By Topic

Intelligent Computer Communication and Processing (ICCP), 2010 IEEE International Conference on

Date 26-28 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 87
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):i - iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2010, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (20 KB) | HTML iconHTML
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2010, Page(s):vi - viii
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Keynote lecture perception for intelligent vehicles

    Publication Year: 2010, Page(s):ix - x
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (49 KB) | HTML iconHTML

    Perceiving or understanding the environment surrounding of a vehicle is a very important step in advanced driver assistant systems (ADAS) or autonomous vehicles. The task involves both Simultaneous Localization And Mapping (SLAM) and Detection And Tracking of Moving Objects (DATMO). While SLAM provides the vehicle with a map of static parts of the environment as well as its location in the map, DA... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote lecture anonymity and privacy in communicating critical systems

    Publication Year: 2010, Page(s):xi - xii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (37 KB) | HTML iconHTML

    Summary form only given. It is well known that despite all of its advantages the digital revolution also leads to large variety of new risks. One principal issue in this context is the growing dependence of our modern information society from the availability and correct (proved) function of modern communication services. First, I'll give a short overview on threats in communication networks (grid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Blank page]

    Publication Year: 2010, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • Intelligent systems

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • A hierarchical semantically enhanced multimedia data warehouse

    Publication Year: 2010, Page(s):3 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    Data warehouses are used in many domains. Their purpose is to store historical data and to assist in the decision making process. Multimedia data warehouses are used for storing files which contain texts, graphics, videos and sound. These kinds of files are produced in large quantities, in fields such as medicine or space research. We propose a framework for building such a data warehouse, structu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evidence combination for baseline accuracy determination

    Publication Year: 2010, Page(s):11 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    In the field of data mining, one of the main objectives is to achieve the highest possible classification accuracy. This paper presents a classifier fusion system based on the principles of the Dempster-Shafer theory of evidence combination. It allows one to combine evidence from different sources and arrive at a degree of belief (represented by a belief function) that takes into account all the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semi-supervised learning with lexical knowledge for opinion mining

    Publication Year: 2010, Page(s):19 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Sentiment prediction for text has been an intriguing subject for the last few years. The goal of it is to automatically indicate the positive or negative attitude towards a topic of interest. The proliferation of user generated content on the World Wide Web has made it possible to perform large scale mining of public opinion. This paper presents an original implementation of a system that integrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spam detection filter using KNN algorithm and resampling

    Publication Year: 2010, Page(s):27 - 33
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    Spamming has become a time consuming and expensive problem for which several new directions have been investigated lately. This paper presents a new approach for a spam detection filter. The solution developed is an offline application that uses the k-Nearest Neighbor (kNN) algorithm and a pre-classified email data set for the learning process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed community detection in social networks with genetic algorithms

    Publication Year: 2010, Page(s):35 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (157 KB) | HTML iconHTML

    Community detection in social networks is a hot research topic that has received great interest in the recent years due to its wide applicability. This paper proposes a scalable approach for community structure identification using a genetic algorithm. Two existing fitness functions are analyzed and genetic parameters are tuned on thoroughly studied networks with known community structures. Experi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unsupervised semantic annotation of Web service datatypes

    Publication Year: 2010, Page(s):43 - 50
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    The paper describes an unsupervised model for classifying Web service datatypes into a large number of classes specified by an ontology. As a result of the classification, each datatype component of a Web service is associated to one ontology concept, the name of which is further used to semantically annotate the datatype. The framework is based on an extended model of hierarchical self-organizing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology matching and verification system using concept description translation

    Publication Year: 2010, Page(s):51 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    The integration of multiple ontologies and also the interaction between entities using different ontologies is one of the major challenges of the Semantic Web, ontologies play a crucial role in information representation. Significant research effort is directed towards aligning ontologies and identifying matching concepts. In this paper we present a novel method of concept translation and mapping ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative ontology modelling collaboratively built, evaluated and distributed ontologies

    Publication Year: 2010, Page(s):59 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (844 KB) | HTML iconHTML

    This article first summarizes problems of the classic Semantic Web approaches to knowledge sharing and, to solve this problems, presents i) a protocol permitting people to collaboratively build a well-organized KB without having to discuss or agree, and ii) a protocol for a global virtual KB well-organized to be based on individual well-organized KBs via a partially mirroring between them. This ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive modeling of user's preferences in multiagent meeting scheduling problem using analytical hierarchy process

    Publication Year: 2010, Page(s):67 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    Reaching to an agreement in meeting arrangements has always been a hard and cumbersome task, especially when there are many participants. An efficient approach to this problem is multi-agent systems. When we are designing a multi-agent system where agents are making decisions behalf of users we face another problem. How agents can model users' preferences? In this paper we are trying to cope with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining trust and distrust relationships in social Web applications

    Publication Year: 2010, Page(s):73 - 80
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    By the immense growth of social applications in web environment, the role of trust in connecting people is getting more important than ever. Although many researchers have already conducted comprehensive studies on the trust related applications, the understanding of distrust relations is still unclear to the researchers. In this paper, we have investigated some of mechanisms that determine the si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavioral segmentation of bank's Point-of-Sales using RF*M* approach

    Publication Year: 2010, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    POSs (Point-of-Sale) are one of the major electronic payment systems in banking industry with more cost. The bank needs to know its customers behavior to find interesting segments to attract more transactions which results in the growth of its income and assets. The RFM (recency, frequency and monetary) analysis is a famous approach for extracting behavior of customers and is a basis for marketing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient genetic algorithm for solving the generalized traveling salesman problem

    Publication Year: 2010, Page(s):87 - 92
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (141 KB) | HTML iconHTML

    The generalized traveling salesman problem (GTSP) is a generalization of the classical traveling salesman problem. The GTSP is known to be an NP-hard problem and has many interesting applications. In this paper we present a local-global approach for the generalized traveling salesman problem and as well an efficient algorithm for solving the problem based on genetic algorithms. Computational resul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A conceptual architecture of an arduino-based social-emotional interactive system

    Publication Year: 2010, Page(s):93 - 98
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    This paper presents an open system that focuses on the social and emotional aspects of the human-computer interaction. We describe a conceptual architecture for an interactive system that can collect, identify and operate with a user's emotions in a social environment. We identified important issues in building and using such a system and provided solutions for those issues, so that it can be succ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards social argumentative machines

    Publication Year: 2010, Page(s):99 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    This research advocates the idea of combining argumentation theory with the social web technology, aiming to enact large scale or mass argumentation. The proposed framework allows mass-collaborative editing of structured arguments in the style of semantic wikipedia. The Argnet system was developed based on the Semantic MediaWiki framework and on the Argument Interchange Format ontology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling incompletely specified contracts by Argumentation

    Publication Year: 2010, Page(s):103 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    Analyzing interorganizational contracts, based on the wide visualization possibilities offered by the representation with Open Workflow Nets for the contract parties, we can identify those deadlock cases that may jeopardize the successful finalization of the service described in the contract. Handling such exceptional situations using the reasoning power of the Value based Argumentation Framework ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From normative to cognitive layer through expectations

    Publication Year: 2010, Page(s):107 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    One of the most disputed issue on norms' study regards their representation and application that have to be flexible and agents' autonomy respectful. We consider that a norm internalization entails not only individual obligations and rights, but also expectations towards other agents' cognitive model. Therefore, a Dolce based formalism for capturing both individual and social nature of norms and p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.