By Topic

Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99

3-3 Sept. 1999

Filter Results

Displaying Results 1 - 25 of 152
  • Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (1417 KB)
    Freely Available from IEEE
  • Beyond current technology: the perspective of three RC GIS projects panel discussion

    Publication Year: 1999, Page(s): 510
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):933 - 937
    Request permission for commercial reuse | PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • Applying signature filtering technique to join algorithms

    Publication Year: 1999, Page(s):928 - 932
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Because joins are time-consuming operations in database systems, many researchers have done a lot of research work for improving the performance of join algorithms, including join filtering techniques. This paper presents a new filter, the signature filter, to improve further the performance of various join algorithms. We have carried out experiments in an object-oriented database system to analyz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schema versioning: queries to the generalized temporal database system

    Publication Year: 1999, Page(s):458 - 459
    Cited by:  Papers (1)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (24 KB)

    Raw data and database structures are evolving entities that require adequate support for past, present and even future versions. Temporal databases supporting schema versioning were developed with the aim of satisfying this requirement. This paper considers a generalized temporal database system, which provides support for time at both intensional and extensional levels. The support for schema ver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-repudiation in an agent-based electronic commerce system

    Publication Year: 1999, Page(s):864 - 868
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    ABECOS is an agent-based e-commerce system under development at the Nanyang Technological University. A key factor in making this system usable in practice is strict security control. One aspect of security is the provision of non-repudiation services. As protocols for non-repudiation have focused on message non-repudiation, its adaptation to afford non-repudiation in a communication session for t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-aware distributed query processing

    Publication Year: 1999, Page(s):923 - 927
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    In the environment of wide-area networks such as the Internet, distributed query processing is becoming problematic due to changes of the underlying networks and user requirements. In this new context, conventional query processing strategies with the homogeneous assumption will not work well, because they are unable to adapt to unexpected changes in the performance of the communication networks. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CHOROCHRONOS: research on spatiotemporal database systems

    Publication Year: 1999, Page(s):452 - 456
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    Spatiotemporal database management systems can become an enabling technology for important applications such as geographic information systems (GIS), environmental information systems, and multimedia. We address research issues in spatiotemporal databases, by providing an analysis of the challenges set, the problems encountered, as well as the proposed solutions and the envisioned research areas o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-party fair exchange with an off-line trusted neutral party

    Publication Year: 1999, Page(s):858 - 862
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    Recently developed cryptographic techniques make it possible to construct fair exchange protocols with an off-line trusted third party (TTP). The technique is referred to as a verifiable encryption scheme (VES) and proves that a ciphertext is the result of the encryption of a specified value without revealing this value. In this paper we apply the technique to multi-party fair exchange (MPFE) prot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of a query language for XML data

    Publication Year: 1999, Page(s):919 - 922
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (28 KB)

    XML data are expected to be widely used in Web information systems and EC/EDI applications. Such applications usually use a large number of XML data. First, we must allow users to retrieve only necessary portions of XML data by specifying search conditions to flexibly describe such applications. Second, we must allow users to combine XML data from different sources. To this end, we will provide a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shaping the research agenda for security in e-commerce

    Publication Year: 1999, Page(s):810 - 814
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    We overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applications on the Internet generally go beyond the more traditional requirements of network security. This is particularly true for the requirements that address the complexity and availability of cryptographic applications, the anonymity of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structure-based similarity search with graph histograms

    Publication Year: 1999, Page(s):174 - 178
    Cited by:  Papers (9)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Objects like road networks, CAD/CAM components, electrical or electronic circuits, molecules, can be represented as graphs, in many modern applications. The authors propose an efficient and effective graph manipulation technique that can be used in graph-based similarity search. Given a query graph Gq (V,E), they would like to determine fast which are the graphs in the database that are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing efficient requirements management

    Publication Year: 1999, Page(s):370 - 375
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    This paper reports the experience gained from ESSI project 24257-Requirements Management in Alcatel Telecom Norway (RMATN) which was started by Alcatel's Defence Communication division (now Thomson-CSF Norcom) in order to address problems relating to RM. The projects focus has been the introduction of improved RM-processes including requirements traceability and requirements attributes, supported ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inter-enterprise workflow management systems

    Publication Year: 1999, Page(s):623 - 627
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    Electronic commerce is conceived as one of the major channels for performing commerce on a global scale, and the area is rapidly evolving. Currently, transferring and processing electronic data is handled separately from the enterprise support system, e.g., workflows, thus blurring the actual functionality of the supply chain. We propose an extension of a standard workflow model to enable the desc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reusing scenario based approaches in requirement engineering methods: CREWS method base

    Publication Year: 1999, Page(s):305 - 309
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    Scenarios have proven useful to elicit, validate and document requirements but the development of new methods find tools for requirements engineering integrating scenario based approaches has been limited. The view developed in this paper is that scenario based approaches should be looked upon as reusable components. Our concern is therefore twofold: first, to represent scenario based approaches i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developments in spatio-temporal query languages

    Publication Year: 1999, Page(s):441 - 449
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    Integrating spatio-temporal data as abstract data types into already existing data models is a promising approach to creating spatio-temporal query languages. In this context, an important new class of queries can be identified which is concerned with developments of spatial objects over time, that is, queries ask especially for changes in spatial relationships. Based on a definition of the notion... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient detection of failure modes in electronic commerce protocols

    Publication Year: 1999, Page(s):850 - 857
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    The design of key distribution and authentication protocols has been shown to be error-prone. These protocols constitute the part of more complex protocols used for electronic commerce transactions. Consequently, these new protocols are likely to contain flaws that are even more difficult to find. In this paper, we present a search method for detecting potential security flaws in such protocols. O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight objects for QoS management in CORBA

    Publication Year: 1999, Page(s):914 - 918
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    This paper describes a global scheme for the support of quality of service (QoS) in CORBA environment. The support of QoS is done through the interaction between two CORBA objects, the micro QoS manager and the object resource manager. A key feature of this scheme is the ability to provide an accurate QoS support according to the application type while enabling a high level of maintenance and reus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining in law with adaptive learning techniques

    Publication Year: 1999, Page(s):799 - 803
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    The freely available law on the Internet could be one of the best applications of data mining. The growing complexity of legal rules and the necessary adaptation to user needs requires better instruments than manual browsing and searching interfaces. Our intelligent agent offers information reconnaissance by classifying and describing unknown text corpora of search results. Based on standard agent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Similarity indexing by means of a metric

    Publication Year: 1999, Page(s):206 - 210
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    This paper presents a method for indexing a large data set by means of a metric and indicates its use for quantified proximity searching (search precision is a parameter of the query). We make a proposal for adding the property of a dimension to a metric and show that this is compatible to our customized understanding of a dimension. We present an algorithm which computes, in optimal time, an inde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Windsurf: region-based image retrieval using wavelets

    Publication Year: 1999, Page(s):167 - 173
    Cited by:  Papers (21)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    In this paper we present WINDSURF (Wavelet-Based Indexing of Images Using Region Fragmentation), a new approach to content-based image retrieval. The method uses the wavelet transform to extract color and texture features from an image and applies a clustering technique to partition the image into a set of “homogeneous” regions. Similarity between images is assessed by using the Bhatta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The process of inconsistency management: a framework for understanding

    Publication Year: 1999, Page(s):364 - 368
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    The process of managing inconsistency is a fundamental activity that permeates a large part of the systems development process. Failure to identify inconsistencies may lead to major problems in the operation of a system, while failure to support a range of inconsistency handling strategies can lend to a rigid and impractical development process. We argue, therefore, that the inconsistency manageme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Atomicity implementation in mobile computing

    Publication Year: 1999, Page(s):105 - 113
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Distributed systems using mobile computing do not have the traditional ACID properties (Atomicity, Consistency, Isolation and Durability), and, therefore, consistency problems may occur. These problems may be managed by using semantic ACID properties, i.e. from an application point of view, the system should function as if all the traditional ACID properties had been implemented. In this paper the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Document storage and retrieval in a neural database

    Publication Year: 1999, Page(s):598 - 602
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    A database of the leech nervous system has been developed. The end users of the database will mainly be neuroscientists, especially those studying the invertebrate nervous system. It is mainly a document database, collecting papers on the leech nervous system, which is maintained in a largely automatic fashion. The database is composed of three subsystems: (1) an object oriented, relational databa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adding a systemic view to the requirements engineering processes

    Publication Year: 1999, Page(s):321 - 325
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    Requirements Engineering (RE) can be seen as a real challenge for human intelligence and ability to manage what we know, what other people know, and what nobody knows. To cope with this challenge, a good way to proceed is to adopt a systemic view, where all the factors involved (information, problems, stakeholders, notations, etc.) may be handled, whilst being as aware as possible of their connect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.