Proceedings. 13th International Workshop on Database and Expert Systems Applications

6-6 Sept. 2002

Filter Results

Displaying Results 1 - 25 of 143
  • Proceedings 13th International Workshop on Database and Expert Systems Applications. DEXA 2002

    Publication Year: 2002
    Request permission for reuse | PDF file iconPDF (352 KB)
    Freely Available from IEEE
  • A genetic algorithm based routing method using two QoS parameters

    Publication Year: 2002, Page(s):7 - 11
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    In order to support multimedia communication over high speed networks, it is necessary to develop routing algorithms which use more than one QoS parameter. This is because new services such as video on demand and remote meeting systems require better QoS. However, the problem of QoS routing is difficult and to find a feasible route with two independent path constraints is NP-complete. Therefore, Q... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol for large-scale group

    Publication Year: 2002, Page(s):12 - 16
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    We discuss a novel type of group communication protocol for a large number of processes. Group communication among a large number of processes implies large computation and communication overheads for manipulating and transmitting messages since computation and communication overheads are O(n/sup 2/) for number n of processes. In this paper, we discuss a hierarchical group which is composed of sub... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security analysis and the DSM model

    Publication Year: 2002, Page(s):17 - 21
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    This paper mainly discusses security analysis in Web-based information systems. The analysis focuses on current client/server system application environments and system vulnerabilities. The paper also briefly describes a proposed conceptual security model-dual security model (DSM). The model focuses on risk management by identifying possible attacks on the system and addressing them before they ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural defects of the secure shell

    Publication Year: 2002, Page(s):22 - 28
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (730 KB) | HTML iconHTML

    Although flaws have been found out in SSH, the Secure Shell, there has been little discussion about its architecture or design safety. Therefore, considering SSH architecture, e.g. the key exchange protocol, user authentication protocols and total design of the SSH, we not only discuss SSH architectural safety but show critical flaws for SSH users. For establishing the SSH connection, before user ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing remote method invocation in Java

    Publication Year: 2002, Page(s):29 - 33
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Communication mechanisms utilized in current middleware technologies have a procedural form. The obvious strategy of purely synchronous remote method invocation can result in a bottleneck when applied to a multi-layer application (e.g., when application logic is isolated from data sources). The effect is apparent in Java technologies and necessitates a suitable solution. This contribution deals wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent based mobile phone groupware system using location information

    Publication Year: 2002, Page(s):37 - 41
    Cited by:  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Many groupware systems have been used for communication between personal computers (PCs) in companies. However, the demand for groupware systems is growing. Cue to the spread of mobile phone users and systems, new mobile phone groupware systems are needed. In groupware systems, the location information function which is used to find the location of group members is a very important function for sm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed multimedia multiple access protocol for adhoc networks

    Publication Year: 2002, Page(s):42 - 46
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    This paper discusses a wireless multiple access protocol for multimedia traffic called DMMA (distributed control multimedia multiple access). The protocol is used where a number of users dynamically migrate to/from an adhoc network to communicate multimedia messages. The protocol has four features. (1) Since the protocol doesn't need a center station, it can construct an adhoc wireless network. (2... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Features of a Web-oriented information system

    Publication Year: 2002, Page(s):49 - 53
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Typical features of the Web-based information system WEBIS are described. WEBIS collects and updates its data automatically using specified Web pages, notifies changes of used Web pages, transforms the obtained data into XML documents, stores them into an XML repository, accepts queries and transforms the found data into information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Persistent cache in a distributed search engine

    Publication Year: 2002, Page(s):54 - 58
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    The Cooperative Search Engine (CSE) is a distributed search engine, which can update indexes in very short time for the purpose of fresh information retrieval in an intranet. In CSE, the retrieval performance is dependent on cache contents because communication delay occurs at retrieval time. On the other hand however, cache is invalidated as soon as indexes are updated. Therefore, we need persist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ESOW: parallel/distributed programming on the Web

    Publication Year: 2002, Page(s):59 - 63
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    This paper presents an environment for supporting parallel/distributed programming using Java with RMI and RMI-IIOP (CORBA). The environment implements the notion of shared objects (SO), distributed shared objects (DSO) and introduces active shared mobile objects (ASMO). The Environment of Shared Objects for Web (ESOW) provides an environment to passive objects (lists, queues and stacks) and activ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The experience of using Java-based message-oriented middleware to build a distributed training simulator

    Publication Year: 2002, Page(s):64 - 68
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1115 KB) | HTML iconHTML

    This paper presents a prototype of a distributed training simulator for a surface-to-air missile system. Since the system requirement enforces us to choose an open standard platform, and we think that Java has matured enough to offer acceptable performance and reliability, we decide to implement it by Java. Basically, this training simulator is a distributed interactive application, and lots of me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Web and knowledge representation

    Publication Year: 2002, Page(s):75 - 79
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    In this paper, we suggest that it should be possible to come closer to the Semantic Web goals by enhancing the ontology paradigm and, in particular, by supplementing the 'traditional' ontologies of concepts with 'ontologies of events'. We present then some of the properties of NKRL (Narrative Knowledge Representation Language). This conceptual modeling formalism makes use of ontologies of events t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain-specific information extraction structures

    Publication Year: 2002, Page(s):80 - 84
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Information describing an event can frequently be found on several Web pages, each of which is often poorly structured and incomplete; the set of pages is typically repetitive, often contradictory and verbose. In order to deliver high quality information to a variety of devices in different contexts and roles, we need to provide information that is more succinct. Our approach to this problem is to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using preference order in ontologies

    Publication Year: 2002, Page(s):85 - 89
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    The latest ontology languages can be translated into a description logic (DL), thus providing them with a formal semantics and associated reasoning procedures. We introduce the ordered description logic OSHOQ(D) as a simple decidable extension of SHOQ(D) that supports the direct definition of a preference order on defeasible axioms, thus allowing for a succinct and intuitive expression of defeasib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linking the Semantic Web with existing sources

    Publication Year: 2002, Page(s):93 - 97
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    The Semantic Web aims at providing Web data sources on a semantic level. On the other hand, most of the Web data itself is not suitably prepared (e.g., by annotations). In this paper, we describe a semantic layer that integrates existing data sources with the Semantic Web by combining semantic modeling with links that associate the semantic notions with actual data on the Web. The semantic level c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image classification using neural networks and ontologies

    Publication Year: 2002, Page(s):98 - 102
    Cited by:  Papers (14)  |  Patents (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    The advent of extremely powerful home PC and the growth of the Internet have made the appearance of multimedia documents a common sight in the computer world. In the world of unstructured data composed of images and other media types, classification often comes at the price of countless hours of manual labor. This research aims to present a scalable system capable of examining images and accuratel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A disciplined approach for the integration of heterogeneous XML datasources

    Publication Year: 2002, Page(s):103 - 108
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    In this paper, we focus on the problem of integrating heterogeneous XML datasources. We follow a semantic approach to information sharing and integration, and we present a disciplined approach based on reconciliation rules and mapping rules to set up a mediation scheme describing the information about DTDs and their contents at an ontological level, without altering the original format of the XML ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACTISE: Advanced e-Commerce Technology laboratory's integrated services environment-a user-centric office framework for knowledge workers

    Publication Year: 2002, Page(s):111 - 115
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    This paper describes the design and implementation of a smart office task framework to automate system integration and to enable user centric application. To achieve the goal of implicit knowledge accumulation and inheritance, we developed a service framework at the backend for integrating diverse systems seamlessly and an interface agent at the front for hiding complex efforts on manually binding... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mental cognitive model of Web semantic for e-customer profile

    Publication Year: 2002, Page(s):116 - 120
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (647 KB) | HTML iconHTML

    e-Business is competing in the new era of e-market. We need an infrastructure that could provide insight information to enable maximum and constant learning that lead to a responsive Web site. To keep the Web site in business on-line, we need sufficient on-line traffic on the e-Business Web site. This result of an urgent need to investigate the keys to satisfy and stimuli e-customers by providing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A clustering approach for XML linked documents

    Publication Year: 2002, Page(s):121 - 125
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Clustering algorithms for hypertext documents consider not only the document content but also the links existing between them. All the similarity functions proposed in the literature assume that just one type of link exists between documents, with a unique semantic meaning. With the rapid diffusion of XML documents, a specific language, called XLink, has been proposed to specify inside XML documen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining ontologies and document retrieval techniques: a case study for an e-learning scenario

    Publication Year: 2002, Page(s):133 - 137
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Ontologies are a perfect knowledge base for enriching standard document retrieval and classification techniques. In this paper we describe such an approach for the application of e-learning. We choose a basic combination of ontologies, some simple heuristics and classic term, resp. document similarity measure to deliver the required functionality. Our system has a distributed architecture handling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business process knowledge modelling: method and tool

    Publication Year: 2002, Page(s):138 - 142
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    The DECOR approach to business process oriented knowledge management (BPOKM) is based upon an extended business process modelling, including automatable knowledge retrieval activities, additional knowledge management tasks and sub processes, and additional process variables used to instruct the latter two. In this paper we present the DECOR business process modelling method and a software tool to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The PROMOTE/sup /spl reg// prototype: a Meta/sup 2/Model based process oriented KMS

    Publication Year: 2002, Page(s):143 - 148
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (543 KB) | HTML iconHTML

    This article introduces the EC-project PROMOTE/sup /spl reg// (IST-1999-11658) where an overall framework for process-oriented knowledge management, starting at modelling knowledge intensive business processes in a Web-environment and focusing on the knowledge management processes such as identification, access, storage, distribution and evaluation where knowledge is being developed. The main focu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-based self-support system for corporate users

    Publication Year: 2002, Page(s):149 - 153
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (582 KB) | HTML iconHTML

    Today's corporations use complex IT systems fabrics to control and manage their businesses, maintain linkages with clients and customers and synchronize their operations with suppliers and partners. In doing so, corporate employees have to master their IT environment. User support automation, which is defined as the process of discovery of user self-support chores, is introduced here to address th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.