By Topic

2011 International Conference on Data and Knowledge Engineering (ICDKE)

6-6 Sept. 2011

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (437 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): II
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):III - IV
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Foreword from the conference chairs

    Publication Year: 2011, Page(s): V
    Request permission for commercial reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference committee

    Publication Year: 2011, Page(s): VI
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2011, Page(s): VII
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2011, Page(s): 80
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • SVM based approaches for classifying protein tertiary structures

    Publication Year: 2011, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1399 KB) | HTML iconHTML

    The tertiary structure of a protein molecule is the main factor which can be used to determine its chemical properties as well as its function. The knowledge of the protein function is crucial in the development of new drugs, better crops and synthetic biochemicals. With the rapid development in technology, the number of determined protein structures increases every day, so retrieving structurally... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meta-model based knowledge discovery

    Publication Year: 2011, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1222 KB) | HTML iconHTML

    Data acquisition and data mining are often seen as two independent processes in research. We introduce a meta-information based, highly generic data acquisition system which is able to store data of almost arbitrary structure. Based on the meta-information we plan to apply data mining algorithms for knowledge retrieval. Furthermore, the results from the data mining algorithms will be used to apply... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealing with domain knowledge in association rules mining — Several experiments

    Publication Year: 2011, Page(s):13 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1237 KB) | HTML iconHTML

    Experiments concerning dealing with domain knowledge in association rules mining are presented. Formalized items of domain knowledge are used. Each such item is converted into a set of all association rules that can be considered as its consequences. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generalization of blocking and windowing algorithms for duplicate detection

    Publication Year: 2011, Page(s):18 - 24
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1198 KB) | HTML iconHTML

    Duplicate detection is the process of finding multiple records in a dataset that represent the same real-world entity. Due to the enormous costs of an exhaustive comparison, typical algorithms select only promising record pairs for comparison. Two competing approaches are blocking and windowing. Blocking methods partition records into disjoint subsets, while windowing methods, in particular the So... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A process provenance service system for scientific data analysis and sharing

    Publication Year: 2011, Page(s):25 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1335 KB) | HTML iconHTML

    Scientific research has moved from an isolated environment into a collaborated culture due to data explosion and the experiment complexity. There are strong demands to track and share the data sources and the analysis processes that generate particular results and conclusions. However, the existing systems do not support well the end-to-end data analysis and sharing environment which involves sear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A database model for heterogeneous spatial collections: Definition and algebra

    Publication Year: 2011, Page(s):30 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1440 KB) | HTML iconHTML

    Spatial DBMSs usually extends the classical relational model with data types for georeferenced data, providing a suitable extension of SQL. Designing a database for heterogeneous technological infrastructures may be hard, and queries may be hard to write and low to execute. We define a data model able to model, in a natural way, heterogeneous collections of spatial objects. The query algebra provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-level continuous skyline queries (MCSQ)

    Publication Year: 2011, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1202 KB) | HTML iconHTML

    Most of the current work on skyline queries mainly dealt with querying static query points over static data sets. With the advances in wireless communication, mobile computing, and positioning technologies, it has become possible to obtain and manage (model, index, query, etc.) the trajectories of moving objects in real life, and consequently the need for continuous skyline query processing has be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A purpose based usage access control model for E-healthcare services

    Publication Year: 2011, Page(s):41 - 46
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1177 KB) | HTML iconHTML

    Information privacy becomes a major concern for customers to provide their private data that can promote future business service, especially in E-healthcare services. E-healthcare is the use of web-based systems to share and deliver information across the Internet that is easy to disclose private data provided by customers. The private data has to be protected through proper authorization and acce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Five examples of web-services for illustrating requirements for security architecture

    Publication Year: 2011, Page(s):47 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1067 KB) | HTML iconHTML

    The tension caused by the need for expressive power when formulating security rules and the need to keep computational complexity low when undertaking the necessary access rule evaluations is a major challenge in the formulation of good security architecture. This paper provides five examples of security in web services. which illustrate this tension. These examples highlight the need for more exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a distributed authenticating CDN

    Publication Year: 2011, Page(s):55 - 59
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1028 KB) | HTML iconHTML

    In recent times, much has been made of the security, or lack thereof, utilised within Facebook's content distribution network (CDN). Their CDN is noted to enable public access to any resource via a GET request presuming the user knows the URL for the resource. This means that not only can users directly access material that they would otherwise not have access to but it also means that material th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multicriteria recommendation method for data with missing rating scores

    Publication Year: 2011, Page(s):60 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1543 KB) | HTML iconHTML

    This paper proposes a recommendation method for multi-criteria (MC) collaborative filtering, where users are required to give rating scores from multiple aspects to each item and systems utilize the rich information to improve the recommendation accuracy. One drawback of MC recommender systems is user's cost to give scores to items because it requires rating scores on MC for each item. To overcome... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • rsLDA: A Bayesian hierarchical model for relational learning

    Publication Year: 2011, Page(s):68 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1300 KB) | HTML iconHTML

    We introduce and evaluate a technique to tackle relational learning tasks combining a framework for mining relational queries with a hierarchical Bayesian model. We present the novel rsLDA algorithm that works as follows. It initially discovers a set of relevant features from the relational data useful to describe in a propositional way the examples. This corresponds to reformulate the problem fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cross-Media framework for personalized learning systems

    Publication Year: 2011, Page(s):75 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1219 KB) | HTML iconHTML

    Distance education is widely supported by Media technology, such as mail, telephone, TV programs, radio, email, and online forums. Growing up with media technology, distance education has a developing track of correspondence learning by radio, T V, online forums, and finally, arrives at personalized learning. Personalized learning relies on diverse media techniques. This paper introduces Cross-Med... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.