The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increased demand for English communication, various styles of learning support methods have been proposed and provided to the Japanese learners. However, there are still many learners finding it hard to read, write and speak in English. Regardless of language difference, understanding the other's intention and emotional status accurately and expressing what they think or feel to the others...
We propose to build an engineering environment for information systems by using metamodels, OCL and symbolic model checkers to manage constraints. Our proposal is based on a definition of constraints as 3D spaces with dimensions corresponding to UML diagrams, constructs, and abstraction levels. We show how such environments can help with engineering quality complex systems by allowing to lift up a...
In this paper we examine issues involving measures of creativity for attribute data generalization using hierarchies. In particular we consider consensus and specificity measures for the partitions that result using crisp concept hierarchies. We note that fuzzy hierarchies do not produce partitions of data in general so some approaches to considering degrees of partitioning is described.
This paper proposes a possibilistic database model that enables dealing with incomplete possibility distributions. The situation considered is that where the data provider does not have a complete knowledge of the attribute domains involved and is only able to specify more or less possible and completely impossible candidates for some attribute values. It is shown that the framework we propose constitutes...
We propose a solution to the problem of exploring large, complex data sets in a (relational) database by a human user. In a nutshell, our proposed solution is to develop the tools to support data exploration and browsing in an organized manner. We introduce: (a) an organization of data around the idea of defining distances on data sets, to reflect the intuitive notion of data that is (closely) related...
Recent research has shown that including context in a recommender system may improve its performance. The context-based recommendation approaches are classified as pre-filtering, post-filtering and contextual modeling. Moreover, in real e-commerce applications, collecting ratings may be quite difficult. It is possible to use purchasing frequencies instead of ratings, but little research has been done...
ITIL (information technology infrastructure library) is the most widely used IT framework in organizations. This de-facto standard is a service-based IT-framework that aims to improve the quality of organizational services. The core of this framework is configuration management that includes configuration management data base (CMDB) to record, update and trace all assessed activities and information...
Context is any information used to characterize the situation of an entity. Examples of contexts include time, location, identity, and activity of a user. This paper proposes a general context-aware DBMS, named Chameleon, that will eliminate the need for having specialized database engines, e.g., spatial DBMS, temporal DBMS, and Hippocratic DBMS, since space, time, and identity can be treated as contexts...
Delivering learning and education is the most invaluable building block in today's knowledge-based society. The emergence of learning objects in learning technology has had a big impact on the learning environment and its community. Teachers and students have more facilities for using the e-learning system, which has made the learning process more effective. This paper presents development of learning...
In this paper we address the problem of XML document normalization and their reconstruction using XQuery. Instead of one type of XML documents, we consider a set of different types of XML documents presenting the same data to different kinds of users. This consideration influences the normalization because more types of redundancies can appear. The presented technique is not based on logical XML schemas...
In this paper we are presenting a semi-automated schema matching approach named C3SM (conceptual and context based combination of schema matchers). A single schema matching technique is unlikely to be successful to achieve high match accuracy for a large variety of schemas therefore C3SM combines different matchers. C3SM exploits various types of schema information, e.g. element names, data types...
One of the motives for studying faces and gestures is the role that they play in spontaneous, socially rich interaction between humans. If computers are to interact with humans in that mode (or to analyse what they are doing in it), methods of interpreting the non-verbal signals that they use are critical. It is becoming clear that developing those methods requires databases whose complexity is of...
This paper discusses the combination of a nifty pseudonym generation mechanism that is used to veil the real world identity of users with semantic user context descriptions and policy reasoning to express decisions of users and thus protects their sensitive location information. The expected development of a new class of mobile applications is further fostered by the underlying service architecture...
We propose static program analysis techniques for identifying the impact of relational database schema changes upon object-oriented applications. We use dataflow analysis to extract all possible database interactions that an application may make. We then use this information to predict the effects of schema change. We evaluate our approach with a case-study of a commercially available content management...
Accurate determination of stack sizes for tasks is essential for software systems whose tasks have predeclared stack sizes (for example, embedded systems). Underestimation of the stack size can lead to stack overflows, a particularly insidious run time error. Overestimation will lead to wastage of precious memory space of these often memory starved systems. In this paper, we describe a tool which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.