default search action
IRI 2008: Las Vegas, NV, USA
- Proceedings of the IEEE International Conference on Information Reuse and Integration, IRI 2008, 13-15 July 2008, Las Vegas, Nevada, USA. IEEE Systems, Man, and Cybernetics Society 2008
Opening Remarks
- Stuart Harvey Rubin, Shu-Ching Chen:
Forward.
Keynote 1
- Lotfi A. Zadeh:
Computation with imprecise probabilities.
Keynote 2
- Hojjat Adeli:
Inventing the future of neurology: Integrated wavelet-chaos-neural network models for knowledge discovery and automated EEG-based diagnosis of neurological disorders.
Panel Session
- Stuart Harvey Rubin, Shu-Ching Chen, Lotfi A. Zadeh, Hojjat Adeli, Mohammad Rifaie, Gordon K. Lee, Kang Zhang, Reda Alhajj, Gary D. Boetticher, Du Zhang:
Panel: The role of information search and retrieval in economic stimulation.
Databases I
- Taher Naser, Reda Alhajj, Mick J. Ridley:
Reengineering XML into object-oriented database. 1-6 - Chia-Chu Chiang, Coskun Bayrak:
Modeling role-based access control using a relational database tool. 7-10 - Brian Harrington, Robert P. Brazile, Kathleen M. Swigger:
Using a search engine to query a relational database. 11-16
Optimization and Search
- Masaya Yoshikawa, Hidekazu Terai:
Route selection algorithm based on integer operation Ant Colony Optimization. 17-21 - Qian Zhang, Ze Dong, Pu Han, Zhongli Wu, Fang Gao:
Optimization of controllers in the thermal system using initial pheromone distribution in Ant Colony Optimization. 22-27 - Hamid Reza Golmakani, Elnaz Jalilipour Alishah:
Portfolio selection using an artificial immune system. 28-33
Web Services
- Lu Chen, Randy Chow:
Web service composition based on integrated substitution and adaptation. 34-39 - Xutao Du, Chunxiao Xing, Lizhu Zhou:
Reachability analysis of Web service interfaces. 40-45 - Ken Q. Pu, Ying Zhu:
Modeling and synthesis of service composition using tree automata. 46-51
Databases II
- Moshe Itshak, Yair Wiseman:
AMSQM: Adaptive multiple super-page queue management. 52-57 - Mohammad Rifaie, Keivan Kianmehr, Reda Alhajj, Mick J. Ridley:
Data warehouse architecture and design. 58-63 - Chin-Hui Lai, Duen-Ren Liu:
Mining knowledge flow for modeling the information needs of task-based groups. 64-69
Biological Applications
- Abu H. M. Kamal, Xingquan Zhu, Abhijit S. Pandya, Sam Hsu, Yong Shi:
An empirical study of supervised learning for biological sequence profiling and microarray expression data analysis. 70-75 - Wei-bang Chen, Chengcui Zhang, Hua Zhong:
An unsupervised protein sequences clustering algorithm using functional domain information. 76-81 - Simina Vasilache, Rebecca Smith, Soo-Yeon Ji, Kayvan Najarian, Toan Huynh:
Outcome prediction in traumatic pelvic injuries using maximum similarity and quality measures. 82-85
Intelligent Agents
- Hyun Ko, Seungwok Han, Ung-Mo Kim, Hee Yong Youn:
A new agent characterization model and grouping method for multi-agent system. 86-91 - Jin Park, Du Zhang, Meiliu Lu:
An intelligent agent for the game of Age of Mythology: the Titans. 92-97 - Adriana Leite, Rosario Girardi, Uiratan Cavalcante:
An ontology for Multi-Agent Domain and Application Engineering. 98-103
Software Reuse
- Xujian Zhao, Peiquan Jin, Lihua Yue:
Research on the COM-based reusability of evaluating models. 104-109 - Gordon S. Novak Jr.:
Coupling data understanding with software reuse. 110-115 - Yair Wiseman, Joel Isaacson, Eliad Lubovsky:
Eliminating the threat of kernel stack overflows. 116-121
Biomedical Applications
- Ryan T. K. Lin, Hong-Jie Dai, Yue-Yang Bow, Min-Yuh Day, Richard Tzong-Han Tsai, Wen-Lian Hsu:
Result identification for biomedical abstracts using Conditional Random Fields. 122-126 - Dorin Carstoiu, Alexandra Cernian, Adriana Olteanu:
Biomedical data correlation and reuse in analyzing the efficiency of rehabilitation treatment. 127-130 - Eija Haapalainen, Perttu Laurinen, Pekka Siirtola, Juha Röning, Hannu Kinnunen, Heidi Jurvelin:
Exercise energy expenditure estimation based on acceleration data using the linear mixed model. 131-136
Risk Management and Social Networks
- Satoshi Takahashi, Muhammad Dzulqarnain bin Muhammad Nasir, Takayuki Fujimoto, Tokuro Matsuo:
Risk management education support system in company. 137-142 - Chunying Zhou, Huajun Chen, Tong Yu:
Social network mashup: Ontology-based social network integration for statistic learning. 143-146 - Yun Zhang, Boqin Feng:
Effective browsing of personal Tag space in social tagging systems. 147-152
Web Intelligence
- Shuxin Zhao, Elizabeth Chang, Tharam S. Dillon:
Knowledge extraction from web-based application source code: An approach to database reverse engineering for ontology development. 153-159 - Claudio Bertoli, Valter Crescenzi, Paolo Merialdo:
Crawling programs for wrapper-based applications. 160-165 - Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar:
A generic notification system for Internet information. 166-171
Question Answer System
- Cheng-Lung Sung, Cheng-Wei Lee, Hsu-Chun Yen, Wen-Lian Hsu:
An alignment-based surface pattern for a question answering system. 172-177 - Chorng-Shyong Ong, Min-Yuh Day, Wen-Lian Hsu:
Development of an evaluation model for Question Answering Systems. 178-183 - Ryan T. K. Lin, Justin Liang-Te Chiu, Hong-Jie Dai, Min-Yuh Day, Richard Tzong-Han Tsai, Wen-Lian Hsu:
Biological question answering with syntactic and semantic feature matching and an improved mean reciprocal ranking measurement. 184-189
Data Handling
- Andres Folleco, Taghi M. Khoshgoftaar, Jason Van Hulse, Lofton A. Bullard:
Identifying learners robust to low quality data. 190-195 - Erik Wilde, Yiming Liu:
Lightweight linked data. 196-201 - Chris Seiffert, Taghi M. Khoshgoftaar, Jason Van Hulse:
Hybrid sampling for imbalanced data. 202-207
Natural Language Processing
- Shih-Hung Wu, Yu-Te Li:
Curate a transliteration corpus from transliteration/translation pairs. 208-213 - Phavy Ouk, Ye Kyaw Thu, Mitsuji Matsumoto, Yoshiyori Urano:
A word-based predictive text entry method for Khmer language. 214-219 - Roumen Kountchev, Stuart Harvey Rubin, Mariofanna G. Milanova, Vladimir Todorov, Roumiana Kountcheva:
Extraction of objects contours for body language study. 220-225
Design Patterns and Web
- Jing Dong, Yongtao Sun, Yajing Zhao:
Compound record clustering algorithm for design pattern detection by decision tree learning. 226-231 - Milos Kudelka, Václav Snásel, Ondrej Lehecka, Eyas El-Qawasmeh:
Web content mining using web design patterns. 232-237 - Allan Chan, Nancy Situ, Kim Wong, Keivan Kianmehr, Reda Alhajj:
Fuzzy querying of nested XML. 238-243
Data Mining I
- Xutong Liu, Chang-Tien Lu, Feng Chen:
An entropy-based method for assessing the number of spatial outliers. 244-249 - Gamgarn Somprasertsri, Pattarachai Lalitrojwong:
Automatic product feature extraction from online product reviews using maximum entropy with lexical and syntactic features. 250-255 - Peerapon Vateekul, Mei-Ling Shyu:
A conflict-based confidence measure for associative classification. 256-261
Document Engineering
- Nacim Fateh Chikhi, Bernard Rothenburger, Nathalie Aussenac-Gilles:
Authoritative documents identification based on Nonnegative Matrix Factorization. 262-267 - Masahiro Shibata, Tomomi Nishiguchi, Yoichi Tomiura:
A method for automatically generating proper responses to user's utterances in open-ended conversation by retrieving documents on the web. 268-273 - Jaewook Kim, Yun Peng, Boonserm Kulvatunyou, Nenad Ivezic, Albert T. Jones:
A layered approach to semantic similarity analysis of XML schemas. 274-279
Software Design
- Qunzhi Zhou, Amol Bakshi, Viktor K. Prasanna, Ramakrishna Soma:
Towards an integrated modeling and simulation framework for freight transportation in metropolitan areas. 280-285 - Citlalih Gutierrez Estrada, Sergio Diaz Zagal, Martin de Jesus Nieto Perez, Itzel Abundez Barrera, Rocio Elizabeth Pulido Alba, Mauro Sanchez Sanchez, René Arnulfo García-Hernández:
Analysis methodology for project design utilizing UML. 286-289 - Behrouz H. Far, Vani Mudigonda, Abdel Halim Elamy:
A General Purpose Software Evaluation System. 290-295
Data Mining II
- Xiaoyuan Su, Taghi M. Khoshgoftaar, Xingquan Zhu:
VCI predictors: Voting on classifications from imputed learning sets. 296-301 - Yun Zhang, Boqin Feng, Lianmeng Liu:
Robust Self-Splitting Competitive learning for data clustering. 302-307 - Rajesh Natarajan, B. Shekar:
Tightness: A novel heuristic and a clustering mechanism to improve the interpretation of association rules. 308-313
Machine Learning
- Gary D. Boetticher, Jason Rudisill:
Optimizing lineage information in genetic algorithms for producing superior models. 314-318 - P. Papantoni-Kazakos, Abbas K. Zaidi, M. Faraz Rafi:
An algorithm for activation timed influence nets. 319-324 - Ying Jin, Tejaswitha Bhavsar:
Incorporating fuzziness into timer-triggers for temporal event handling. 325-329
Knowledge Representation and Reuse
- Jianmei Guo, Yinglin Wang:
Context modeling for knowledge flow. 330-335 - Éric Grégoire:
Using default logic to enhance default logic: preliminary report. 336-340 - Tokuro Matsuo, Takayuki Fujimoto:
Electronic learning support system based on analogy reuse. 341-344
Ontology
- Yinglin Wang, Xijuan Liu, Junquan Chen:
A multi-stage strategy for ontology mapping resolution. 345-350 - Jyotishman Pathak, Thomas M. Johnson, Christopher G. Chute:
Modular ontology techniques and their applications in the biomedical domain. 351-356 - Arash Shaban-Nejad, Volker Haarslev:
An ontology-empowered model for annotating protein-protein interaction data: a case study for budding yeast. 357-362
Workflow Management
- Fan Sun, Viktor K. Prasanna, Amol Bakshi, Laurent Pianelo:
Workflow instance detection: Toward a knowledge capture methodology for smart oilfields. 363-369 - Li Zhao, Qing Li, Guoqing Wu:
Injecting formulized delegation constraints into secure workflow systems. 370-373 - Qianhui Liang, Stuart Harvey Rubin:
Rule randomization for propositional logic-based workflow verification. 374-379
Component-based Methods
- Rose F. Gamble, Robert Baird, Leigh Flagg, Melody McClure:
FACT: A fusion architecture with contract templates for semantic and syntactic integration. 380-385 - Cong Zhang, Amol Bakshi, Viktor K. Prasanna:
Data component based management of reservoir simulation models. 386-392 - Martin Kunz, Steffen Mencke, Dmytro Rud, Reiner R. Dumke:
Empirical-based design - quality-driven assembly of components. 393-397
Data Integration I
- Shankara B. Subramanya, Baoxin Li, Huan Liu:
Robust integration of multiple information sources by view completion. 398-403 - Ming Zhong, Mengchi Liu, Qian Chen:
Modeling heterogeneous data in dataspace. 404-409 - R. Raja Kumar, J. Indumathi, G. V. Uma:
Optimizing PPDM in asynchronous sparse data using random projection. 410-415
Business Computing
- Li Tan, Shenghan Xu:
Model check stochastic supply chains. 416-421 - Seung-Yun Kim:
Modeling and analysis of a web-based collaborative enterprise using Petri nets. 422-428 - Weiyun Ying, Xiu Li, Yaya Xie, Ellis Johnson:
Preventing customer churn by using random forests modeling. 429-434
Multimedia
- Kasturi Chatterjee, Shu-Ching Chen:
Hierarchical affinity hybrid tree: A multidimensional index structure to organize videos and support content-based retrievals. 435-440 - Itzel Abundez Barrera, Citlalih Gutierrez Estrada, Sergio Diaz Zagal, Martin de Jesus Nieto Perez:
Segmentation of medical images by region growing. 441-444 - Masami Shishibori, Satoru Tsuge, Le Zhang, Minoru Sasaki, Yoshiki Uemura, Kenji Kita:
A fast retrieval algorithm for the earth mover's distance using EMD lower bounds. 445-450
Networking
- Deise de Brum Saccol, Nina Edelweiss, Renata de Matos Galante, Marcio Roberto de Mello:
Managing application domains in P2P systems. 451-456 - Omar Gonzalez-Padilla, Félix F. Ramos Corchado, Herwig Unger:
RFID composite event definition and detection. 457-462 - Mais Nijim, Ahmed Abukmail, Adel Ali:
An energy efficient framework using non-volatile flash memory for networked storage systems. 463-468
Data Integration II
- Chia-Hui Chang, Shih-Feng Yang, Che-Min Liou, Mohammed Kayed:
Gadget creation for personal information integration on web portals. 469-472 - Sabah S. Al-Fedaghi:
Integration of information needs and seeking. 473-478 - Saehoon Cheon, Doohwan Kim, Bernard P. Zeigler:
DEVS model composition by system entity structure. 479-484
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.