By Topic

2011 Third International Conference on Knowledge and Systems Engineering

14-17 Oct. 2011

Filter Results

Displaying Results 1 - 25 of 52
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1081 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • KSE 2011 Preface

    Publication Year: 2011, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (68 KB) | HTML iconHTML
    Freely Available from IEEE
  • KSE 2011 Organization

    Publication Year: 2011, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • KSE 2011 External Reviewers

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • IWEC 2011 Organization

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Invited Speakers

    Publication Year: 2011, Page(s):xiv - xv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB)

    The Internet has been becoming an important infrastructure of network society. The success of the Internet is mainly due to its architecture. In this presentation, the author shares the experience of the design and the operation of China Education and Research Network (CERNET), the second generation China Education and Research Network (CNGI-CERNET2) and summarizes the challenges which the future ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Different Methods for Initialization the I-k-Means Clustering of Time Series Data

    Publication Year: 2011, Page(s):3 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    I-k-Means is a popular clustering algorithm for time series data transformed by a multiresolution dimensionality reduction method. In this paper, we compare two different methods for initialization the I-k-means clustering algorithm. The first method uses kd tree and the second applies cluster-feature tree (CF-tree) to determine initial centers. In both approaches of clustering, we employ a new me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time Series Discord Discovery Based on iSAX Symbolic Representation

    Publication Year: 2011, Page(s):11 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Among several algorithms have been proposed to solve the problem of time series discord discovery, HOT SAX is one of the widely used algorithms. In this work, we employ state-of-the-art iSAX representation in time series discord discovery. We propose a new time series discord discovery algorithm, called HOTiSAX, by employing iSAX rather than SAX representation in discord discovery algorithm. The i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Algorithms for Mining Frequent Itemsets with Constraint

    Publication Year: 2011, Page(s):19 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    An important problem of interactive data mining is "to find frequent item sets contained in a subset C of set of all items on a given database". Reducing the database on C or incorporating it into an algorithm for mining frequent item sets (such as Charm-L, Eclat) and resolving the problem are very time consuming, especially when C is often changed. In this paper, we propose an efficient approach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Solution for Privacy Preserving Outlier Detection

    Publication Year: 2011, Page(s):26 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    In this paper, we study some parties - each has a private data set - want to conduct the outlier detection on their joint data set, but none of them want to disclose its private data to the other parties. We propose a linear transformation technique to design protocols of secure multivariate outlier detection in both horizontally and vertically distributed data models. While different from the mos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WORL: A Web Ontology Rule Language

    Publication Year: 2011, Page(s):32 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    We develop a Web ontology rule language, called WORL, which combines a variant of OWL 2 RL with eDatalog-with-negation. We disallow the features of OWL 2 RL that play the role of constraints (i.e., the ones that are translated to negative clauses), but allow additional features like negation, the minimal number restriction and unary external checkable predicates to occur in the left hand side of c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Querying Fuzzy Object-Oriented Data Based on Fuzzy Association Algebra

    Publication Year: 2011, Page(s):40 - 47
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Along with the developing fuzzy object-oriented data models for an expression and a processing of uncertain and imprecise data, the fuzzy data query languages should also be studied, is built to perform data queries in the fuzzy data models flexibly and certainly. Fuzzy association algebra is considered as a query algebra for fuzzy object-oriented data models. In this article, based on possibility... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Parallel Cooperative Coevolution Evolutionary Algorithm

    Publication Year: 2011, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    Evolutionary algorithms (EAs) have been widely applied to solve many numerical and combinatorial optimization problems. A special paradigm of EAs has been promoted allowing several populations to co-evolve together. During evolution process these populations can be either cooperative or competitive. The cooperative co-evolution evolutionary algorithm (CCEA) has shown a great deal in solving large ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Volume Visualization and Exploration Based on Semi-automatic Multidimensional Transfer Function Design

    Publication Year: 2011, Page(s):54 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    Exploration and analysis of scalar and multivariate volume data play an important role in different domains from physical simulations to medical treatments. In visual analytics of volumetric data sets we need to define a multidimenional transfer functions. This is a challenging task because of the difficulty in understanding multiple attribute spaces and displaying in physical three dimension spac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Algorithm for Discovering Maximum Length Frequent Itemsets

    Publication Year: 2011, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    The exploitation of frequent itemsets has been restricted by the the large number of generated frequent itemsets and the high computational cost in real world applications. Meanwhile, maximum length frequent itemsets can be efficiently discovered on very large datasets and are useful in many application domains. At present, LFIMiner_ALL is the fastest algorithm for mining maximum length frequent i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhance Java Software Development with Knowledge Acquisition and Management Tools

    Publication Year: 2011, Page(s):70 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (850 KB) | HTML iconHTML

    The Semantic Web can be a very promising platform for developing knowledge management systems. It has been applied in many domains, especially in Software Engineering. The main benefit is high improvement in the precision by searching for knowledge, as well as the possibility to retrieve a composition of knowledge sources which are relevant for the software development process. However, the proble... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic-Based Subtree Crossover Applied to Dynamic Problems

    Publication Year: 2011, Page(s):78 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    Although many real world problems are dynamic in nature, the study of Genetic Programming in dynamic environments is still immature. This paper investigates the application of some recently proposed semantic-based crossover operators on a series of dynamic problems. The operators studied include Semantic Similarity based Crossover and the Most Semantic Similarity based Crossover. The experimental ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast and Efficient Method for Estimating Amino Acid Substitution Models

    Publication Year: 2011, Page(s):85 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Amino acid substitution models (matrices) play important role for protein phylogenetics analysis and protein sequence alignment. Different approaches have been proposed to estimate amino acid substitution matrices since the time of Day Hoff in 1972. Currently, maximum likelihood approaches have been widely used to estimate popular matrices such as WAG, LG, FLU, etc. Although maximum likelihood app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building an Efficient Functional-Tag Labeling System for Vietnamese

    Publication Year: 2011, Page(s):92 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Functional tags represent the role of syntactic constituents such as noun phrases and verb phrases in a tree. Functional-tag labeling has been studied for languages such as English and Chinese. In this paper, we present a new system for tagging Vietnamese sentences functionally. We used maximum entropy model for this task with six tree-based features. Besides, a new feature based on word cluster h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protein Type Specific Amino Acid Substitution Models for Influenza Viruses

    Publication Year: 2011, Page(s):98 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    The amino acid substitution model (matrix) is a crucial part of protein sequence analysis systems. General amino acid substitution models have been estimated from large protein databases, however, they are not specific for influenza viruses. In previous study, we estimated the amino acid substitution model, FLU, for all influenza viruses. Experiments showed that FLU outperformed other models when ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Low-delay Push-Pull Based Application Layer Multicast for P2P Live Video Streaming

    Publication Year: 2011, Page(s):104 - 111
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1098 KB) | HTML iconHTML

    In this paper, we present our low-delay push-pull based application layer multicast for live video streaming on P2P networks. The main goal of our work is to optimize content delivery on P2P networks to guarantee the time constraints of live video streaming. We achieve this goal by constructing multiple balanced sub-trees for pushing data and optimizing pulling connections between nodes in differe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.