By Topic

Web Intelligence, 2004. WI 2004. Proceedings. IEEE/WIC/ACM International Conference on

Date 20-24 Sept. 2004

Filter Results

Displaying Results 1 - 25 of 172
  • [Title page]

    Publication Year: 2004 , Page(s): i - iv
    Save to Project icon | Request Permissions | PDF file iconPDF (93 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004 , Page(s): v - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB)  
    Freely Available from IEEE
  • Message from the WI'04 and IAT'04 Conference Chairs and Program Chair

    Publication Year: 2004 , Page(s): xiv - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • WI'04 and IAT'04 Conference Organizers

    Publication Year: 2004 , Page(s): xviii - xix
    Save to Project icon | Request Permissions | PDF file iconPDF (35 KB)  
    Freely Available from IEEE
  • WI'04 and IAT'04 Program Committee Leadership

    Publication Year: 2004 , Page(s): xx
    Save to Project icon | Request Permissions | PDF file iconPDF (30 KB)  
    Freely Available from IEEE
  • WI'04 and IAT'04 Program Committee Members

    Publication Year: 2004 , Page(s): xxi - xxvi
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB)  
    Freely Available from IEEE
  • WI'04 Non-Program Committee Reviewers

    Publication Year: 2004 , Page(s): xxvii
    Save to Project icon | Request Permissions | PDF file iconPDF (23 KB)  
    Freely Available from IEEE
  • WI'04 and IAT'04 Tutorials and Workshops

    Publication Year: 2004 , Page(s): xxviii
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (30 KB) |  | HTML iconHTML  

    Provides an abstract for each of the tutorial presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Web - Early Visions, Present Reality, the Grander Future

    Publication Year: 2004 , Page(s): 3
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of Intelligent Agent Technology to The Grid

    Publication Year: 2004 , Page(s): 4
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling up Multi-Agent Systems through Organizational Structuring

    Publication Year: 2004 , Page(s): 5
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Workstation Agents and Unstructured Workstation Data

    Publication Year: 2004 , Page(s): 6
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Mining: Artificial Intelligence in Data Analysis

    Publication Year: 2004 , Page(s): 7
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | PDF file iconPDF (44 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incentive-Compatible Social Choice

    Publication Year: 2004 , Page(s): 8 - 14
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4856 KB) |  | HTML iconHTML  

    Many situations present a social choice problem where different self-interested agents have to agree on joint, co-ordinated decisions. For example, power companies have to agree on how to use the power grid, and airlines have to agree on how to schedule takeoffs and landings. Mechanisms for social choice are called incentive-compatible when cooperative behavior is optimal for all parties. The most... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of Business Intelligence Based on Three-Level Ontology Services

    Publication Year: 2004 , Page(s): 17 - 23
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4040 KB) |  | HTML iconHTML  

    Usually, integration of business intelligence (BI) from realistic telecom enterprise is by packing data warehouse (DW), OLAP, data mining and reporting from different vendors together. As a result, BI system users are transferred to a reporting system with reports, data models, dimensions and measures predefined by system designers. As a result of survey, 85% of DW projects failed to meet their in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method

    Publication Year: 2004 , Page(s): 24 - 28
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (176 KB) |  | HTML iconHTML  

    Flash crowd events (FCEs) and malicious traffic including DDoS and worm attacks present a real threat to the stability of Web services. In this paper, we design a practical defense system that can provide some needed relief from the two types of events and protect the availability of Web services. A novel method of dynamic bandwidth arbitration using Generalized Vickrey auction based on microecono... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study of Web Interface Design on Small Display Devices

    Publication Year: 2004 , Page(s): 29 - 35
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (248 KB) |  | HTML iconHTML  

    This paper reports an empirical study that explores the problem of finding a highly-efficient, user-friendly interface design method on small display devices. We compared three models using our PDA interface simulator: presentation optimization method, semantic conversion method, and zooming method. A controlled experiment has been carried out to identify the pros and cons of each method. The resu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach for Step-By-Step Query Refinement in the Ontology-Based Information Retrieval

    Publication Year: 2004 , Page(s): 36 - 43
    Cited by:  Papers (5)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (208 KB) |  | HTML iconHTML  

    In this paper we present a comprehensive approach for the refinement of ontology-based queries, which is based on incrementally (step-by-step) and interactively tailoring a query to the current information needs of a user, whereas these needs are implicitly and on-line elicited by analysing the user's behaviour during the searching process. The gap between a user's need and his query is quantified... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logic Programming for Context-Aware Pervasive Computing: Language Support, Characterizing Situations, and Integration with the Web

    Publication Year: 2004 , Page(s): 44 - 50
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (168 KB) |  | HTML iconHTML  

    We characterize situations as constraints on sensor readings expressed in rules. We also introduce an extension of Prolog which we call LogicCAP for programming context-aware applications, where situations are first-class entities. The operator "in-situation" in the language captures a common form of reasoning in context-aware applications, which is to ask if an entity is in a given situation. We ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal Document Recommendation System Based on Data Mining Techniques

    Publication Year: 2004 , Page(s): 51 - 57
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (472 KB) |  | HTML iconHTML  

    Most existing recommendation systems may not be very effective due to the lack of the adequate knowledge of user's behavior or interests. Some systems are not] efficient enough because of the huge on-line computational demand. In this paper, we propose a personal documents recommendation system that effectively filters the on-line news on WWW for each individual user. The proposed system recommend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Neural Agents for Online NBA Scouting

    Publication Year: 2004 , Page(s): 58 - 63
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (136 KB) |  | HTML iconHTML  

    Internet is the focus of the intelligent agent applications. The current status of intelligent agent for the World Wide Web is still in its infancy, but like the Web itself, is evolving constantly. Several agents are being designed and implemented for a variety of tasks in diverse range of applications: managing e-mail, navigating and retrieving information from the Internet, online shopping, elec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting Precise Link Context Using NLP Parsing Technique

    Publication Year: 2004 , Page(s): 64 - 69
    Cited by:  Papers (2)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (152 KB) |  | HTML iconHTML  

    Link context has been exploited extensively ever since the advent of the World Wide Web, but the approach to extracting precise link context has not been fully explored and many state-of-the-art extraction methods are based on simplistic heuristics and require ad-hoc parameters. In this paper, we propose a novel two-step extraction model, which aims to systematically derive link context of quality... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rough Set-Aided Feature Selection for Automatic Web-Page Classification

    Publication Year: 2004 , Page(s): 70 - 76
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (184 KB) |  | HTML iconHTML  

    Recently Web-pages on the World Wide Web are explosively increasing, and it is now required for portal sites such as Yahoo! service having directory-style search engines to classify Web-pages into many categories automatically. This paper investigates how rough settheory can help select relevant features for Web-page classification. Our experimental results show that the combination of the rough s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology-Based Scalable and Portable Information Extraction System to Extract Biological Knowledge from Huge Collection of Biomedical Web Documents

    Publication Year: 2004 , Page(s): 77 - 83
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (192 KB) |  | HTML iconHTML  

    Automated discovery and extraction of biological knowledge from biomedical web documents has become essential because of the enormous amount of biomedical literature published each year. In this paper we present an ontology-based scalable and portable information extraction system to automatically extract biological knowledge from huge collection of online biomedical web documents. Our method inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matching and Retrieving Sequential Patterns Under Regression

    Publication Year: 2004 , Page(s): 84 - 90
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (256 KB) |  | HTML iconHTML  

    Sequential pattern matching and retrieving is of real value. For example, finding stocks in the NASDAQ market whose closing prices are always about $β₀ higher than or β₁ times as that of a given company. The probelm reduces to linear pattern retrieval: given query X, find all sequence Y from database S so that Y = β₀ + β₁ with confidence C. In this paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.