The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We would like to discuss with workshop participants the iTrails framework for pay-as-you-go information integration, which was recently presented at VLDB 2007 (M. A. V. Salles et al., 2007). iTrails allows users to provide mini-mappings on their data that sharply increase the quality of search results. The core idea is to extend the semantics of a standard graphical search engine such that the quality...
There are several pieces of information that can be utilized in order to improve the efficiency of similarity searches on high-dimensional data. The most commonly used information is the distribution of the data itself but the use of dimensional choice based on the information in the query as well as the parameters of the distribution can provide an effective improvement in the query processing speed...
Aircraft engine repair and overhaul (AERO) is an area of professional activity that draws heavily upon an engineer's knowledge. While engine maintenance typically follows a structured process, engine repairs are subject to unstructured processes. Such knowledge intensive professions benefit most from mobile knowledge management applications, but access of unstructured knowledge on mobile devices has...
In this environment each mobile peer has a local database that stores and manages a collection of reports (where each report is a product record, or a coupon), and all the local databases maintained by the mobile peers form a mobile e-commerce (or, more generally, a mobile P2P) database. Queries on this database are posed by potential customers, and they search for coupons and products pertaining...
This paper discusses our ongoing research efforts in regards to processing multi-scale queries in service-oriented environments. A multi-scale query is a query over traditional datasets in conjunction with streaming data and that may involve spatio-temporal aspects. In a service-oriented environment, classic and streaming data are made available and processed through services, which we refer to as...
Recent years have seen a proliferation of work on the Semantic Web, an initiative to enable intelligent agents to reason about and utilize World Wide Web content and services. Concurrently, the networking community has developed a concept of the knowledge plane, using artificial intelligence to reason about and manage network behavior. These two efforts have progressed independently despite potential...
Distributed denial of service (DDoS) attacks are today the most destabilizing factor in the global internet and there is a strong need for sophisticated solutions. We introduce a formal statistical framework and derive a Bayes optimal packet classifier from it. Our proposed practical algorithm "adaptive history-based IP filtering" (AHIF) mitigates DDoS attacks near the victim and outperforms...
We present a new access control model for XML Web-Services that provides users with two kinds of authorities: the authority to delegate their authorities to other users and the authority to create new authorities based on their own authorities. We developed this model by introducing capability- based access control to Web services. A capability consists of an object identifier and the list of permitted...
Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To achieve this goal many systems sacrifice security and privacy such, that services can be discovered and...
Lately there has been a growing interest in the use of peer-to-peer technologies for deploying large-scale live media streaming systems over the Internet. In this paper we give a brief survey on the peer-to-peer streaming field and have also a closer look on selected applications. In practice, we analyse the selected peer-to-peer streaming systems (Octoshape, SopCast, TVAnts and TVU networks) and...
"Top K" queries reduce a query result to the most interesting or the most urgent items. In many cases, e.g., when the result size is unbounded due to duplicate key values, a "top" operation cannot be implemented using the standard algorithm based on an in-memory priority queue. The default alternative is a full sort. External merge sort admits multiple novel optimizations specific...
This paper introduces a novel keyword searching paradigm in relational databases (DBs), where the result of a search is a ranked set of object summaries (OSs). An OS summarizes all data held about a data subject (DS) in the database. More precisely, it is a tree with a tuple containing the keyword as a root and neighboring tuples as children. In contrast to traditional relational keyword search (R-KwS),...
Traditional data integration and analysis approaches tend to assume intimate familiarity with the structure, semantics, and capabilities of the available information sources before applicable tools can be used effectively. This assumption often does not hold in practice. We introduce dataspace profiling as the cardinal activity when beginning a project in an unfamiliar dataspace. Dataspace profiling...
We propose a new approach to the problem of schema matching in relational databases that merges the hybrid and composite approach of combining multiple individual matching techniques. In particular, we propose assigning individual matchers to two categories, "strong" matchers that provide a priori higher quality matches, and "weak" matchers that may be more sensitive to the inputs...
In ontology-based data access (OBDA), the aim is to use an ontology to mediate the access to data sources. We present a plug-in for the standard ontology editor Protege that allows users to model ontologies with mappings to data sources in order to perform OBDA. We argue that our plug-in, together with an OBDA-Enabled reasoner, allows users to build, test, and deploy OBDA Systems in academic or industrial...
If we consider a query involving multiple domains, such as "find all database conferences held within six months in locations whose seasonal average temperature is 28degC and for which a cheap travel solution exists", we note that (i) general- purpose search engines fail to answer multi-domain queries and (ii) specific search services may cover one of such domains, but no general integration...
With the increasing deployment of P2P networks, supervising the malicious behaviours of participants, which degrade the quality and performance of the overall delivered service, is a real challenge. In this paper, we propose a fully distributed and adaptive revocation mechanism based on the reputation of the peers. The originality of our approach is that the revocation is integrated in the core of...
In this paper a proof of concept infrastructure for the delivery of IMS-based IPTV services driven by the IPTV enabled FOKUS open IMS infrastructure was presented. As the different standard development organizations (SDOs) will release frameworks for standardized IPTV by the end of this year the FOKUS Media Interoperability Lab (MIL) represents one of the world's first real world test beds for these...
In this paper we released some connection problems with BitTorrent (BT) that we have founded in our four months' experimental study. One connection per IP address is usually used by network application software for flow fairness. However if one connection per IP address is configured with BT there will be some problems in connection setup, which induces some peers not to find some of others even the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.