigm which involves a large number of autonomous situated agents evolving in, and interacting with, an explicit description of a geographic environment called a Virtual Geographic Environment (VGE). Path planning in MAGS has to be solved in real time, often under constraints of limited memory and CPU resources. Moreover, the compu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Changing Products, Changing Processes: Dealing with Small Updates in Product-Based Design

    Publication Year: 2010, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    In the method of "product-based design" (PBD), a direct relation exists between the design of a business process and the characteristics of the end product that such a process should deliver. This offers many benefits over more traditional business process redesign approaches. This paper takes into consideration that any end product is subject to (frequent) change. While it is technically feasible... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Alternative Model for Information Ethics

    Publication Year: 2010, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Floridi's resource-product-target (RPT) model has been proposed as a unified approach for information ethics (IE). RPT can be used to explain and relate the main concepts of IE. It models morally relative acts on information. This paper introduces an enhancement of the RPT model that represents a more complete conceptualization of the "life of information," establishing a firmer foundation for Flo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge between Capability and Enactment: Towards Dynamic Knowledge Potentials

    Publication Year: 2010, Page(s):68 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB) | HTML iconHTML

    Knowledge Management is a well-established stream of research in many disciplines. Nonetheless, many frameworks guiding the development of information systems follow a view of knowledge that focuses on explicit representations of knowledge; leaving out important contextual components. Based on the differentiation between the ostensive and performative aspects of organizational routines, we propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop-Based Risk Assessment for the Definition of Secure Business Processes

    Publication Year: 2010, Page(s):74 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    Nowadays, industry and governments are faced with an increasing number of varying threats concerning the security of their valuable business processes. Due to the vast damage potential, organizations are raising their security investments, but often (i) without considering the efficiency of the investments made, (ii) neglect to involve people in order to raise security awareness and (iii) without ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge Composition: Theory, Architecture and Implementation

    Publication Year: 2010, Page(s):80 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2692 KB) | HTML iconHTML

    Integrated information systems, such as ERP systems, have been proven to provide significant benefits for organisations in processing transactional data. In many unstructured processes similar improvements have not yet been established. We illustrate the concept of knowledge composition, which focuses on the rich and context-dependent nature of knowledge. Based on this theoretical background, we p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Several Kinds of Temporal Association Rules Enhanced by Tree Structures

    Publication Year: 2010, Page(s):86 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    Market basket analysis is one important application of knowledge discovery in databases. Real life market basket databases usually contain temporal coherences, which cannot be captured by means of standard association rule mining. Thus there is a need for developing algorithms, that reveal such temporal coherences within this data. This paper gathers several notions of temporal association rules a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Please Don't Make Me Draw!

    Publication Year: 2010, Page(s):94 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    This paper describes the development of a software tool to support knowledge acquisition by means of rich pictures, for Object Oriented Analysis (OOA). Transposition of manual rich picture practise into software proved difficult, therefore we decided to follow a user-centered approach, design and implement a prototype with basic functionalities, then run a usability test with a few students and pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Knowledge Management Challenges in a Service Desk: A Case Study

    Publication Year: 2010, Page(s):100 - 105
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    Service desk plays a central role within IT service management. The main goal of the service desk is to record failure reports and service requests from software users and customers. The main contribution of this study is to present knowledge management challenges in the service desk function of a large IT service provider company in Finland. Data for this study were collected through interviews w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.