2013 Ninth International Conference on Semantics, Knowledge and Grids

3-4 Oct. 2013

Filter Results

Displaying Results 1 - 25 of 44
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for reuse | PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - vii
    Request permission for reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2013, Page(s): viii
    Request permission for reuse | PDF file iconPDF (73 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013, Page(s): ix
    Request permission for reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2013, Page(s):x - xi
    Request permission for reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • A Software Defined Self-Aware Network: The Cognitive Packet Network

    Publication Year: 2013, Page(s):1 - 5
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1531 KB) | HTML iconHTML

    This article is a summary description of the Cognitive Packet Network (CPN) which is an example both of a completely software defined network (SDN) and of a self-aware computer network (SAN) which has been completely implemented and used in numerous experiments. CPN is able to observe its own internal performance as well as the interfaces of the external systems that it interacts with, in order to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommendation Techniques Based on Off-Line Data Processing a Multifaceted Survey

    Publication Year: 2013, Page(s):6 - 13
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Recommendations based on off-line data processing has attracted increasing attention from both research communities and IT industries. The recommendation techniques could be used to explore huge volumes of data, identify the items that users probably like, and translate the research results into real-world applications, etc. This paper surveys the recent progress in the research of recommendations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PaaS-Independent Approach to Provision Appropriate Cloud Resources for SCA-based Applications Deployment

    Publication Year: 2013, Page(s):14 - 21
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (759 KB) | HTML iconHTML

    The adoption of Cloud Computing as a new business model has induced the proliferation of platform providers. However, the platform as-a-service (PaaS) concept still has several drawbacks to address before it can become widely used. In fact, PaaS involves some risks of vendor lock-in and compatibility restrictions if applications to deploy require proprietary or specific hosting frameworks such as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Theorem Finding by Forward Deduction Based on the Semi-lattice Model of Formal Theory: A Case Study in NBG Set Theory

    Publication Year: 2013, Page(s):22 - 29
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1008 KB) | HTML iconHTML

    The problem of automated theorem finding is one of 33 basic research problems in automated reasoning which was originally proposed by Wos in 1988, and it is still an open problem. To solve the problem, a forward deduction approach based on the strong relevant logics was proposed. To verify the effectiveness of the approach, we tried to rediscover already known theorems in NBG set theory by using t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Analysis for Keywords Based User Segmentation from Internet Data

    Publication Year: 2013, Page(s):30 - 36
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Nowadays, Internet has been one of the major advertising channels and behavioral targeting has become increasingly important for improving the click-through rate of online advertisements. One of the key research problems in behavioral targeting is how to group users into segments with similar interests or backgrounds. In this paper, we propose a web page-oriented and keywords-based approach to add... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Access Control Model for Organisational Management in Enterprise Architecture

    Publication Year: 2013, Page(s):37 - 43
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Enterprise architecture (EA) aims to provide management with appropriate indicators and controls to steer and model service-oriented enterprises. EA offers a suitable operating platform to support an organisation's future goals and the roadmap for moving towards this vision. Despite significant research interest in the domain, common enterprises architecture frameworks lack of access control mecha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Verification of SCA Assembly Model with Event-B

    Publication Year: 2013, Page(s):44 - 51
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1407 KB) | HTML iconHTML

    Service Component Architecture (SCA) is a new promising programming model for constructing service-oriented application, which facilitates the development of business integration in SOA. However, SCA in its current form does not represent any formal definition. In addition, there is a growing interest for verification techniques which help to prevent SCA composition specification failure. In this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Association Link Network Model for Organizing Video Resources from Web

    Publication Year: 2013, Page(s):52 - 57
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Recent research shows that videos "in the wild" are growing at a staggering rate. The rapid increase number of video resources has brought an urgent need to develop intelligent methods to organize the video events. In this paper, we use the Association Link Network model for organizing video resources from Web. Association Link Network is a kind of semantic link network, which is designed to estab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Citation-Based Knowledge Flow in Scientific Research

    Publication Year: 2013, Page(s):58 - 65
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    This paper studies the citation-based knowledge flows among research elements such as researcher, paper, publication venue and research topic. The knowledge flow networks have been used to evaluate the research elements and distinguish their roles. The visualization of knowledge flow network of different research elements can overview the knowledge flows among research elements of the same type. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic-Driven Configuration of Internet of Things Middleware

    Publication Year: 2013, Page(s):66 - 73
    Cited by:  Papers (15)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    We are currently observing emerging solutions to enable the Internet of Things (IoT). Efficient and feature rich IoT middeware platforms are key enablers for IoT. However, due to complexity, most of these middleware platforms are designed to be used by IT experts. In this paper, we propose a semantics-driven model that allows non-IT experts (e.g. plant scientist, city planner) to configure IoT mid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Resource Evaluation Model Based on Entropy Optimization Toward Green Cloud

    Publication Year: 2013, Page(s):74 - 81
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1854 KB) | HTML iconHTML

    The uncertainty of cloud resources makes task scheduling very difficult, and may results in a waste of energy of cloud resources if some cloud resources stay in unusable state for a long time. This paper proposes the cloud resource evaluation model based on entropy optimization (EOEM) to solve the uncertain problem. The evaluation results also can be used to develop resource management strategies,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a Hierarchical Graph Kernel for Semantic Link Network

    Publication Year: 2013, Page(s):82 - 89
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    One of the most important abilities of human is cluster and classify similar things, which makes people could better understand the nature, easier establish and manage the social society. How to model things like people and how to compute the similarities between models are two major problems need to be solved to make the machine has this ability. For the first problem, the Semantic Link Network (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Quadtree-Based Semantic Link Network for Image Classification

    Publication Year: 2013, Page(s):90 - 97
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1333 KB) | HTML iconHTML

    Bag-of-words model is widely utilized for representing images in a semantic intermediate manner. However traditional visual words are orderless without information with regard to co-occurrences of them as well as their spatial distributions. Spatial pyramid matching provides an effective way to preserve partly spatial information within images, but ignores geometric relations between visual words.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Multicore Based Parallel Computing Approach for TSP Problems

    Publication Year: 2013, Page(s):98 - 104
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    TSP (Travelling Salesman Problem) is a typical problem in the scientific and business computing applications such as social network analysis, VLSI chip design, etc. However TSP is regarded as not only a combinatorial optimization problem but also a typical NP-hard problem, and becomes an important method of verifying the correctness and feasibility of new algorithms. Branch and bound algorithm is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Genetic Algorithm for Cost-Effective Data-Intensive Service Composition

    Publication Year: 2013, Page(s):105 - 112
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    The explosion of digital data and the dependence on data-intensive services have been recognized as the most significant characteristics of IT trends in the current decade. Designing workflow of data-intensive services requires data analysis from multiple sources to get required composite services. Composing such services requires effective transfer of large data. Thus many new challenges are pose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Threshold and Associative Based Classification for Social Spam Profile Detection on Twitter

    Publication Year: 2013, Page(s):113 - 120
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Online Social Networks (OSNs) such as Facebook and Twitter are the fastest growing online entities. Because they do not require much authentication for a user to create an account, they are susceptible to social spam attacks. These low-quality, unsolicited, and unwanted bulk messages commonly originate from Social Spam Profiles (SSPs). Spam messages may contain harmful virus links that infect user... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searching in Cloud Object Storage by Using a Metadata Model

    Publication Year: 2013, Page(s):121 - 128
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    In a Cloud environment, an independent service or model referred to as object storage is used for the management of persistent data. This model provides a virtualized pool of storage resources and can be accessed via Application Programming Interface (API) and/or simply a browser. Object storage is used to store the persistent data from various users through put/get methods and it also store the v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology Merging: Compatible and Incompatible Ontology Mappings

    Publication Year: 2013, Page(s):129 - 134
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Ontology mappings are used in data integration, query answering, and comparative analysis tasks of ontologies. Ontology mappings are often obtained by using a matching tool. Ontology merging is the creation of a new ontology from at least two source ontologies. In Ontology merging, establishing map-pings between source ontologies is the primitive step. Ontology matching tools can be used for estab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.