Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Selected Works

2008

Information Systems

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael May 2008

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

Professor Katina Michael

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


The Need For A Digital Aid Framework In Humanitarian Relief, J. Sargent, Katina Michael May 2008

The Need For A Digital Aid Framework In Humanitarian Relief, J. Sargent, Katina Michael

Professor Katina Michael

Humanitarian relief organizations are increasingly becoming reliant upon the use of Information Technology & Telecommunications (IT&T) for the distribution of aid to refugees and Internally Displaced Persons (IDP) throughout the world. Traditionally, basic telecommunications infrastructure like the public switch telephone network (PSTN) has been used to transmit important information but today humanitarian relief organizations are attempting to utilize emerging technologies such as global positioning systems (GPS) telephones and geographic information systems (GIS). For the greater part IT&T utilization by relief organizations has happened in an ad-hoc manner in response to specific events. This paper proposes the use of a complete …


The Use Of Information And Communication Technology For The Preservation Of Aboriginal Culture: The Badimaya People Of Western Australia, Katina Michael, L. Dunn May 2008

The Use Of Information And Communication Technology For The Preservation Of Aboriginal Culture: The Badimaya People Of Western Australia, Katina Michael, L. Dunn

Professor Katina Michael

Information and Communication Technology (ICT) has been applied successfully to numerous remote Indigenous communities around the world. The greatest gains have been made when requirements have been first defined by Indigenous members of the community then pattern matched to an ICT solution.


A Unified Approach For Schema Matching, Coreference And Canonicalization, Michael Wick, Khashayar Rohanimanesh, Karl Schultz, Andrew Mccallum Jan 2008

A Unified Approach For Schema Matching, Coreference And Canonicalization, Michael Wick, Khashayar Rohanimanesh, Karl Schultz, Andrew Mccallum

Andrew McCallum

The automatic consolidation of database records from many heterogeneous sources into a single repository requires solving several information integration tasks. Although tasks such as coreference, schema matching, and canonicalization are closely related, they are most commonly studied in isolation. Systems that do tackle multiple integration problems traditionally solve each independently, allowing errors to propagate from one task to another. In this paper, we describe a discriminatively-trained model that reasons about schema matching, coreference, and canonicalization jointly. We evaluate our model on a real-world data set of people and demonstrate that simultaneously solving these tasks reduces errors over a cascaded or …


Unsupervised Deduplication Using Cross-Field Dependencies, Robert Hall, Charles Sutton, Andrew Mccallum Jan 2008

Unsupervised Deduplication Using Cross-Field Dependencies, Robert Hall, Charles Sutton, Andrew Mccallum

Andrew McCallum

Recent work in deduplication has shown that collective deduplication of different attribute types can improve performance. But although these techniques cluster the attributes collectively, they do not model them collectively. For example, in citations in the research literature, canonical venue strings and title strings are dependent---because venues tend to focus on a few research areas---but this dependence is not modeled by current unsupervised techniques. We call this dependence between fields in a record a cross-field dependence. In this paper, we present an unsupervised generative model for the deduplication problem that explicitly models cross-field dependence. Our model uses a single set …