Search results for "computer.software_genre"
showing 10 items of 3858 documents
The visual query language CQL for transitive and relational computation
2000
Abstract Classification query language (CQL) is a high-level visual query language with a great expressive power. In CQL the processing of ordinary relations and classifications based on transitive relationships is integrated seamlessly. Relations and classifications are represented in the visual interface in a uniform way through relation and classification skeletons. All query formulation in CQL is QBE-like – based on the intuitive way of filling constants and sample values into the skeletons. In order to guarantee great expressive power, relational and classification expressions can be nested freely with each other at unlimited nesting levels. Recursive definition of transitive processin…
A Two-layer Partitioning for Non-point Spatial Data
2021
Non-point spatial objects (e.g., polygons, linestrings, etc.) are ubiquitous and their effective management is always timely. We study the problem of indexing non-point objects in memory. We propose a secondary partitioning technique for space-oriented partitioning indices (e.g., grids), which improves their performance significantly, by avoiding the generation and elimination of duplicate results. Our approach is novel and of a high impact, as (i) it is extremely easy to implement and (ii) it can be used by any space-partitioning index. We show how our approach can be used to boost the performance of spatial range queries. We also show how we can avoid performing the expensive refinement s…
Some Experiments in Supervised Pattern Recognition with Incomplete Training Samples
2002
This paper presents some ideas about automatic procedures to implement a system with the capability of detecting patterns arising from classes not represented in the training sample. The procedure aims at incorporating automatically to the training sample the necessary information about the new class for correctly recognizing patterns from this class in future classification tasks. The Nearest Neighbor rule is employed as the central classifier and several techniques are added to cope with the peril of incorporating noisy data to the training sample. Experimental results with real data confirm the benefits of the proposed procedure.
On Using Conceptual Modeling for Ontologies
2004
Are database concepts and techniques suitable for ontology design and management? The question has been on the floor for some time already. It gets a new emphasis today, thanks to the focus on ontologies and ontology services due to the spread of web services as a new paradigm for information management. This paper analyzes some of the arguments that are relevant to the debate, in particular the question whether conceptual data models would adequately support the design and use of ontologies. It concludes suggesting a hybrid approach, combining databases and logic-based services.
Comparing Cybersecurity Information Exchange Models and Standards for the Common Secure Information Management Framework
2021
Cyber threats have increased in spite of formal economic integration in the world. Decision-makers and authorities need to respond to the growing challenge of cyberthreats by increasing cooperation. Information is one of the main facilities when the objective is to prevent hybrid threats at the EU level and between the western countries. The main purpose of the study is to find out separating and combining factors concerning existing cyber information sharing models and information management frameworks in western countries. The aim is also to find out crucial factors, which affect the utilization of a common Early Warning System for the ECHO stakeholders. The main findings are that unclear…
Enterprise content management: An integrated perspective on information management
2005
Konferansebidrag fra 38th Annual Hawaii International Conference on System Sciences, 2005. HICSS 2005 Enterprise Content Management (ECM) is an emerging concept involving numerous software vendors, consultants, and information management practitioners around increasing market potential. However, there exist yet few academic reports on ECM from the viewpoint of organizational system implementations. This article analyses 58, mainly practitioner-oriented, case narratives of ECM projects and implementations to identify a framework of major issues that require managerial attention in organizations. The main areas covered by the framework are: objectives/impacts sought with ECM, enterprise model…
Analyzing the strategies used in media discourse management
2015
Digital economy is based on digital revolution and information management that gave rise to the new media image in the era of globalization. Media and media discourse management is a completely new concept for establishing innovative relations between manufacturer and consumer. The subject of interest of the present article is the analysis of the existing strategies in media discourse management. The introduction concerns the etymological meanings of the notion of discourse and its application. The main objective of the study is to reveal the capacity of media discourse management in expanding the consumers’ cognitive resources and maintaining stable information links in everyday life. The …
ExtMiner : Combining multiple ranking and clustering algorithms for structured document retrieval
2006
This paper introduces ExtMiner, a platform and potential tool for information management in SMEs (small & medium-size enterprise), or for organizational workgroups. ExtMiner supports interactive and iterative clustering of documents. It provides users with a visual cluster and list views at the same time, supporting iterative search process. ExtMiner may also be applied as a platform for research on retrieval fusion, since it combines search, clustering and visualization algorithms. ExtMiner was evaluated with three document collections. Although the findings were encouraging the user interface and performance with large document repositories need further development. peerReviewed
Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
2016
In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…
Constraints validation in privacy-preserving attribute-based access control
2015
Attribute-Based Access Control (ABAC) has been found to be extremely useful and flexible and has drawn a lot of research in recent years. It was observed that in the context of new emerging applications, attributes play an increasingly important role both in defining and enforcing more elaborated and flexible security policies. Recently, NIST has proposed more formal definition of ABAC. In this paper we discuss a general privacy-preserving ABAC model (which combines both authentication and authorization) and propose an approach to handle constraints in such privacy preserving setting.