By Topic

16th International Workshop on Database and Expert Systems Applications (DEXA'05)

22-26 Aug. 2005

Filter Results

Displaying Results 1 - 25 of 204
  • 16th International Workshop on Database and Expert Systems Applications - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • 16th International Workshop on Database and Expert Systems Applications - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • 16th International Workshop on Database and Expert Systems Applications - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • 16th International Workshop on Database and Expert Systems Applications - Table of contents

    Publication Year: 2005, Page(s):v - xxiv
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2005, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (34 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2005, Page(s):xxvi - xxviii
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Hierarchical Protocol for Byzantine Agreement in a Peer-to-Peer Overlay Network

    Publication Year: 2005, Page(s):5 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    Peer-to-peer (P2P) systems are composed of large number and various types of processes interconnected in networks. Peers may not suffer from only stop fault but also Byzantine fault. We have to discuss how to make a system tolerant of Byzantine faults of processes. In order to reduce the overhead of Byzantine agreement (BA), we consider a hierarchical group (HG) composed of subgroups. Each subgrou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role Ordering (RO) Scheduler for Concurrency Control

    Publication Year: 2005, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    A role concept shows a job function in an enterprise. Traditional locking protocols and timestamp ordering schedulers are based on principles "first-comer-winner" and "timestamp order" to make multiple conflicting transactions serializable, respectively. In this paper, we newly discuss a role ordering (RO) scheduler. Here, methods of more significant roles are performed before one of less signific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Computation Model for Marketable Quality and Profitability Considering Unfair Relationship

    Publication Year: 2005, Page(s):15 - 21
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (139 KB) | HTML iconHTML

    In this paper, we provide an evaluation method for both: the quality aspect of corporations (marketable quality) and the profitability. We define the corporation rate of operation and profitability. Based on these definitions, we present a model to identify the profitability function considering the rate of operation at the break-even point. This function is considered as the marketable quality in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graph-Theoretic Nature of Local Web-Spaces

    Publication Year: 2005, Page(s):22 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    A local Web-space is defined as a sub-graph of WWW whose sites are confined within a particular geographical area. It is naturally conjectured that sites in a local Web-space are tightly connected with each other by means of links because of their geographical, social and human relations. The initial motivation of this paper is to examine the conjecture. In fact, this paper gauges the strength of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EEERB: An Experience and Environment Based Evolutionary Rule Base for Simulated Exploration Robots

    Publication Year: 2005, Page(s):27 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (110 KB) | HTML iconHTML

    This paper proposes an experience and environment based evolutionary rule base (EEERB) system. With it the simulated exploration robots, also called robot agents perform a specific exploration towards their predefined goal with their individual increasing experience and shared information from their environment. The rule base is evolving with the individual increasing experience by applying geneti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Impact of Patterns on Services and Vice Versa

    Publication Year: 2005, Page(s):35 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    Design patterns are a concept which has contributed a lot to the advancement of the field of software engineering. On the other hand, the introduction of services has brought forth a new direction in software development. In this paper we try to consolidate the two concepts by showing their mutual interdependence, by analyzing the subset of middleware-services. In this context we examine how both ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Virtual Organization Solution for Web-Services Based Grid Middleware

    Publication Year: 2005, Page(s):40 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (82 KB) | HTML iconHTML

    Many solutions of virtual organization have been proposed in recent years. Most of them have one or more centralized component(s). Here, we show a system, which is fully distributed and independent. This system is designed using the Web-services based technologies and uses the idea "node" to indicate the server. It provides several simple behaviours to satisfy the basic requirements of grid comput... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Extraction and Registration of Physical Feature Vectors for Digital Traditional Crafting Database

    Publication Year: 2005, Page(s):45 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    In this paper, we propose a Kansei retrieval method based on the design pattern of traditional Japanese crafting object to provide a user with the desired presentation space in digital traditional Japanese crafting system. The visual quantitative feature values are extracted by using visual pattern image coding (VPIC). These values include the total number, the frequency, the dispersion rate and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of WWW-Based Conference System

    Publication Year: 2005, Page(s):50 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1474 KB) | HTML iconHTML

    Recently in Japan, the mental health care has become a very important issue because there are many people suffering from mental problems. Also, there are only few specialists and researchers to deal with these problems. Because there are very few mental healthcare specialists, it is very important to decrease their moving time. Also, it is very important to see the facial expression and talk to pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anti-SPAM System: Another Way of Preventing SPAM

    Publication Year: 2005, Page(s):57 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    In recent years, spam email has become big trouble over the Internet. Although some technical counter-measures against spam have been proposed, spam is still coming everyday, but when countermeasures are overly sensitive, even legitimate emails are refused or eliminated. Hence, we propose a new countermeasure that guarantees that legitimate emails are delivered. Our proposed system can restrain th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tightly-Coupled Wrappers with Event Detection Subsystem for Heterogeneous Information Systems

    Publication Year: 2005, Page(s):62 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    The interconnection of heterogeneous and autonomous data sources for information sharing demands for flexible and extensible integrative components. In this paper we present a universal architecture for building wrapper components to access various types of heterogeneous information sources. The wrapper comprises an event detection subsystem to detect and propagate modifications of the data stock.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Random ID Update Scheme to Protect Location Privacy in RFID-Based Student Administration Systems

    Publication Year: 2005, Page(s):67 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (602 KB) | HTML iconHTML

    Recently the RFID has been received great attentions and gotten wide applications in many different areas including some administration systems for automatically managing students in a campus. However, a RFID tag may infringe on its owner's location privacy because of its traceability. Therefore, location privacy problems in RFID-based student administration systems become a critical issue in appl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Propagation on the φ Failure Detector

    Publication Year: 2005, Page(s):72 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (135 KB) | HTML iconHTML

    It is widely recognized that distributed systems would greatly benefit from the availability of a generic failure detection service. There are however several issues that must be addressed before such a service can actually be implemented. In this paper, we highlight the issue related to propagating information on failures in the phi failure detector for large-scale systems. Traditionally, failure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Initial Design of Distributed Identification System for Geographical Origin by Trace Element Analysis

    Publication Year: 2005, Page(s):79 - 83
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    In Japan, districts where agricultural products are cultivated have recently begun to make their locality into a brand. In order to take advantage of this brand creation, some retailer and distributor camouflage agricultural products cultivated in non-branded districts to be sold as the branded districts goods with its attendant higher brand values; thus fraudulently raising their own prices. In o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New TV Conferencing System with Flexible Middleware by Omni-Directional Camera

    Publication Year: 2005, Page(s):84 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    In this paper, a new TV teleconference with flexible middleware for omni-directional video camera is introduced. The omni-directional image has more advantages in that it provides a wider view than a single directional camera and able to realize TV conferencing even between remotely separated small rooms. In this paper, we describe system architecture and functions of the middleware for omni-direc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web CC: A WBT System of Programming for Beginners

    Publication Year: 2005, Page(s):89 - 93
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB) | HTML iconHTML

    This paper introduces Web CC, a Web based C compiler. Web CC is simple but provides a ubiquitous programming environment for beginners. Web CC has several other features. Many beginners are interested in computer graphics (CG). But, CG programming is difficult for beginners because CG programs are implemented using pointers, structures, and such difficult techniques. Web CC provides several functi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Human-Robot Networking Based on a Multi-Agent Mind Model

    Publication Year: 2005, Page(s):94 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB) | HTML iconHTML

    The mental image directed semantic theory (MIDST) has proposed a methodology for integrated multimedia information understanding, for example, cross-media translation. This paper describes a multi-agent model of human mind based on MIDST and its application to human-robot communication View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Client/Intercept Based System for Optimized Wireless Access to Web Services

    Publication Year: 2005, Page(s):101 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB) | HTML iconHTML

    In this paper we discuss the introduction of Web services in the wireless/mobile domain. The use of Web services is gradually expanding into the mobile Internet area where the population of users is rapidly increasing. Web services offer standardized ways of creating, publishing, searching and invoking services and provide a very important platform for the development of mobile e-commerce. We iden... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of RA Beaconing Techniques in Mobile IPv6

    Publication Year: 2005, Page(s):106 - 110
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    The address auto-configuration of MIPv6 mobile nodes relies on the availability of a router advertisement (RA) messages from the access router responsible of the subnet, which the terminal is moving towards. If the mobile node does not receive an RA message by a certain period, it sends a router solicitation (RS) message to request router information. This phase is critical during handoff procedur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.