Search and Find
Service
Editorial Preface
5
1 Introduction
5
2 Book Organization
7
3 Acknowledgment
12
4 About the Editors
13
5 List of Reviewers
14
Contents
16
Contextual and Conceptual Information Retrieval and Navigation on the Web
19
1.1 Introduction: Goals and Challenges
20
1.2 Conceptual Contexts and Relationship with Ontologies
21
1.3 Methodology for a Conceptual and Contextual Information Retrieval and Navigation on the Web
26
1.4 Enhancing Navigation in the Lattice – Similarity Measure
28
1.5 Perspectives: Towards Galois Lattices’ Visual Footprints
35
1.6 Conclusion
36
References
37
Automatic Invocation Linking for Collaborative Web- Based Corpora
40
2.1 Introduction
41
2.2 State of the Art
44
2.3 Challenges and Design Goals
47
2.4 NNexus Approach
49
2.5 Case Studies
56
2.6 Conclusion and Open Issues
61
References
61
WS-Query – A Framework to Efficiently Query SemanticWeb Service
63
3.1 Introduction
63
3.2 Service Query Model
67
3.3 Quality ofWeb Service-Aware Optimization
75
3.4 Implementation
91
3.5 RelatedWork
98
3.6 Conclusions
100
References
101
RDF-GL: A SPARQL-Based Graphical Query Language for RDF
103
4.1 Introduction
103
4.2 RelatedWork
104
4.3 RDF-GL
108
4.4 SPARQLinG
125
4.5 Conclusions and Further Research
130
References
131
Semantics-Based Intelligent Indexing and Retrieval of Digital Images – A Case Study
133
5.1 Introduction
133
5.2 SemanticWeb
135
5.3 Case Study
136
5.4 Ontology Development
137
5.5 Image Annotation
141
5.6 Image Retrieval
142
5.7 Query Expansion
144
5.8 Conclusions
148
References
149
Harvesting Intelligence in Multimedia Social Tagging Systems
151
6.1 Introduction
151
6.2 Multimedia Content Annotation
153
6.3 State of the Art
156
6.4 Content and Tag-Based Clustering Approach
160
6.5 Experimental Results
167
6.6 Use Cases – Scenarios
174
6.7 Conclusions
176
6.8 Appendix
176
References
180
User Profiles Modeling in Information Retrieval Systems
184
7.1 Introduction
184
7.2 Information Retrieval
186
7.3 Evolutionary Computation
194
7.4 Evolutionary Techniques and Fuzzy Logic Principles in IRS
198
7.5 Experimental Evaluation
203
7.6 Conclusion
211
References
211
Human–Web Interactions
214
8.1 Introduction
215
8.2 Data Collection
217
8.3 Case Study: Data and Intranet Portal
219
8.4 Preprocessing
221
8.5 Analysis
222
8.6 Modeling
232
8.7 Applications
235
8.8 Conclusions and Future Trends
245
References
246
Web Recommender Agents with Inductive Learning Capabilities
248
9.1 Introduction
248
9.2 RelatedWork
253
9.3 CILWEB Knowledge Representation: Ontology and Agent Profile
255
9.4 Connectionist Representation of Agent’s Profile
265
9.5 Implication-BasedWeb Recommendations
271
9.6 Evaluation of CILWEB
274
9.7 Conclusions
277
Appendix: The Rules-Network Translation Method
278
References
280
Capturing the Semantics of User Interaction: A Review and Case Study
283
10.1 Introduction
283
10.2 Survey of Collaborative Filtering and Long-Term Learning
287
10.3 Unifying Interaction Domains
302
10.4 Long-Term Learning in Image Retrieval: A Case Study
304
10.5 Conclusion
309
References
310
Analysis of Usage Patterns in Large Multimedia Websites
314
11.1 Introduction
314
11.2 Overview of the Proposed Approach
318
11.3 Introduction to the Skyserver
319
11.4 Analysis of Usage Patterns
320
11.5 Case Studies and Experiments
328
11.6 Conclusions
331
References
332
An Adaptation Framework forWeb Multimedia Presentations
334
12.1 Introduction
335
12.2 Related Work
337
12.3 Spatio-Temporal Representation
338
12.4 Spatio-Temporal Reasoning
343
12.5 Framework for Multimedia Adaptation by substitution
343
12.6 Conflicts
349
12.7 Conclusion and Perspectives
352
References
352
A Multifactor Secure Authentication System for Wireless Payment
354
13.1 Introduction
354
13.2 Background and RelatedWork
356
13.3 Multifactor Authentication Approach
358
13.4 Secure Web Authentication Protocol
360
13.5 System for Two Way Authentication
365
13.6 Implementation Issues
370
13.7 Analysis of Various Internet Threats
372
13.8 Advantages
380
13.9 Conclusion
380
References
381
A Lightweight Authentication Protocol for Web Applications in Mobile Environments
383
14.1 Introduction
383
14.2 Preliminary Notions and Notations
384
14.3 An Overview on the Previous Literature
387
14.4 The Authentication Protocol
389
14.5 Security Analysis of the Proposed Protocols
392
14.6 Pseudo Random Number Generation
394
14.7 Security Analysis of the Proposed PRN Generator
397
14.8 Conclusions
401
References
401
Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses
404
15.1 Introduction
404
15.2 Related Work
406
15.3 A Framework of the Proposed Model
408
15.4 Implementation
417
15.5 Conclusion and Future Work
423
References
423
Security in Distributed Collaborative Environments: Limitations and Solutions
425
16.1 Introduction
425
16.2 Uses Cases
427
16.3 Related Work
429
16.4 The Chameleon Architecture
436
16.5 The Distrust Model
440
16.6 Establishing Trust Beliefs Based on Disposition to Trust
444
16.7 X316: Morph Access Pass Certificate
449
16.8 Conclusion and Discussion
460
References
461
A Low-Cost and Secure Solution for e- Commerce
465
17.1 Introduction
465
17.2 The Proposed Solution
468
17.3 Security Analysis
473
17.4 Conclusion and Perspectives
478
References
479
Hyperchaotic Encryption for Secure E-Mail Communication
480
18.1 Introduction
480
18.2 Description
482
18.3 Hyperchaotic Cryptosystem
482
18.4 Output Synchronization of Hyperchaotic Maps
484
18.5 Output Synchronization of Hyperchaotic Rössler Maps
488
18.6 Secure Chaotic Encryption
490
18.7 Conclusions
493
References
493
Index
496
All prices incl. VAT