18-22 Dec. 2006
Filter Results
-
2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Cover
Publication Year: 2006, Page(s): c1
|
PDF (101 KB)
-
2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology-Title
Publication Year: 2006, Page(s):i - iii
|
PDF (54 KB)
-
2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology-Copyright
Publication Year: 2006, Page(s): iv
|
PDF (62 KB)
-
2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - TOC
Publication Year: 2006, Page(s):v - xiv
|
PDF (78 KB)
-
-
Organization
Publication Year: 2006, Page(s): xvi
|
PDF (67 KB)
-
Infrastructural Issues for Agent-Based Distributed Learning
Publication Year: 2006, Page(s):3 - 6
Cited by: Papers (3)The experience proved that integration of multi-agent and data mining technologies provides mutual enrichment of them both and leads to emergence of new design technologies and systems with better properties. However, this integration put forward novel problems of different kinds. The paper considers agent-based distributed design technology of distributed classification systems and presents basic... View full abstract»
-
Enhancing Tutoring Intelligence Using Knowledge Discovery Techniques
Publication Year: 2006, Page(s):7 - 10In this paper, we present an approach to enhance tutoring knowledge using a promising approach of data and knowledge discovery based on pattern sequence recognition. We show how the approach is used to discover new meta knowledge and rules in a given domain which then extend domain knowledge and serve as problem space allowing the intelligent tutoring agent to guide learners in problem solving sit... View full abstract»
-
Multiagent-Based Model Integration
Publication Year: 2006, Page(s):11 - 14This paper presents a distributed data mining technique based on a multiagent environment, called SMAMDD (multiagent system for distributed data mining), which uses model integration. Model integration consists in the amalgamation of local models into a global, consistent one. In each subset, agents perform mining tasks locally and, afterwards, results are merged into a global model. In order to a... View full abstract»
-
Agent-Based Pattern Mining of Discredited Activities in Public Services
Publication Year: 2006, Page(s):15 - 18
Cited by: Papers (2)Along with the applications of computer and database techniques, a large even huge amount of data has been produced and collected in the field of public service. Many valuable regulations hide in the raw data. It is necessary that new technique is studied to help the manager make proper decision. We propose a data mining model which is based on multi-agent technique to mine the discredit activitie... View full abstract»
-
A Human-Friendly MAS for Mining Stock Data
Publication Year: 2006, Page(s):19 - 22
Cited by: Papers (2)Mining stock data can be beneficial to the participants and researchers in the stock market. However, it is very difficult for a normal trader or researcher to apply data mining techniques to the data on his own due to the complexity involved in the whole data mining process. In this paper, we present a multi-agent system that can help users easily deal with their data mining jobs on stock data. T... View full abstract»
-
Exploiting Data Mining Techniques for Improving the Efficiency of a Supply Chain Management Agent
Publication Year: 2006, Page(s):23 - 26Supply chain management (SCM) environments are often dynamic markets providing a plethora of information, either complete or incomplete. It is, therefore, evident that such environments demand intelligent solutions, which can perceive variations and act in order to achieve maximum revenue. To do so, they must also provide some sophisticated mechanism for exploiting the full potential of the enviro... View full abstract»
-
Towards a Multimodal Framework for Human Behavior Recognition
Publication Year: 2006, Page(s):27 - 31This paper proposes a framework of an interface that is capable of detecting and classifying human intentions and personality types. The framework relies on a conventional set of multimodal components, namely an eye-tracking system, a mouse and a keyboard, where a large number of real time data analysis will take place, in order to detect behavioral patterns. The system gradually learns from the p... View full abstract»
-
Investigating Agent Strategies within a Complex Adaptive System of Purchasing Agents for Estimating Attribute Relevance
Publication Year: 2006, Page(s):32 - 36The authors constructed a complex adaptive system of purchasing agents, and have used this software to estimate the relevance of attributes in a data set. The simulation supports the creation of arbitrarily complex and diverse agent strategies. The effect of altering the proportion of two different agent strategies is investigated and reported, and contrasted with two non-CAS strategies based on i... View full abstract»
-
Informed Recommender Agent: Utilizing Consumer Product Reviews through Text Mining
Publication Year: 2006, Page(s):37 - 40
Cited by: Papers (3)Consumer reviews, opinions and shared experiences in the use of a product form a powerful source of information about consumer preferences that can be used for making recommendations. A novel framework, which utilizes this valuable information sources first time to create recommendations in recommender agents was recently developed by the authors. In this recommender agent, the most critical issue... View full abstract»
-
Crime Pattern Detection Using Data Mining
Publication Year: 2006, Page(s):41 - 44
Cited by: Papers (52)Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes faster will pay for itself. About 10% of the criminals commit about 50% of the crimes. Here we look at use of clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of s... View full abstract»
-
An Intelligent Intrusion Detection and Response System Using Network Quarantine Channels: Adaptive Policies and Alert Filters
Publication Year: 2006, Page(s):45 - 48
Cited by: Patents (1)Intrusion detection systems are used to identify suspicious network traffic. However, a high percentage of alerts generated by such systems are liable to be false positives. Since these alerts typically require manual intervention from a network administrator, false positives create considerable administrative overheads. In order to reduce the number of false positives, we propose a new network pr... View full abstract»
-
Management and Integration of Information in Intrusion Detection System: Data Integration System for IDS Based Multi-Agent Systems
Publication Year: 2006, Page(s):49 - 52
Cited by: Papers (1)In this paper, we present a model, an architecture and an implementation of an information manager for an IDS (intrusion detection systems), using the technology of multi-agent systems and Web services. This manager has been integrated to NIDIA (network intrusion detection system based on intelligent agents), which is an IDS whose architecture consists of a group of cooperative agents. In our prop... View full abstract»
-
Analysis of an Intelligent Agent Intrusion Response System
Publication Year: 2006, Page(s):53 - 56Analysis of the properties and the quality of IDS, take a mathematical analysis of the alarm confidence level, the attack frequency, the risk assessment and the response cost of IDS. Analysis of the tactic of IRS. Based on these, analysis of an intelligent agent intrusion response system that is able to make automated response and adjust security policies according to the environmental variation d... View full abstract»
-
An Effective Hybrid Classifier Based on Rough Sets and Neural Networks
Publication Year: 2006, Page(s):57 - 62Due to the exponential growth of documents on the Internet and the emergent need to organize them, the automated categorization of documents into predefined labels has received an ever-increased attention in the recent years. This paper describes a method developed for the automatic clustering of documents by using a hybrid classifier based on rough sets and neural networks, which we called as Rou... View full abstract»
-
Web User Access Pattern Mining Based on Kohonen Neural Network
Publication Year: 2006, Page(s):63 - 68This paper provides a method for Web user access pattern mining based on kohonen neural network. User session vectors were first input to kohonen network, after training we found several clusters, compute the median of each cluster and characterize what the cluster represents with the URLs. When the online user requests URLs, a matching category is found according to the pages the user has accesse... View full abstract»
-
Trust Negotiations with Customizable Anonymity
Publication Year: 2006, Page(s):69 - 72Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosing digital credentials and policies. Credentials, exchanged during trust negotiations, often contain sensitive attributes that attest to the properties of the credential owner. Uncontrolled disclosure of such sensitive attr... View full abstract»
-
A Bayesian Network Approach to Detecting Privacy Intrusion
Publication Year: 2006, Page(s):73 - 76
Cited by: Papers (1)Personal information privacy could be compromised during information collection, transmission, and handling. In information handling, privacy could be violated by both the inside and the outside intruders. Though, within an organization, private data are generally protected by the organization's privacy policies and the corresponding platforms for privacy practices, private data could still be mis... View full abstract»
-
Adding User-Level SPACe: Security, Privacy, and Context to Intelligent Multimedia Information Architectures
Publication Year: 2006, Page(s):77 - 84
Cited by: Patents (3)We provide a unified architecture, called SPACe, for secure, privacy-aware, and contextual multimedia systems in organizations. Many key and important architectural components already exist which contribute to a unified platform, including the classic data mining, security, and privacy-preserving components in conventional intelligent systems. After presenting an overview of our unified architectu... View full abstract»
-
Efficient Access Control in Wireless Network
Publication Year: 2006, Page(s):85 - 88
Cited by: Papers (2)To use role-based access control (RBAC) in wireless network is difficult than that in wired network. RBAC needs to search relative tables to get the user's permissions. We present an access control judgment algorithm which bases on artificial neural network (ANN). The algorithm reduces the data transmission using bit string to express roles and permissions. The algorithm employs set theory to repr... View full abstract»
Abstract