Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on

Date 2003

Filter Results

Displaying Results 1 - 25 of 161
  • Towards an autonomic computing environment

    Publication Year: 2003 , Page(s): 694 - 698
    Cited by:  Papers (27)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (250 KB) |  | HTML iconHTML  

    Autonomic Computing is a promising new concept in system development. It aims to (i) increase reliability by designing systems to be self-protecting and self-healing; and (ii) increase autonomy and performance by enabling systems to adapt to changing circumstances, using self-configuring and self-optimizing mechanisms. This paper discusses the type of system architecture needed to support such objectives. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an autonomic distributed computing environment

    Publication Year: 2003 , Page(s): 699 - 703
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (226 KB) |  | HTML iconHTML  

    Increasing hardware performance of desktop computers accounts for a low-cost computing potential that is waiting to be efficiently used. However, the complexity of installation and maintenance of a large number of distributed heterogeneous computers is limiting the use of such systems on a large scale. Systems which are autonomic, capable of managing themselves are required. The architecture of QADPZ (Quite Advanced Distributed Parallel Zystem), an open source system for heterogeneous distributed computing is presented. The system allows the management and use of the computational power of idle computers from a network of PCs. Different autonomic computing features of the system are described, together with possible extensions of the system towards an autonomic distributed computing system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings. 14th International Workshop on Database and Expert Systems Applications

    Publication Year: 2003
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (300 KB)  

    The following topics are dealt with: biological data management systems; cultural heritage presentation; semantic Web; mobile communication; network-based information systems; Web based collaboration; e-learning; distance learning; information management systems; trustbus; watermarking; protocols; data privacy; security of data; parallel databases; distributed databases; data mining; World Wide Web; Internet; autonomic architectures; software agents; ontology; metadata; artificial intelligence; knowledge management; electronic negotiations; mobile payment; mobile commerce; system architectures; mobile objects; peer to peer computing; location management; replication; and mobile agent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of revocation systems with a Java test-bed

    Publication Year: 2003 , Page(s): 450 - 454
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2251 KB)  

    Public key cryptography is widely used to provide different security services. The PKI is the infrastructure that supports the public key cryptography and the revocation of certificates implies one of its major costs. Java test-bed has been developed for certificate revocation by J.L. Munoz and J. Forne (2003). The goal of this paper is to evaluate the most used revocation systems using this test-bed. In this sense, some results in terms of downlink bandwidth and processing capacity requirements are shown for CRL, OCSP and ADMHT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous negotiation games: a case study

    Publication Year: 2003 , Page(s): 834 - 838
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (330 KB) |  | HTML iconHTML  

    We claim that negotiation is a powerful abstract notion for the coordination of generic services available from distributed components. This is the main motivation underlying the development of XPLORE, a middleware infrastructure for component service negotiation. We illustrate it here by breaking down an existing e-negotiation application into a set of autonomous components coordinated through XPLORE. We chose NegotiAuction as our case-study, because it combines various elements from negotiation and auction protocols, which demand for a diversified representation in XPLORE. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2003 , Page(s): 983 - 987
    Save to Project icon | Request Permissions | PDF file iconPDF (164 KB)  
    Freely Available from IEEE
  • FID: longlife e-learning project in the Italian ministry of Justice

    Publication Year: 2003 , Page(s): 322 - 326
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (238 KB) |  | HTML iconHTML  

    The aim of this paper is to present the FID (Interactive Distance Learning) e-learning project promoted by a division of the Italian Ministry of Justice (URSIA) responsible for the National Justice IT Infrastructure and Policy. The project purpose is to perform a long-life learning platform based on Web technology to train legal content to the Ministry employees. The paper would like to remark the benefits and the obstacles encountered in the project for supporting the Ministry to build on-line courses timely, effectively and in line with the rapid and frequent transformations of the public administration domain. Finally the paper provides some considerations about long-life process in the e-government environment, where a holistic approach is a key factor for a pervasive and relevant success of the e-learning system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fairness in wallets with observer

    Publication Year: 2003 , Page(s): 364 - 368
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    We examine the interference of fairness and observers in digital coin systems. Since copying of coins cannot be prevented cryptographically in anonymous off-line coin systems, double-spending detection is one of the major tasks. An observer is a tamper resistant device that prevents double-spending physically. While privacy protection is a desirable property of cash systems, perfect anonymity is not. Perfect anonymity enables criminals to do perfect blackmailing or money laundry according to B. von Solms and D. Naccache (1992). To prevent a perfect crime it has to be possible to revoke the anonymity of customers in case of need. Anonymity revocation is done by a trusted third party. Cash systems that allow anonymity revocation are called fair. We present a coin system which features both observer and fairness. This shows that both concepts do not interfere and can be implemented simultaneously without loss of security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Current mobile payment procedures on the German market from the view of customer requirements

    Publication Year: 2003 , Page(s): 870 - 874
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (255 KB) |  | HTML iconHTML  

    The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the most relevant acceptance criteria. The outcome of the paper is an evaluation scheme containing the covered payment scenarios, important main criteria (security, costs and convenience) and additional functionality requirements for each MP procedure. The scheme is based on empirical results and can assess a given MP procedure with regard to customer acceptance as well as to compare different procedures. The operational MP procedures Paybox, I-mode and Vodafone m-pay are examined and compared according to the scheme. Finally, a prospect is given to possible further development of mobile payment procedures in the direction of an integrative universal mobile payment system (UMPS). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methodology and tools to support storytelling in cultural heritage forums

    Publication Year: 2003 , Page(s): 105 - 109
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (538 KB) |  | HTML iconHTML  

    Storytellling is a method by which members of a community communicate, learn and build identity. In the CIPHER project we aim to provide customisable tools for the sharing of stories in communities, and test these tools in specific case studies. Here we describe the generic storytelling environment customised for two quite different communities, a group of adult volunteers interested in a particular heritage area and children collaborating from two different schools. The participatory development of the tools has highlighted a number of design recommendations for the development of community story sharing support including story seeding, role identification, launch strategy, and the model of communication and story exchange. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A protocol for programmable smart cards

    Publication Year: 2003 , Page(s): 369 - 374
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (238 KB) |  | HTML iconHTML  

    This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host applications in a unified, card-independent way. Its design, inspired by the standardization of on-card Java language and cryptographic API, has been kept as generic and modular as possible. The protocol security model has been designed with the aim of allowing multiple applications to use the services exposed by the same card, with either a cooperative or a no-interference approach, depending on application requirements. With respect to existing protocols for smart card interoperability, defining sophisticated card services intended to be hard-coded into the device hardware, this protocol is intended to be implemented in software on programmable smart cards. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a logic of privacy-preserving selective disclosure credential protocols

    Publication Year: 2003 , Page(s): 396 - 401
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (610 KB)  

    This paper presents a first approach towards a logic suited for protocols aiming to achieve selective disclosure of credentials while preserving privacy. The analysis draws from the BAN and related logics by M. Burrows et al (1990) and P. Syverson and I. Cervesanto (2001) that are targeted to aid reasoning about authentication protocols, as well as from formal methods on PKIs by C. Liu et al (2000, 2001) . The families of protocols directly covered are built using selective disclosure certificates, blind signatures and one-way has functions as cryptographic primitives. The logic is able to prove that if the protocol's credentials are properly constructed and signed by trusted issuers, they should convince a verifier; furthermore, it provides a framework on which mechanized attacks against privacy may be attempted by an automatic theorem prover. The runner example is a protocol by J.E. Holt and K.E. Seamons (2002). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-negotiations, supply networks and collaborative product development in aerospace manufacturing

    Publication Year: 2003 , Page(s): 855 - 859
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (211 KB) |  | HTML iconHTML  

    Firms are turning their attention to global sourcing as a means to improve performance and enhance competitiveness. Some partnerships created with this strategy improve product development through collaborative design. With the advent of e-commerce, a new set of collaborative applications integrated to the firm's IT infrastructure allow a direct interaction between the firm and its suppliers, having an impact on negotiation. The issue is particularly relevant for industries with highly engineered products and extensive supply networks. We provide insights on the impact of the adoption of collaborative design technologies by an aerospace manufacturing firm and how these relate to electronic negotiations. We provide a set of consequences of the adoption of this technology to add to the body of knowledge of the impacts of e-commerce in supply chains. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • M-commerce at Helsana Health Insurance: mobile premium calculator

    Publication Year: 2003 , Page(s): 877 - 881
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (219 KB) |  | HTML iconHTML  

    The advancement of Information and Telecommunication Technologies allows new types of interaction between companies and customers. Companies face the question: which potentials can be exploited using new communication and transaction channels and which challenges must be overcome in doing so. The design of the interaction between customer and company is of crucial importance. Depending on the process requirements different alternatives of communication can be chosen. The following case study describes a project and the implemented solution integrating a mobile channel into the acquisition process of a health insurance provider. It gives insight into a way of using mobile channels and what aspects a company needs to take into account when implementing solutions using mobile technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology-based integration of OLAP and information retrieval

    Publication Year: 2003 , Page(s): 610 - 614
    Cited by:  Papers (2)  |  Patents (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (892 KB) |  | HTML iconHTML  

    This paper describes an ontology-based approach for building an enterprise knowledge portal that integrates OLAP and information retrieval functionality to access both structured data stored in a data warehouse and unstructured data in form of documents. We discuss how to perform global searches over these information sources. In addition, our approach provides adaptive searching by tracking the user context. When a user performs ad-hoc navigation in an OLAP report, the system will be able to use the query context information to also search for relevant documents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A visual interface for native XML database

    Publication Year: 2003 , Page(s): 571 - 575
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (430 KB) |  | HTML iconHTML  

    XML is becoming a de facto standard for representing and exchanging data over the Web. With the tremendous growth of XML data on the Internet, an efficient database system becomes necessary to maintain it. Traditional databases that force all data to conform to an explicitly specified rigid schema are inefficient to maintain irregular XML data, thus, new data models, called native XML database management systems, are introduced. Currently proposed native database systems mainly focus on designing database architectures and their components, but they have not addressed how an efficient user interface can be designed to support users to interact with their databases. In this paper, we mainly present the design and implementation of DB manager, a visual interface for the native XML database management system, NextDB. DB manager is an integrated interface which is composed of various components that provide interactive communication between external users and internal database. It offers a rich variety of functions, and provides usability and accessibility to users. The results from an initial usability study show that the visual interface is usable and efficient for most users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A prototypal environment for collaborative work within a research organization

    Publication Year: 2003 , Page(s): 274 - 279
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (251 KB) |  | HTML iconHTML  

    An organization is a complex system where collaborative work takes place through formalized groups (such as internal committees, project groups, etc.) as well as informal groups (i.e., communities of practice) that may arise around common problems, interests and objectives. From this the need, widely recognized in the last years are new technologies and tools addressing the information sharing requirements within organizations. This paper presents an experimental knowledge management tool, the ICAR Knowledge Portal, running at ICAR-CNR, a research institute of the Italian National Council of Research. The task of this tool is basically to provide a Web-based environment for knowledge creation, sharing and access. With the ICAR Knowledge Portal, researchers can quickly set up their own sub-portals, create and organize knowledge items (such as news, papers, links, announcements, projects, etc.), share them within workgroups, search for a specific document or browse through a set of related documents (ontology-driven browsing). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing information security culture: increased trust by an appropriate information security culture

    Publication Year: 2003 , Page(s): 405 - 409
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (253 KB) |  | HTML iconHTML  

    Security culture encompasses all socio-cultural measures that support technical security measures, so that information security becomes a natural aspect in the daily activities of every employee. The cultural concept helps to increase trust between the different actors concerning information security within an organization. We start with the explanation of the "organizational culture concept," asking how it can be used to implement information security culture. To create, maintain and change security culture, certain measuring instruments are necessary. We discuss several ways and methods to analyze organizational culture. Furthermore, we ask to what extent they could be used in the context of security culture and what special problems might arise. Finally, the possible implementation is discussed in the context of an ongoing survey from which we present some results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy and trusted computing

    Publication Year: 2003 , Page(s): 383 - 388
    Cited by:  Papers (9)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (254 KB) |  | HTML iconHTML  

    This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user and remote third parties. The privacy implications of this approach are investigated in the context of the Trusted Computing Platform Alliance (TCPA) specification. The trust relationships of the TCPA architecture are examined in detail. An analysis of the revocation requirements inherent in the TCPA design is presented, which highlights the challenges that revocation presents in the context of a large scale deployment of TCPA platforms. Finally, a modification to the specification is suggested that reduces the level of trust that need to be placed on the Privacy CA. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schema Mapping for Interoperability in XML-based multidatabase

    Publication Year: 2003 , Page(s): 235 - 240
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (274 KB) |  | HTML iconHTML  

    The main aim of a multidatabase system (MDBS) is to achieve data integration and interoperability among distributed and heterogeneous database systems. But data model heterogeneity and schema make this a challenging task. Multidatabase users can only view the global schemas whose real data come from local database systems. Thus, mappings from global schemas to local schemas should be established. At the same time, the recent emergence of XML has shown great intractability as a new standard for data representation and exchange on the Web. A data model based on XML becomes more suitable for integrating different types of systems. This paper firstly introduces a multidatabase common data model based on XML, named XML-based Integration Model (XIDM). Then, an approach of schema mappings based on XIDM in MDBSs has been presented. Finally, the illustration and implementation of schema mappings in a multidatabase prototype - Panorama are also discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS routing method for ad-hoc networks based on genetic algorithm

    Publication Year: 2003 , Page(s): 175 - 179
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (279 KB) |  | HTML iconHTML  

    A lot of work has been done on routing in MANETs. However, the proposed routing resolutions deal only with the best effort data traffic. Connections with quality of service (QoS) requirements are not supported. QoS routing has been receiving increasingly intensive attention in the wireline network domain. However, for MANETs only few QoS algorithms are proposed to be developed and QoS routing algorithms should be adaptive, flexible, and intelligent. We propose a genetic algorithm (GA) based routing method for Mobile Ad-Hoc Networks (GAMAN). Robustness rather that optimality is the primary concern of GAMAN. The GAMAN uses two QoS parameters for routing. The performance evaluation via simulations shows that GAMAN is a promising QoS routing algorithm for MANETs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SEMOPS: design of a new payment service

    Publication Year: 2003 , Page(s): 865 - 869
    Cited by:  Papers (7)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (273 KB) |  | HTML iconHTML  

    One of the most promising future applications in the domain of mCommerce is the mobile payment. Different approaches come to the market and try to address existing needs, but up to day no global solution exists. In this paper we take an insight on the SEMOPS project, analyze some of the requirements that have been its guiding force as well as the business model it supports. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building autonomic computing systems based on ontological component models and a controller synthesis algorithm

    Publication Year: 2003 , Page(s): 674 - 680
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (268 KB)  

    A novel approach for building autonomic computing systems is presented. Autonomic computing systems are systems which are self-managed, self-healing, self-organized, ultra-reliable, robust, and flexible. These systems have multiple ways of accomplishing their purpose, and are capable of reconfiguring themselves in order to optimize their performance, achieve their goals under varying and unpredictable conditions, recover from internal faults and protect themselves. The presented approach for building autonomic computing systems is based on an extension of Bunge ontology and the Bunge-Wand-Weber (BWW) models. An extended ontology is presented which models a system as an organized whole exhibiting a coherent and useful overall behavior. Ontological component models captured using software engineering diagrams enable these systems to have self- awareness on their construction, their available resources, their external environment, and their goals. Self-organization, self-adaptation and self-healing are achieved by employing a controller synthesis algorithm based on the Ramadge and Wonham supervisory control theory of discrete event systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Soft ontologies and similarity cluster tools to facilitate exploration and discovery of cultural heritage resources

    Publication Year: 2003 , Page(s): 75 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (450 KB) |  | HTML iconHTML  

    We describe a system and tools that we are creating and that allows us to produce similarity (SC) cluster representations of the contents of our Culture Heritage (CH) Forum. The motivation for introducing these types of technologies in the context of cultural heritage materials is to allow the use of spatial vector-based computational techniques that result in similarity mapping. We propose that similarity mappings can be used to build navigation tools that enable users to explore these types of materials without knowing the search parameters in advance. Also, this method of access to cultural heritage materials might be less dependent on a priori determined ontologies than conventional curatorial practices. This is in line with our final objective of developing representation methods and visualization tools that describe cultural heritage material while at the same time allowing the user freedom to interpret the material, i.e. the open interpretation approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fine-grained self-healing hardware for large-scale autonomic systems

    Publication Year: 2003 , Page(s): 707 - 712
    Cited by:  Papers (4)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    The hardware redundancy costs required for self-healing systems increase with system complexity, creating concerns about the cost-feasibility of large-scale autonomic systems. Redundancy costs can be minimized without reducing reliability by providing finest-grained fault recovery, but modern redundancy techniques are not effective for sub-component-level recovery. This paper introduces a design technique for low-cost, fine-grained self-healing hardware. Small amounts of reconfigurable logic are integrated within primarily fixed-logic circuits to provide heterogeneous redundancy for efficient fine-grained, self-contained fault detection, diagnosis, and recovery. When combined with traditional coarse-grained recovery techniques for larger failures, this technique enables large-scale self-healing systems with reduced redundancy costs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.