IOS Press

Displaying 1-18 of 18 results

  • White Papers // Sep 2013

    Linked SDMX Data

    As statistical data is inherently highly structured and comes with rich metadata (in form of code lists, data cubes etc.), it would be a missed opportunity to not tap into it from the linked data angle. At the time of this writing, there exists no simple way to transform statistical...

    Provided By IOS Press

  • White Papers // Jul 2013

    Deterministic Approach for Biclustering of Co-Regulated Genes from Gene Expression Data

    This paper presents an expression pattern based biclustering technique for grouping both positively and negatively regulated genes together as co-regulated genes from microarray expression data. Most interesting variants of this problem are NP-complete requiring either large computational effort or the use of lossy heuristics to short circuit the calculation. The...

    Provided By IOS Press

  • White Papers // May 2013

    The Information Workbench - A Platform for Linked Data Applications

    The authors describe the information workbench, a platform for developing linked data applications. The platform features a highly customizable user interface to present the data to the users and realize different interaction mechanisms. UI development is based on SemanticWiki technologies, enriched with a large set of widgets for data access,...

    Provided By IOS Press

  • White Papers // May 2012

    Linked Data in Enterprise Information Integration

    Data integration in large enterprises is a crucial but at the same time costly, long lasting and challenging problem. While business-critical information is often already gathered in integrated information systems, such as ERP, CRM and SCM systems, the integration of these systems itself as well as the integration with the...

    Provided By IOS Press

  • White Papers // Feb 2012

    Multiagent Meta-level Control for Radar Coordination

    It is crucial for embedded systems to adapt to the dynamics of open environments. This adaptation process becomes especially challenging in the context of multiagent systems. In this paper, the authors argue that multiagent meta-level control is an effective way to determine when this adaptation process should be done and...

    Provided By IOS Press

  • White Papers // Jan 2012

    Data Set Preprocessing and Transformation in a Database System

    In general, there is a significant amount of data mining analysis performed outside a database system, which creates many data management issues. This paper presents a summary of their experience and recommendations to compute data set preprocessing and transformation inside a database system (i.e., data cleaning, record selection, summarization, de-normalization,...

    Provided By IOS Press

  • White Papers // Jan 2012

    Evaluating Association Rules and Decision Trees to Predict Multiple Target Attributes

    Association rules and decision trees represent two well-known data mining techniques to find predictive rules. In this paper, the authors present a detailed comparison between constrained association rules and decision trees to predict multiple target attributes. They identify important differences between both techniques for such goal. They conduct an extensive...

    Provided By IOS Press

  • White Papers // Nov 2011

    Bringing Relational Databases Into the Semantic Web: A Survey

    Relational databases are considered one of the most popular storage solutions for various kinds of data and they have been recognized as a key factor in generating huge amounts of data for semantic web applications. Ontologies, on the other hand, are one of the key concepts and main vehicle of...

    Provided By IOS Press

  • White Papers // Sep 2010

    NPR - A New QoS-Based Routing Protocol for Mobile Ad-hoc Networks

    Ad-hoc on-demand networks have received a significant interest in the literature. Many routing schemes for such networks focus on finding an optimal path. In this paper, however, the authors consider the routing problem from the viewpoint of sustaining QoS (quality of service) requirement. Some algorithms such as MPDSR already have...

    Provided By IOS Press

  • White Papers // Sep 2010

    A Novel QOS-Based Broadcasting Scheme for Wide Area Networks

    In this paper, the authors have proposed a practical approach for broadcasting in wide area networks. The concept of pseudo-diameter, an important parameter in the DVR data structure unused by the RPF method has been applied to prune the flow of packets in order to achieve reduction in the number...

    Provided By IOS Press

  • White Papers // Jul 2010

    Creating Knowledge out of Interlinked Data

    Over the past 3 years, the semantic web activity has gained momentum with the widespread publishing of structured data as RDF. The linked data paradigm has therefore evolved from a practical research idea into a very promising candidate for addressing one of the biggest challenges in the area of the...

    Provided By IOS Press

  • White Papers // Mar 2010

    Monitoring Service Clouds in the Future Internet

    Service clouds are a key emerging feature of the Future Internet which will provide a platform to execute virtualized services. To effectively operate a service cloud there needs to be a monitoring system which provides data on the actual usage and changes in resources of the cloud and of the...

    Provided By IOS Press

  • White Papers // Feb 2010

    Information Security Underlying Transparent Computing: Impacts, Visions and Challenges

    The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved information and service sharing enjoyed by more and more people, how to strengthen the information security has become an increasingly critical issue. In this paper, the authors propose...

    Provided By IOS Press

  • White Papers // Jan 2010

    Biometric Template Protection in Multimodal Authentication Systems Based on Error Correcting Codes

    The widespread deployment of biometric systems has raised public concern about security and privacy of personal data. In this paper, the authors present a novel framework for biometric template security in multimodal biometric authentication systems based on error correcting codes. Biometric recognition is formulated as a channel coding problem with...

    Provided By IOS Press

  • White Papers // Jan 2010

    Emulation Framework for the Design and Development of Active RFID Tag Systems

    The design and development of active RFID tag systems requires several iterations, and thorough testing in order to ensure that the prototype systems behave as intended. Facilitating these operations contributes significantly to faster product development and to a quicker time to market. The emulation framework that the authors present makes...

    Provided By IOS Press

  • White Papers // Jan 2010

    Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers

    Virtual data centers allow the hosting of virtualized infrastructures (networks, storage, machines) that belong to several customers on the same physical infrastructure. Virtualization theoretically provides the capability for sharing the infrastructure among different customers. In reality, however, this is rarely (if ever) done because of security concerns. A major challenge...

    Provided By IOS Press

  • White Papers // Aug 2009

    The SCOOP Concurrency Model in Java-Like Languages

    SCOOP is a minimal extension to the sequential object-oriented programming model for concurrency. The extension consists of one keyword (separate) that avoids explicit thread declarations, synchronized blocks, explicit waits, and eliminates data race and atomicity violations by construction, through a set of compiler rules. SCOOP was originally described for the...

    Provided By IOS Press

  • White Papers // Sep 2007

    Design and Analysis of Shock and Random Vibration Isolation of Operating Hard Disk Drive in Harsh Environment

    An effective vibration isolation system is important for Hard Disk Drives (HDD) used in a harsh mechanical environment. This paper describes how to design, simulate, test and evaluate vibration isolation systems for operating HDD subjected to severe shock and random vibrations based on military specifications MIL-STD-810E. The well-defined evaluation criteria...

    Provided By IOS Press

  • White Papers // Mar 2010

    Monitoring Service Clouds in the Future Internet

    Service clouds are a key emerging feature of the Future Internet which will provide a platform to execute virtualized services. To effectively operate a service cloud there needs to be a monitoring system which provides data on the actual usage and changes in resources of the cloud and of the...

    Provided By IOS Press

  • White Papers // Sep 2010

    NPR - A New QoS-Based Routing Protocol for Mobile Ad-hoc Networks

    Ad-hoc on-demand networks have received a significant interest in the literature. Many routing schemes for such networks focus on finding an optimal path. In this paper, however, the authors consider the routing problem from the viewpoint of sustaining QoS (quality of service) requirement. Some algorithms such as MPDSR already have...

    Provided By IOS Press

  • White Papers // Sep 2010

    A Novel QOS-Based Broadcasting Scheme for Wide Area Networks

    In this paper, the authors have proposed a practical approach for broadcasting in wide area networks. The concept of pseudo-diameter, an important parameter in the DVR data structure unused by the RPF method has been applied to prune the flow of packets in order to achieve reduction in the number...

    Provided By IOS Press

  • White Papers // Jan 2010

    Emulation Framework for the Design and Development of Active RFID Tag Systems

    The design and development of active RFID tag systems requires several iterations, and thorough testing in order to ensure that the prototype systems behave as intended. Facilitating these operations contributes significantly to faster product development and to a quicker time to market. The emulation framework that the authors present makes...

    Provided By IOS Press

  • White Papers // Aug 2009

    The SCOOP Concurrency Model in Java-Like Languages

    SCOOP is a minimal extension to the sequential object-oriented programming model for concurrency. The extension consists of one keyword (separate) that avoids explicit thread declarations, synchronized blocks, explicit waits, and eliminates data race and atomicity violations by construction, through a set of compiler rules. SCOOP was originally described for the...

    Provided By IOS Press

  • White Papers // Feb 2010

    Information Security Underlying Transparent Computing: Impacts, Visions and Challenges

    The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved information and service sharing enjoyed by more and more people, how to strengthen the information security has become an increasingly critical issue. In this paper, the authors propose...

    Provided By IOS Press

  • White Papers // Jan 2010

    Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers

    Virtual data centers allow the hosting of virtualized infrastructures (networks, storage, machines) that belong to several customers on the same physical infrastructure. Virtualization theoretically provides the capability for sharing the infrastructure among different customers. In reality, however, this is rarely (if ever) done because of security concerns. A major challenge...

    Provided By IOS Press

  • White Papers // Jan 2010

    Biometric Template Protection in Multimodal Authentication Systems Based on Error Correcting Codes

    The widespread deployment of biometric systems has raised public concern about security and privacy of personal data. In this paper, the authors present a novel framework for biometric template security in multimodal biometric authentication systems based on error correcting codes. Biometric recognition is formulated as a channel coding problem with...

    Provided By IOS Press

  • White Papers // Jan 2012

    Data Set Preprocessing and Transformation in a Database System

    In general, there is a significant amount of data mining analysis performed outside a database system, which creates many data management issues. This paper presents a summary of their experience and recommendations to compute data set preprocessing and transformation inside a database system (i.e., data cleaning, record selection, summarization, de-normalization,...

    Provided By IOS Press

  • White Papers // Jan 2012

    Evaluating Association Rules and Decision Trees to Predict Multiple Target Attributes

    Association rules and decision trees represent two well-known data mining techniques to find predictive rules. In this paper, the authors present a detailed comparison between constrained association rules and decision trees to predict multiple target attributes. They identify important differences between both techniques for such goal. They conduct an extensive...

    Provided By IOS Press

  • White Papers // Nov 2011

    Bringing Relational Databases Into the Semantic Web: A Survey

    Relational databases are considered one of the most popular storage solutions for various kinds of data and they have been recognized as a key factor in generating huge amounts of data for semantic web applications. Ontologies, on the other hand, are one of the key concepts and main vehicle of...

    Provided By IOS Press

  • White Papers // May 2013

    The Information Workbench - A Platform for Linked Data Applications

    The authors describe the information workbench, a platform for developing linked data applications. The platform features a highly customizable user interface to present the data to the users and realize different interaction mechanisms. UI development is based on SemanticWiki technologies, enriched with a large set of widgets for data access,...

    Provided By IOS Press

  • White Papers // May 2012

    Linked Data in Enterprise Information Integration

    Data integration in large enterprises is a crucial but at the same time costly, long lasting and challenging problem. While business-critical information is often already gathered in integrated information systems, such as ERP, CRM and SCM systems, the integration of these systems itself as well as the integration with the...

    Provided By IOS Press

  • White Papers // Sep 2007

    Design and Analysis of Shock and Random Vibration Isolation of Operating Hard Disk Drive in Harsh Environment

    An effective vibration isolation system is important for Hard Disk Drives (HDD) used in a harsh mechanical environment. This paper describes how to design, simulate, test and evaluate vibration isolation systems for operating HDD subjected to severe shock and random vibrations based on military specifications MIL-STD-810E. The well-defined evaluation criteria...

    Provided By IOS Press

  • White Papers // Jul 2010

    Creating Knowledge out of Interlinked Data

    Over the past 3 years, the semantic web activity has gained momentum with the widespread publishing of structured data as RDF. The linked data paradigm has therefore evolved from a practical research idea into a very promising candidate for addressing one of the biggest challenges in the area of the...

    Provided By IOS Press

  • White Papers // Sep 2013

    Linked SDMX Data

    As statistical data is inherently highly structured and comes with rich metadata (in form of code lists, data cubes etc.), it would be a missed opportunity to not tap into it from the linked data angle. At the time of this writing, there exists no simple way to transform statistical...

    Provided By IOS Press

  • White Papers // Feb 2012

    Multiagent Meta-level Control for Radar Coordination

    It is crucial for embedded systems to adapt to the dynamics of open environments. This adaptation process becomes especially challenging in the context of multiagent systems. In this paper, the authors argue that multiagent meta-level control is an effective way to determine when this adaptation process should be done and...

    Provided By IOS Press

  • White Papers // Jul 2013

    Deterministic Approach for Biclustering of Co-Regulated Genes from Gene Expression Data

    This paper presents an expression pattern based biclustering technique for grouping both positively and negatively regulated genes together as co-regulated genes from microarray expression data. Most interesting variants of this problem are NP-complete requiring either large computational effort or the use of lossy heuristics to short circuit the calculation. The...

    Provided By IOS Press