Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004.

8-10 Nov. 2004

Filter Results

Displaying Results 1 - 25 of 120
  • Proceedings of the 2004 IEEE Conference on Information Reuse and Integration (IRI - 2004) (IEEE Cat. No.04EX974)

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Copyright

    Publication Year: 2004, Page(s): 0_2
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration (IRI - 2004)

    Publication Year: 2004, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Copyright

    Publication Year: 2004, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2004, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • International Technical Program Committee

    Publication Year: 2004, Page(s):iv - v
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Foreward

    Publication Year: 2004, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (83 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2004, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • IRI 2004 keynote speech - Reusing information by learning models from extreme data sets

    Publication Year: 2004, Page(s): viii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IRI 2004 keynote speech - Evolutionary computation: information discovery and reuse in games

    Publication Year: 2004, Page(s): ix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IRI 2004 keynote speech - The myth of computing's maturity

    Publication Year: 2004, Page(s): x
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (38 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IRI 2004 keynote speech - Using ordered pairs to transcend the limitations of knowledge representation with an application to quantum logic

    Publication Year: 2004, Page(s): xi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (89 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial principles and challenges in network defense

    Publication Year: 2004, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (75 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2004, Page(s):xiii - xxv
    Request permission for commercial reuse | PDF file iconPDF (596 KB)
    Freely Available from IEEE
  • Technical papers

    Publication Year: 2004, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (6 KB)
    Freely Available from IEEE
  • An object-extracting approach based on non-negative matrix factorization

    Publication Year: 2004, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Previous object-extracting approaches, which are based on subgraph merging and partition, need to compute excessive modules tightness and modules overlap. An object-extracting approach based on nonnegative matrix factorization is presented. First, in order to design effective similarity measure between subprogram vectors, nonnegative matrix factorization is applied to dimensionality reduction of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of multiple input/multiple output business processes

    Publication Year: 2004, Page(s):6 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    In many business process modelling situations using Petri nets, the resulting model does not have a single input place and a single output place. Therefore, the correctness of the model cannot be assessed within the existing frameworks, which are devised for workflow nets - a particular class of Petri nets with a single input place and a single output place. Moreover, the existing approaches for t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SQL Statement Template: a development approach for database-driven applications

    Publication Year: 2004, Page(s):12 - 17
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    Database-driven applications are some of the most widespread applications nowadays. It normally requires a good knowledge and experience in application development, database SQL, and may be some other fields to build a well-designed application. The inherited nature, which is common in most database-driven applications, is that SQL statements are considered to be part of the code. However, this te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying domain patterns using software stability

    Publication Year: 2004, Page(s):18 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (663 KB) | HTML iconHTML

    The fact that domain applications share core aspects has turned software reuse into a viable option. System development has experienced time saving, cost saving, and the luxury of deploying proven-to-work solutions as main advantages of software reuse. Software patterns represent a major approach for reuse. Domain patterns capture system components shared by different applications that belong to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A re-engineering approach for PLC programs using finite automata and UML

    Publication Year: 2004, Page(s):24 - 29
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (578 KB) | HTML iconHTML

    Today there is a standard for the implementation of programs on programmable logic controllers (PLCs). Furthermore there are methods for the formal development of these programs. The standard allows the interchange of algorithms (e.g. if a new hardware should be used) and the formal methods allow the rigid prove of functionality especially needed in safety critical applications (e.g. using model c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using reengineering and aspect-based techniques to retrieve knowledge embedded in object-oriented legacy system

    Publication Year: 2004, Page(s):30 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    This paper presents an approach to retrieve the knowledge embedded in object-oriented legacy system. This approach aids in the migration from object-oriented code, written in Java, to a combination of objects and aspects, using AspectJ. The approach uses aspect mining in order to identify possible crosscutting concerns from the object-oriented source code and extracts them through refactorings int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing core knowledge in networks with node assignment applications

    Publication Year: 2004, Page(s):36 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    The ultimate objective of the software development process is to timely build a flawless system. The realization of this objective is quite challenging. Several approaches have been proposed to successfully achieve this goal. Most important is software reuse. The software stability model captures the domain core knowledge and inherently promotes software reuse. In this paper, we apply software sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing tools for reverse engineering in a software product-line architecture

    Publication Year: 2004, Page(s):42 - 47
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (553 KB) | HTML iconHTML

    Software reuse should be engineered as early as possible in the software development life cycle. The earlier reusability considerations are put into software development, the larger the payoff can be obtained from reuse. Today, many organizations recognize that an architecture represent a significant investment of both time and effort of its design expertise. The organizations want to maximize thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RiSE project: towards a robust framework for software reuse

    Publication Year: 2004, Page(s):48 - 53
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (623 KB) | HTML iconHTML

    Software reuse is a critical aspect for companies interested in the improvement of software development quality and productivity, and in costs reduction. However, achieving it is a nontrivial task. In this paper, we present a robust framework for software reuse, based on previous success factors, in order to guide organizations in the effective reuse. Nontechnical and technical aspects compose the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Any Transaction stable design pattern

    Publication Year: 2004, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    The traditional concept of a database transaction is based purely on the Atomicity, Consistency, Isolation and Durability (ACID) properties. However, these properties do not hold in the case of the other transactions, which exist in other domains. The concept of a transaction can be perceived differently based on the context of the application within the enterprise, ranging from the traditional tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.