Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004.

8-10 Nov. 2004

Filter Results

Displaying Results 1 - 25 of 120
  • Quantitative analysis with IQAM for business decision support

    Publication Year: 2004, Page(s):594 - 599
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2047 KB) | HTML iconHTML

    In this paper we introduce the original IQAM system (intelligent quantitative analyzer for business management) that we have designed. It can help the managers make the right decisions by examining various business and financial factors involved through a unique process, which is based on the fuzzy reasoning and probabilistic inference. It's one of the first system tools that can be used to analyz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discussion on interest spider's algorithm of search engine

    Publication Year: 2004, Page(s):588 - 593
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2003 KB) | HTML iconHTML

    At this paper, by analyzing the crawler algorithm and its programs, we put forward an interest spider objecting to user. The spider takes on three characteristics: (1) understand means what user require, and analyze and conclude user's interest and crawl intelligently Internet by user history interest; (2) a much smaller user search space than the space of Internet; (3) search process on real time... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzification of a standard ontology to encourage reuse

    Publication Year: 2004, Page(s):582 - 587
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2080 KB) | HTML iconHTML

    A mapping between query terms and members of an ontology is usually a key part of any ontology enhanced searching tool. However many terms used in queries may be overloaded in terms of the ontology, which limits the potential use of automatic query expansion and refinement. In particular this problem affects information systems where different users are likely to expect different meanings for the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient algorithm for fuzzy Web-mining

    Publication Year: 2004, Page(s):576 - 581
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2030 KB) | HTML iconHTML

    In this paper, Web mining in a fuzzy environment is devoted. Browsing time staying on a Web page is considered and characterized as a fuzzy variable. Thus, the frequent preferred paths with fuzzy expected values can be gained. With the comparison of the fuzzy expected values, the measure of the interest of people for different Web pages is clear. In order to find more completely frequent fuzzy pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of payment transaction security in mobile commerce

    Publication Year: 2004, Page(s):475 - 480
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2137 KB) | HTML iconHTML

    Mobile payment is the process of two parties exchanging financial value using a mobile device in return for goods or services. This paper is an analysis of the security issues in mobile payment for m-commerce. We introduce m-commerce and mobile payment, discuss the public key infrastructure as a basis for secure mobile technologies, and study the features for different security technologies employ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-agent approach for dynamic ontology loading to support semantic Web applications

    Publication Year: 2004, Page(s):570 - 575
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2122 KB) | HTML iconHTML

    The semantic Web refers to a range of standards, modeling languages and tool development initiatives aimed at annotating Web pages with well-defined metadata, so that the semantics associated with Web contexts can be effectively interpreted. The applications that deliver these new online solutions are all based on ontologies. An ontology can be described as a consensual, shared and formal descript... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying hidden Markov models to keystroke pattern analysis for password verification

    Publication Year: 2004, Page(s):467 - 474
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2178 KB) | HTML iconHTML

    Due to increasing incidents of security breaches in the cyber space, a rigorous user authentication process has become crucial. A very feasible biometric approach to verify the authenticity of a user is to examine his/her typing patterns. There is a significant difference in the keystroke patterns exhibited from person to person, even when asked to type the same words. Typing patterns can be shown... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selective block matching algorithm for video system

    Publication Year: 2004, Page(s):163 - 167
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1975 KB) | HTML iconHTML

    An error concealment (or recovery) algorithm useful for transmitting image frames on Internet-based applications is presented. The selective block matching algorithm (SBMA) recovers the lost blocks by incorporating the selective spatial interpolation (only selected pixels are interpolated) and the side match algorithm (SMA) to achieve smooth restoration of lost blocks. First, pixels of lost blocks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blending scheduling based on particle swarm optimization algorithm

    Publication Year: 2004, Page(s):618 - 622
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1969 KB) | HTML iconHTML

    Blending is an important unit operation in process industry. Blending scheduling is nonlinear optimization problem with constraints. It is difficult to obtain optimum solution by other general optimization methods. Particle swarm optimization (PSO) algorithm is developed for nonlinear optimization problems with both continuous and discrete variables. In order to obtain a global optimum solution qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • KDIST: a development environment for knowledge discovery system

    Publication Year: 2004, Page(s):376 - 381
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2093 KB) | HTML iconHTML

    The paper presents a universal development environment of application domain-oriented knowledge discovery system - KDIST. Based on graphic modeling and intelligent guidance techniques, KDIST is user-friendly enough for generic people to develop a knowledge discovery system with expertise as little as possible. Not only discovering knowledge from data with high performance, but can the developed kn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying domain patterns using software stability

    Publication Year: 2004, Page(s):18 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2208 KB) | HTML iconHTML

    The fact that domain applications share core aspects has turned software reuse into a viable option. System development has experienced time saving, cost saving, and the luxury of deploying proven-to-work solutions as main advantages of software reuse. Software patterns represent a major approach for reuse. Domain patterns capture system components shared by different applications that belong to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining real estate listings using Oracle data warehousing and predictive regression

    Publication Year: 2004, Page(s):296 - 301
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2100 KB) | HTML iconHTML

    The object of this paper is to introduce our development experience of a data mining system for prospective real estate sellers and buyers to determine properties price. The prediction of continuous values of properties selling prices is modeled by a statistical technique called predictive regression. The prerequisite of this data mining process is to design a data warehouse that contains a wide v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to text classification using dimensionality reduction and combination of classifiers

    Publication Year: 2004, Page(s):564 - 569
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2071 KB) | HTML iconHTML

    Text classification involves assignment of predetermined categories to textual resources. Applications of text classification include recommendation systems, personalization, help desk automation, content filtering and routing, selective alerting, and text mining. This paper describes an experiment for improving the classification accuracy of a large text corpus by the use of dimensionality reduct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Affinity-based similarity measure for Web document clustering

    Publication Year: 2004, Page(s):247 - 252
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2138 KB) | HTML iconHTML

    Compared to the regular documents, the major distinguishing characteristics of the Web documents are the dynamic hyper-structure. Thus, in addition to terms or keywords for regular document clustering, Web document clustering can incorporate some dynamic information such as the hyperlinks and the access patterns extracted from the user query logs. In this paper, we extend the concept of document c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and completion of digital certificate with authorization based on PKI

    Publication Year: 2004, Page(s):462 - 466
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2017 KB) | HTML iconHTML

    In this paper, a design and establishment of certification authority is completed successfully, and the functions of digital certificate are extended through describing and encoding the role attribute extension of particular certificate using ASN.1. When issuing a certificate for user, it is appended to user's certificate that some access privilege coming from RBAC database. Consequently, differin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using traceability mechanisms to support software product line evolution

    Publication Year: 2004, Page(s):157 - 162
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2088 KB) | HTML iconHTML

    This paper presents traceability mechanisms to support software product line evolution. Product line approach to software development requires designers to consider requirements for a family of products and the relationships between these requirements. This paper examines three kinds of evolution processes -architecture, product line, and product. Change management mechanisms are identified. These... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scale equalization higher-order neural networks

    Publication Year: 2004, Page(s):612 - 617
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2041 KB) | HTML iconHTML

    This paper presents a novel approach, called scale equalization (SE), to implement higher-order neural networks. SE is particularly useful in eliminating the scale divergence problem commonly encountered in higher order networks. Generally, the larger the scale divergence is, the more the number of training steps required to complete the training process. Effectiveness of SE is illustrated with an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification-based testing with linear temporal logic

    Publication Year: 2004, Page(s):493 - 498
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2152 KB) | HTML iconHTML

    This paper considers the specification-based testing in which the requirement is given in the linear temporal logic (LTL). The required LTL property must hold on all the executions of the system, which are often infinite in size and/or in length. The central piece of our framework is a property-coverage metric. Based on requirement mutation, the metric measures how well a property has been tested ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating multiple noise elimination filters with the ensemble-partitioning filter

    Publication Year: 2004, Page(s):369 - 375
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2169 KB) | HTML iconHTML

    We present the ensemble-partitioning filter which is a generalization of some common filtering techniques developed in the literature. Filtering the training dataset, i.e., removing noisy data, can be used to improve the accuracy of the induced data mining learners. Tuning the few parameters of the ensemble-partitioning filter allows filtering a given data mining problem appropriately. For example... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characters recognition using vector field and linear regression model

    Publication Year: 2004, Page(s):408 - 413
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2053 KB) | HTML iconHTML

    In order to obtain a low computational cost method (or rough classification) for automatic handwritten character recognition, this paper proposes a combined system of two feature representation methods based on a vector field: one is autocorrelation matrix, and another is a low frequency Fourier expansion. In each method, the similarity is defined as a weighted sum of the squared values of the inn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decision support systems design as knowledge-based tool integration

    Publication Year: 2004, Page(s):516 - 521
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2203 KB) | HTML iconHTML

    Decision making is always a topical problem. In order to make a decision, a decision maker needs criteria and has to analyze the problem with these criteria. But it is not simple to take into account a great deal of criteria in order to make a decision. In general, one tool gives one analysis for one criterion (except the multicriteria tools). The paper aims to present a method of designing DSS ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WVFA: a Web visualization framework architecture

    Publication Year: 2004, Page(s):103 - 108
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2094 KB) | HTML iconHTML

    Nowadays, humans and machines don't use the same format of knowledge representation. This gap represents a serious problem in the interaction human-machine. More specifically, comprehension of text and images plays a key role in the process underlying Web navigation. This fact aim us to explode the application of intelligent methods that minimize the gap between the information that is showed to u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SQL Statement Template: a development approach for database-driven applications

    Publication Year: 2004, Page(s):12 - 17
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2064 KB) | HTML iconHTML

    Database-driven applications are some of the most widespread applications nowadays. It normally requires a good knowledge and experience in application development, database SQL, and may be some other fields to build a well-designed application. The inherited nature, which is common in most database-driven applications, is that SQL statements are considered to be part of the code. However, this te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robustness enhancement for proximal support vector machines

    Publication Year: 2004, Page(s):290 - 295
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2004 KB) | HTML iconHTML

    Proximal support vector machine (PSVM) is a new version of SVM, which involves equality instead of inequality constraints, and works with a square error function. In this way, the solution follows from a linear Karush-Kuhn-Tucker system instead of a quadratic programming problem. The linear PSVM can easily solve the classification problems of extremely large datasets. However, according to the exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A liquid nonlinear acoustic parameter B/A measuring system based on information fusion

    Publication Year: 2004, Page(s):559 - 563
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1933 KB) | HTML iconHTML

    According to phase shift error hard to take out in measurement with single information source, based on multiple echo information sources, a liquid B/A measuring system is set up. Fusion of multiple information sources is adopted originally, and phase shift error generated by the transducer and measuring circuit is avoided by complementarity between different echo information. Accuracy and reliabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.