Search results for "computer.software_genre"

showing 10 items of 3858 documents

User profile matching in social networks

2010

International audience; Inter-social networks operations and functionalities are required in several scenarios (data integration, data enrichment, information retrieval, etc.). To achieve this, matching user profiles is required. Current methods are so restrictive and do not consider all the related problems. Particularly, they assume that two profiles describe the same physical person only if the values of their Inverse Functional Property or IFP (e.g. the email address, homepage, etc.) are the same. However, the observed trend in social networks is not fully compatible with this assumption since users tend to create more than one social network account (for personal use, for work, etc.) w…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR]Matching (statistics)Computer science[SCCO.COMP]Cognitive science/Computer science02 engineering and technologySimilarity measurecomputer.software_genreElectronic mail[SCCO.COMP] Cognitive science/Computer science020204 information systemsFOAF0202 electrical engineering electronic engineering information engineeringPattern matchingUser profileSocial networkbusiness.industrycomputer.file_formatProfile MatchingSocial Networks[ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]020201 artificial intelligence & image processingData mining[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]businesscomputerData integration
researchProduct

Toward Approximate GML Retrieval Based on Structural and Semantic Characteristics

2010

International audience; GML is emerging as the new standard for representing geographic information in GISs on the Web, allowing the encoding of structurally and semantically rich geographic data in self describing XML-based geographic entities. In this study, we address the problem of approximate querying and ranked results for GML data and provide a method for GML query evaluation. Our method consists of two main contributions. First, we propose a tree model for representing GML queries and data collections. Then, we introduce a GML retrieval method based on the concept of tree edit distance as an efficient means for comparing semi-structured data. Our approach allows the evaluation of bo…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR]Tree edit distanceSimilarity (geometry)[INFO.INFO-WB] Computer Science [cs]/WebComputer sciencecomputer.internet_protocol[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genre[SCCO.COMP] Cognitive science/Computer science020204 information systemsEncoding (memory)0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB][ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM]Information retrieval[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]GML SearchStructural & Semantic Similarity[INFO.INFO-WB]Computer Science [cs]/WebProcess (computing)[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]GISConstraint (information theory)[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]Ranked retrieval020201 artificial intelligence & image processingData mining[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computerXMLDecision tree model
researchProduct

Semantic-based Merging of RSS Items

2009

Merging XML documents can be of key importance in several applications. For instance, merging the RSS news from same or different sources and providers can be beneficial for end-users in various scenarios. In this paper, we address this issue and explore the relatedness measure between RSS elements. We show here how to define and compute exclusive relations between any two elements and provide several predefined merging operators that can be extended and adapted to human needs. We also provide a set of experiments conducted to validate our approach. © Springer Science+Business Media, LLC 2009.

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolRSS[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genreClusteringMergingSet (abstract data type)[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Cluster analysisComputingMilieux_MISCELLANEOUS[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]Measure (data warehouse)[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Document relatedne[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]computer.file_formatRSSMerging operator[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]Key (cryptography)020201 artificial intelligence & image processingData mining[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computerSoftwareXML
researchProduct

Enforcing role based access control model with multimedia signatures.

2009

International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer access controlComputer science[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer scienceXACMLAccess control02 engineering and technologycomputer.software_genreWorld Wide Web[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineeringRole-based access control[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Intelligent environmentcomputer.programming_language[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Ambient intelligenceMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Computer security model[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]Web servicebusinesscomputerSoftware
researchProduct

Towards a Novel Approach to Multimedia Data Mixed Fragmentation

2009

International audience; Distributed multimedia applications have emerged at an increasing rate during the last decade in several domains (video conferencing, e-health, virtual meeting rooms, etc). This has created several new challenging problems related to the data integration and fragmentation, user-oriented and adaptive interfaces, real time and network performances, etc. In this paper, we focus on the problem of data(base) fragmentation in a multimedia context. We recall in this respect that data fragmentation consists of reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. We mainly address the issue of query and predicate implication r…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer science[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genreMultimedia DistanceVideoconferencing[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Data partitioningData PartitionQuery Implication[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]MultimediaFunctional Dependency[INFO.INFO-WB]Computer Science [cs]/WebFragmentation (computing)[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Multimedia FragmentationPartition (database)Predicate (grammar)[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computerData integration
researchProduct

Detecting Inference Channels in Private Multimedia Data via Social Networks

2009

International audience; Indirect access to protected information has been one of the key challenges facing the international community for the last decade. Providing techniques to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to meet indirect access prevention. However, those addressing the inference problem when involving multimedia objects (images, audio, video, etc.) remain few and hold several drawbacks. In essence, the complex structure of multimedia objects makes the fact of detecting indirect a…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer sciencemedia_common.quotation_subject[ INFO.INFO-WB ] Computer Science [cs]/WebInference[SCCO.COMP]Cognitive science/Computer scienceAccess control02 engineering and technologycomputer.software_genre01 natural sciences010104 statistics & probability[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]0101 mathematicsSet (psychology)Function (engineering)media_common[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]Structure (mathematical logic)[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Social networkMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Information sensitivity[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer scienceKey (cryptography)[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]businesscomputer
researchProduct

Automatic Temporal Formatting of Multimedia Presentations Using Dynamic Petri Nets.

2009

An efficient authoring tool would provide support for automatic temporal formatting and modeling of multimedia presentations. Automatic temporal formatting is a process of converting the given presentation specifications into a required temporal format. This paper presents an algorithm that can convert a temporal layout into a dynamic petri net (DPN )w hich can represent iterative and interactive presentation components effectively. The prototype of the authoring tool extracts the temporal layout from any given SMIL file representation and uses the proposed algorithm to automatically convert it into a DPN. The DPN generated automatically at compile-time helps the run-time components in effe…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer sciencemedia_common.quotation_subject[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genreDisk formattingPresentation[SCCO.COMP] Cognitive science/Computer scienceFormal specificationSynchronization (computer science)0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Representation (mathematics)ComputingMilieux_MISCELLANEOUSmedia_common[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]MultimediaProgramming language[INFO.INFO-WB]Computer Science [cs]/WebProcess (computing)[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]020207 software engineeringPetri net[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computer
researchProduct

Semantic oriented data structuration for MABS Application to BIM

2013

International audience; This paper presents a multiagent-based simulation approach to qualify the usage of buildings from the design phase. Our approach combines ontology and evolution process based on machine learning algorithms. The ontology relies on semantic data structures for the representation of environment components, agent knowledge and all data generated during the simulation.

[ INFO.INFO-MO ] Computer Science [cs]/Modeling and SimulationComputer scienceProcess (engineering)0211 other engineering and technologies020101 civil engineering02 engineering and technologyOntology (information science)Semantic data modelcomputer.software_genre0201 civil engineering021105 building & constructionUpper ontologyRepresentation (mathematics)business.industryOntology-based data integration[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationDesign phaseBuilding information modeling[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][ INFO.INFO-MA ] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and SimulationData miningbusinessSoftware engineeringcomputer
researchProduct

Qualifying semantic graphs using model checking

2011

International audience; Semantic interoperability problems have found their solutions using languages and techniques from the Semantic Web. The proliferation of ontologies and meta-information has improved the understanding of information and the relevance of search engine responses. However, the construction of semantic graphs is a source of numerous errors of interpretation or modeling and scalability remains a major problem. The processing of large semantic graphs is a limit to the use of semantics in current information systems. The work presented in this paper is part of a new research at the border of two areas: the semantic web and the model checking. This line of research concerns t…

[ INFO.INFO-MO ] Computer Science [cs]/Modeling and Simulation[INFO.INFO-WB] Computer Science [cs]/WebComputer science[ INFO.INFO-WB ] Computer Science [cs]/Web0102 computer and information sciences02 engineering and technologycomputer.software_genre01 natural sciencesSocial Semantic Webtemporal logicSemantic similaritySemantic computing0202 electrical engineering electronic engineering information engineeringSemantic analyticsSemantic integrationSemantic Web StackInformation retrievalbusiness.industry[INFO.INFO-WB]Computer Science [cs]/WebSemantic search020207 software engineeringSemantic interoperability[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationModel-checking010201 computation theory & mathematicsSemantic graphTheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS[INFO.INFO-MO] Computer Science [cs]/Modeling and SimulationArtificial intelligencebusinesscomputerNatural language processing2011 International Conference on Innovations in Information Technology
researchProduct

A new approach based on NμSMV Model to query semantic graph

2011

International audience; The language most frequently used to represent the semantic graphs is the RDF (W3C standard for meta-modeling). The construction of semantic graphs is a source of numerous errors of interpretation. Processing of large semantic graphs can be a limit to use semantics in modern information systems. The work presented in this paper is part of a new research at the border between two areas: the semantic web and the model checking. For this, we developed a tool, RDF2NμSMV, which converts RDF graphs into NμSMV language. This conversion aims checking the semantic graphs with the model checker NμSMV in order to verify the consistency of the data. The data integration and shar…

[ INFO.INFO-MO ] Computer Science [cs]/Modeling and Simulation[INFO.INFO-WB] Computer Science [cs]/WebComputer science[ INFO.INFO-WB ] Computer Science [cs]/WebNμSMVTemporal logic02 engineering and technologycomputer.software_genreQuery languageSPARQLtemporal logic queryRDFModel CheckingSemantic similarity020204 information systemsSemantic computing0202 electrical engineering electronic engineering information engineeringSPARQLRDFSemantic WebGraph databaseInformation retrieval[INFO.INFO-WB]Computer Science [cs]/Webcomputer.file_format[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAbstract semantic graphSemantic graphQuery checking020201 artificial intelligence & image processing[INFO.INFO-MO] Computer Science [cs]/Modeling and Simulationcomputer
researchProduct