By Topic

Information Reuse and Integration (IRI), 2012 IEEE 13th International Conference on

Date 8-10 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 122
  • [USB Start]

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (499 KB)  
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (299 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012 , Page(s): i - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • The 2012 IEEE international conference on information reuse and integration FORWARD

    Publication Year: 2012 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from Program Co-chairs

    Publication Year: 2012 , Page(s): xiv - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (54 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2012 , Page(s): xvi - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (51 KB)  
    Freely Available from IEEE
  • International technical program committee

    Publication Year: 2012 , Page(s): xviii - xx
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • Outline of a restriction-centered theory of reasoning and computation in an environment of uncertainty and imprecision

    Publication Year: 2012 , Page(s): xxi - xxii
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | PDF file iconPDF (155 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Information neighborhoods for visualization and monitoring strategies of real stochastic behavior trajectories: Computational aspects

    Publication Year: 2012 , Page(s): xxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (112 KB)  
    Freely Available from IEEE
  • Knowledge synthesizing and reusing by cognitive computing moving beyond “prescriptive programming” and von neumann

    Publication Year: 2012 , Page(s): xxiv - xxv
    Save to Project icon | Request Permissions | PDF file iconPDF (134 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Panel: Using information re-use and integration principles in big data

    Publication Year: 2012 , Page(s): xxvi
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012 , Page(s): xxvii
    Save to Project icon | Request Permissions | PDF file iconPDF (27 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012 , Page(s): xxviii
    Save to Project icon | Request Permissions | PDF file iconPDF (39 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012 , Page(s): xxix
    Save to Project icon | Request Permissions | PDF file iconPDF (42 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012 , Page(s): xxx
    Save to Project icon | Request Permissions | PDF file iconPDF (34 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2012 , Page(s): 743 - 746
    Save to Project icon | Request Permissions | PDF file iconPDF (62 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • A novel dataset-similarity-aware approach for evaluating stability of software metric selection techniques

    Publication Year: 2012 , Page(s): 1 - 8
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (155 KB) |  | HTML iconHTML  

    Software metric (feature) selection is an important pre-processing step before building software defect prediction models. Although much research has been done analyzing the classification performance of feature selection methods, fewer works have focused on their stability (robustness). Stability is important because feature selection methods which reliably produce the same results despite change... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reusing and converting code clones to aspects - An algorithmic approach

    Publication Year: 2012 , Page(s): 9 - 16
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (129 KB) |  | HTML iconHTML  

    In this research we have developed an algorithmic approach to convert source code clones to aspects. Code cloning is the process of duplicating code or creating replication of code fragments. In this work, we use an existing code-clone detection tool to identify code clones in a source code. Secondly, we design algorithms to convert the code clones into aspects and do aspect composition with the o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating test cases via model-based simulation

    Publication Year: 2012 , Page(s): 17 - 24
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (406 KB) |  | HTML iconHTML  

    We present a new model-based test case generation approach, which takes inputs an executable system model and preliminary test case coverage, performs an automated model simulation, and eventually generates refined test cases for software testing. We adopt Live Sequence Charts to specify an executable system model, and present a logic-based model simulator for consistency testing. As a result, our... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software product lines system test case tool and its initial evaluation

    Publication Year: 2012 , Page(s): 25 - 32
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (439 KB) |  | HTML iconHTML  

    The Software Product Lines (SPL) approach requires specific testing tools that should help to manage reusable testing assets and automate the test execution. Despite of the increasing interest by the research community regarding software testing tools, SPL still need tools to support the testing process. This work presents briefly the results of a mapping study on software testing tool and defines... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based diagnosis with default information implemented through MAX-SAT technology

    Publication Year: 2012 , Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (79 KB) |  | HTML iconHTML  

    Fault diagnosis is both a complex conceptual task and a fruitful application target for Artificial Intelligence techniques. In this paper, the focus is on model-based diagnosis (MBD), which formalizes reasoning from first principles. The contribution of the paper is twofold. On the one hand, the standard MBD representation framework is enriched to permit default information. On the other hand, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks

    Publication Year: 2012 , Page(s): 37 - 44
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (242 KB) |  | HTML iconHTML  

    Availability of low cost sensor nodes has made Wireless Sensor Networks (WSNs) a viable choice for monitoring critical infrastructure such as power grid, civil structures and others. There are quite a few approaches in the literature that use WSN to monitor pipelines (water, gas, oil, and various other types of pipelines). The primary goal of all these protocols is to detect device malfunctions su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A web-based user interface for a mobile robotic system

    Publication Year: 2012 , Page(s): 45 - 50
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (749 KB) |  | HTML iconHTML  

    An essential component of human-robot interaction, even for the case when the robot operates autonomously, is the interface between the human and the robot. This paper presents an AJAX-based graphical user interface for a mobile robotic system that has multiple sensors (an ultrasonic array, a thermal sensor, and a video streaming system) to obtain information about the environment, a virtual field... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating and enhancing cross-domain rank predictability of textual entailment datasets

    Publication Year: 2012 , Page(s): 51 - 58
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (186 KB) |  | HTML iconHTML  

    Textual Entailment (TE) is the task of recognizing entailment, paraphrase, and contradiction relations between a given text pair. The goal of textual entailment research is to develop a core inference component that can be applied to various domains, such as IR or NLP. Since the domain that a TE system applies to may be different from its source domain, it is crucial to develop proper datasets for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.