Search results for "computer.software_genre"

showing 10 items of 3858 documents

The visual query language CQL for transitive and relational computation

2000

Abstract Classification query language (CQL) is a high-level visual query language with a great expressive power. In CQL the processing of ordinary relations and classifications based on transitive relationships is integrated seamlessly. Relations and classifications are represented in the visual interface in a uniform way through relation and classification skeletons. All query formulation in CQL is QBE-like – based on the intuitive way of filling constants and sample values into the skeletons. In order to guarantee great expressive power, relational and classification expressions can be nested freely with each other at unlimited nesting levels. Recursive definition of transitive processin…

Information Systems and Managementbusiness.industryComputer scienceQuery languagecomputer.software_genreQuery optimizationQuery expansionObject Query LanguageWeb query classificationSargableQuery by ExampleArtificial intelligencebusinesscomputerNatural language processingRDF query languagecomputer.programming_languageData & Knowledge Engineering
researchProduct

A Two-layer Partitioning for Non-point Spatial Data

2021

Non-point spatial objects (e.g., polygons, linestrings, etc.) are ubiquitous and their effective management is always timely. We study the problem of indexing non-point objects in memory. We propose a secondary partitioning technique for space-oriented partitioning indices (e.g., grids), which improves their performance significantly, by avoiding the generation and elimination of duplicate results. Our approach is novel and of a high impact, as (i) it is extremely easy to implement and (ii) it can be used by any space-partitioning index. We show how our approach can be used to boost the performance of spatial range queries. We also show how we can avoid performing the expensive refinement s…

Information engineeringDistributed databaseRange query (data structures)Computer scienceSearch engine indexingScalabilityTwo layerPoint (geometry)Data miningcomputer.software_genreSpatial analysiscomputer
researchProduct

Some Experiments in Supervised Pattern Recognition with Incomplete Training Samples

2002

This paper presents some ideas about automatic procedures to implement a system with the capability of detecting patterns arising from classes not represented in the training sample. The procedure aims at incorporating automatically to the training sample the necessary information about the new class for correctly recognizing patterns from this class in future classification tasks. The Nearest Neighbor rule is employed as the central classifier and several techniques are added to cope with the peril of incorporating noisy data to the training sample. Experimental results with real data confirm the benefits of the proposed procedure.

Information extractionComputer sciencebusiness.industryAnomaly detectionPattern recognitionArtificial intelligencebusinessMachine learningcomputer.software_genreClassifier (UML)computerk-nearest neighbors algorithm
researchProduct

On Using Conceptual Modeling for Ontologies

2004

Are database concepts and techniques suitable for ontology design and management? The question has been on the floor for some time already. It gets a new emphasis today, thanks to the focus on ontologies and ontology services due to the spread of web services as a new paradigm for information management. This paper analyzes some of the arguments that are relevant to the debate, in particular the question whether conceptual data models would adequately support the design and use of ontologies. It concludes suggesting a hybrid approach, combining databases and logic-based services.

Information managementComputer scienceNCCR-MICSmedia_common.quotation_subjectProcess ontologyNCCR-MICS/CL4Ontology (information science)computer.software_genreData modelingWorld Wide WebDescription logicData integrityConceptual modelOntologyInformation systemontologiesWeb servicecomputermedia_common
researchProduct

Comparing Cybersecurity Information Exchange Models and Standards for the Common Secure Information Management Framework

2021

Cyber threats have increased in spite of formal economic integration in the world. Decision-makers and authorities need to respond to the growing challenge of cyberthreats by increasing cooperation. Information is one of the main facilities when the objective is to prevent hybrid threats at the EU level and between the western countries. The main purpose of the study is to find out separating and combining factors concerning existing cyber information sharing models and information management frameworks in western countries. The aim is also to find out crucial factors, which affect the utilization of a common Early Warning System for the ECHO stakeholders. The main findings are that unclear…

Information managementComputer securitycomputer.software_genreCritical infrastructureInformation sharing Early warning Standards ECHO projectInformation systemmedia_common.cataloged_instancestandarditEuropean unionkansallinen turvallisuuskyberturvallisuusRisk managementInformation exchangemedia_commonturvallisuuspolitiikkaearly warningbusiness.industryturvallisuusympäristöInformation sharingtietojenvaihtoECHO projectManagement information systemsinformation sharingstandardsBusinesscomputertiedonkulkuDigital Transformation, Cyber Security and Resilience of Modern Societies. Studies in Big Data, vol 84
researchProduct

Enterprise content management: An integrated perspective on information management

2005

Konferansebidrag fra 38th Annual Hawaii International Conference on System Sciences, 2005. HICSS 2005 Enterprise Content Management (ECM) is an emerging concept involving numerous software vendors, consultants, and information management practitioners around increasing market potential. However, there exist yet few academic reports on ECM from the viewpoint of organizational system implementations. This article analyses 58, mainly practitioner-oriented, case narratives of ECM projects and implementations to identify a framework of major issues that require managerial attention in organizations. The main areas covered by the framework are: objectives/impacts sought with ECM, enterprise model…

Information managementMarketingSocieties and institutionsKnowledge managementEnterprise content managementbusiness.industryElectronic document exchangeComputingMilieux_LEGALASPECTSOFCOMPUTINGDocument management systemcomputer.software_genreEnterprise modellingTechnology managementInformation managementComputer softwarebusinessDigital firmcomputerEnterprise softwareContent management
researchProduct

Analyzing the strategies used in media discourse management

2015

Digital economy is based on digital revolution and information management that gave rise to the new media image in the era of globalization. Media and media discourse management is a completely new concept for establishing innovative relations between manufacturer and consumer. The subject of interest of the present article is the analysis of the existing strategies in media discourse management. The introduction concerns the etymological meanings of the notion of discourse and its application. The main objective of the study is to reveal the capacity of media discourse management in expanding the consumers’ cognitive resources and maintaining stable information links in everyday life. The …

Information managementMedia managementMultimediaScope (project management)business.industryApplied MathematicsMechanical EngineeringEnergy Engineering and Power TechnologyMedia relationsPublic relationscomputer.software_genreIndustrial and Manufacturing EngineeringNew mediaComputer Science ApplicationsControl and Systems EngineeringManagement of Technology and InnovationDigital economySociologyElectrical and Electronic EngineeringEveryday lifebusinessDigital RevolutioncomputerEastern-European Journal of Enterprise Technologies
researchProduct

ExtMiner : Combining multiple ranking and clustering algorithms for structured document retrieval

2006

This paper introduces ExtMiner, a platform and potential tool for information management in SMEs (small & medium-size enterprise), or for organizational workgroups. ExtMiner supports interactive and iterative clustering of documents. It provides users with a visual cluster and list views at the same time, supporting iterative search process. ExtMiner may also be applied as a platform for research on retrieval fusion, since it combines search, clustering and visualization algorithms. ExtMiner was evaluated with three document collections. Although the findings were encouraging the user interface and performance with large document repositories need further development. peerReviewed

Information managementdokumenttien hakumenetelmätklusterointiDocument retrievalInformation retrievalComputer scienceDocument clusteringXMLcomputer.software_genreRanking (information retrieval)document clusteringRankingHuman–computer information retrievalRelevance (information retrieval)Data miningUser interfaceDocument retrievalCluster analysiscomputer
researchProduct

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

2016

In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…

Information privacy020205 medical informaticsPrivacy by DesignComputer Networks and Communicationsbusiness.industryPrivacy softwareComputer scienceInternet privacyAccess controlProvisioning02 engineering and technologyLibrary and Information SciencesComputer securitycomputer.software_genreInformation sensitivityInformation and Communications Technology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerPersonally identifiable informationInformation SystemsInternational Journal of Information Management
researchProduct

Constraints validation in privacy-preserving attribute-based access control

2015

Attribute-Based Access Control (ABAC) has been found to be extremely useful and flexible and has drawn a lot of research in recent years. It was observed that in the context of new emerging applications, attributes play an increasingly important role both in defining and enforcing more elaborated and flexible security policies. Recently, NIST has proposed more formal definition of ABAC. In this paper we discuss a general privacy-preserving ABAC model (which combines both authentication and authorization) and propose an approach to handle constraints in such privacy preserving setting.

Information privacyAuthenticationComputer access controlComputer sciencebusiness.industryContext (language use)Access controlSecurity policyComputer securitycomputer.software_genrePrivacy preservingNISTbusinesscomputer2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct