By Topic

Database and Expert Systems Applications, 1999. Proceedings. Tenth International Workshop on

Date 3-3 Sept. 1999

Filter Results

Displaying Results 1 - 25 of 152
  • Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99

    Save to Project icon | Request Permissions | PDF file iconPDF (1417 KB)  
    Freely Available from IEEE
  • Beyond current technology: the perspective of three RC GIS projects panel discussion

    Page(s): 510
    Save to Project icon | Request Permissions | PDF file iconPDF (10 KB)  
    Freely Available from IEEE
  • Author index

    Page(s): 933 - 937
    Save to Project icon | Request Permissions | PDF file iconPDF (16 KB)  
    Freely Available from IEEE
  • Guidelines for better scenarios: supporting theories and evidence

    Page(s): 352 - 356
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (44 KB)  

    Today different types of scenario are used to support a diverse range of requirements engineering tasks. However, little is understood about how to design scenarios and their usage sessions to support these different tasks. This paper presents SACRE, a theoretically-grounded framework which supports a requirements engineering team to design and use scenarios. As well as reporting empirical findings which highlight the importance of designing scenarios to fit the task, it describes findings from disciplines such as cognitive science and knowledge engineering which inform scenario design through guidelines. It ends with proposals to better design scenarios View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing efficient requirements management

    Page(s): 370 - 375
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (56 KB)  

    This paper reports the experience gained from ESSI project 24257-Requirements Management in Alcatel Telecom Norway (RMATN) which was started by Alcatel's Defence Communication division (now Thomson-CSF Norcom) in order to address problems relating to RM. The projects focus has been the introduction of improved RM-processes including requirements traceability and requirements attributes, supported by an RM-tool. The aim being to make employees at all levels an are of requirements and to make sure that all development effort was spent on activities contributing to fulfilling the system requirements, thereby reducing rework and “over engineering”. In addition the aim was that traceability and improved RM would make it easier to foresee the consequences of changes. The project has evaluated the following RM-tools in detail: DOORS, RTM and Requisite Pro. Originally DOORS was recommended, but then senior management decided we were to use Rational tools in the future and hence Requisite Pro was chosen View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining in law with adaptive learning techniques

    Page(s): 799 - 803
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (60 KB)  

    The freely available law on the Internet could be one of the best applications of data mining. The growing complexity of legal rules and the necessary adaptation to user needs requires better instruments than manual browsing and searching interfaces. Our intelligent agent offers information reconnaissance by classifying and describing unknown text corpora of search results. Based on standard agent technology, our research on self-organising maps focuses on adaptive learning techniques for information reconnaissance. The units of the self-organising map are labeled with the most appropriate keywords. The user can choose between the various units in order to refine the next step of research. First results have shown the potential of this approach View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real-time prefetching method for continuous media playback

    Page(s): 889 - 893
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (88 KB)  

    Continuous media (CM) such as digitally-coded video and sound impose time constraints on multimedia systems to prevent hiccups. In this paper we propose a new CM playback method that is suitable for handling CM streams with various playback rates and a rather short duration of playback. Our proposed method is aimed at providing both good response times and high disk utilization. For better disk utilization, the SCAN algorithm is employed for retrieving CM data and then a real-time bulk-scan is conducted. Along with this bulk-scan, we propose an EDF-style algorithm with a priority-driven property. Owing to the flexibility of disk scanning, our method is able to provide a good response time as well as high disk utilization. We show performance advantages through experimental comparisons between our method and earlier round-style methods View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reusing scenario based approaches in requirement engineering methods: CREWS method base

    Page(s): 305 - 309
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (136 KB)  

    Scenarios have proven useful to elicit, validate and document requirements but the development of new methods find tools for requirements engineering integrating scenario based approaches has been limited. The view developed in this paper is that scenario based approaches should be looked upon as reusable components. Our concern is therefore twofold: first, to represent scenario based approaches in a modular way which eases their reusability and second, to specify the design context in which these approaches can be reused in order to facilitate their integration in existing methods. The paper presents also an implementation of our proposal using SGML-HTML to store scenario based approaches in the multimedia hypertext documents and illustrates the retrieval of components meeting the requirements of the user by means of SGMLQL queries View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Markov random field approach for querying and reconciling heterogeneous databases

    Page(s): 185 - 191
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (408 KB)  

    The problem of defining a uniform query interface to access distributed heterogeneous data sources is becoming more and more important in the modern, distributed information systems. Main focus is on how to handle semantic heterogeneity of data in different sources to support integration and query processing activities. In both cases, techniques to assess similarity between schema elements of different data sources are required, to support the derivation of a reconciled representation at the global level and similarity-based search over different sources. In this paper we introduce an approach based on the Markov random field theory for similarity-based matching of database schemas View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient multicast delivery scheme to support Mobile IP

    Page(s): 683 - 688
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (640 KB)  

    Once mobile nodes move into another network, Mobile IP is employed for the remaining unicast services. However, multicast services become unavailable because of topology changes. A multicast scheme is proposed based on our Domain-based Mobile IP (K.D. Wu et al., 1998). Multicast services are divided into two types: Intra-domain service and Inter-domain service. The article identifies mobile nodes joining the Internet where they can acquire benefits of multicasting and its potential values, as for stationary nodes it does not matter they are at Home Network or Foreign Network. Finally the comparison of multicast delivery schemes for the mobile environment is presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Desktop scene analysis for document management system

    Page(s): 544 - 548
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (244 KB)  

    In this report, we propose a method to support human intellectual activity by managing the history of document information on a desktop environment. Recently, many research groups have been focused on “desk” as an interactive environment in which projective display and user's action can share the same physical space. Although our experimental setup is similar to these researches, our aim differs from their approach in the point that we limit the target to documents placed on a desktop to monitor the thinking process of a user from appearance. The system recognizes documents, folders, and stacks and their layout from a TV camera located above desk, and it also recognizes the motion of user's hands to estimate the action. We indicate that the system can consistently manage personal documents even if they are cluttered on the desk View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Similarity search through fuzzy relational algebra

    Page(s): 235 - 239
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (80 KB)  

    Multimedia informations systems and Web-based applications such as search engines need to automatically extract and classify multimedia data such as images and textual documents. For this reason, very significant research has focused on similarity queries from the standpoint of the definition and creation of appropriate index structures. We provide a formal framework in which formulate powerful similarity-based queries. For this purposes a fuzzy relational algebra extending the classical relational algebra is defined and equivalence and containment rules for query processing are given View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The labour game method [requirements engineering]

    Page(s): 382 - 386
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (44 KB)  

    Requirements engineering is usually defined as a process in which detailed descriptions of a future software system are created. However, system requirements depend on the ways in which the organisation and its potential future are argued. One future will lead to one kind of system while another may require another kind of system. From this perspective requirements engineering should precede a process of organisational development and learning. In this paper, a prototype of a method for such a process is presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metrics for evaluating database selection techniques

    Page(s): 726 - 730
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (92 KB)  

    The increasing availability of online databases and other information resources in digital libraries has created the need for efficient and effective algorithms for selecting databases to search. A number of techniques have been proposed for query routing or database selection. We have developed a methodology and metrics that can be used to directly compare competing techniques. They can also be used to isolate factors that influence the performance of these techniques so that we can better understand performance issues. We describe the methodology we have used to examine the performance of database selection algorithms such as gGIOSS and CORI. In addition we develop the theory behind a “random” database selection algorithm and show how it can be used to help analyze the behavior of realistic database selection algorithms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adding a systemic view to the requirements engineering processes

    Page(s): 321 - 325
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (112 KB)  

    Requirements Engineering (RE) can be seen as a real challenge for human intelligence and ability to manage what we know, what other people know, and what nobody knows. To cope with this challenge, a good way to proceed is to adopt a systemic view, where all the factors involved (information, problems, stakeholders, notations, etc.) may be handled, whilst being as aware as possible of their connections, links, implications and obviously of their meaning. An approach derived from the SHEL model (Software, Hardware, Environment, Live-ware) of Edwards has been discussed in order to introduce and support such a systemic view and to propose a model. It is argued that this model can facilitate management of the RE process by managing the lack of knowledge which characterises many RE activities. We have also prototyped a tool to manage typical processes involving the sharing of what is known and detection of gaps in knowledge, mainly based on the paradigm of distributed cognition View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Document classification using layout analysis

    Page(s): 556 - 560
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (92 KB)  

    This paper describes methods for document image classification at the spatial layout level. The goal is to develop fast algorithms for initial document type classification without OCR, which can then be verified using more elaborate methods based on more detailed geometric and syntactic models. A novel feature set called interval encoding is introduced to capture elements of spatial layout. This feature set encodes region layout information in fixed-length vectors by capturing structural characteristics of the image. We demonstrate the usefulness of these features derived from interval coding, in a hidden Markov model based page layout classification system that is trainable and extendible View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schema versioning: queries to the generalized temporal database system

    Page(s): 458 - 459
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (24 KB)  

    Raw data and database structures are evolving entities that require adequate support for past, present and even future versions. Temporal databases supporting schema versioning were developed with the aim of satisfying this requirement. This paper considers a generalized temporal database system, which provides support for time at both intensional and extensional levels. The support for schema versioning raises two complex subjects: the storage of the several schema versions and their associate data, and the processing of queries involving more than one schema version. The main goal of this paper is to analyse the second aspect in order to propose a strategy to answer multi-schema queries View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interoperability of event service in Java ORB environment

    Page(s): 29 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (252 KB)  

    The paper begins with consideration on push technology in Java ORB environment, and investigates interoperability of event channels of the event service of CORBA, which should be technically addressed to build a true push service in a Java ORB environment. We present three different methods that enable one event channel to be connected with other event channels. Pros and cons of each method are described. All mentioned approaches have been implemented in Java. An experimental performance evaluation has been carried out and evaluation results are also given View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on utilizing OCR technology in building text database

    Page(s): 582 - 586
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (48 KB)  

    Optical character recognition (OCR) might be the most plausible method in building databases from printed documents. The paper describes the points to be considered when one selects an OCR system in order to build a database. Based on our experiments on four commercial OCR systems, we chose one that shows the highest recognition rate to build an OCR text database. The character recognition rate was 90.5% over 970 abstracts of conference proceedings in Korean. This recognition rate is still insufficient for practical use. For practical use of the OCR texts which has approximately 10% of character-level errors, we need to investigate whether automatic indexing generates acceptable retrieval performance. In addition, it is necessary to evaluate which indexing method results in better performance. Experimental results show that 2-gram indexing provides similar retrieval efficiency to morpheme based indexing for the Korean OCR text database. In addition, the retrieved results of the indexed OCR texts are similar to those selected by experts View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Geo-information for monitoring land use from map overlay to object-structured noise reduction

    Page(s): 419 - 425
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (132 KB)  

    Over the last 10 years, three different national geographical databases with data on land use and land cover have been developed in the Netherlands, all of which are to be updated at a frequency of once every four years. It was shown by means of a case study in the municipality of Soest that these multi-temporal databases could not be used to monitor changes in actual land use by using a simple GIS overlay technique. Most of the resulting changes were explained by the accuracy of the data sets themselves rather than by the `real world' changes. An initial step in an object-structured approach has been developed, resulting in improved monitoring outcome for a detail of the Top 10 vector database. The method requires (empirical) threshold values for decision rules on overlap percentage, shape factor and reliability of thematic changes. A considerable part of the noise was filtered out at various levels of detail. The method will be further developed towards a monitoring tool for noise reduction, applicable to various spatio-temporal land use databases and data quality independent View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locating Web information using Web checkpoints

    Page(s): 716 - 720
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (452 KB)  

    Conventional search engines locate information by letting users establish a single Web checkpoint. By specifying one or more keywords, users direct search engines to return a set of documents that contain those keywords. From the documents (links) returned by search engines, user proceed to further probe the WWW from there. Hence, these initial set of documents (contingent upon the occurrence of keyword(s)) serve as a Web checkpoint. Generally, these links are numerous and may not result in much fruitful searches. By establishing multiple Web checkpoints, a richer and controllable search procedure can be constructed to obtain more relevant Web information. This paper presents the design and implementation of permitting multiple checkpoints to facilitate improved searching on the WWW. Web checkpointing is performed as part of the WHOWEDA project View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Categorising justifications in legal argument

    Page(s): 775 - 779
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (36 KB)  

    The article discusses the various justifications that can be given for components of a legal argument. First a number of different types of argument are described. These are used in legal reasoning, but cannot be satisfactorily reduced to deductive arguments. While deductive arguments have been fruitfully analysed in the literature, these other forms of arguments, and the ways in which they can be challenged are relatively unexplored from any kind of formal perspective. The author suggests a way of describing these forms of argument in an extended version of S. Toulmin's (1958) well known argument schema. He concludes by arguing that progress in a computational understanding of legal reasoning requires that we address these non-deductive argument forms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making space for time: issues in space-time data representation

    Page(s): 404 - 408
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (40 KB)  

    Even with much activity over the past decade (1989-99), including organized efforts on both sides of the Atlantic, the representation of both space and time in digital databases is still problematic, and functional space-time systems have not gone beyond the limited prototype stage. Why is this the case? Why did it take twenty years from the first GIS for the representation and analysis in the temporal, as well as the spatial dimension, to begin? The author explores the answers to these questions by giving a historical overview of the development of space-time representation in the geographic information systems and database communities. Within the context of this perspective, she also questions what seems to be a spirit of self-accusation in which they have been discussed in the literature and in meetings of GIS researchers. The author closes by offering her own interpretation of current research issues on space-time data models and languages View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XViews: XML views of relational schemas

    Page(s): 700 - 705
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (76 KB)  

    The Mediation of Information using XML (MIX) project is a joint effort between the the San Diego Supercomputer Center (SDSC) and the Database Lab at the University of California, San Diego where we are investigating the use of XML as the medium for information modeling and information interchange among heterogeneous information sources. Relational databases represent an important type of information source. We discuss issues in providing XML document views of relational schemas. We refer to these as, XViews. We also discuss related work from a project funded by DARPA and the US Patent and Trademark Office where we investigated issues in mapping SGML document type definitions to relational schemas. The work described here reflects initial results from the above mentioned projects View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving consistency in mobile databases through localization in PRO-MOTION

    Page(s): 82 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (124 KB)  

    There is great need and potential for traditional transaction support in a mobile computing environment. However owing to the inherent limitations of mobile computing, we need to augment the well-developed techniques of database management systems with new approaches. We focus on the challenge of assuring data consistency. Our approach of localization is to reformulate global constraints so as to enhance the autonomy of the mobile hosts. We show how this approach unifies techniques of maintaining replicated data with methods of enforcing polynomial inequalities. We also discuss how localization can be implemented in PRO-MOTION, a flexible infrastructure for transaction processing in a mobile environment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.