Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 6031 - 6060 of 6719

Full-Text Articles in Physical Sciences and Mathematics

Biased Support Vector Machine For Relevance Feedback In Image Retrieval, Steven Hoi, Chi-Hang Chan, Kaizhu Huang, Michael R. Lyu, Irwin King Jul 2004

Biased Support Vector Machine For Relevance Feedback In Image Retrieval, Steven Hoi, Chi-Hang Chan, Kaizhu Huang, Michael R. Lyu, Irwin King

Research Collection School Of Computing and Information Systems

Recently, support vector machines (SVMs) have been engaged on relevance feedback tasks in content-based image retrieval. Typical approaches by SVMs treat the relevance feedback as a strict binary classification problem. However, these approaches do not consider an important issue of relevance feedback, i.e. the unbalanced dataset problem, in which the negative instances largely outnumber the positive instances. For solving this problem, we propose a novel technique to formulate the relevance feedback based on a modified SVM called biased support vector machine (Biased SVM or BSVM). Mathematical formulation and explanations are provided for showing the advantages. Experiments are conducted to evaluate …


Sweto: Large-Scale Semantic Web Test-Bed, Boanerges Aleman-Meza, Chris Halaschek, Amit P. Sheth, I. Budak Arpinar, Gowtham Sannapareddy Jun 2004

Sweto: Large-Scale Semantic Web Test-Bed, Boanerges Aleman-Meza, Chris Halaschek, Amit P. Sheth, I. Budak Arpinar, Gowtham Sannapareddy

Kno.e.sis Publications

The emergent Semantic Web community needs a common infrastructure for testing the scalability and quality of new techniques and software which use machine processable data. Since ontologies are a centerpiece of most approaches, we believe that for an accurate evaluation of tools for quality, scalability and performance, the research community needs a freely available ontology with a large description base. If the use of tools is to be for advanced semantic applications, such as those in business intelligence and national security, then instances in the knowledge base should be highly interconnected. Thus, we propose and describe a Semantic WEb Technology …


Steganographic Schemes For File System And B-Tree, Hwee Hwa Pang, Kian-Lee Tan, Xuan Zhou Jun 2004

Steganographic Schemes For File System And B-Tree, Hwee Hwa Pang, Kian-Lee Tan, Xuan Zhou

Research Collection School Of Computing and Information Systems

While user access control and encryption can protect valuable data from passive observers, these techniques leave visible ciphertexts that are likely to alert an active adversary to the existence of the data. We introduce StegFD, a steganographic file driver that securely hides user-selected files in a file system so that, without the corresponding access keys, an attacker would not be able to deduce their existence. Unlike other steganographic schemes proposed previously, our construction satisfies the prerequisites of a practical file system in ensuring the integrity of the files and maintaining efficient space utilization. We also propose two schemes for implementing …


Proprietary And Open Systems Adoption In E-Procurement: A Risk-Augmented Transactions Cost Perspective, Robert J. Kauffman, Hamid Mohtadi Jun 2004

Proprietary And Open Systems Adoption In E-Procurement: A Risk-Augmented Transactions Cost Perspective, Robert J. Kauffman, Hamid Mohtadi

Research Collection School Of Computing and Information Systems

We present an economic model that enables the study of incentives for business-to-business (B2B) e-procurement systems investments that permit inventory coordination and improved operational control. We focus on the information technology adoption behavior of firms in the presence of transaction costs, agency costs and information uncertainty. We conclude that it is appropriate to rethink the prior theory and develop an extended transaction-cost theory perspective that incorporates the possibility of shocks. We distinguish among three kinds of B2B e-procurement systems platforms. Proprietary platform procurement systems involve traditional electronic data interchange (EDI) technologies. Open platform procurement systems are associated with e-market Web …


Relationship Analysis : Improving The Systems Analysis Process, Joseph Thomas Catanio May 2004

Relationship Analysis : Improving The Systems Analysis Process, Joseph Thomas Catanio

Dissertations

A significant aspect of systems analysis involves discovering and representing entities and their inter-relationships. Guidelines exist to identify entities but do not provide a rigorous and comprehensive process to explicitly capture the relationship structure of the problem domain. Whereas, other analysis techniques lightly address the relationship discovery process, Relationship Analysis is the only systematic, domain-independent analysis technique focusing exclusively on a domain's relationship structure.

The quality of design artifacts, such as class diagrams, and development time necessary to generate these artifacts can be improved by first representing the complete relationship structure of the problem domain. The Relationship Analysis Model is …


A Discovery And Analysis Of Influencing Factors Of Pair Programming, Kyungsub Steve Choi May 2004

A Discovery And Analysis Of Influencing Factors Of Pair Programming, Kyungsub Steve Choi

Dissertations

The exploration into the underlying psychosocial links of pair programming. a new and unorthodox programming paradigm in which two programmers share one keyboard and monitor during real-time programming sessions, is undertaken. These complex psychosocial relationships, along with cognitive process exchanges, ultimately mold the programming output as well as determine the level of communication, satisfaction. confidence and compatibility. Laying the framework for this research, a through review of traditional and contemporary paradigms with a special focus on their limitations and a list of current software development problems are presented. Next, a detailed summary of pair programming and related agile software paradigms, …


Participatory Learning Environment : Requirements And Design Analysis, Vikas Manohar Achhpiliya May 2004

Participatory Learning Environment : Requirements And Design Analysis, Vikas Manohar Achhpiliya

Theses

The primary purpose of this thesis is to develop the requirements and model preliminary database and class designs for the Participatory Learning Approach Environment (PLAE). The requirements and the designs will be presented for version 1.0 and 2.0 with version 2.0 supporting an enhanced requirements set.

Participatory Learning Approach Environment (PLAE) is an exercise management tool for the Participatory Learning Approach (PLA) - a pedagogy approach based on the theory of constructivism. The PLAE facilitates and enhances learning among students while easing the administrative burden of the instructor and cognitive overload of the students. The theory and concepts on which …


Electronic Marketplaces And Their Roles In The Staffing Industry : An Explorative Analysis, Vishal Khubani May 2004

Electronic Marketplaces And Their Roles In The Staffing Industry : An Explorative Analysis, Vishal Khubani

Theses

This thesis will explore and analyze the role of electronic marketplaces in the staffing industry from the viewpoint of hiring executives, human resources personnel, staffing organizations, and candidates. Using analyses of popular electronic job marketplaces, this paper will establish the efficiency and effectiveness of electronic marketplaces as compared to traditional staffing methods. It will also provide a detailed view of various electronic marketplaces, their financial structure and analysis of their performance. This information will also result in a return on investment estimate for the average hiring organization using electronic marketplaces.


Semantic Web Technology Evaluation Ontology (Sweto): A Test Bed For Evaluating Tools And Benchmarking Applications, Boanerges Aleman-Meza, Amit P. Sheth, I. Budak Arpinar, Chris Halaschek May 2004

Semantic Web Technology Evaluation Ontology (Sweto): A Test Bed For Evaluating Tools And Benchmarking Applications, Boanerges Aleman-Meza, Amit P. Sheth, I. Budak Arpinar, Chris Halaschek

Kno.e.sis Publications

No abstract provided.


Sempl: A Semantic Portal, Matthew Perry, Eric Stiles May 2004

Sempl: A Semantic Portal, Matthew Perry, Eric Stiles

Kno.e.sis Publications

Semantic Web technology is intended for the retrieval, collection, and analysis of meaningful data with significant automation afforded by machine understandability of data [1]. As one illustration of semantic web technology in action, we present SEMPL, a semantic web portal for the Large Scale Distributed Information Systems lab (LSDIS) at the University of Georgia. SEMPL, which is powered by a state of the art commercial system, Semagix Freedom [7], uses an ontology-driven approach to provide semantic browsing, linking, and contextual querying of content within the portal. By using the ontology based information integration technique, SEMPL can specify the context of …


Meteor-S Web Service Annotation Framework, Abhijit A. Patil, Swapna A. Oundhakar, Amit P. Sheth, Kunal Verma May 2004

Meteor-S Web Service Annotation Framework, Abhijit A. Patil, Swapna A. Oundhakar, Amit P. Sheth, Kunal Verma

Kno.e.sis Publications

The World Wide Web is emerging not only as an infrastructure for data, but also for a broader variety of resources that are increasingly being made available as Web services. Relevant current standards like UDDI, WSDL, and SOAP are in their fledgling years and form the basis of making Web services a workable and broadly adopted technology. However, realizing the fuller scope of the promise of Web services and associated service oriented architecture will requite further technological advances in the areas of service interoperation, service discovery, service composition, and process orchestration. Semantics, especially as supported by the use of ontologies, …


Indexing Genomic Databases, Gina Cooper, Michael L. Raymer, Travis E. Doom, Dan E. Krane, Natsuhiko Futamura May 2004

Indexing Genomic Databases, Gina Cooper, Michael L. Raymer, Travis E. Doom, Dan E. Krane, Natsuhiko Futamura

Kno.e.sis Publications

Current biological sequence comparison tools utilize full database searches to find approximate matches between a database and a query. A new approach to sequence comparisons can be performed by indexing the database using a novel indexing scheme. An indexed scheme can immediately eliminate highly mismatched sequences thereby improving performance and accuracy. iBlast is proposed as an indexed version of BLAST. In its initial implementation, iBlast uses a sequence-based index to catalog genomic databases in an NCR Teradata RDBMS. Several types of indexes and querying methods are explored to determine the most efficient solution utilizing the parallel nature of the Teradata …


Structuring A Wayfinder's Dynamic And Uncertain Environment, Michael D. Hendricks May 2004

Structuring A Wayfinder's Dynamic And Uncertain Environment, Michael D. Hendricks

Electronic Theses and Dissertations

Wayfinders typically travel in dynamic environments where barriers and requirements change over time. In many cases, uncertainty exists about the future state of this changing environment. Current geographic information systems lack tools to assist wayfinders in understanding the travel possibilities and path selection options in these dynamic and uncertain settings. The goal of this research is a better understanding of the impact of dynamic and uncertain environments on wayfinding travel possibilities. An integrated spatio-temporal framework, populated with barriers and requirements, models wayfinding scenarios by generating four travel possibility partitions based on the wayfinder's maximum travel speed. Using these partitions, wayfinders …


Modified Art 2a Growing Network Capable Of Generating A Fixed Number Of Nodes, Ji He, Ah-Hwee Tan, Chew-Lim Tan May 2004

Modified Art 2a Growing Network Capable Of Generating A Fixed Number Of Nodes, Ji He, Ah-Hwee Tan, Chew-Lim Tan

Research Collection School Of Computing and Information Systems

This paper introduces the Adaptive Resonance Theory under Constraint (ART-C 2A) learning paradigm based on ART 2A, which is capable of generating a user-defined number of recognition nodes through online estimation of an appropriate vigilance threshold. Empirical experiments compare the cluster validity and the learning efficiency of ART-C 2A with those of ART 2A, as well as three closely related clustering methods, namely online K-Means, batch K-Means, and SOM, in a quantitative manner. Besides retaining the online cluster creation capability of ART 2A, ART-C 2A gives the alternative clustering solution, which allows a direct control on the number of output …


Web Image Learning For Searching Semantic Concepts In Image Databases, Steven Hoi, Michael R. Lyu May 2004

Web Image Learning For Searching Semantic Concepts In Image Databases, Steven Hoi, Michael R. Lyu

Research Collection School Of Computing and Information Systems

Without textual descriptions or label information of images, searching semantic concepts in image databases is still a very challenging task. While automatic annotation techniques are yet a long way off, we can seek other alternative techniques to solve this difficult issue. In this paper, we propose to learn Web images for searching the semantic concepts in large image databases. To formulate effective algorithms, we suggest to engage the support vector machines for attacking the problem. We evaluate our algorithm in a large image database and demonstrate the preliminary yet promising results.


Quality Of Service For Workflows And Web Service Processes, Jorge Cardoso, Amit P. Sheth, John A. Miller, Jonathan Arnold, Krzysztof J. Kochut Apr 2004

Quality Of Service For Workflows And Web Service Processes, Jorge Cardoso, Amit P. Sheth, John A. Miller, Jonathan Arnold, Krzysztof J. Kochut

Kno.e.sis Publications

Workflow management systems (WfMSs) have been used to support various types of business processes for more than a decade now. In workflows or Web processes for e-commerce and Web service applications, suppliers and customers define a binding agreement or contract between the two parties, specifying quality of service (QoS) items such as products or services to be delivered, deadlines, quality of products, and cost of services. The management of QoS metrics directly impacts the success of organizations participating in e-commerce. Therefore, when services or products are created or managed using workflows or Web processes, the underlying workflow engine must accept …


The United States Marine Corps Data Collaboration Requirements: Retrieving And Integrating Data From Multiple Databases, Pamela J. Cole Mar 2004

The United States Marine Corps Data Collaboration Requirements: Retrieving And Integrating Data From Multiple Databases, Pamela J. Cole

Theses and Dissertations

The goal of this research is to develop an information sharing and database integration model and suggest a framework to fully satisfy the United States Marine Corps collaboration requirements as well as its information sharing and database integration needs. This research is exploratory; it focuses on only one initiative: the IT-21 initiative. The IT-21 initiative dictates The Technology for the United States Navy and Marine Corps, 2000-2035: Becoming a 21st Century Force. The IT-21 initiative states that Navy and Marine Corps information infrastructure will be based largely on commercial systems and services, and the Department of the Navy must ensure …


An Exploratory Analysis Of Factors Affecting Participation In Air Force Knowledge Now Communities Of Practice, David C. Fitzgerald Mar 2004

An Exploratory Analysis Of Factors Affecting Participation In Air Force Knowledge Now Communities Of Practice, David C. Fitzgerald

Theses and Dissertations

As the AF continues to lose its knowledge base through retirements and downsizing, the need to get maximum use from the remaining knowledge base becomes increasingly important. In their efforts to help the Department of Defense and the Air Force Chief Information Officer (AFCIO) meet their knowledge management goals, Air Force Material Command (AFMC) has been working to implement the use of communities of practice. A primary goal of AFMC/DRW , the AF Knowledge Now program office, and the office of the AFCIO is to increase effectiveness and participation within communities of practice. The goal of this research is to …


An Exploration Of Cultural Factors Affecting Use Of Communities Of Practice, Peter L. Hinrichsen Mar 2004

An Exploration Of Cultural Factors Affecting Use Of Communities Of Practice, Peter L. Hinrichsen

Theses and Dissertations

On-line communities of practice are potentially powerful social learning networks that can improve organizational performance. Unfortunately, administrators of on-line communities of practice report that community members do not take full advantage of this potential. This study used Shaw and Tuggle's (2003) factors of knowledge management (KM) culture affecting organizational acceptance of a knowledge management initiative to explore this issue. It was hypothesized that respondents whose communities of practice possessed higher average community use per member would rate KM culture variables higher than respondents whose communities possessed a lower average community use. An analysis of survey data collected from Air Force …


Exploring Content Management Issues In Air Force On-Line Communities Of Practice: A Multiple Case Study Approach, Jaime A. Rodriguez Mar 2004

Exploring Content Management Issues In Air Force On-Line Communities Of Practice: A Multiple Case Study Approach, Jaime A. Rodriguez

Theses and Dissertations

The practice of content management attempts regardless of platform to ensure that pertinent information is current, relevant, and presented in a usable manner. The Air Force Communities of Practice (CoPs) are hosted by AFMC/DRW, The purpose of these CoPs is to facilitate and promote an environment of capturing and sharing knowledge among members of a particular field task or common practice. As the host for these CoPs AFMC/DRW desires to increase CoP participation efficiency and effectiveness. Addressing existing or potential content management issues will help do so. This multiple-case study research observed and interviewed managers and members of eight active …


Swarm Based Implementation Of A Virtual Distributed Database System In A Sensor Network, Wen C. Lee Mar 2004

Swarm Based Implementation Of A Virtual Distributed Database System In A Sensor Network, Wen C. Lee

Theses and Dissertations

The deployment of unmanned aerial vehicles (UAVs) in recent military operations has had success in carrying out surveillance and combat missions in sensitive areas. An area of intense research on UAVs has been on controlling a group of small-sized UAVs to carry out reconnaissance missions normally undertaken by large UAVs such as Predator or Global Hawk. A control strategy for coordinating the UAV movements of such a group of UAVs adopts the bio-inspired swarm model to produce autonomous group behavior. This research proposes establishing a distributed database system on a group of swarming UAVs, providing for data storage during a …


Phoneme-Based Transliteration Of Foreign Names For Oov Problem, Wei Gao, Kam-Fai Wong, Wai Lam Mar 2004

Phoneme-Based Transliteration Of Foreign Names For Oov Problem, Wei Gao, Kam-Fai Wong, Wai Lam

Research Collection School Of Computing and Information Systems

A proper noun dictionary is never complete rendering name translation from English to Chinese ineffective. One way to solve this problem is not to rely on a dictionary alone but to adopt automatic translation according to pronunciation similarities, i.e. to map phonemes comprising an English name to the phonetic representations of the corresponding Chinese name. This process is called transliteration. We present a statistical transliteration method. An efficient algorithm for aligning phoneme chunks is described. Unlike rule-based approaches, our method is data-driven. Compared to source-channel based statistical approaches, we adopt a direct transliteration model, i.e. the direction of probabilistic estimation …


Investigation Of Geobase Implementation Issues: Case Study Of Information Resource Management, Mario L. Oliver Mar 2004

Investigation Of Geobase Implementation Issues: Case Study Of Information Resource Management, Mario L. Oliver

Theses and Dissertations

Billions of dollars have been wasted on failed information system (IS) projects over the last decade in the private and public sectors. More specifically, the tri-service environment of the U.S. military has not implemented a single successful geospatial IS (GIS). The lack of a service-wide insertion process for GIS was cited as the most significant cause for military GIS failures. GeoBase represents the USAF's most recent GIS implementation. The GeoBase program focuses on Information Resource Management (IRM) and cultural issues. The GeoBase Sustainment Model (GSM), anecdotally developed by GeoBase leadership to reflect implementation issues and the IRM practices of the …


Automated Agent Ontology Creation For Distributed Databases, Austin A. Bartolo Mar 2004

Automated Agent Ontology Creation For Distributed Databases, Austin A. Bartolo

Theses and Dissertations

In distributed database environments, the combination of resources from multiple sources requiring different interfaces is a universal problem. The current solution requires an expert to generate an ontology, or mapping, which contains all interconnections between the various fields in the databases. This research proposes the application of software agents in automating the ontology creation for distributed database environments with minimal communication. The automatic creation of a domain ontology alleviates the need for experts to manually map one database to other databases in the environment. Using several combined comparison methods, these agents communicate and negotiate similarities between information sources and retain …


Authenticating Query Results In Edge Computing, Hwee Hwa Pang, Kian-Lee Tan Mar 2004

Authenticating Query Results In Edge Computing, Hwee Hwa Pang, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for validating their outputs. This paper proposes a mechanism that creates a verification object (VO) for checking the integrity of each query result produced by an edge server - that values in the result tuples are not tampered with, and that no spurious tuples are introduced. The primary advantages of our proposed mechanism are that the VO is independent of the database size, and that …


Group Nearest Neighbor Queries, Dimitris Papadias, Qiongmao Shen, Yufei Tao, Kyriakos Mouratidis Mar 2004

Group Nearest Neighbor Queries, Dimitris Papadias, Qiongmao Shen, Yufei Tao, Kyriakos Mouratidis

Research Collection School Of Computing and Information Systems

Given two sets of points P and Q, a group nearest neighbor (GNN) query retrieves the point(s) of P with the smallest sum of distances to all points in Q. Consider, for instance, three users at locations q1 , q2 and q3 that want to find a meeting point (e.g., a restaurant); the corresponding query returns the data point p that minimizes the sum of Euclidean distances |pqi| for 1 ≤i ≤3. Assuming that Q fits in memory and P is indexed by an R-tree, we propose several algorithms for finding the group nearest neighbors efficiently. As a second step, …


Efficient Group Pattern Mining Using Data Summarization, Yida Wang, Ee Peng Lim, San-Yih Hwang Mar 2004

Efficient Group Pattern Mining Using Data Summarization, Yida Wang, Ee Peng Lim, San-Yih Hwang

Research Collection School Of Computing and Information Systems

In group pattern mining, we discover group patterns from a given user movement database based on their spatio-temporal distances. When both the number of users and the logging duration are large, group pattern mining algorithms become very inefficient. In this paper, we therefore propose a spherical location summarization method to reduce the overhead of mining valid 2-groups. In our experiments, we show that our group mining algorithm using summarized data may require much less execution time than that using non-summarized data.


Hiding Data Accesses In Steganographic File System, Xuan Zhou, Hwee Hwa Pang, Kian-Lee Tan Mar 2004

Hiding Data Accesses In Steganographic File System, Xuan Zhou, Hwee Hwa Pang, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

To support ubiquitous computing, the underlying data have to be persistent and available anywhere-anytime. The data thus have to migrate from devices local to individual computers, to shared storage volumes that are accessible over open network. This potentially exposes the data to heightened security risks. We propose two mechanisms, in the context of a steganographic file system, to mitigate the risk of attacks initiated through analyzing data accesses from user applications. The first mechanism is intended to counter attempts to locate data through updates in between snapshots - in short, update analysis. The second mechanism prevents traffic analysis - identifying …


Spatial Queries In The Presence Of Obstacles, Jun Zhang, Dimitris Papadias, Kyriakos Mouratidis, Manli Zhu Mar 2004

Spatial Queries In The Presence Of Obstacles, Jun Zhang, Dimitris Papadias, Kyriakos Mouratidis, Manli Zhu

Research Collection School Of Computing and Information Systems

Despite the existence of obstacles in many database applications, traditional spatial query processing utilizes the Euclidean distance metric assuming that points in space are directly reachable. In this paper, we study spatial queries in the presence of obstacles, where the obstructed distance between two points is defined as the length of the shortest path that connects them without crossing any obstacles. We propose efficient algorithms for the most important query types, namely, range search, nearest neighbors, e-distance joins and closest pairs, considering that both data objects and obstacles are indexed by R-trees. The effectiveness of the proposed solutions is verified …


An Automated Algorithm For Extracting Website Skeleton, Zehua Liu, Wee-Keong Ng, Ee Peng Lim Mar 2004

An Automated Algorithm For Extracting Website Skeleton, Zehua Liu, Wee-Keong Ng, Ee Peng Lim

Research Collection School Of Computing and Information Systems

The huge amount of information available on the Web has attracted many research efforts into developing wrappers that extract data from webpages. However, as most of the systems for generating wrappers focus on extracting data at page-level, data extraction at site-level remains a manual or semi-automatic process. In this paper, we study the problem of extracting website skeleton, i.e. extracting the underlying hyperlink structure that is used to organize the content pages in a given website. We propose an automated algorithm, called the Sew algorithm, to discover the skeleton of a website. Given a page, the algorithm examines hyperlinks in …