By Topic

Digital Information Management (ICDIM), 2011 Sixth International Conference on

Date 26-28 Sept. 2011

Filter Results

Displaying Results 1 - 25 of 64
  • Author index

    Publication Year: 2011, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • International Program Committee

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (231 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (534 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (215 KB)
    Freely Available from IEEE
  • On mining XML integrity constraints

    Publication Year: 2011, Page(s):23 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    Since XML documents can appear in any semi-structured form, structural and integrity constraints are often imposed on the data that are to be modified or processed. These constraints are formally defined in a schema. But, despite the obvious advantages, the presence of a schema is not mandatory and many XML documents are not joined with any. Consequently, no integrity constrains are specified as w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of stop word lists in text retrieval using Latent Semantic Indexing

    Publication Year: 2011, Page(s):133 - 136
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    The goal of this research is to evaluate the use of English stop word lists in Latent Semantic Indexing (LSI)-based Information Retrieval (IR) systems with large text datasets. Literature claims that the use of such lists improves retrieval performance. Here, three different lists are compared: two were compiled by IR groups at the University of Glasgow and the University of Tennessee, and one is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online ngram-enhanced topic model for academic retrieval

    Publication Year: 2011, Page(s):137 - 142
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Applying topic model to text mining has achieved a great success. However, state-of-art topic modeling methods still have potential to improve in academic retrieval field. In this paper, we propose an online unified topic model, which is ngram-enhanced. Our model discovers topics with unigrams as well as topical bigrams and is updated by an online inference algorithm with the new incoming data str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Private range query by perturbation and matrix based encryption

    Publication Year: 2011, Page(s):211 - 216
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    In this paper, we propose a novel approach for private query; IPP (inner product predicate) method. Private query is a query processing protocol to obtain requesting tuples without exposing any information about what users request to third persons including service providers. Existing works about private query such as PIR, which ensure information theoretic safety, have severe restriction because ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of motivations for using mobile content sharing games

    Publication Year: 2011, Page(s):258 - 263
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1082 KB) | HTML iconHTML

    Applications blending games with mobile content sharing have recently attracted much interest. In this paper, we examine users' motivations for creating content in the context of Indagator, a mobile content sharing game. Studying motivations is important because a deeper understanding will help designers create compelling and impactful applications for users. We conducted an experiment where 28 pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern mining for query answering in marine sensor data

    Publication Year: 2011, Page(s):288 - 293
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1218 KB) | HTML iconHTML

    An integrated pattern mining technique for query answering is proposed for marine sensor data. In pattern query, we adopt the dynamic time warping (DTW) method and propose the use of a query relaxation approach in finding similar patterns. We further calculate prediction from discovered similar patterns in marine sensor data. The predictive values are then compared with the forecast from hydrodyna... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chart image understanding and numerical data extraction

    Publication Year: 2011, Page(s):115 - 120
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2002 KB) | HTML iconHTML

    Chart images in digital documents are an important source of valuable information that is largely under-utilized for data indexing and information extraction purposes. We developed a framework to automatically extract data carried by charts and convert them to XML format. The proposed algorithm classifies image by chart type, detects graphical and textual components, extracts semantic relations be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multisensor fusion-based object detection and tracking using Active Shape Model

    Publication Year: 2011, Page(s):108 - 114
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1536 KB) | HTML iconHTML

    This paper proposes automatic target detection and tracking system using Active Shape Model (ASM). Existing model based approaches for tracking are either manually initiated or need some form of user interaction to locate the object in images. Also the low light environmental conditions for surveillance systems make the tracking further harder. Hence the proposed system makes use of multiple senso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When theory meets practice: A case report on conceptual modeling for XML

    Publication Year: 2011, Page(s):242 - 251
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Modern information systems usually exploit numerous XML formats for communication with other systems. There are, however, many potential problems hidden. This includes the degree of readability, integrability and adaptability of the XML formats. In the first part of this paper we demonstrate the problems on a real-world application - the National Register of Public Procurement in the Czech Republi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying multi-correlation for improving forecasting in cyber security

    Publication Year: 2011, Page(s):179 - 186
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1557 KB) | HTML iconHTML

    Currently, defense of the cyber space is mostly based on detection and/or blocking of attacks (Intrusion Detection and Prevention System - IDPS). But, a significant improvement for IDPS is the employment of forecasting techniques in a Distributed Intrusion Forecasting System (DIFS), which enables the capability for predicting attacks. Notwithstanding, during our earlier works, one of the issues we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index-based n-gram extraction from large document collections

    Publication Year: 2011, Page(s):73 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    N-grams are applied in some applications searching in text documents, especially in cases when one must work with phrases, e.g. in plagiarism detection. N-gram is a sequence of n terms (or generally tokens) from a document. We get a set of n-grams by moving a floating window from the begin to the end of the document. During the extraction we must remove duplicate n-grams and we must store addition... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new perfect hashing based approach for secure stegnograph

    Publication Year: 2011, Page(s):174 - 178
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    Image stegnography is an emerging field of research for secure data hiding for data transmission over internet, copyright protection, and ownership identification. A couple of techniques have been proposed for colour image stegnography. However, the colour images are more costly to transmit on internet due to their size. In this paper, we propose a new perfect hashing based approach for stegnograp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discriminating early stage AD patients from healthy controls using synchronization analysis of EEG

    Publication Year: 2011, Page(s):282 - 287
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1019 KB) | HTML iconHTML

    In this paper we study how the meso-scale and micro-scale electroencephalography (EEG) synchronization measures can be used for discriminating patients suffering from Alzheimer's disease (AD) from normal control subjects. To this end, two synchronization measures, namely power spectral density and multivariate phase synchronization, are considered and the topography of the changes in patients vs. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-aware SQA e-learning system

    Publication Year: 2011, Page(s):327 - 331
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2031 KB) | HTML iconHTML

    In this paper, we propose an ontological design for developing a context-aware e-learning system that supports learners developing Software Quality Assurance (SQA) compliant software. The learning process is driven by the type of software product the learner is dealing with, as well as, its SQA requirements and corresponding SQA techniques and procedures. The paper shows a global ontology design t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BatCave: Adding security to the BATMAN protocol

    Publication Year: 2011, Page(s):199 - 204
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    The Better Approach To Mobile Ad-hoc Networking (BATMAN) protocol is intended as a replacement for protocols such as OLSR, but just like most such efforts, BATMAN has no built-in security features. In this paper we describe security extensions to BATMAN that control network participation and prevent unauthorized nodes from influencing network routing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic text classification and focused crawling

    Publication Year: 2011, Page(s):143 - 148
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    A focused crawler is a web crawler that traverse the web to explore information that is related to a particular topic of interest only. On the other hand, generic web crawlers try to search the entire web, which is impossible due to the size and the complexity of WWW. In this paper we make a survey of some of the latest focused web crawling approaches discussing each with their experimental result... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting software black-box defects using stacked generalization

    Publication Year: 2011, Page(s):294 - 299
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Defect number prediction is essential to make a key decision on when to stop testing. For more applicable and accurate prediction, we propose an ensemble prediction model based on stacked generalization (PMoSG), and use it to predict the number of defects detected by third-party black-box testing. Taking the characteristics of black-box defects and causal relationships among factors which influenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method based on Finite State Machine for detecting misbehaving nodes in ad hoc networks

    Publication Year: 2011, Page(s):187 - 192
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    In this paper we express a new intrusion detection system based FSM (Finite State Machine) in ad hoc networks. Security is one of the most important issues in current networks. The most common cases of attacks in mobile Ad hoc networks can be drop of routing packages and changes in the incoming packet which aims at disrupting the network routing and overall network reduce performance. The presente... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web service with criteria: Extending WSDL

    Publication Year: 2011, Page(s):205 - 210
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    WSDL is used to describe the interface of a service, in XML format. The interface describes the functional properties as well as non functional properties. We are concerned with specifying `criteria' as a non functional property of a web service. For this we have extend WSDL to X-WSDL. In order to add criteria information we extend the WSDL (Web Service Definition Language) schema by adding a new ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategic government initiatives to promote diffusion of online retailing in Saudi Arabia

    Publication Year: 2011, Page(s):217 - 222
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    This paper presents findings from a study of factors affecting the rate of diffusion and adoption of online retailing in Saudi Arabia. In general, Saudi retailers have not responded actively to the global growth of online retailing. Accordingly, this research was conducted to find the key factors involved in this phenomenon. A major finding presented here, is that both buyers and sellers emphasize... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming for evaluating strip layout of progressive dies

    Publication Year: 2011, Page(s):229 - 234
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB) | HTML iconHTML

    A progressive die is an effective tool for efficient and economical production of sheet metal parts in large quantities. Nowadays, progressive die designers still spend much of their time on choosing better layouts among feasible ones. This study employs Pro/Web.Link, Hyper Text Markup Language (HTML) and JavaScript to develop an application which helps evaluate automatically strip layouts in Pro/... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.