IOS Press

Displaying 1-18 of 18 results

  • White Papers // Jul 2013

    Deterministic Approach for Biclustering of Co-Regulated Genes from Gene Expression Data

    This paper presents an expression pattern based biclustering technique for grouping both positively and negatively regulated genes together as co-regulated genes from microarray expression data. Most interesting variants of this problem are NP-complete requiring either large computational effort or the use of lossy heuristics to short circuit the calculation. The...

    Provided By IOS Press

  • White Papers // May 2013

    The Information Workbench - A Platform for Linked Data Applications

    The authors describe the information workbench, a platform for developing linked data applications. The platform features a highly customizable user interface to present the data to the users and realize different interaction mechanisms. UI development is based on SemanticWiki technologies, enriched with a large set of widgets for data access,...

    Provided By IOS Press

  • White Papers // May 2012

    Linked Data in Enterprise Information Integration

    Data integration in large enterprises is a crucial but at the same time costly, long lasting and challenging problem. While business-critical information is often already gathered in integrated information systems, such as ERP, CRM and SCM systems, the integration of these systems itself as well as the integration with the...

    Provided By IOS Press

  • White Papers // Jan 2012

    Data Set Preprocessing and Transformation in a Database System

    In general, there is a significant amount of data mining analysis performed outside a database system, which creates many data management issues. This paper presents a summary of their experience and recommendations to compute data set preprocessing and transformation inside a database system (i.e., data cleaning, record selection, summarization, de-normalization,...

    Provided By IOS Press

  • White Papers // Jan 2012

    Evaluating Association Rules and Decision Trees to Predict Multiple Target Attributes

    Association rules and decision trees represent two well-known data mining techniques to find predictive rules. In this paper, the authors present a detailed comparison between constrained association rules and decision trees to predict multiple target attributes. They identify important differences between both techniques for such goal. They conduct an extensive...

    Provided By IOS Press

  • White Papers // Nov 2011

    Bringing Relational Databases Into the Semantic Web: A Survey

    Relational databases are considered one of the most popular storage solutions for various kinds of data and they have been recognized as a key factor in generating huge amounts of data for semantic web applications. Ontologies, on the other hand, are one of the key concepts and main vehicle of...

    Provided By IOS Press

  • White Papers // Sep 2010

    NPR - A New QoS-Based Routing Protocol for Mobile Ad-hoc Networks

    Ad-hoc on-demand networks have received a significant interest in the literature. Many routing schemes for such networks focus on finding an optimal path. In this paper, however, the authors consider the routing problem from the viewpoint of sustaining QoS (quality of service) requirement. Some algorithms such as MPDSR already have...

    Provided By IOS Press

  • White Papers // Sep 2010

    A Novel QOS-Based Broadcasting Scheme for Wide Area Networks

    In this paper, the authors have proposed a practical approach for broadcasting in wide area networks. The concept of pseudo-diameter, an important parameter in the DVR data structure unused by the RPF method has been applied to prune the flow of packets in order to achieve reduction in the number...

    Provided By IOS Press

  • White Papers // Mar 2010

    Monitoring Service Clouds in the Future Internet

    Service clouds are a key emerging feature of the Future Internet which will provide a platform to execute virtualized services. To effectively operate a service cloud there needs to be a monitoring system which provides data on the actual usage and changes in resources of the cloud and of the...

    Provided By IOS Press

  • White Papers // Feb 2010

    Information Security Underlying Transparent Computing: Impacts, Visions and Challenges

    The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved information and service sharing enjoyed by more and more people, how to strengthen the information security has become an increasingly critical issue. In this paper, the authors propose...

    Provided By IOS Press

  • White Papers // Jan 2010

    Biometric Template Protection in Multimodal Authentication Systems Based on Error Correcting Codes

    The widespread deployment of biometric systems has raised public concern about security and privacy of personal data. In this paper, the authors present a novel framework for biometric template security in multimodal biometric authentication systems based on error correcting codes. Biometric recognition is formulated as a channel coding problem with...

    Provided By IOS Press

  • White Papers // Jan 2010

    Emulation Framework for the Design and Development of Active RFID Tag Systems

    The design and development of active RFID tag systems requires several iterations, and thorough testing in order to ensure that the prototype systems behave as intended. Facilitating these operations contributes significantly to faster product development and to a quicker time to market. The emulation framework that the authors present makes...

    Provided By IOS Press

  • White Papers // Jan 2010

    Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers

    Virtual data centers allow the hosting of virtualized infrastructures (networks, storage, machines) that belong to several customers on the same physical infrastructure. Virtualization theoretically provides the capability for sharing the infrastructure among different customers. In reality, however, this is rarely (if ever) done because of security concerns. A major challenge...

    Provided By IOS Press

  • White Papers // Aug 2009

    The SCOOP Concurrency Model in Java-Like Languages

    SCOOP is a minimal extension to the sequential object-oriented programming model for concurrency. The extension consists of one keyword (separate) that avoids explicit thread declarations, synchronized blocks, explicit waits, and eliminates data race and atomicity violations by construction, through a set of compiler rules. SCOOP was originally described for the...

    Provided By IOS Press

  • White Papers // Apr 2009

    The Agent Environment in Multi-Agent Systems: A Middleware Perspective

    Interaction is at the core of multi-agent systems. The authors use agent environment as a general term to denote the medium for agent interaction. Over the last years, the agent environment has been subject of active research. In this paper, they reflect on the role of the agent environment in...

    Provided By IOS Press

  • White Papers // Apr 2009

    A Simulation Based Analysis of the Impact of IEEE 802.15.4 MAC Parameters on the Performance Under Different Traffic Loads

    IEEE 802.15.4, a MAC/PHY protocol for low power and low data rate wireless networks, is emerging as the popular choice for various monitoring and control applications. Depending on the application, the traffic load on an IEEE 802.15.4 network may vary over a wide range. The performance of the protocol, measured...

    Provided By IOS Press

  • White Papers // Apr 2009

    The Publish/Subscribe Internet Routing Paradigm (PSIRP): Designing the Future Internet Architecture

    Despite its success, the Internet is suffering from several key design limitations, most notably the unification of endpoint locators and identifiers, and an imbalance of power in favor of the sender of information. The unfavourable consequences are that the full range of possibilities offered by the Internet may not be...

    Provided By IOS Press

  • White Papers // Sep 2007

    Design and Analysis of Shock and Random Vibration Isolation of Operating Hard Disk Drive in Harsh Environment

    An effective vibration isolation system is important for Hard Disk Drives (HDD) used in a harsh mechanical environment. This paper describes how to design, simulate, test and evaluate vibration isolation systems for operating HDD subjected to severe shock and random vibrations based on military specifications MIL-STD-810E. The well-defined evaluation criteria...

    Provided By IOS Press

  • White Papers // Mar 2010

    Monitoring Service Clouds in the Future Internet

    Service clouds are a key emerging feature of the Future Internet which will provide a platform to execute virtualized services. To effectively operate a service cloud there needs to be a monitoring system which provides data on the actual usage and changes in resources of the cloud and of the...

    Provided By IOS Press

  • White Papers // Sep 2010

    NPR - A New QoS-Based Routing Protocol for Mobile Ad-hoc Networks

    Ad-hoc on-demand networks have received a significant interest in the literature. Many routing schemes for such networks focus on finding an optimal path. In this paper, however, the authors consider the routing problem from the viewpoint of sustaining QoS (quality of service) requirement. Some algorithms such as MPDSR already have...

    Provided By IOS Press

  • White Papers // Sep 2010

    A Novel QOS-Based Broadcasting Scheme for Wide Area Networks

    In this paper, the authors have proposed a practical approach for broadcasting in wide area networks. The concept of pseudo-diameter, an important parameter in the DVR data structure unused by the RPF method has been applied to prune the flow of packets in order to achieve reduction in the number...

    Provided By IOS Press

  • White Papers // Jan 2010

    Emulation Framework for the Design and Development of Active RFID Tag Systems

    The design and development of active RFID tag systems requires several iterations, and thorough testing in order to ensure that the prototype systems behave as intended. Facilitating these operations contributes significantly to faster product development and to a quicker time to market. The emulation framework that the authors present makes...

    Provided By IOS Press

  • White Papers // Apr 2009

    The Agent Environment in Multi-Agent Systems: A Middleware Perspective

    Interaction is at the core of multi-agent systems. The authors use agent environment as a general term to denote the medium for agent interaction. Over the last years, the agent environment has been subject of active research. In this paper, they reflect on the role of the agent environment in...

    Provided By IOS Press

  • White Papers // Aug 2009

    The SCOOP Concurrency Model in Java-Like Languages

    SCOOP is a minimal extension to the sequential object-oriented programming model for concurrency. The extension consists of one keyword (separate) that avoids explicit thread declarations, synchronized blocks, explicit waits, and eliminates data race and atomicity violations by construction, through a set of compiler rules. SCOOP was originally described for the...

    Provided By IOS Press

  • White Papers // Apr 2009

    A Simulation Based Analysis of the Impact of IEEE 802.15.4 MAC Parameters on the Performance Under Different Traffic Loads

    IEEE 802.15.4, a MAC/PHY protocol for low power and low data rate wireless networks, is emerging as the popular choice for various monitoring and control applications. Depending on the application, the traffic load on an IEEE 802.15.4 network may vary over a wide range. The performance of the protocol, measured...

    Provided By IOS Press

  • White Papers // Jan 2012

    Data Set Preprocessing and Transformation in a Database System

    In general, there is a significant amount of data mining analysis performed outside a database system, which creates many data management issues. This paper presents a summary of their experience and recommendations to compute data set preprocessing and transformation inside a database system (i.e., data cleaning, record selection, summarization, de-normalization,...

    Provided By IOS Press

  • White Papers // Jan 2012

    Evaluating Association Rules and Decision Trees to Predict Multiple Target Attributes

    Association rules and decision trees represent two well-known data mining techniques to find predictive rules. In this paper, the authors present a detailed comparison between constrained association rules and decision trees to predict multiple target attributes. They identify important differences between both techniques for such goal. They conduct an extensive...

    Provided By IOS Press

  • White Papers // Jan 2010

    Biometric Template Protection in Multimodal Authentication Systems Based on Error Correcting Codes

    The widespread deployment of biometric systems has raised public concern about security and privacy of personal data. In this paper, the authors present a novel framework for biometric template security in multimodal biometric authentication systems based on error correcting codes. Biometric recognition is formulated as a channel coding problem with...

    Provided By IOS Press

  • White Papers // Jan 2010

    Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers

    Virtual data centers allow the hosting of virtualized infrastructures (networks, storage, machines) that belong to several customers on the same physical infrastructure. Virtualization theoretically provides the capability for sharing the infrastructure among different customers. In reality, however, this is rarely (if ever) done because of security concerns. A major challenge...

    Provided By IOS Press

  • White Papers // Jul 2013

    Deterministic Approach for Biclustering of Co-Regulated Genes from Gene Expression Data

    This paper presents an expression pattern based biclustering technique for grouping both positively and negatively regulated genes together as co-regulated genes from microarray expression data. Most interesting variants of this problem are NP-complete requiring either large computational effort or the use of lossy heuristics to short circuit the calculation. The...

    Provided By IOS Press

  • White Papers // Nov 2011

    Bringing Relational Databases Into the Semantic Web: A Survey

    Relational databases are considered one of the most popular storage solutions for various kinds of data and they have been recognized as a key factor in generating huge amounts of data for semantic web applications. Ontologies, on the other hand, are one of the key concepts and main vehicle of...

    Provided By IOS Press

  • White Papers // Sep 2007

    Design and Analysis of Shock and Random Vibration Isolation of Operating Hard Disk Drive in Harsh Environment

    An effective vibration isolation system is important for Hard Disk Drives (HDD) used in a harsh mechanical environment. This paper describes how to design, simulate, test and evaluate vibration isolation systems for operating HDD subjected to severe shock and random vibrations based on military specifications MIL-STD-810E. The well-defined evaluation criteria...

    Provided By IOS Press

  • White Papers // May 2013

    The Information Workbench - A Platform for Linked Data Applications

    The authors describe the information workbench, a platform for developing linked data applications. The platform features a highly customizable user interface to present the data to the users and realize different interaction mechanisms. UI development is based on SemanticWiki technologies, enriched with a large set of widgets for data access,...

    Provided By IOS Press

  • White Papers // May 2012

    Linked Data in Enterprise Information Integration

    Data integration in large enterprises is a crucial but at the same time costly, long lasting and challenging problem. While business-critical information is often already gathered in integrated information systems, such as ERP, CRM and SCM systems, the integration of these systems itself as well as the integration with the...

    Provided By IOS Press

  • White Papers // Feb 2010

    Information Security Underlying Transparent Computing: Impacts, Visions and Challenges

    The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved information and service sharing enjoyed by more and more people, how to strengthen the information security has become an increasingly critical issue. In this paper, the authors propose...

    Provided By IOS Press

  • White Papers // Apr 2009

    The Publish/Subscribe Internet Routing Paradigm (PSIRP): Designing the Future Internet Architecture

    Despite its success, the Internet is suffering from several key design limitations, most notably the unification of endpoint locators and identifiers, and an imbalance of power in favor of the sender of information. The unfavourable consequences are that the full range of possibilities offered by the Internet may not be...

    Provided By IOS Press