By Topic

Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004.

8-10 Nov. 2004

Filter Results

Displaying Results 1 - 25 of 120
  • K-Support system: knowledge support for disseminating and sharing task-relevant knowledge

    Publication Year: 2004, Page(s):332 - 337
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2144 KB) | HTML iconHTML

    In task-based business environments, an important issue in deploying knowledge management systems (KMS) is providing task-relevant information to fulfill the information needs of knowledge workers. This work develops a knowledge support (K-Support) system providing a collaborative task-based workplace to facilitate knowledge retrieval and sharing among peer-groups. In the developed system, an adap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to text classification using dimensionality reduction and combination of classifiers

    Publication Year: 2004, Page(s):564 - 569
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2071 KB) | HTML iconHTML

    Text classification involves assignment of predetermined categories to textual resources. Applications of text classification include recommendation systems, personalization, help desk automation, content filtering and routing, selective alerting, and text mining. This paper describes an experiment for improving the classification accuracy of a large text corpus by the use of dimensionality reduct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge management: impact of knowledge delivery factors on software product development efficiency

    Publication Year: 2004, Page(s):320 - 325
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2105 KB) | HTML iconHTML

    Software development (SWD) is a knowledge intensive activity. SWD organizations apply knowledge management system (KMS) to create, gather, store and distribute in-house knowledge. Studies show that employing KMS might introduce risks as well as benefits. Better understanding of how different characteristics of KMS affect SWD efficiency will help organizations increase the benefits and reduce the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A liquid nonlinear acoustic parameter B/A measuring system based on information fusion

    Publication Year: 2004, Page(s):559 - 563
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1933 KB) | HTML iconHTML

    According to phase shift error hard to take out in measurement with single information source, based on multiple echo information sources, a liquid B/A measuring system is set up. Fusion of multiple information sources is adopted originally, and phase shift error generated by the transducer and measuring circuit is avoided by complementarity between different echo information. Accuracy and reliabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reuse of a geometric model for shape approximation

    Publication Year: 2004, Page(s):174 - 179
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2127 KB) | HTML iconHTML

    A robust procedure of three-dimensional shape modeling for an object approximation is proposed. A solid model is first prepared or reused for the prototype and then transferred to the model that approximates the shape of the object. Vertex geometry of the prototype is modified based on the multidirectional silhouettes and light stripe pattern projection. Topology of the mesh, shape and connectivit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the auto-randomization of knowledge

    Publication Year: 2004, Page(s):308 - 313
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2036 KB) | HTML iconHTML

    In this paper, we first apply traditional computability theory to prove that the randomization problem, as defined herein, is recursively unsolvable. We then move on to extend traditional computability theory for the case of k-limited fine-grained parallel processors (i. e., temporal relativity). Using this modification, we are able to prove the Semantic Randomization Theorem (SRT). This theorem s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A heuristic approach for best sets of actions determination in influence nets

    Publication Year: 2004, Page(s):600 - 605
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2076 KB) | HTML iconHTML

    The paper presents a heuristic approach for the problem of finding the best or close-to-best sets of actions in uncertain situations modeled by influence nets. The approach enhances the analysis capability of influence nets by allowing the user to observe the combined impact of actions on the desired effect in contrast to the sensitivity analysis that allows the user to evaluate individual impacts... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision making with fuzzy-belief-state-based reasoning

    Publication Year: 2004, Page(s):553 - 558
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2022 KB) | HTML iconHTML

    An outstanding problem is how to make decisions with uncertain and incomplete data from disparate sources without NP-hard algorithms. Here we introduce a new reasoning methodology, fuzzy-belief-state-based reasoning, to solve this problem. In this methodology, we first create a fuzzy-belief-state base for a system from its historical data. For any component n(n=1,...,N) of the set of empirical sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fusing legal knowledge

    Publication Year: 2004, Page(s):522 - 529
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2143 KB) | HTML iconHTML

    In this paper, the problem of fusing various sources of legal knowledge is addressed. It is shown that standard logic-based approaches to knowledge fusion can unfortunately transform necessary conditions for a rule to apply into sufficient ones. A transformation schema that solves this problem is then proposed and analyzed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using traceability mechanisms to support software product line evolution

    Publication Year: 2004, Page(s):157 - 162
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2088 KB) | HTML iconHTML

    This paper presents traceability mechanisms to support software product line evolution. Product line approach to software development requires designers to consider requirements for a family of products and the relationships between these requirements. This paper examines three kinds of evolution processes -architecture, product line, and product. Change management mechanisms are identified. These... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying domain patterns using software stability

    Publication Year: 2004, Page(s):18 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2208 KB) | HTML iconHTML

    The fact that domain applications share core aspects has turned software reuse into a viable option. System development has experienced time saving, cost saving, and the luxury of deploying proven-to-work solutions as main advantages of software reuse. Software patterns represent a major approach for reuse. Domain patterns capture system components shared by different applications that belong to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification-based testing with linear temporal logic

    Publication Year: 2004, Page(s):493 - 498
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2152 KB) | HTML iconHTML

    This paper considers the specification-based testing in which the requirement is given in the linear temporal logic (LTL). The required LTL property must hold on all the executions of the system, which are often infinite in size and/or in length. The central piece of our framework is a property-coverage metric. Based on requirement mutation, the metric measures how well a property has been tested ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACE: improving search engines via Automatic Concept Extraction

    Publication Year: 2004, Page(s):229 - 234
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2137 KB) | HTML iconHTML

    The proliferation of the Internet has caused the process of browsing and searching for information to become extremely cumbersome. While many search engines provide reasonable information., they still fall short by overwhelming users with a multitude of often irrelevant results. This problem has several causes but most notably is the inability for the user to be able to convey the context of their... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A component-based design for a simulated network

    Publication Year: 2004, Page(s):283 - 289
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2117 KB) | HTML iconHTML

    This paper describes a component-based design for a virtual network construction and simulation tool to be used for educational purposes. In this study, the elements of a computer network are defined in terms of discrete objects. It presents the component hierarchy and design requirements for modeling a network, and describes the means by which these objects can be modeled and instantiated as simu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blending scheduling based on particle swarm optimization algorithm

    Publication Year: 2004, Page(s):618 - 622
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1969 KB) | HTML iconHTML

    Blending is an important unit operation in process industry. Blending scheduling is nonlinear optimization problem with constraints. It is difficult to obtain optimum solution by other general optimization methods. Particle swarm optimization (PSO) algorithm is developed for nonlinear optimization problems with both continuous and discrete variables. In order to obtain a global optimum solution qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rule-based noise detection for software measurement data

    Publication Year: 2004, Page(s):302 - 307
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2117 KB) | HTML iconHTML

    The quality of training data is an important issue for classification problems, such as classifying program modules into the fault-prone and not fault-prone groups. The removal of noisy instances will improve data quality, and consequently, performance of the classification model. We present an attractive rule-based noise detection approach, which detects noisy instances based on Boolean rules gen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A system for distributed image acquisition, content-analysis and similarity retrieval

    Publication Year: 2004, Page(s):168 - 173
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2076 KB) | HTML iconHTML

    Emergence of mobile communications devices capable of acquiring high-resolution images and sensor devices with communication capabilities contributes to the increasing feasibility of remote screening of various medical and environmental conditions. In this work we present a system that supports remote acquisition of images and similarity retrieval from a centralized database after automatic conten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantitative analysis with IQAM for business decision support

    Publication Year: 2004, Page(s):594 - 599
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2047 KB) | HTML iconHTML

    In this paper we introduce the original IQAM system (intelligent quantitative analyzer for business management) that we have designed. It can help the managers make the right decisions by examining various business and financial factors involved through a unique process, which is based on the fuzzy reasoning and probabilistic inference. It's one of the first system tools that can be used to analyz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualization of design knowledge component relationships to facilitate reuse

    Publication Year: 2004, Page(s):414 - 419
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2213 KB) | HTML iconHTML

    Within the software development process, reuse at the requirements level has become an increasingly more compelling notion. Following a human-centric approach, this work focuses on both requirements and design solution reuse using a design knowledge repository. In recent years, many improvements have been made to increase reuse through design knowledge repositories, but retrieval of knowledge in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A predictive control strategy based on fuzzy system

    Publication Year: 2004, Page(s):549 - 552
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1921 KB) | HTML iconHTML

    In this paper a new predictive control strategy based on fuzzy system is proposed. An improved nearest neighborhood clustering algorithm is presented to establish fuzzy system. The algorithm is used to identify predictive model on-line. And the nonderivative optimization method is used to optimize the parameter of the controller. The algorithm can solve the problem of predictive control of nonline... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Furthest fitting cost: time series similarity from another angle

    Publication Year: 2004, Page(s):499 - 503
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2067 KB) | HTML iconHTML

    On time series similarity measurement, a new idea based on furthest fitting cost (FFC) is proposed, which cares the cost transforming one series to another one. This paper introduces amplitude scaling and y-axis shifting, to give a simple distance definition. Furthermore, a fast simple time warping method is proposed to deal with the time series of different lengths, to make FFC more applicable. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Execution model for non-hierarchical heterogeneous modeling

    Publication Year: 2004, Page(s):139 - 144
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2060 KB) | HTML iconHTML

    To combine different technology domains, modeling languages and platforms generally use a hierarchical approach. This approach avoids the combinatorial explosion of the number of interfaces between models of computation (MoC), but it forbids the use of components which have inputs or outputs that obey different MoCs, This affects the modularity and the reuse of the components. Moreover, the commun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SQL Statement Template: a development approach for database-driven applications

    Publication Year: 2004, Page(s):12 - 17
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2064 KB) | HTML iconHTML

    Database-driven applications are some of the most widespread applications nowadays. It normally requires a good knowledge and experience in application development, database SQL, and may be some other fields to build a well-designed application. The inherited nature, which is common in most database-driven applications, is that SQL statements are considered to be part of the code. However, this te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solution reuse in partial MAX-SAT problem

    Publication Year: 2004, Page(s):481 - 486
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2079 KB) | HTML iconHTML

    Partial MAX-SAT (PMSAT) is a variant of the MAX-SAT problem in propositional logic. It was introduced as an encoding domain for real-world problems in which the satisfiability of some constraints is required to the feasibility of a solution. It consists of two CNF formulae over the same variable set, and its solution must satisfy all clauses of the first formula and as many clauses in the second f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software technological roles, usability, and reusability

    Publication Year: 2004, Page(s):210 - 214
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2050 KB) | HTML iconHTML

    Software reuse is an important and relatively new approach to software engineering. The aim is further development of a methodology and mathematical theory of software metrics for evaluation of software reusability. In the second section, going after Introduction, it is demonstrated that reusability is a form of usability. This allows one to use experience in the development and utilization of sof... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.