By Topic

ITRE 2004. 2nd International Conference Information Technology: Research and Education

28 June-1 July 2004

Filter Results

Displaying Results 1 - 25 of 65
  • Identifying generic agents for active workspaces

    Publication Year: 2004, Page(s):136 - 140
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (657 KB) | HTML iconHTML

    Collaborative systems, in particular workspaces and groupware, are used to support distributed team members. However, groupware or workspaces require users to adapt the tool to their work practices to support their interactions within the context of work. Such adaption may need considerable time and effort especially where work situations continually evolve. This paper proposes an alternate approa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-orientation and description logics techniques for implementing the indexing of surveillance video content

    Publication Year: 2004, Page(s):165 - 169
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (618 KB) | HTML iconHTML

    Retrieving video based on content is a challenging task that has became a central focus for many professional groups including knowledge management, database and image processing communities. Benefiting from automatic feature extraction and labeling, current systems are still inherently limited as they only operate at the simple features level. This paper presents a model for content and event-bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Web based tool for assessment and self-assessment

    Publication Year: 2004, Page(s):131 - 135
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB) | HTML iconHTML

    In the paper we present a Web application, named eWorkbook, which allows us to easily create and enjoy on-line tests. The system can be used for evaluating learner's knowledge by means of multiple choice questions. Its use is suitable within the academic environment in order to improve a blended learning approach by providing tutors with an additional assessment tool, and learners with a distance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-learning in England

    Publication Year: 2004, Page(s): 0_7
    Request permission for commercial reuse | PDF file iconPDF (424 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rhetorical structure theory for content-based indexing and retrieval of Web documents

    Publication Year: 2004, Page(s):160 - 164
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (645 KB) | HTML iconHTML

    The amount of information available on the Internet is currently growing at an incredible rate. However, the lack of efficient indexing is still a major barrier to effective information retrieval on the Web. This paper presents the design of a technique for content-based indexing and retrieval of relevant documents from a large collection of documents such as the Internet. The technique aims at im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic assessment of the content of essays based on course materials

    Publication Year: 2004, Page(s):126 - 130
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (699 KB) | HTML iconHTML

    Assessing free-text responses, like essays, is a demanding task even for a human. To reduce the costs of essay grading, methods to automate the assessment process have been developed. Approaches based on surface features and content have been introduced. We present a method for evaluating the content of essays based on latent semantic analysis (LSA), which was originally developed for information ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Companion agents for enabling B2B culture in SMB's

    Publication Year: 2004, Page(s):223 - 227
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (675 KB) | HTML iconHTML

    Small and medium sized businesses (SMBs) in Mexico represent nearly 97% of the total of industry employment, more than 76% of revenue, and nearly 50% of the GNP. Similar phenomena occur worldwide; SMB's constitute a huge growth opportunity for high tech companies. However, the technological resources that they employ are - in general - in the early stages, and many of them are underfinanced. Moreo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using human memory structures to model knowledge within algebra virtual laboratory

    Publication Year: 2004, Page(s):155 - 159
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (706 KB) | HTML iconHTML

    In this paper we describe our knowledge representation model embodied within an algebra virtual laboratory dedicated to Boolean reduction problem solving. The model is inspired by psychology theories that explain the human cognitive activity in terms of memory subsystems and their processes. During the problem solving, complex knowledge entities, built from primitive units of knowledge, are dynami... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Student modeling with timed assessment information

    Publication Year: 2004, Page(s):121 - 125
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (645 KB) | HTML iconHTML

    This paper presents a Bayesian belief network based approach to modeling students with their timed learning assessment information. Our modeling method updates beliefs using the assessment result of a student's learning performance on a learning object along with the time spent on the assessment. The modeling process requires few parameters and takes linear time, reducing the high computational co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mechanism to defend SYN flooding attack based on network measurement system

    Publication Year: 2004, Page(s):208 - 212
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    SYN flooding attack is a common method employed in denial of service (DoS) and distributed denial of service (DDoS). It's hard to maintain the effective defense merely by passive defense measures such as monitoring and filtering. To avoid influencing the legitimate service requests and stop attacks at the source, the attack-detection and service-protection must be combined with the trace of the at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mozilla Internet application suite: developing for education

    Publication Year: 2004, Page(s):96 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (690 KB) | HTML iconHTML

    Introduction to communication and resource sharing through the Internet and the World Wide Web is included in the compulsory course of informatics (nowadays - information technology) in Lithuanian comprehensive schools. There are two tracks: the first level is designed for basic schools (grade 9-10, e.g. age 15-16), the second one for secondary schools (grade 11-12, e.g. age 17-18). It is a short ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FRames-Ensured-Delivery algorithm for smoothing and multiplexing prerecorded videos

    Publication Year: 2004, Page(s):39 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    Video-on-demand (VoD) servers normally store MPEG compressed versions of prerecorded videos in order to reduce their network bandwidth demands. Compressed videos have variable-bit-rate (VBR) for a specific compression quality. Transmission of videos on the network at a peak rate results in poor bandwidth utilization, while transmission at a lower rate results in quality-of-service (QoS) degradatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web engineering in Internet degrees

    Publication Year: 2004, Page(s):218 - 222
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB) | HTML iconHTML

    In this paper we outline the development of Internet-related modules and degree routes at Teesside. We focus on the Web engineering module, explaining how we make the case for engineering Web systems, and survey Web methods and techniques. We introduce the method we have developed: The simple Web method (SWIM, pronounced 'swim'), and describe it in use. We discuss student evaluation and tool use. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study of knowledge discovery on academic achievement, student desertion and student retention

    Publication Year: 2004, Page(s):150 - 154
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (667 KB) | HTML iconHTML

    This paper presents an applied research study on knowledge discovery based on academic data analysis. The main objectives of this research study were to get knowledge about academic achievement success and failure, student retention and student desertion. Automatic clustering and decision rule data mining techniques were used. The application of the C-mean algorithm on statistically homogeneous da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient data hiding approach for video retrieval on demand

    Publication Year: 2004, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (595 KB) | HTML iconHTML

    In this paper, we propose a data hiding approach to hide related information in MPEG-2 videos for their retrieval, inspired from the spirit of digital watermarking. By hiding the retrieval-related information in the MPEG compressed codes, significant advantages are gained. Our experiments on hiding more than 20 bits averagely in every 3 frames illustrate that no noticeable distortion is introduced... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless information agent powered by AspTear object

    Publication Year: 2004, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (625 KB) | HTML iconHTML

    Wireless information agent aims to provide relevant information gathered from different worldwide Web sites into a single and easy manageable Web page. Information gathered is extracted from Web sites powered by Microsoft IIS (Internet Information Server) platform and AspTear object. The application is an automated system, which collects significant information from the Web and updates system data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New models for higher educational curricula

    Publication Year: 2004, Page(s):69 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (673 KB) | HTML iconHTML

    Based upon experience in teaching Computer Science course in university traditional curricula, we have explored at our University the creation of new educational curricula that combines apprenticeship (i.e. an educational curriculum combining working and studying) with university studies. The project relies on the intelligent use of innovative training methodologies and technologies. We have devel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for the creation of collaborative environments

    Publication Year: 2004, Page(s):184 - 188
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (690 KB) | HTML iconHTML

    In this paper, we propose an approach for the creation of collaborative e-learning environments. The approach provides suitable visual languages allowing the instruction designer to specify e-learning courses in a simple way. The defined courses are based on synchronous and asynchronous activities. Moreover, we describe a system prototype based on the presented approach, which provides automated s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPDEMO - a novel software tool for teaching multimedia signal processing

    Publication Year: 2004, Page(s):116 - 120
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB) | HTML iconHTML

    The move from analog to digital media in recent years has given rise to the flourishing of digital signal processing techniques. In addition to the many benefits of this flourishing, the plenitude and sophistication of these techniques has caused learning and teaching the essence of this subject to be a more difficult task. In this paper, a software tool for teaching multimedia signal processing i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internationalization of open source software: framework and some issues

    Publication Year: 2004, Page(s):204 - 207
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (641 KB) | HTML iconHTML

    The paper considers the main issues of open source software internationalization and suggests the systematization of the process. Although this research is based on the OpenOffice.org software, still many issues presented here may be valid to the various open source programs. The main attention is paid to the investigation of the OpenOffice.org internationalization model - we seek to find out its ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent security service architecture for mobile learning

    Publication Year: 2004, Page(s):91 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    M-learning continues and extends the learning paradigms and styles derived from a classroom lecture-and-seminar model, now made accessible through Web-based delivery and mobile devices. In an environment, in which circumstances make using a laptop inappropriate, a handheld device offers a convenient alternative. Communicating with anything and everything via wireless can open new opportunities for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating diverse IT areas: bridging the gap between multimedia kiosks and the wireless world

    Publication Year: 2004, Page(s):34 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (772 KB) | HTML iconHTML

    This paper presents a student research effort of developing a multimedia kiosk and extending its functionality to wireless mobile devices. Kiosk engine (KE) implements a framework for creating and presenting interactive multimedia kiosks. KE is implemented in Java and it can be used to present the kiosk content on both a stationary kiosk and a wireless device. This project brings together many are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated programming environment for undergraduate computing courses

    Publication Year: 2004, Page(s):141 - 144
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (639 KB) | HTML iconHTML

    The Computing Division of the Business School at University College Worcester provides computing and information technology education to a range of undergraduate students. Topics include various approaches to programming, artificial intelligence, operating systems and digital technologies. Each of these has its own potentially conflicting requirements for a pedagogically sound programming environm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On technology for engineering knowledge refinement

    Publication Year: 2004, Page(s):170 - 174
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB) | HTML iconHTML

    This study develops an approach for engineering knowledge refinement to facilitate engineering knowledge management. This approach is basically a refinement process that includes the steps of knowledge capture, knowledge representation and storage, and knowledge compilation. This study involves the development of a semantic graph for describing product related information, design intent and know-h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online discussions in computer science courses: how to make them an effective learning tool

    Publication Year: 2004, Page(s):228 - 233
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB) | HTML iconHTML

    This paper discusses the experience of using asynchronous online discussions obtained by a group of faculty teaching graduate computer science courses online. We also discuss a number of advantages of using asynchronous discussions and how they can enrich the learning experience of students. This is followed by a collection of our practices in course management when online discussions are used. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.