Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004.

8-10 Nov. 2004

Filter Results

Displaying Results 1 - 25 of 120
  • Knowledge-based systems for biomedical laboratory applications

    Publication Year: 2004, Page(s):314 - 319
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2089 KB) | HTML iconHTML

    The research project BIOMIS focuses on three different biomedical problem domains, each dealing with huge amounts of data. In order to validate new input data and create a proposal system this data is used to build up an adaptive knowledge-base. The knowledge is structured by creating clusters of similar items and searching relationships among them. In the classification process system input is co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the auto-randomization of knowledge

    Publication Year: 2004, Page(s):308 - 313
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2036 KB) | HTML iconHTML

    In this paper, we first apply traditional computability theory to prove that the randomization problem, as defined herein, is recursively unsolvable. We then move on to extend traditional computability theory for the case of k-limited fine-grained parallel processors (i. e., temporal relativity). Using this modification, we are able to prove the Semantic Randomization Theorem (SRT). This theorem s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule-based noise detection for software measurement data

    Publication Year: 2004, Page(s):302 - 307
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2117 KB) | HTML iconHTML

    The quality of training data is an important issue for classification problems, such as classifying program modules into the fault-prone and not fault-prone groups. The removal of noisy instances will improve data quality, and consequently, performance of the classification model. We present an attractive rule-based noise detection approach, which detects noisy instances based on Boolean rules gen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data stream mining architecture for network intrusion detection

    Publication Year: 2004, Page(s):363 - 368
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2078 KB) | HTML iconHTML

    In this paper, we propose a stream mining architecture which is based on a single-pass approach. Our approach can be used to develop efficient, effective, and active intrusion detection mechanisms which satisfy the near real-time requirements of processing data streams on a network with minimal overhead. The key idea is that new patterns can now be detected on-the-fly. They are flagged as network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a Web-based oil delivery remote monitoring and controlling system

    Publication Year: 2004, Page(s):192 - 197
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2061 KB) | HTML iconHTML

    On the basis of the introducing the Web-based structural mode adopted in the remote monitoring and controlling system, we puts forward an integrated technological solution of the oil delivery remote monitoring and controlling system, specifies its system structure and the design and implementation of the system. We discuss many technical details in the system. In practical operation, the Web-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of virtual laboratories using wrapping and agent techniques

    Publication Year: 2004, Page(s):450 - 455
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2164 KB) | HTML iconHTML

    This work designs and implements a virtual laboratory that breaks the limits of time and location in traditional education under the innovation of network and information technology. Since the development of a virtual laboratory from scratch is time consuming and costly, our system can be used to wrap an existing CAI tool without knowing its source code. The key concept is to use mobile agents as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining real estate listings using Oracle data warehousing and predictive regression

    Publication Year: 2004, Page(s):296 - 301
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2100 KB) | HTML iconHTML

    The object of this paper is to introduce our development experience of a data mining system for prospective real estate sellers and buyers to determine properties price. The prediction of continuous values of properties selling prices is modeled by a statistical technique called predictive regression. The prerequisite of this data mining process is to design a data warehouse that contains a wide v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A data mining framework for building a Web-page recommender system

    Publication Year: 2004, Page(s):357 - 362
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2103 KB) | HTML iconHTML

    In this paper, we propose a new framework based on data mining algorithms for building a Web-page recommender system. A recommender system is an intermediary program (or an agent) with a user interface that automatically and intelligently generates a list of information, which suits an individual's needs. Two information filtering methods for providing the recommended information are considered: (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying domain patterns using software stability

    Publication Year: 2004, Page(s):18 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2208 KB) | HTML iconHTML

    The fact that domain applications share core aspects has turned software reuse into a viable option. System development has experienced time saving, cost saving, and the luxury of deploying proven-to-work solutions as main advantages of software reuse. Software patterns represent a major approach for reuse. Domain patterns capture system components shared by different applications that belong to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synchronization of mobile XML databases by utilizing deferred views

    Publication Year: 2004, Page(s):186 - 191
    Cited by:  Papers (2)  |  Patents (48)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2059 KB) | HTML iconHTML

    In today fast pace, technologically based world, people need access to information on the go, anywhere at anytime. Because of this, mobile databases are greatly increasing in popularity. Using mobile devices, users can access and modify information without a network connection, and can then synchronize any updates when they get connected. This synchronization process must not only be able to perfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification-based testing with linear temporal logic

    Publication Year: 2004, Page(s):493 - 498
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2152 KB) | HTML iconHTML

    This paper considers the specification-based testing in which the requirement is given in the linear temporal logic (LTL). The required LTL property must hold on all the executions of the system, which are often infinite in size and/or in length. The central piece of our framework is a property-coverage metric. Based on requirement mutation, the metric measures how well a property has been tested ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative agents through bidding

    Publication Year: 2004, Page(s):444 - 449
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2067 KB) | HTML iconHTML

    One of the main research topics in multiagent systems is learning cooperation among agents. This paper presents a multiagent reinforcement learning approach with bidding. Self-interested agents cooperate with each other through bidding and evolutionary computation. We tested the approach to the TSP problem. The experimental results show our approach can achieve a certain level of performance in pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robustness enhancement for proximal support vector machines

    Publication Year: 2004, Page(s):290 - 295
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2004 KB) | HTML iconHTML

    Proximal support vector machine (PSVM) is a new version of SVM, which involves equality instead of inequality constraints, and works with a square error function. In this way, the solution follows from a linear Karush-Kuhn-Tucker system instead of a quadratic programming problem. The linear PSVM can easily solve the classification problems of extremely large datasets. However, according to the exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinating human operators and computer agents for recovery-oriented computing

    Publication Year: 2004, Page(s):351 - 356
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2107 KB) | HTML iconHTML

    This paper examines the errors committed by human operators of large networks and systems. It proposes a formal procedure in which system defense mechanisms are used to improve the coordination between human operators and computer agents. Further, it discusses and compares the effectiveness of different types of system defense mechanisms by performing experiments with Web-based GUI screens. In the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective block matching algorithm for video system

    Publication Year: 2004, Page(s):163 - 167
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1975 KB) | HTML iconHTML

    An error concealment (or recovery) algorithm useful for transmitting image frames on Internet-based applications is presented. The selective block matching algorithm (SBMA) recovers the lost blocks by incorporating the selective spatial interpolation (only selected pixels are interpolated) and the side match algorithm (SMA) to achieve smooth restoration of lost blocks. First, pixels of lost blocks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-level filters for a Web-based e-mail system

    Publication Year: 2004, Page(s):109 - 114
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2152 KB) | HTML iconHTML

    With spams becoming an ever increasing problem, different strategies have been used to fight against these junk e-mails, including feature-based and statistic approaches. Although these approaches are effective in filtering out the junk e-mails, they frequently generate false positives. In this paper, we describe a multilevel cascading filter approach for a Web-based email system. The system allow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SQL Statement Template: a development approach for database-driven applications

    Publication Year: 2004, Page(s):12 - 17
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2064 KB) | HTML iconHTML

    Database-driven applications are some of the most widespread applications nowadays. It normally requires a good knowledge and experience in application development, database SQL, and may be some other fields to build a well-designed application. The inherited nature, which is common in most database-driven applications, is that SQL statements are considered to be part of the code. However, this te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying hidden Markov models to keystroke pattern analysis for password verification

    Publication Year: 2004, Page(s):467 - 474
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2178 KB) | HTML iconHTML

    Due to increasing incidents of security breaches in the cyber space, a rigorous user authentication process has become crucial. A very feasible biometric approach to verify the authenticity of a user is to examine his/her typing patterns. There is a significant difference in the keystroke patterns exhibited from person to person, even when asked to type the same words. Typing patterns can be shown... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audio watermarking based on inverse difference decomposition

    Publication Year: 2004, Page(s):180 - 185
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2035 KB) | HTML iconHTML

    A new approach for audio watermarking in the phase-frequency domain is presented, based on the inverse difference decomposition (IDD) with complex Hadamard transform (CHT). The main advantages of the method, compared with others based on the discrete Fourier and wavelet transforms, are the absence of quantization noise, the lower computational complexity and the ability for the owner of the audio ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML-based software component retrieval with partial and reference matching

    Publication Year: 2004, Page(s):127 - 132
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2090 KB) | HTML iconHTML

    In software development, it is very desirable that existing software components can be reused that meet the user's specifications. A great amount of software components, or software objects, exist in some libraries or repositories, but finding the ones that can be reused for an application is a challenging task. The main objective is to find a match between the required specifications with those c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based testing and monitoring for hybrid embedded systems

    Publication Year: 2004, Page(s):487 - 492
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2161 KB) | HTML iconHTML

    We propose an integrated framework for testing and monitoring the model-based embedded systems. The framework incorporates three components: 1) model-based test generation for hybrid system, 2) run-time verification, and 3) modular code generation for hybrid systems. To analyze the behavior of a model-based system, the model of the system is augmented with a testing automaton that represents a giv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining ordinal patterns for data cleaning

    Publication Year: 2004, Page(s):438 - 443
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2063 KB) | HTML iconHTML

    It is well recognized that sequential pattern mining plays an essential role in many scientific and business domains. In this paper, a new extension of sequential pattern, ordinal pattern, is proposed. An ordinal pattern is an ordinal sequence of attributes, whose values commonly occur in ascending order over data set. Ordinal pattern mining requests that values of different attributes must be com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge management: overcoming the knowledge acquisition bottleneck

    Publication Year: 2004, Page(s):420 - 425
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2005 KB) | HTML iconHTML

    This paper addresses the bottleneck issues of knowledge acquisition and their impact on knowledge management. It introduces several solution approaches as the basis for problem solving models, which is further supported by the randomization and truth maintenance techniques. These techniques have the potential of offering new services for automated knowledge management and would open up new ways pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A component-based design for a simulated network

    Publication Year: 2004, Page(s):283 - 289
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2117 KB) | HTML iconHTML

    This paper describes a component-based design for a virtual network construction and simulation tool to be used for educational purposes. In this study, the elements of a computer network are defined in terms of discrete objects. It presents the component hierarchy and design requirements for modeling a network, and describes the means by which these objects can be modeled and instantiated as simu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal vs. spectral approach to feature extraction from prehensile EMG signals

    Publication Year: 2004, Page(s):344 - 350
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2122 KB) | HTML iconHTML

    There are generally two nonparametric approaches in feature extraction from temporal signals: temporal and spectral approach. Both approaches were used in classification of prehensile electromyographic (EMG) signals. The goal of this paper is to define and evaluate some successful methods in both approaches and to determine experimentally which method and approach is the most appropriate. The eval... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.