By Topic

IEEE Transactions on Knowledge and Data Engineering

Issue 2 • Date Mar/Apr 2002

Filter Results

Displaying Results 1 - 18 of 18
  • Load balancing of parallelized information filters

    Publication Year: 2002, Page(s):456 - 461
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    We investigate the data-parallel implementation of a set of "information filters" used to rule out uninteresting data from a database or data stream. We develop an analytic model for the costs and advantages of load rebalancing for the parallel filtering processes, as well as a quick heuristic for its desirability. Our model uses binomial models of the filter processes and fits key parameters to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On scheduling atomic and composite continuous media objects

    Publication Year: 2002, Page(s):447 - 455
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    In multiuser multimedia information systems (e.g., movie-on-demand, digital-editing), scheduling the retrievals of continuous media objects becomes a challenging task. This is because of both intra and inter lobject time dependencies. Intraobject time dependency refers to the real-time display requirement of a continuous media object. Interobject time dependency is the temporal relationships defin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ElGamal-like cryptosystem for enciphering large messages

    Publication Year: 2002, Page(s):445 - 446
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    In practice, we usually require two cryptosystems, an asymmetric one and a symmetric one, to encrypt a large confidential message. The asymmetric cryptosystem is used to deliver secret key SK, while the symmetric cryptosystem is used to encrypt a large confidential message with the secret key SK. In this article, we propose a simple cryptosystem which allows a large confidential message to be encr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study of various nested normal forms

    Publication Year: 2002, Page(s):369 - 385
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (427 KB) | HTML iconHTML

    As object-relational databases (ORDBs) become popular in the industry, it is important for database designers to produce database schemes with good properties in these new kinds of databases. One distinguishing feature of an ORDB is that its tables may not be in first normal form. Hence, ORDBs may contain nested relations along with other collection types. To help the design process of an ORDB, se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient C4.5 [classification algorithm]

    Publication Year: 2002, Page(s):438 - 444
    Cited by:  Papers (94)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    We present an analytic evaluation of the runtime behavior of the C4.5 algorithm which highlights some efficiency improvements. Based on the analytic evaluation, we have implemented a more efficient version of the algorithm, called EC4.5. It improves on C4.5 by adopting the best among three strategies for computing the information gain of continuous attributes. All the strategies adopt a binary sea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving constraint optimization problems from CLP-style specifications using heuristic search techniques

    Publication Year: 2002, Page(s):353 - 368
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (473 KB) | HTML iconHTML

    Presents a framework for efficiently solving logic formulations of combinatorial optimization problems using heuristic search techniques. In order to integrate cost, lower-bound and upper-bound specifications with conventional logic programming languages, we augment a constraint logic programming (CLP) language with embedded constructs for specifying the cost function and with a few higher-order p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance study of robust load sharing strategies for distributed heterogeneous Web server systems

    Publication Year: 2002, Page(s):398 - 414
    Cited by:  Papers (14)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    Replication of information across multiple servers is becoming a common approach to support popular Web sites. A distributed architecture with some mechanisms to assign client requests to Web servers is more scalable than any centralized or mirrored architecture. In this paper, we consider distributed systems in which the Authoritative Domain Name Server (ADNS) of the Web site takes the request di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing outliers cautiously

    Publication Year: 2002, Page(s):432 - 437
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    Outliers are difficult to handle because some of them can be measurement errors, while others may represent phenomena of interest, something "significant" from the viewpoint of the application domain. Statistical and computational methods have been proposed to detect outliers, but further analysis of outliers requires much relevant domain knowledge. In our previous work (1994), we suggested a know... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Redefining clustering for high-dimensional applications

    Publication Year: 2002, Page(s):210 - 225
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (427 KB) | HTML iconHTML

    Clustering problems are well-known in the database literature for their use in numerous applications, such as customer segmentation, classification, and trend analysis. High-dimensional data has always been a challenge for clustering algorithms because of the inherent sparsity of the points. Recent research results indicate that, in high-dimensional data, even the concept of proximity or clusterin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Production systems with negation as failure

    Publication Year: 2002, Page(s):336 - 352
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    We study action rule-based systems with two forms of negation, namely classical negation and "negation as failure to find a course of action". We show, by means of several examples, that adding negation as failure to such systems increases their expressiveness in the sense that real-life problems can be represented in a natural and simple way. Then we address the problem of providing a formal decl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weighted fuzzy reasoning using weighted fuzzy Petri nets

    Publication Year: 2002, Page(s):386 - 397
    Cited by:  Papers (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    This paper presents a Weighted Fuzzy Petri Net model (WFPN) and proposes a weighted fuzzy reasoning algorithm for rule-based systems based on Weighted Fuzzy Petri Nets. The fuzzy production rules in the knowledge base of a rule-based system are modeled by Weighted Fuzzy Petri Nets, where the truth values of the propositions appearing in the fuzzy production rules and the certainty factors of the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SEAM: A state-entity-activity-model for a well-defined workflow development methodology

    Publication Year: 2002, Page(s):415 - 431
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    Current conceptual workflow models use either informally defined conceptual models or several formally defined conceptual models that capture different aspects of the workflow, e.g., the data, process, and organizational aspects of the workflow. To the best of our knowledge, there are no algorithms that can amalgamate these models to yield a single view of reality. A fragmented conceptual view is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A database perspective on geospatial data modeling

    Publication Year: 2002, Page(s):226 - 243
    Cited by:  Papers (5)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    We study the representation and manipulation of geospatial information in a database management system (DBMS). The geospatial data model that we use as a basis hinges on a complex object model, whose set and tuple constructors make it efficient for defining not only collections of geographic objects but also relationships among these objects. In addition, it allows easy manipulation of nonbasic ty... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast indexing and visualization of metric data sets using slim-trees

    Publication Year: 2002, Page(s):244 - 260
    Cited by:  Papers (43)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1530 KB) | HTML iconHTML

    Many recent database applications need to deal with similarity queries. For such applications, it is important to measure the similarity between two objects using the distance between them. Focusing on this problem, this paper proposes the slim-tree, a new dynamic tree for organizing metric data sets in pages of fixed size. The slim-tree uses the triangle inequality to prune the distance calculati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trigger condition testing and view maintenance using optimized discrimination networks

    Publication Year: 2002, Page(s):261 - 280
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (743 KB) | HTML iconHTML

    Presents a structure that can be used both for trigger condition testing and view materialization in active databases, along with a study of techniques for optimizing the structure. The structure presented is known as a discrimination network. The type of discrimination network introduced and studied in this paper is a highly general type of discrimination network which we call the Gator network. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-orientated design of digital library platforms for multiagent environments

    Publication Year: 2002, Page(s):281 - 295
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (601 KB) | HTML iconHTML

    The application of an object-oriented (OO) methodology to the design of a platform for heterogeneous digital libraries with multiagent technologies is demonstrated. Emphasis is placed on maximizing the autonomy of the query processing activity. The Fusion OO paradigm is specifically employed as the basis for the design process due to the significance attributed to the development of object interfa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A content-based authorization model for digital libraries

    Publication Year: 2002, Page(s):296 - 315
    Cited by:  Papers (30)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    Digital libraries (DLs) introduce several challenging requirements with respect to the formulation, specification and enforcement of adequate data protection policies. Unlike conventional database environments, a DL environment is typically characterized by a dynamic user population, often making accesses from remote locations, and by an extraordinarily large amount of multimedia information, stor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high-level Petri nets-based approach to verifying task structures

    Publication Year: 2002, Page(s):316 - 335
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1720 KB)

    As knowledge-based system technology gains wider acceptance, there is an increasing need to verify knowledge-based systems to improve their reliability and quality. Traditionally, attention has been given to verifying knowledge-based systems at the knowledge level, which only addresses structural errors such as redundancy, conflict and circularity in rule bases. No semantic errors (such as inconsi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Knowledge and Data Engineering (TKDE) informs researchers, developers, managers, strategic planners, users, and others interested in state-of-the-art and state-of-the-practice activities in the knowledge and data engineering area.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Jian Pei
Simon Fraser University

Associate Editor-in-Chief
Xuemin Lin
University of New South Wales

Associate Editor-in-Chief
Lei Chen
Hong Kong University of Science and Technology