By Topic

Web Society (SWS), 2010 IEEE 2nd Symposium on

Date 16-17 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 144
  • An intelligent offline filtering agent for website analysis and content rating

    Publication Year: 2010 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB) |  | HTML iconHTML  

    The unregulated nature of the web means that anyone can make content available on the web, some of which could be harmful to children and unsuspecting adults. Content filtering is aimed at blocking out undesirable material from reaching the end user. Most existing software content filters make use an access control list which involves some sort of manual search, gathering and classification of undesirable web sites so that the software filter can block the access of these URLs. In this paper, we describe an Offline filtering Agent in terms of its two main modules: automated web page crawling and intelligent classification modules. Experimental results based on 1250 web pages are presented to show the effectiveness of our system. On the testing set, the agent was able to achieve a correct acceptance rate of 97% and a correct reject rate of 92.6%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualizing the web search results with web search visualization using scatter plot

    Publication Year: 2010 , Page(s): 5 - 10
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (261 KB) |  | HTML iconHTML  

    We live in 21st century, a time when the speed of flow of information is the indicator of the quality of life. Therefore, it is rightly called the century of information. We need information in our everyday life, but we need to get it in bulk, with ease and with assured quality. The best and easiest way to get it is through the World Wide Web. Although there are a good number of search engines available in web, the most commonly used ones show the search result in a list based representation. This list based representation is not very user friendly for the users all the time. Sometimes they don't get their desired results easily and there is not enough scope for the user to compare documents, find relevant documents and filter according to their needs. Web search visualization using scatter plot provides the users to search their documents and the results will be visualized in a traditional list based representation and also in a scatter plot according to the documents' last modification date and document type. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hierarchical resource locating and routing for SIP-based telephony systems

    Publication Year: 2010 , Page(s): 11 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (212 KB) |  | HTML iconHTML  

    SIP provides powerful capabilities for building audio conferencing services. However, the scalability for SIP-based telephony systems is mainly limited by both the capability of server and the availability of bandwidth. Based on the study of the SIP and P2P protocol, the paper proposes a pure hierarchical P2P architecture for SIP-based telephony systems. The architecture can dynamically increase the number of users without negative influence on the stability of system. Experimental results show that the hierarchical P2P architecture can significantly reduce both resource lookup latency and physical hops. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber communication of adolescent

    Publication Year: 2010 , Page(s): 16 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (119 KB) |  | HTML iconHTML  

    This paper conducts a quantitative analysis about cyber communication based on the data collected by questionnaires got from the Adolescent in Zhejiang, Hunan and Gansu. It finds that the internet has become a new field of daily communication, cyber communication will not only help adolescent to keep up with existing relations, but also expand their relative network. The dominant impetus of adolescent' cyber communication is pursuing the joy of interaction itself and the internet is changing the rules of adolescent' communication considerably. To many young netizens, the internet is a medium of interaction, as well as a medium for self presentation, cyber communication is applicable in making adolescent' self presentation more no-limits, polybasic and flexible. Adolescent exchange their mutual concerns through cyber communication, relaying their experiences and feelings; thus the communication is a process of sharing these concerns. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The personal learning environment (PLE) based on web2.0

    Publication Year: 2010 , Page(s): 22 - 25
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (133 KB) |  | HTML iconHTML  

    "Web 2.0" refers to a second generation of web-based communities and online services, such as social-networking sites, wikis, and social indexing sites, which enable creativity, collaboration and sharing between users. With the rapid development of “Web 2.0”, network education is changing a lot. In contrast to traditional LMS-driven VLE solutions, PLE based on web2.0 takes a more natural and learner-centric approach and is characterized by the freeform use of a set of lightweight services and tools that belong to and are controlled by individual learners. PLEs based on Web2.0 tools consist of three parts. They are knowledge digging, knowledge coding and knowledge shifting. So PLEs are not an application but rather a new approach to the use of new technologies for learning. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The power relation in virtual communities — Taking “Chinese Muslim Community” as the example

    Publication Year: 2010 , Page(s): 26 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (98 KB) |  | HTML iconHTML  

    As a new community, the virtual community is rising along with the development of Internet. Netizens establish and develop new forms of power relation through online interaction. In the condition of body absence, reconstructing rules, argument of opinions and collectively resisting become the main ways of power relation. Cyberpower is a flowing power. Its body, object and ways become uncertain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HisTrace: A system for mining on news-related articles instead of web pages

    Publication Year: 2010 , Page(s): 30 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (205 KB) |  | HTML iconHTML  

    The Web is now playing an important part in people's real-life activities. Scientists of not only computer science but also sociology and economics might be interested in mining on information directly related to real-life events, or news-related information on the Web. In this paper we propose a system to enable mining on news-related articles instead of raw web pages. There are functionally two tasks in our system: 1) mining for news-related articles and 2) duplicate elimination. For the first task, a novel approach for determining titles, contents and publication-times of news-related articles is presented. Anchor texts are firstly used to extract titles from HTML bodies and then contents are extracted right after titles. After that, crawl-times and are used to initially compute publication-times for all articles. At last, times extracted from HTML bodies, URLs and anchor texts are used to determine precise publication-times for possible articles. For the second task, a duplicate detection algorithm for news-related articles is described which is base on LCS (longest common subsequence) and achieves both high precision and high recall. The framework of this algorithm has been presented as a general-purpose algorithm for web pages in a previously published paper. In this paper we explain why this algorithm is particularly suitable for news-related articles and present corresponding implementation details. Evaluations have been conducted which show the effectiveness of our approaches. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case study on incentive mechanism and its effectiveness of campus network in virtual community-case of Myclub2.com

    Publication Year: 2010 , Page(s): 38 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (114 KB) |  | HTML iconHTML  

    The effectiveness of incentive mechanism in virtual community determines whether this virtual community can achieve its primary goals when it's first established. Meantime it's also a key factor to determine whether the community will exist over a long period of time as long as its profit is more than the cost. As a special virtual community, the campus virtual community provides students a platform for communication, meanwhile it implements some educational purposes. Therefore, the settings of incentive mechanism directly determine the educational effect when the virtual community introduced in. In this paper, by the way of case study, the author introduces a campus virtual community named Myclub2.com which was established by himself, labors its design goals and value degree settings of network behavior, analyzes user's initial motivation and induced motivation, also elaborates the setting mode and the function system of incentive mechanism. By summarizing Myclub2.com's operational situation over the past 10 years in the aspects of module settings, interface layout, identity and value orientation settings and function system, also analyzing the effectiveness of user's behavior guidance, it is shown that users are highly interested in those functions promoting communication. Moreover, by marking the post as Top or Essence is an adjustment of visual display which can guide the network behavior effectively. It is concluded that the internal value system based on visual control and incentive function plays an effective guiding role for user's network behavior. In addition, the ranking settings of getting promoted in the virtual community are also appealing to many users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring the concepts of visualization, clustering, and re-finding in Web information gathering tasks: A survey

    Publication Year: 2010 , Page(s): 45 - 52
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (117 KB) |  | HTML iconHTML  

    The paper explores research concerned with improving aspects of the Web information gathering task. This type of task involves finding source of information on the Web, comparing different types of information, and re-finding information for reasoning and decision making. Research in Web information retrieval has explored visualization, clustering, and re-finding for improving the effectiveness of Web search tools. Investigations concerning aspects of the Web information gathering task are discussed in this paper. In addition, the paper provides practical research recommendations for improving the design of Web information gathering tools. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and evaluation of a parallel k-nearest neighbor algorithm on CUDA-enabled GPU

    Publication Year: 2010 , Page(s): 53 - 60
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (286 KB) |  | HTML iconHTML  

    Recent developments in Graphics Processing Units (GPUs) have enabled inexpensive high performance computing for general-purpose applications. Due to GPU's tremendous computing capability, it has emerged as the co-processor of CPU to achieve a high overall throughput. CUDA programming model provides the programmers adequate C language like APIs to better exploit the parallel power of the GPU. K-nearest neighbor (KNN) is a widely used classification technique and has significant applications in various domains, especially in text classification. The computational-intensive nature of KNN requires a high performance implementation. In this paper, we propose CUKNN, a CUDA-based parallel implementation of KNN. It launches two CUDA kernels, distance calculation kernel and selecting kernel. In the distance calculation kernel, a great number of concurrent CUDA threads are issued, where each thread performs the calculation between the query object and a reference object; in the selecting kernel, threads in a block find the local-k nearest neighbors of the query object concurrently, and then a thread is invoked to find the global-k nearest neighbors out of the queues of local-k neighbors. Various CUDA optimization techniques are applied to maximize the utilization of GPU. We evaluate our implementation by using synthetic dataseis and a real physical simulation dataset. The experimental results demonstrate that CUKNN outperforms the serial KNN on an HP xw8600 workstation significantly, achieving up to 46.7IX speedup on the synthetic dataseis and 42.49X on the physical simulation dataset including I/O cost. It also shows good scalability when varying the number of dimensions of the reference dataset, the number of objects in the reference dataset, and the number of objects in the query dataset. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The relationship between regulatory emotional self-efficacy, Big-Five personality and Internet events attitude

    Publication Year: 2010 , Page(s): 61 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (97 KB) |  | HTML iconHTML  

    Internet is quickly becoming one of the most important parts in social life. As such people could pay more attention to the Internet events. However, it is not clear that which psychological factors influence Internet event attitudes. The present research was to investigate the mechanism of how Big-Five personality and regulatory emotional self-efficacy influence the attitude on Internet event. In the present study, 183 participants completed a series questionnaires posted online, and the questionnaire includes Big-Five Personality Scales, RESE Scales, Internet Event Attitude Scales. The result indicated that RESE and Big-Five personality contributed significantly to the attitude on Internet Event, in addition, RESE positively correlated to Big-Five personality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resilience as a predictor of internet addiction: The mediation effects of perceived class climate and alienation

    Publication Year: 2010 , Page(s): 66 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (90 KB) |  | HTML iconHTML  

    Adolescent internet addiction is becoming a serious problem in China. The aim of the present study was to examine the relationship between resilience and internet addiction. Three hundred and forty-eight vocational technical school students from Hebei province completed the self-reported questionnaire. Structural Equation Model was used to explore the effects of resilience, perceived class climate, and alienation on internet addiction. Result shows that resilience is negatively associated with internet addiction, and this relationship was partially mediated by perceived class climate and alienation. The current finding suggests that improving individual's resilience can be an effective way to reduce internet addiction behavior. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Psychological influences of blogging: Blog use, personality trait and self-concept

    Publication Year: 2010 , Page(s): 71 - 76
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (101 KB) |  | HTML iconHTML  

    There is a growing body of evidence indicating that individual differences and Internet usage have an interaction relationship. We conducted a questionnaire survey of personal blog authors to extend this research to a popular online format for expression: blogging. The results indicate that bloggers and non-bloggers share lots of similarities in personality-related characters. Additionally, self-esteem is a major determinate to bloggers' physical self-concept, while self-esteem, emotional intelligence, conscientiousness and neuroticism show direct effect on non-bloggers' physical self-concept. The finding suggests that the impact of blog usage generates to personal psychological traits in daily life. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relationship variables in online versus face-to-face counseling

    Publication Year: 2010 , Page(s): 77 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (97 KB) |  | HTML iconHTML  

    The study examined relational variables in face-to-face versus online counseling to explore how initial relationships between a counselor and a client differed from face-to-face and online communication. The participants were 42 undergraduates who acted to come to Students Counseling Center for help for the first time. Five graduates of clinical psychology acted as their counselors. The counselors of the two groups were same. Participants were told to fill out several pencil-and-paper measures on the completion of their interaction such as satisfaction, genuiness, positive regard, self-disclose and the depth of processing, mainly about relationship variables. The findings indicated that the face-to-face group felt more satisfied with the experience and experienced a higher degree of genuiness with their partner. There were no significant differences between groups in regard to the level of empathy, positive regard, self-disclose and the depth of processing. The implications for online counseling are discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer-assisted Video-on-Demand with an informed interface of chunk availability

    Publication Year: 2010 , Page(s): 83 - 86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (96 KB) |  | HTML iconHTML  

    Video-on-Demand (VoD) is popular on the Internet for offering time-unconstrained viewing experience. In order to reduce their operational costs, VoD service providers call for assistance of the participating peers via employing peer-to-peer technologies. However, perfect viewing experiences perceived on the home DVD players are still hardly (or impractical) implemented on the Internet because of Internet features, provider costs, media characteristics, and viewer behaviors. In this paper, we are motivated to take viewer behaviors into account. Specifically, information of media chunks being available in neighborhood is compactly represented on the interface of viewers' clients. The viewers in turn may bias their future VCR operations towards the currently available chunks for achieving a seldom interrupted media playback. As a side effect, VoD providers are more likely to reduce their operational costs for serving asynchronously arriving viewers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A general social intelligent algorithmic framework for packing problem with multi-processors

    Publication Year: 2010 , Page(s): 87 - 91
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (107 KB) |  | HTML iconHTML  

    In this paper we establish a general social intelligent algorithmic framework for packing problem under the help of the conception of social computing. In this framework, packing problem can be solved intelligently, with the same asymptotic bounds by applying the existing packing algorithms. More precisely, our framework is designed to intelligently adopt the most proper one among all the given existing packing algorithms to pack the fixed given rectangle according to the present packing scenario. Moreover, for single packing processor, the algorithm created by our framework certainly turns out to be the algorithm the processor holds. But for multiple packing processors, it can construct and provide one social parallel intelligent packing algorithm based on all existing ones. This constructed algorithm certainly better than any algorithm involved, since the most proper algorithm is always adopted. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effect of E-service category on consumers' perceived risk

    Publication Year: 2010 , Page(s): 92 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (99 KB) |  | HTML iconHTML  

    Whether consumers' risk perception differs or not when purchasing different services online? 115 participants were investigated to discover the differences in the lab experiment, and the results indicated that: a) Consumers perceived higher risk in buying professional services than mass services, interactive services, and supporting services online, while the differences among the latter three services were not significant, b) The constructs of risk perception in different E-services differ: consumers perceived performance risk when purchasing mass services; financial risk and psychological risk were perceived in interactive services; when buying the supportive services, financial risk was perceived; financial risk, social risk and psychological risk were perceived in buying professional services online. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Color image retrieval with adaptive feature weight in Brushlet domain

    Publication Year: 2010 , Page(s): 97 - 102
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (287 KB) |  | HTML iconHTML  

    This paper presents a method for extracting texture and color hybrid features and constructing an adaptive weight operator, which can be used for content-based image retrieval (CBIR). This method extracts texture feature effectively based on Brushlet transform, quantifies in the HSV space, and extracts color feature by color histogram. K-mean clustering is introduced to count overall characteristics of images and to classify images. Moreover, in considering the distinction between images, an adaptive feature weight operator is constructed. Experiments show that average precision of our method has increased by 12% compared with hybrid features of traditional weight-based. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive image retrieval based on generalized Gaussian model and LBP

    Publication Year: 2010 , Page(s): 103 - 107
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (125 KB) |  | HTML iconHTML  

    This paper proposes an adaptive image retrieval method via spatial-frequency mixed features (SFMF). The SFMF can describe spatial and frequency information of image simultaneously. More specifically, spatial feature is local binary pattern (LBP) histogram extracted from image. Frequency features are described as the generalized Gaussian density (GGD) of Contourlet transform detail coefficients and LBP histogram of approximation coefficients. Further, we use closed-loop feedback to adjust weighting factor adoptively for image retrieval. Experiments show that average recall rate of this method is 12.08%, 10.23% higher than frequency domain method and LBP respectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying machine query for an intelligent web browser system

    Publication Year: 2010 , Page(s): 108 - 113
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (172 KB) |  | HTML iconHTML  

    This paper describes our research on learning browsing behavior model for predicting the current information need of a web user. This inference is based on a parameterized model of how the sequence of browsing behavior indicates the degree to which page content satisfies the user's information need, and the model parameters can be estimated using standard methods from a labelled corpus. Data from lab experiments demonstrate that the prediction model can effectively identify the information needs of new users, browsing previously unseen pages. The paper concludes with an overview of our WebIC which integrates the model into a web browser, to help the user find the relevant information effectively from the web. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiple description coding based on multiwavelets transforming

    Publication Year: 2010 , Page(s): 114 - 118
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    Multiple description coding is a source coding for multiple channels such that a decoder which receives an arbitrary subset of the channels may produce a useful reconstruction, which is one of useful methods for solving the problem of packet losses in network communication. In this paper, on the basis of multiwavelet transform, a new method of multiple description coding will be presented, and experiments show it works well. Moreover, a parametrization of one kind of multifiler banks, which generate multiwavelets with some good properties, will be given. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why do people blog? Exploration of motivations for blogging

    Publication Year: 2010 , Page(s): 119 - 122
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (145 KB) |  | HTML iconHTML  

    Blogs have become an increasingly popular form of displaying online content for general Internet users. The reason why people create and maintain blogs should be concerned. This study has offered an investigation into the motivations of adult bloggers in China using questionnaires. The factor analysis results indicate that there were five motivations for blogging were: need for affection, expression of one's thoughts, obtaining benefit, sharing knowledge and information, and communicating with others. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intra-domain routing for traffic engineering

    Publication Year: 2010 , Page(s): 123 - 126
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (111 KB) |  | HTML iconHTML  

    Traffic engineering is essential for the performance optimization of operational networks, which render the indispensable platform for web applications like web search and multimedia communication. We will review recent progress in intra-domain routing, which is a critical ingredient of traffic engineering. Our focus will be on techniques handling traffic uncertainty in networks. We review three classes of solutions: link weight optimization, traffic-adaptive approaches and demand-oblivious routing. The link weight optimization approach attempts to make an OSPF-like routing scheme accommodate traffic changes. The traffic-adaptive approaches usually rely on a multipath implementation, so that an MPLS architecture is necessary. The adaptive approach may encounter stability and convergence issues. To overcome such problems, the demand-oblivious routing was studied. It designs a static routing and can provide a performance guarantee without accurate knowledge of the traffic. We present the original work on oblivious routing by Applegate and Cohen and our work on a feasible implementation using multipath routing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-line learning skin model based on similarity between neighboring pixels

    Publication Year: 2010 , Page(s): 127 - 131
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (149 KB) |  | HTML iconHTML  

    It is well known that the color of many natural and man-made objects is often very similar to that of human skin, such as sand, brick, to name a few. For the task of skin detection, it is often a very challenge task to identify the right skin locations while being robust against the distraction of these objects. In this paper, we present an on-line learning approach to model human skin by utilizing the similarity between neighboring pixels, and then combine it with region growing technique to accurately segment skin regions. By assuming the colors of neighboring skin pixels in YCbCr color space follows conditional Gaussian distributions, an on-line learning update is devised to efficiently estimate the parameters of these Gaussian distributions. For the inference stage, our algorithm first evaluates the color distance map in RGB space to reliably place the seeds of skin regions, then segment the skin regions by iterative seed growing based on the learned skin models. Empirical evaluations demonstrate the efficacy of the proposed approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acronym extraction using SVM with Uneven Margins

    Publication Year: 2010 , Page(s): 132 - 138
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (126 KB) |  | HTML iconHTML  

    Extracting acronyms and their expansions from plain text is an important problem in text mining. Previous research shows that the problem can be solved via machine learning approaches. That is, converting the problem of acronym extraction to binary classification. We investigate the classification problem and find that the classes are highly unbalanced (the positive instances are very rare compared to negative ones). So we try to tackle the problem using an uneven margin classifier - SVM with Uneven Margins. Experimental results showed that our approach can get better results than baseline methods of using heuristic rules and conventional SVM models. Experimental results also showed how uneven margins classifier made the tradeoff between the precision and recall of extraction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.