By Topic

Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99

3-3 Sept. 1999

Filter Results

Displaying Results 1 - 25 of 152
  • Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (1417 KB)
    Freely Available from IEEE
  • Beyond current technology: the perspective of three RC GIS projects panel discussion

    Publication Year: 1999, Page(s): 510
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • Electronic copyright management systems: requirements, players and technologies

    Publication Year: 1999, Page(s):896 - 898
    Cited by:  Papers (4)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (26 KB)

    The large diffusion of multimedia products distributed through CD-ROMs (off-line) and the Internet (on-line) is raising many concerns regarding the preservation of authors' rights. On the other hand, these new publication methods appear to be very attractive for increasing business opportunities. The problem of electronic management of copyright has thus become very important and many projects are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1999, Page(s):933 - 937
    Request permission for commercial reuse | PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • Efficient detection of failure modes in electronic commerce protocols

    Publication Year: 1999, Page(s):850 - 857
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    The design of key distribution and authentication protocols has been shown to be error-prone. These protocols constitute the part of more complex protocols used for electronic commerce transactions. Consequently, these new protocols are likely to contain flaws that are even more difficult to find. In this paper, we present a search method for detecting potential security flaws in such protocols. O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Batching proofs of knowledge and its applications

    Publication Year: 1999, Page(s):844 - 849
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    This paper presents a technique to speed up practical zero-knowledge cryptographic protocols. We introduce a new technique of batching proofs of knowledge. Its security is analysed and its applicability to some cryptographic protocols is described. The use of the batching technique can significantly reduce the number of online computations required in the proofs and consequently helps to lower the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordination of security levels for Internet architectures

    Publication Year: 1999, Page(s):837 - 841
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    Internet systems provide a variety of ways for exchanging information, contain a large amount and variety of data, and have become quite complex, making them vulnerable to attacks from determined hackers. There are many products currently being used to stop these attacks but they suffer from a lack of completeness, only applying to one type of attack. Several mechanisms are needed for a comprehens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure payment system for electronic commerce

    Publication Year: 1999, Page(s):832 - 836
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    Security is an important factor for the wide acceptance of electronic commerce services. Special security mechanisms are needed for the implementation of secure electronic payment systems that permit the integration of electronic transactions. In the framework of the information brokerage system that has been developed by the GAIA project of the European union a number of such mechanisms have been... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and querying structure and contents of the Web

    Publication Year: 1999, Page(s):721 - 725
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    For accessing and processing the information provided on the Web, there is a need for extraction, restructuring, and integration of semistructured data from autonomous, heterogeneous sources. We regard the Web and its contents as a unit, represented in an object-oriented data model: the Web structure (inter-document level), given by its hyperlinks, the parse-trees of Web pages (intra-document leve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The management of business transactions through electronic contracts

    Publication Year: 1999, Page(s):824 - 831
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    Based on a Business Media Framework (BMF) as an instantiation of a new media reference model, the paper provides a solution for the integrated management of business transactions, considering contracts as the key information of all legally relevant actions in a business transaction. Derived from these concepts and assumptions, a contracting framework is presented that gives an overview of the serv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locating Web information using Web checkpoints

    Publication Year: 1999, Page(s):716 - 720
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    Conventional search engines locate information by letting users establish a single Web checkpoint. By specifying one or more keywords, users direct search engines to return a set of documents that contain those keywords. From the documents (links) returned by search engines, user proceed to further probe the WWW from there. Hence, these initial set of documents (contingent upon the occurrence of k... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT-security in electronic commerce: from cost to value driver

    Publication Year: 1999, Page(s):816 - 822
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    We systematically discuss the role of IT security regarding electronic commerce (EC) and show that business success in EC heavily depends on IT security and moreover, it even emerges to a business enabler for professional EC. For that reason, we call IT security a value driver and introduce a first proposal for quantification of benefits that will allow to improve economic calculations in security... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A data model and algebra for the Web

    Publication Year: 1999, Page(s):711 - 714
    Cited by:  Papers (2)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The recent emergence of XML as a standard for representation and exchange of data on the Web has drawn significant attention. But existing semistructured data models, such as OEM, cannot support XML naturally and fully. A new data model named XOM is proposed in this paper as the common data model for the Web data source. Based on rooted connected directed graphs both cyclic and acyclic, whose node... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shaping the research agenda for security in e-commerce

    Publication Year: 1999, Page(s):810 - 814
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB)

    We overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applications on the Internet generally go beyond the more traditional requirements of network security. This is particularly true for the requirements that address the complexity and availability of cryptographic applications, the anonymity of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Document storage and retrieval in a neural database

    Publication Year: 1999, Page(s):598 - 602
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    A database of the leech nervous system has been developed. The end users of the database will mainly be neuroscientists, especially those studying the invertebrate nervous system. It is mainly a document database, collecting papers on the leech nervous system, which is maintained in a largely automatic fashion. The database is composed of three subsystems: (1) an object oriented, relational databa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An XML-based, 3-tier scheme for integrating heterogeneous information sources to the WWW

    Publication Year: 1999, Page(s):706 - 710
    Cited by:  Papers (5)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    The phenomenal growth that the WWW currently experiences necessitates the integration of various types of information sources to its platform. We present an open, extensible multi-agent architecture, which is based on standards like XML, for the efficient retrieval of information from RDBMSs and HTML document collections. We also specify a series of protocols for achieving the synergy between a nu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining in law with adaptive learning techniques

    Publication Year: 1999, Page(s):799 - 803
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    The freely available law on the Internet could be one of the best applications of data mining. The growing complexity of legal rules and the necessary adaptation to user needs requires better instruments than manual browsing and searching interfaces. Our intelligent agent offers information reconnaissance by classifying and describing unknown text corpora of search results. Based on standard agent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Indexing semi-structured documents for context-based information retrieval in a medical information system

    Publication Year: 1999, Page(s):593 - 597
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    Most of the information retrieval models for documents are intended for SGML-like structured documents. In the context of medical informatics, the patient record document needs a looser structuration process as an a priori structure can hardly be defined. Thus we first propose an authoring tool that allows us to annotate embedded information, i.e. to give them a context, with qualifiers that are s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XViews: XML views of relational schemas

    Publication Year: 1999, Page(s):700 - 705
    Cited by:  Papers (5)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    The Mediation of Information using XML (MIX) project is a joint effort between the the San Diego Supercomputer Center (SDSC) and the Database Lab at the University of California, San Diego where we are investigating the use of XML as the medium for information modeling and information interchange among heterogeneous information sources. Relational databases represent an important type of informati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Geo-information for monitoring land use from map overlay to object-structured noise reduction

    Publication Year: 1999, Page(s):419 - 425
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    Over the last 10 years, three different national geographical databases with data on land use and land cover have been developed in the Netherlands, all of which are to be updated at a frequency of once every four years. It was shown by means of a case study in the municipality of Soest that these multi-temporal databases could not be used to monitor changes in actual land use by using a simple GI... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SIAM: an integrated intelligent system for retrieving, organising and managing on-line legal information

    Publication Year: 1999, Page(s):793 - 798
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    Thanks to recent developments in informatic and telematic technologies, the documentary material needed for the legal theorist and operator to conduct their activities-in any sector of law and as concerns any related professional function-can now be retrieved for the most part by consulting the many legal archives online. These differ in structure and features and are available especially in the I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • “STRETCH”: a system for document storage and retrieval by content

    Publication Year: 1999, Page(s):588 - 592
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    A system for storing and retrieving imaged multimedia documents by content is described. This system is being developed within the Esprit project STRETCH (STorage and RETrieval by Content of imaged documents). The core of STRETCH system is a powerful archiving and retrieval engine, based on a structured document representation and capable of activating appropriate methods to characterise and autom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task rescheduling in multi-agent manufacturing

    Publication Year: 1999, Page(s):689 - 694
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    We present a model for task rescheduling in multi-agent manufacturing that is geared toward maximising system efficiency and reliability in an environment with predictable failure patterns. We describe a distributed manufacturing system architecture (http://hms.ifw.uni-hannover.de/public/overview.html) to illustrate the merits of rescheduling. We also develop an action redistribution framework bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Causality and the spatial-temporal ordering of events in mobile systems

    Publication Year: 1999, Page(s):116 - 120
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Several mobile computing applications require that both the order of occurrence of events, and the location of their occurrence, be taken into account during decision making. Thus, processes need to track the location of nodes and synchronize their clocks. In this paper we present a framework, based on the capabilities of Global Positioning System, which provides processes with a global virtual cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A spatio-temporal data model for analysing personal biographies

    Publication Year: 1999, Page(s):410 - 418
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    Analysing the dynamics of urban and regional systems require methodologies for aggregating, in space and time, the consequences of the decisions of individuals and households. The life courses of most individuals are built around three interlocking successions of events: household history, residential trajectory and occupational career. As a result of societal evolution, these patterns of events b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.