Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Emergent Web Intelligence: Advanced Information Retrieval

of: Richard Chbeir, Youakim Badr, Ajith Abraham, Aboul-Ella Hassanien

Springer-Verlag, 2010

ISBN: 9781849960748 , 487 Pages

Format: PDF, Read online

Copy protection: DRM

Windows PC,Mac OSX,Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Read Online for: Windows PC,Mac OSX,Linux

Price: 149,79 EUR



More of the content

Emergent Web Intelligence: Advanced Information Retrieval


 

Editorial Preface

5

1 Introduction

5

2 Book Organization

7

3 Acknowledgment

12

4 About the Editors

13

5 List of Reviewers

14

Contents

16

Contextual and Conceptual Information Retrieval and Navigation on the Web

19

1.1 Introduction: Goals and Challenges

20

1.2 Conceptual Contexts and Relationship with Ontologies

21

1.3 Methodology for a Conceptual and Contextual Information Retrieval and Navigation on the Web

26

1.4 Enhancing Navigation in the Lattice – Similarity Measure

28

1.5 Perspectives: Towards Galois Lattices’ Visual Footprints

35

1.6 Conclusion

36

References

37

Automatic Invocation Linking for Collaborative Web- Based Corpora

40

2.1 Introduction

41

2.2 State of the Art

44

2.3 Challenges and Design Goals

47

2.4 NNexus Approach

49

2.5 Case Studies

56

2.6 Conclusion and Open Issues

61

References

61

WS-Query – A Framework to Efficiently Query SemanticWeb Service

63

3.1 Introduction

63

3.2 Service Query Model

67

3.3 Quality ofWeb Service-Aware Optimization

75

3.4 Implementation

91

3.5 RelatedWork

98

3.6 Conclusions

100

References

101

RDF-GL: A SPARQL-Based Graphical Query Language for RDF

103

4.1 Introduction

103

4.2 RelatedWork

104

4.3 RDF-GL

108

4.4 SPARQLinG

125

4.5 Conclusions and Further Research

130

References

131

Semantics-Based Intelligent Indexing and Retrieval of Digital Images – A Case Study

133

5.1 Introduction

133

5.2 SemanticWeb

135

5.3 Case Study

136

5.4 Ontology Development

137

5.5 Image Annotation

141

5.6 Image Retrieval

142

5.7 Query Expansion

144

5.8 Conclusions

148

References

149

Harvesting Intelligence in Multimedia Social Tagging Systems

151

6.1 Introduction

151

6.2 Multimedia Content Annotation

153

6.3 State of the Art

156

6.4 Content and Tag-Based Clustering Approach

160

6.5 Experimental Results

167

6.6 Use Cases – Scenarios

174

6.7 Conclusions

176

6.8 Appendix

176

References

180

User Profiles Modeling in Information Retrieval Systems

184

7.1 Introduction

184

7.2 Information Retrieval

186

7.3 Evolutionary Computation

194

7.4 Evolutionary Techniques and Fuzzy Logic Principles in IRS

198

7.5 Experimental Evaluation

203

7.6 Conclusion

211

References

211

Human–Web Interactions

214

8.1 Introduction

215

8.2 Data Collection

217

8.3 Case Study: Data and Intranet Portal

219

8.4 Preprocessing

221

8.5 Analysis

222

8.6 Modeling

232

8.7 Applications

235

8.8 Conclusions and Future Trends

245

References

246

Web Recommender Agents with Inductive Learning Capabilities

248

9.1 Introduction

248

9.2 RelatedWork

253

9.3 CILWEB Knowledge Representation: Ontology and Agent Profile

255

9.4 Connectionist Representation of Agent’s Profile

265

9.5 Implication-BasedWeb Recommendations

271

9.6 Evaluation of CILWEB

274

9.7 Conclusions

277

Appendix: The Rules-Network Translation Method

278

References

280

Capturing the Semantics of User Interaction: A Review and Case Study

283

10.1 Introduction

283

10.2 Survey of Collaborative Filtering and Long-Term Learning

287

10.3 Unifying Interaction Domains

302

10.4 Long-Term Learning in Image Retrieval: A Case Study

304

10.5 Conclusion

309

References

310

Analysis of Usage Patterns in Large Multimedia Websites

314

11.1 Introduction

314

11.2 Overview of the Proposed Approach

318

11.3 Introduction to the Skyserver

319

11.4 Analysis of Usage Patterns

320

11.5 Case Studies and Experiments

328

11.6 Conclusions

331

References

332

An Adaptation Framework forWeb Multimedia Presentations

334

12.1 Introduction

335

12.2 Related Work

337

12.3 Spatio-Temporal Representation

338

12.4 Spatio-Temporal Reasoning

343

12.5 Framework for Multimedia Adaptation by substitution

343

12.6 Conflicts

349

12.7 Conclusion and Perspectives

352

References

352

A Multifactor Secure Authentication System for Wireless Payment

354

13.1 Introduction

354

13.2 Background and RelatedWork

356

13.3 Multifactor Authentication Approach

358

13.4 Secure Web Authentication Protocol

360

13.5 System for Two Way Authentication

365

13.6 Implementation Issues

370

13.7 Analysis of Various Internet Threats

372

13.8 Advantages

380

13.9 Conclusion

380

References

381

A Lightweight Authentication Protocol for Web Applications in Mobile Environments

383

14.1 Introduction

383

14.2 Preliminary Notions and Notations

384

14.3 An Overview on the Previous Literature

387

14.4 The Authentication Protocol

389

14.5 Security Analysis of the Proposed Protocols

392

14.6 Pseudo Random Number Generation

394

14.7 Security Analysis of the Proposed PRN Generator

397

14.8 Conclusions

401

References

401

Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

404

15.1 Introduction

404

15.2 Related Work

406

15.3 A Framework of the Proposed Model

408

15.4 Implementation

417

15.5 Conclusion and Future Work

423

References

423

Security in Distributed Collaborative Environments: Limitations and Solutions

425

16.1 Introduction

425

16.2 Uses Cases

427

16.3 Related Work

429

16.4 The Chameleon Architecture

436

16.5 The Distrust Model

440

16.6 Establishing Trust Beliefs Based on Disposition to Trust

444

16.7 X316: Morph Access Pass Certificate

449

16.8 Conclusion and Discussion

460

References

461

A Low-Cost and Secure Solution for e- Commerce

465

17.1 Introduction

465

17.2 The Proposed Solution

468

17.3 Security Analysis

473

17.4 Conclusion and Perspectives

478

References

479

Hyperchaotic Encryption for Secure E-Mail Communication

480

18.1 Introduction

480

18.2 Description

482

18.3 Hyperchaotic Cryptosystem

482

18.4 Output Synchronization of Hyperchaotic Maps

484

18.5 Output Synchronization of Hyperchaotic Rössler Maps

488

18.6 Secure Chaotic Encryption

490

18.7 Conclusions

493

References

493

Index

496