Scheduled Maintenance on March 25th, 2017:
Single article purchases and IEEE account management will be unavailable from 4:00 AM until 6:30 PM (ET). We apologize for the inconvenience.
By Topic

2010 IEEE International Conference on Information Reuse & Integration

4-6 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 88
  • Message from Program Co-Chairs

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Forward

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (72 KB) | HTML iconHTML
    Freely Available from IEEE
  • International Technical Program Committee

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Precisiation of meaning—toward computation with natural language

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | PDF file iconPDF (189 KB)
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Panel title: Critical need for funding of basic and applied research in large-scale computing

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 9
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • A message-based interoperability framework with application to astrophysics

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    Many software applications in astrophysics lack the capabilities to directly exchange data or share their functionality. The proposed framework utilizes a light-weight messaging technique based on the Simple Application Messaging Protocol (SAMP) to enable software to participate in a collaborative system by sharing data and services between one another. A built-in mechanism allows users to non-pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective API navigation and reuse

    Publication Year: 2010, Page(s):7 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    Most reuse libraries come with few source-code examples that demonstrate how the library at hand should be used. We have developed a source-code recommendation approach for constructing and delivering relevant code snippets that programmers can use to complete a certain programming task. Our approach is semantic-based; relying on an explicit ontological representation of source-code. We argue that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical evaluation of active sampling for CRF-based analysis of pages

    Publication Year: 2010, Page(s):13 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    We propose an automatic method of extracting bibliographies for academic articles scanned with OCR markup. The method uses conditional random fields (CRF) for labeling serially OCR-ed text lines on an article's title page as appropriate names for bibliographic elements. Although we achieved excellent extraction accuracies for some Japanese academic journals, we needed a substantial amount of train... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workflow management of simulation based computation processes in transportation domain

    Publication Year: 2010, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    Simulation based computational analysis is a key approach for system design and evaluation in many domains. These computation processes are often complex and experience-based, requiring domain scientists and engineers to deal with heterogeneous simulation models and applications in an integrated manner. As domain users employ simulations for increasingly sophisticated studies, management of the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving query suggestion by utilizing user intent

    Publication Year: 2010, Page(s):25 - 30
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    In this paper, we introduce a query suggestion approach to reuse users' search context and search logs. For a given search log, we integrate two pieces of wisdom embedded in the search context: consecutive queries and reformulation patterns between consecutive queries. When providing suggestions online, we extract concepts that represent the user's intent and associate these concepts with wisdom a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the impact of data quality on sampling

    Publication Year: 2010, Page(s):31 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    Three important data characteristics that can substantially impact a data mining project are class imbalance, poor data quality and the size of the training dataset. Data sampling is a commonly used method for improving learner performance when data is imbalanced. However, little effort has been put forth to investigate the performance of data sampling techniques when data is both noisy and imbala... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heuristic based approach to clustering and its time critical applications

    Publication Year: 2010, Page(s):37 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Clustering may be named as the first clustering technique addressed by the research community since 1960s. However, as databases continue to grow in size, numerous research studies have been undertaken to develop more efficient clustering algorithms and to improve the performance of existing ones. This paper demonstrates a general optimization technique applicable to clustering algorithms with a n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study of filter-based feature ranking techniques

    Publication Year: 2010, Page(s):43 - 48
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    One factor that affects the success of machine learning is the presence of irrelevant or redundant information in the training data set. Filter-based feature ranking techniques (rankers) rank the features according to their relevance to the target attribute and we choose the most relevant features to build classification models subsequently. In order to evaluate the effectiveness of different feat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active learning with neural networks for intrusion detection

    Publication Year: 2010, Page(s):49 - 54
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    This paper presents a neural-network-based active learning procedure for computer network intrusion detection. Applying data mining and machine learning techniques to network intrusion detection often faces the problem of very large training dataset size. For example, the training dataset commonly used for the DARPA KDD-1999 offline intrusion detection project contained approximately five hundred ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks

    Publication Year: 2010, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    Due to the network topology of an ad hoc network changes frequently and unpredictable, the security of multicast routing becomes more challenging than the traditional networks. In this paper, we describes a dynamic multicast height balanced group key agreement that allows a user in a multicast group to dynamically compose the group key and securely deliver multicast data for a multicast source to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure information exchange

    Publication Year: 2010, Page(s):59 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    Ad hoc routing protocols have been designed to be more and more efficient without keeping security in mind. This makes them vulnerable to a variety of attacks which affect the reliability of data transmission. We propose in this paper a new a secure protocol based on the hash chains to provide a high level of security. The proposed protocol is analyzed using the NS-2 simulator. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model based detection of implied scenarios in multi agent systems

    Publication Year: 2010, Page(s):63 - 68
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Multi-agent systems (MAS) are efficient solutions for commercial applications such as information retrieval and search. In a MAS, agents are usually designed with distribution of functionality and control. Lack of central control implies that the quality of service of MAS may be degraded because of possible unwanted behavior at the runtime, commonly known as emergent behavior. Detecting and removi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • k-NN based LS-SVM framework for long-term time series prediction

    Publication Year: 2010, Page(s):69 - 74
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    Long-term time series prediction is to predict the future values multi-step ahead. It has received more and more attention due to its applications in predicting stock prices, traffic status, power consumption, etc. In this paper, a k-nearest neighbors (k-NN) based least squares support vector machine (LS-SVM) framework is proposed to perform long-term time series prediction. A new distance functio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aggregating music recommendation Web APIs by artist

    Publication Year: 2010, Page(s):75 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    Through user accounts, music recommendations are refined by user-supplied genres and artists preferences. Music recommendation is further complicated by multiple genre artists, artist collaborations and artist similarity identification. We focus primarily on artist similarity in which we propose a rank fusion solution. We aggregate the most similar artist ranking from Idiomag, Last.fm and Echo Nes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel feature selection technique for highly imbalanced data

    Publication Year: 2010, Page(s):80 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    Two challenges often encountered in data mining are the presence of excessive features in a data set and unequal numbers of examples in the two classes in a binary classification problem. In this paper, we propose a novel approach to feature selection for imbalanced data in the context of software quality engineering. This technique consists of a repetitive process of data sampling followed by fea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Class compactness for data clustering

    Publication Year: 2010, Page(s):86 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    In this paper we introduce a compactness based clustering algorithm. The compactness of a data class is measured by comparing the inter-subset and intra-subset distances. The class compactness of a subset is defined as the ratio of the two distances. A subset is called an isolated cluster (or icluster) if its class compactness is greater than 1. All iclusters make a containment tree. We introduce ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.