| ||
19.00 - Conference Dinner Day two - Friday 14th November 2008
|
10.00 -11.00 |
Key note by Paul Hofmann | |||
11.00-11.30 | Coffee Break | |||
11.30-13.00 |
3 A Information Retrieval
(Chair: Wolfgang Kahlig) |
3 B Information Management
(Chair: ) |
3 C Mobile, Ad Hoc and Sensor Network Security
(Chair: Ajith Abraham) |
3 D Semantic Web and Ontology
(Chair: Julie Doyle) |
---|---|---|---|---|
55 - Analysis of Machine Learning Techinques for Context Extraction-Michael Granitzer, Mark Kröll, Christin Seifert, Andreas Rath, Nicolas Weber | 84 - DYONIPOS-Josef Makolm, Silke Weiß, Doris Ipsmiller | 15 - Approximation Algorithm using: neighbors, history and errors (NHE)-Maytham Safar, Nisreen Al-Masri | 231 - Chain Ontology Based: A Model For Protecting Personal Information Privacy-Esraa Omran, Shereef Abu Al-Maati, Albert Bokma | |
67 - How the ExpLSA approach impacts the document classification tasks-Nicolas Béchet, Mathieu Roche, Jacques Chauché | 123 - Managing tacit and explicit knowledge in organisational teams-Raija Halonen, Elisa Laukkanen | 88 - NIDS Based on Payload Word Frequencies and Anomaly of Transitions- Sasa Mrdovic, Branislava Drazenovic | 129 - Description Ontologies-Massimo Ruffolo, Ermelinda Oro | |
253. Data Collection System for Link Analysis-Bo Yang, Jian Qin | 152 - SCEP-SOA: An applicative architecture to enhance interoperability in multi-site planning-Karim Ishak, Bernard Archimede, Philippe Charbonnaud | 93 - A Cross-Layer Framework for Video Streaming over Wireless Ad-Hoc Networks-Mohammad Nikoupour, Ali Nikoupour, Mehadi Dehghan | 172 - Query rewriting for Lightweight Information Integration-Rodolfo Stecher, Claudia Niederée, Wolfgang Nejdl | |
98 - Algorithm of the Longest Commonly Consecutive Word for Plagiarism Detection in Text Based Document-agung sediyono, Ku Ruhana Ku Mahamud | 307 - Re-Shaping EMail Relatuionships- Eyas El-Qawasmeh, Pit Pichappan, Daisy Jacobs | 149 - Reliable Data Aggregation Protocol for Wireless Sensor Networks-Tamara Pazynyuk, JiangZhong Li, George S. Oreku | ||
148 - A Ranking Algorithm for User-generated Video Contents based on Social Activities-Lisa Wiyartanti, Yo-Sub Han, Laehyun Kim | 249 - A Participant Testing Strategy for Service Orchestrations-Flavio Corradini, Francesco De Angelis,Andrea Polini, Alberto Polzonetti | 158 - Addressing the Vulnerability of the 4-way Handshake of 802.11i-Songhe Zhao, Charles Shoniregun, Chris Imafidon | ||
299 - Flexible Question Asnwering System for Mobile Devices-Daniel Ortiz-Arroyo, | 251 - Modeling vocabularies in the architectural domain-Katja Niemann, Martin Wolpers |
293. A Power Efficient Approach in
a Multi-Channel Dissemination Network-Ahmad
Al-Mogren |
||
200 - Grid-Based Semantic Integration and Dissemination of Medical Information-Aisha Naseer, Lampros Stergioulas, Suhel Hammoud, Maozhen Li | 264 - Bug Reports Retrieval Using Self-Organizing Map-Renata L. M. E. Rêgo, Márcio Ribeiro, Emanuella Aleixo, Renata M. C. R. Souza | |||
218 - English Sentence Retrieval System Based on Dependency Structure and its Evaluation-Yoshihide Kato, Seiji Egawa, Shigeki Matsubara, Yasuyoshi Inagaki | ||||
10.00 - 11.00 | Lunch | |||
14.00 – 16.00 | Session 3 A (Contd) Session 3 B (Contd) |
Session 4 A Workshop 3 Context Modeling and Management for Smart Environments (cmmse'08)
(Chair:Soraya Kouadri Mostéfaoui) |
Session 4 B E-Learning, eCommerce, e-Business and e-Government
(Chair: Behzad Bordbar) |
Session 4 C -
Mosaica Workshop Chair: Jawed Siddiqi |
Context-Aware User Model
for Personalized Services Aekyung Moon, Young-il Choi, Byung-sun Lee |
327 - The Role of Interoperability in eGovernment Applications: An Investigation of Obstacles and Implementation Decisions - Εfthimios Tambouris, Nikolaos Loutas, Vassilios Peristeras, Κonstantinos Tarabanis |
1. General introduction to
Mosaica methodology - Jawed Siddiqi (Sheffield
Hallam University) 2- Mosaica architectural design and pedagogical framework - Fazilatur Rahman (Sheffield Hallam University) 3- Demonstration of Mosaica system (movie film) -Lukasz Jopek (Sheffield Hallam University) |
||
Context-awareness and Model Driven Engineering: Illustration by an E-commerce application scenario Chantal Taconet and Zakia Kazi-Aoul | 94 - Legal Cognitive Decision Processing towards a Dynamic Taxonomy-Wolfgang Kahlig | |||
A Generic Context Model with Autonomic Features Tudor Cioara, Ionut Anghel, Ioan Salomie, Mihaela Dinsoreanu | 116 - E-Business and Strategy Management in Digital Information Management Methodologies: An Adaptive Algorithmic Approach-Alexandra Lipitakis |
Session 4C Web Mining including Web
Intelligence and Web 3.0
(Chair: Daisy Jacobs) |
||
Mobile Ontology-based
Reasoning and Feedback (MORF) Health Monitoring System Luke Docksteader, Rachid Benlamri |
177 - A PROMETHEE-based Recommender System for Multi-sort Recommendations in On-line Stores-Arash Niknafs, Nasrollah Moghaddam Charkari, Aliakbar Niknafs | 65 - How to Assess Customer Opinions Beyond Language Barriers?-Kerstin Denecke | ||
A Hierarchical Model-Based System for Discovering Atypical Behavior -Dorothy Ndedi Monekosso | 211 - Electronic Government Paradigm-Cyril Ehijie Azenabor, Charles A Shoniregun | 75 - Extracting Community Structure Features for Hypertext Classification-Dell Zhang, Robert Mao | ||
Smart Heating Systems:
optimizing heating systems by kinetic-awareness Vincenzo Pallotta, Pascal Bruegger, Béat Hirsbrunner |
247 - A Framework for culture influence virtual learning environments-Samson Omosule, David Preston, Charles Shoniregun | |||
Context
Management for Response to Traffic Accident in Smart
Environment Smirnov Alexander, Levashova Tatiana, Shilov Nikolay, Kashevnik Alexey |
262 - Modeling Interactivity in a B2B Web-Based Community-Chima Adiele
337- Identification of influence factors in the Information Technology formation in United Arab Emirates - Abdullah A. Al-Tameem |
|||
16.00 – 16.30 | Coffee Break | |||
16.30 – 18.30 |
Session 5 A Workshop 4 Workshop on Remote control of Devices (WoRD)
(Chair:Christophe Gravier) |
Session 5 B Case Studies on Data Management, Monitoring and Analysis
(Chair: Prabhakar Tadinada) |
Session 5 C Mobile Data Management
(Chair: Soon Hyun) |
|
Acceptance, Usability and
Usefulness of WebLab-Deusto from Students Point of View- J. García-Zubía D. López-de-Ipiña P. Orduña |
246 - Hierarchical Segmentation of Digital Mammography by Agents Competition- Ahlem Melouah, Hayet Farida Merouani | 43 - A Framework for Caching Relevant Data Items for Checking Integrity Constraints of Mobile Database-Zarina Dzolkhifli, Hamidah Ibrahim, Lilly Suriani Affendey, Praveen Madiraju | ||
Design , Implementation
and Use of a Remote Network Lab as an Aid to Support Teaching Computer Network- Marco Aravena Vivar |
37 - Visualizing consumption in weighted hierarchies-Benoit Otjacques,Pierre Collin, Fernand Feltz, Monique Noirhomme | 108 - Efficient Distributed Information Management in Smart Spaces-Alexander Smirnov, Nikolay Shilov, Andrew Krizhanovsky, Antti Lappetelainen, Ian Oliver | ||
Design and Test of Application-Specific Integrated Circuits by use of Mobile Clients -Danilo G. Zutin, Michael E. Auer | 113 - Collaborative Geospatial Web Services for Multi-Dimension Remote Sensing Data-Chunyang Hu, Yongwang Zhao, Xiaoliang Sun, Jun Sao, Dianfu Ma |
206 - A Robust Cooperation Approach For
Mobile Multimedia Adhoc Networks-J.M.
BAHI, Mirna ESKANDAR, Ahmed MOSTEFAOUI |
||
Reusability in practice for Remote Laboratories-Christophe Gravier-Christophe Gravier, Jacques Fayolle, Bernard Bayard, Jérémy Lardon, Gaétan Dusser | 242 - A model driven approach to the design and implementing of fault tolerant Service oriented Architectures-Mohammed Alodib, Behzad Bordbar, Basim Majeed | 236 - A New Sufficient Condition for 1-Coverage to Imply Connectivity-Seyed Hossein Khasteh, Saeed Bagher Shouraki | ||
Remote controlled Flying
Robot Platform- Hartmut Haehnel |
205 - Towards an Automatic Real-Time Assessment of Online Discussions in CSCL Practices-Santi Caballe, Fatos Xhafa, Ajith Abraham | |||
10.00 -11.00 | Key note by Owen O'Connor | |||
11.00-11.30 | Coffee Break | |||
11.30-13.00 |
Session 6 A Natural Language Processing (Chair: Brajendra Panda) |
Session 6 B Information Content Security (Chair: Peyman Kabiri) |
Session 6C XML
(Chair: Elena Nielsen) |
|
---|---|---|---|---|
258 - A Genetic Algorithm for Logical Topic Text Segmentation -Alin Mihaila, Andreea-Diana Mihis, Cristina Mihaila | 256- Time Signatures – An Implementation of Keystroke and Click Patterns for Practical and Secure Authentication-Muhammad Sharif | 150 - Runtime Middleware for the Generation of Adaptive User Interfaces on Portable Devices -Karim Yaici, Ahmet Kondoz | ||
130 - Towards the Development of an Automatic Readability Measurements for Arabic Language-Amani Al-Ajlan, Hend Al-Khalifa, AbdulMalik Al-Salman | 174 - Securing Information Content using a New Encryption Method and Steganography-Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt | 156 - A framework for RESTful object exchange through288 schematized XML (unRESTricted)-Barbara Van De Keer, Dieter Van Rijsselbergen, Erik Mannens,Rik Van de Walle | ||
138 - Testing Concept Indexing in Crosslingual Medical Text Classification-Francisco Carrero, Jose Carlos Cortizo, Jose Maria Gomez | 119 - The Importance of Biometric Sensor Continuous Secure Monitoring-Alexandros Papanikolaou,Christos Ilioudis,Christos Georgiadis, Elias Pimenidis |
170 - Fine-Grained Access Control in Hybrid Relational-XML Databases-Taketo
Sasaki, Daeil Park, Motomichi Toyama |
||
145 - Use of Text Syntactical Structures in Detection of Document Duplicates-Mohamed Elhadi, Amjad Al-Tobi |
234 - Integrity assurance of mobile agents through public-key encryption and watermarking-Noor Qayyum, Farooq Ahmad, Fauzan Mirza |
187 - CXQU: A Compact XML Storage for Efficient Query and Update processing-Ramez Alkhatib, Marc H. Scholl | ||
164 - A New Technique for Detecting Similar Documents based on Term Co-occurrence and Conceptual Property of the Text-Azadeh Zamanifar, Behrouz Minaei-Bidgoli, Omid Kashef"i | 268 - A NetFlow Based Internet-worm Detecting System in Large Network-Yi-Tung F. Chan, Galyna A. Akmayeva, Charles A. Shoniregun | 260 - Enabling smooth integration between HL7 CDA and Medical Guidelines on the Web with an initial focus on Women’s Health in General Practice-M. Arguello, J. Des, A. Thompson, H. Paniagua, M.J. Fernandez-Prieto, and R. Perez | ||
166 - Morphological Analysis of Bangla Words for Universal Networking Language-Md. Nawab Yousuf Ali, Jugal Krishna Das, S. M. Abdulla Al-Mamun, Abu Mohammad Nurannabi | ||||
171 - A Comparison of Collation Algorithm for Myanmar Language-Yu zana, Khin Mar Lar Tun | ||||
203 - Sentence Compression by Structural Conversion of Parse Tree-Seiji Egawa, Yoshihide Kato, Shigeki Matsubara |
|
|||
252 - Robust recognition of complex entities in text exploiting enterprise data and NLP-techniques-Falk Brauer | ||||
10.00 - 11.00 | Lunch | |||
14.00 – 16.00 | Session 6 A Natural Language Processing (contd) |
Session 7 A Data Management (Chair: Atsuhiro Takasu) |
Session 7 B Database Management (Chair: Francisco Couto) |
Session 7 C Knowledge Management
(Chair: Youakim Badr) |
193- Sieving Publishing Communities in DBLP-Christoph Schommer- |
20 - Semantic Cache Schema for Query Processing in Mobile Databases-Ali Asghar Safaeei |
96-Adapted Relation Structure Algorithm for Word Sense Disambiguation-Myunggwon Hwang, Pankoo Kim | ||
223.A Fast Approximate Algorithm for Large-Scale Latent Semantic Indexing-Dell Zhang, Zheng Zhu | 47 - Statistical Shape based Multispectral Image Retrieval Extracting Power Spectrum Vectors-Peyman Kabiri, Hamed Shahbazi, Mohsen Soryani | 82 - Process-Oriented method usage for examining the knowledge mining process-Olga Zvereva, Vera Morosova | ||
117. Two Pattern Classifiers for Interval Data Based on Binary Regression Models- Renata Souza, Francisco Cysneiros, Diego Florêncio, Roberta Fagundes |
300 - A Cross-layer Quality Driven Approach in Web Service Selection-Jin
Wu, Zhili Sun |
103 - Knowledge management practices in higher education institutes: a different approach-Reza Hoveida, Gholamreza Shams, Ali Hooshmand | ||
214. Learning Classifiers without Negative Examples: A Reduction Approach- Dell Zhang, Wee Sun Lee | 132 - A Storage Scheme for Multidimensional Data Alleviating Dimension Dependency-Teppei Shimada, Tatsuo Tsuji, Ken Higuchi |
128 - Performance Analysis of an Insider Threat Mitigation Model-Qutaibah
Althebyan, Brajendra Panda |
||
136 - Management of context-aware preferences in Multidimensional Databases-Houssem Jerbi, Franck Ravat, Olivier Teste, Gilles Zurfluh | 189 - Using the Augmented Vector Space Model to Support the Knowledge Worker in Document Filtering- Ann Johnston, Francesco Lelli, Stefan Decker | |||
232 - Visual SBVR- Prabhakar TV. | ||||
16.00 – 16.30 | Coffee Break | |||
16.30 – 18.30 | Session 8 A Multimedia Information Systems (Chair: Richard Chbeir) |
Session 8 B Data and Information Quality Management (Chair: ) |
Session 8 C Data Grids, Data and Information Quality (Chair: Christoph Schommer) |
|
139 - Adaptive Mean Shift-Based Image Segmentation Using Multiple Instance Learning -Iker Gondra, Tao Xu |
271 - Identifying Bioentity Recognition Errors of Rule-Based Text-Mining Systems-Francisco
M Couto, Tiago Grego , Hugo P. Bastos, Catia Pesquita, Christian Blaschke |
162 - A Load Balancing Replica Placement Strategy in Data Grid-Qaisar Rasool, Jianzhong Li, George S. Oreku, Shuo Zhang, Donghua Yang | ||
222 - The softphone security-Dannan Lin | 104 - MAW: A New Effective and Efficient Knowledge Meta-model for Audiovisual Works-Ana Iglesias, Guillermo Millan, Elisa Pintado, Elena Castro |
86 - Matching Multiple Elements in Grid Databases: A Practical Approach-Ejaz
Ahmed , Nik Bessis, Yong Yue, Muhammad Sarfraz |
||
270 - Real-Time Detection of Sport in MPEG-2 Sequences using High-Level AV-Descriptors and SVM-Ronald Glasberg, Sebastian Schmiedeke, Hüseyin Oguz, Pascal Kelm, Thomas Sikora |
225 - Availability in Peer to Peer Management Networks-Ouldooz
Baghban Karimi, Mahmood Fathy , Saleh Yousefi |
105 - DVM Based Dynamic VPN Architecture for Group Working and Orchestrated Distributed Computing-Yiran Gao, Chris Phillips, Liwen He | ||
155 - Geo-Information Quality Assurance in Disaster Management-Ying Su, Jie Peng | ||||
Day four - Sunday 16th November 2008
10.00 - 15.00 | London Tour | |||
15.00 - 16.00 | Closing Ceremony |
Posters
53-Combating Digital Document Forgery using New Secure Information Hiding Algorithm -Abbas Cheddad,
57-Preservation Metadata - A Framework for 3D Data based on the Semantic Web- Julie Doyle
66-X.509 Certificate Quality- Ahmad Samer WAZAN
143- A Data Model for Versioned XML Documents using XQuery- Luis Arévalo
168 -A Survey in Semantic Web Technologies-Inspired Focused Crawlers- Hai Dong
265- A quantitative analysis on the progress of technology fusion based on IPC codes of patent data- Katsuhiro Suzuki, Junichi Sakata, Jun Hosoya
297 - Population-Variance and Explorative Power of Harmony Search: An Analysis -Arpan Mukhopadhyay, Anwit Roy, Sourav Das, Swagatam Das, Ajith Abraham
Home | Paper Submission | Program Committees | Registration | Sponsors | Accommodation | Travel Information | Contact |
© 2007 ICDIM. |