Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

4,509 Full-Text Articles 4,962 Authors 1,167,439 Downloads 161 Institutions

All Articles in Databases and Information Systems

Faceted Search

4,509 full-text articles. Page 160 of 161.

Supporting Multiple Paths To Objects In Information Hierarchies: Faceted Classification, Faceted Search, And Symbolic Links, Saverio Perugini 2010 University of Dayton

Supporting Multiple Paths To Objects In Information Hierarchies: Faceted Classification, Faceted Search, And Symbolic Links, Saverio Perugini

Computer Science Faculty Publications

We present three fundamental, interrelated approaches to support multiple access paths to each terminal object in information hierarchies: faceted classification, faceted search, and web directories with embedded symbolic links. This survey aims to demonstrate how each approach supports users who seek information from multiple perspectives. We achieve this by exploring each approach, the relationships between these approaches, including tradeoffs, and how they can be used in concert, while focusing on a core set of hypermedia elements common to all. This approach provides a foundation from which to study, understand, and synthesize applications which employ these techniques. This survey does not ...


Updated Bus Routes And Text Messaging System For San Luis Obispo Public Transit System Web Application, Matthew Bojorquez 2010 California Polytechnic State University - San Luis Obispo

Updated Bus Routes And Text Messaging System For San Luis Obispo Public Transit System Web Application, Matthew Bojorquez

Computer Engineering

As gas prices continue to rise and people become more aware of their carbon footprint, public transportation becomes more economically, environmentally, and sustainably viable. Currently, bus route timetables are available inside buses and at the transit center, but many users have little knowledge of how to read them. Therefore, to entice more people into using public transportation, we must make riding the buses less of a hassle for users. The Efficient Deployment of Advanced Public Transportation Systems (EDAPTS) system attempts to accomplish this. Building upon a web application designed by Jeff Tikkanen, a former Cal Poly student, that places bus ...


A Primer On Digital Object Identifiers For Law Librarians, Benjamin J. Keele 2010 Indiana University - Purdue University Indianapolis

A Primer On Digital Object Identifiers For Law Librarians, Benjamin J. Keele

Library Staff Publications

No abstract provided.


Early Detection Of Online Auction Opportunistic Sellers Through The Use Of Negative-Positive Feedback, Gregory J. Reinert 2010 Nova Southeastern University

Early Detection Of Online Auction Opportunistic Sellers Through The Use Of Negative-Positive Feedback, Gregory J. Reinert

CCE Theses and Dissertations

Apparently fraud is a growth industry. The monetary losses from Internet fraud have increased every year since first officially reported by the Internet Crime Complaint Center (IC3) in 2000. Prior research studies and third-party reports of fraud show rates substantially higher than eBay’s reported negative feedback rate of less than 1%. The conclusion is most buyers are withholding reports of negative feedback.

Researchers Nikitov and Stone in a forensic case study of a single opportunistic eBay seller found buyers sometimes embedded negative comments in positive feedback as a means of avoiding retaliation from sellers and damage to their reputation ...


Database Security: What Students Need To Know, Meg C. Murray 2010 Kennesaw State University

Database Security: What Students Need To Know, Meg C. Murray

Faculty Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an understanding ...


Cbtv: Visualising Case Bases For Similarity Measure Design And Selection, Brian Mac Namee, Sarah Jane Delany 2010 Technological University Dublin

Cbtv: Visualising Case Bases For Similarity Measure Design And Selection, Brian Mac Namee, Sarah Jane Delany

Conference papers

In CBR the design and selection of similarity measures is paramount. Selection can benefit from the use of exploratory visualisation- based techniques in parallel with techniques such as cross-validation ac- curacy comparison. In this paper we present the Case Base Topology Viewer (CBTV) which allows the application of different similarity mea- sures to a case base to be visualised so that system designers can explore the case base and the associated decision boundary space. We show, using a range of datasets and similarity measure types, how the idiosyncrasies of particular similarity measures can be illustrated and compared in CBTV allowing ...


Mining Antagonistic Communities From Social Networks, Kuan ZHANG 2010 Singapore Management University

Mining Antagonistic Communities From Social Networks, Kuan Zhang

Dissertations and Theses Collection (Open Access)

In this thesis, we examine the problem of mining antagonistic communities from social networks. In social networks, people with opposite opinions normally behave differently and form sub-communities each of which containing people sharing some common behaviors. In one scenario, people with opposite opinions show differences in their views on a set of items. Another scenario is people explicitly expressing whom they agree with, like or trust as well as whom they disagree with, dislike or distrust. We defined the indirect and direct antagonistic groups based on the two scenarios. We have developed algorithms to mine the two types of antagonistic ...


The Identification, Development And Application Of Information Culture In The Western Australian Public Sector, Janine Douglas 2010 Edith Cowan University

The Identification, Development And Application Of Information Culture In The Western Australian Public Sector, Janine Douglas

Theses: Doctorates and Masters

Information can be found in government departments in many forms. It exists, for example, as performance indicators, statistics, economic analysis, policy advice, political know-how or opinions. Using information is a daily and oft repeated activity in government departments. Information is central to the achievement of outcomes and the delivery of services. It is critical to the government’s success in the information economy. It is central to the development of products and services. It supports policy making and it underpins accountability. Government departments are built on the generation and use of information that is relevant to the largest of all ...


Inside The Selection Box: Visualising Active Learning Selection Strategies, Brian Mac Namee, Rong Hu, Sarah Jane Delany 2010 Technological University Dublin

Inside The Selection Box: Visualising Active Learning Selection Strategies, Brian Mac Namee, Rong Hu, Sarah Jane Delany

Conference papers

Visualisations can be used to provide developers with insights into the inner workings of interactive machine learning techniques. In active learning, an inherently interactive machine learning technique, the design of selection strategies is the key research question and this paper demonstrates how spring model based visualisations can be used to provide insight into the precise operation of various selection strategies. Using sample datasets, this paper provides detailed examples of the differences between a range of selection strategies.


The Use Of Human Patient Simulators To Enhance The Clinical Decision Making Of Nursing Students, Sharon Kay Powell-Laney 2010 Walden University

The Use Of Human Patient Simulators To Enhance The Clinical Decision Making Of Nursing Students, Sharon Kay Powell-Laney

Walden Dissertations and Doctoral Studies

One of the newest teaching modalities in nursing education is the use of human patient simulators (HPS). An HPS simulation scenario creates a software program vignette in which students interact with a manikin to practice caring for critical patients in a risk-free environment. Although used extensively in schools of nursing, there is little research that examines if these expensive simulators improve the clinical decision-making ability of nursing students. The purpose of this experimental differentiated treatment study was to assess if HPS technology leads to increased clinical decision-making ability and clinical performance more than the teaching modality of a paper and ...


A Correlational Study Of Telework Frequency, Information Communication Technology, And Job Satisfaction Of Home-Based Teleworkers, Shana P. Webster-Trotman 2010 Walden University

A Correlational Study Of Telework Frequency, Information Communication Technology, And Job Satisfaction Of Home-Based Teleworkers, Shana P. Webster-Trotman

Walden Dissertations and Doctoral Studies

In 2008, 33.7 million Americans teleworked from home. The Telework Enhancement Act (S. 707) and the Telework Improvements Act (H.R. 1722) of 2009 were designed to increase the number of teleworkers. The research problem addressed was the lack of understanding of factors that influence home-based teleworkers' job satisfaction. Job dissatisfaction has been found to have a significant impact on voluntary turnover. The purpose of the study was to assess the relationship among telework frequency, information communication technology (ICT), and job satisfaction. The research questions were designed to answer whether correlational relationships exist among telework frequency, ICT, and job ...


Comparing The Effects Of Two Asynchronous Teaching Methods, Wikis And Eboards, On Spanish Students' Cultural Proficiency, Kristopher D. Muir 2010 Walden University

Comparing The Effects Of Two Asynchronous Teaching Methods, Wikis And Eboards, On Spanish Students' Cultural Proficiency, Kristopher D. Muir

Walden Dissertations and Doctoral Studies

Culture tends to be misplaced as a secondary instructional goal in most foreign language classrooms. Although research has suggested that a strong link exists between language and culture, the problem resides in how best to teach culture in the classroom. While this problem impacts all learners, it may affect high school students more because they are entering a multilingual and multicultural world through higher education, study abroad, and employment. Based on Moran's conceptual framework of culture, this study addressed a gap in the literature by examining the effects of 2 innovative technologies, wikis and eBoards, and their potential to ...


Questioning Cultural Commons, Lawrence B. Solum 2010 Georgetown University Law Center

Questioning Cultural Commons, Lawrence B. Solum

Georgetown Law Faculty Publications and Other Works

In Constructing Commons in the Cultural Environment, Michael J. Madison, Brett M. Frischmann, and Katherine J. Strandburg offer an innovative and attractive vision of the future of cultural and scientific knowledge through the construction of “cultural commons,” which they define as “environments for developing and distributing cultural and scientific knowledge through institutions that support pooling and sharing that knowledge in a managed way.” The kind of “commons” they have in mind is modeled on the complex arrangement of social norms that allocate lobstering rights among fishermen in Maine and extends to arrangements such as patent pools, open-source software development (e ...


Recommender System For Audio Recordings, Jong Seo Lee 2010 California Polytechnic State University - San Luis Obispo

Recommender System For Audio Recordings, Jong Seo Lee

Master's Theses and Project Reports

Nowadays the largest E-commerce or E-service websites offer millions of products for sale. A Recommender system is defined as software used by such websites for recommending commercial or noncommercial product items to users according to the users’ tastes. In this project, we develop a recommender system for a private multimedia web service company. In particular, we devise three recommendation engines using different data filtering methods – named weighted-average, K-nearest neighbors, and item-based – which are based on collaborative filtering techniques, which work by recording user preferences on items and by anticipating the future likes and dislikes of users by comparing the records ...


Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle 2010 Technological University Dublin

Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle

Conference papers

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed ...


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn 2010 Technological University Dublin

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher ...


Modeling Anticipatory Event Transitions, He QI, Kuiyu CHANG, Ee Peng LIM 2010 Nanyang Technological University

Modeling Anticipatory Event Transitions, He Qi, Kuiyu Chang, Ee Peng Lim

Research Collection School Of Information Systems

Major world events such as terrorist attacks, natural disasters, wars, etc. typically progress through various representative stages/states in time. For example, a volcano eruption could lead to earthquakes, tsunamis, aftershocks, evacuation, rescue efforts, international relief support, rebuilding, and resettlement, etc. By analyzing various types of catastrophical and historical events, we can derive corresponding event transition models to embed useful information at each state. The knowledge embedded in these models can be extremely valuable. For instance, a transition model of the 1918-1920 flu pandemic could be used for the planning and allocation of resources to decisively respond to future occurrences ...


Census 2010 And Human Services And Community Development, Mark Salling, Jenita McGowan 2010 Cleveland State University

Census 2010 And Human Services And Community Development, Mark Salling, Jenita Mcgowan

Urban Publications

Census 2010 and Human Services and Community Development, Planning & Action, The Center for Community Solutions, Vol. 63, No. 2 (March), 2010, pp 1-4.


Dual Phase Learning For Large Scale Video Gait Recognition, Jialie SHEN, Hwee Hwa PANG, Dacheng TAO, Xuelong LI 2010 Singapore Management University

Dual Phase Learning For Large Scale Video Gait Recognition, Jialie Shen, Hwee Hwa Pang, Dacheng Tao, Xuelong Li

Research Collection School Of Information Systems

Accurate gait recognition from video is a complex process involving heterogenous features, and is still being developed actively. This article introduces a novel framework, called GC2F, for effective and efficient gait recognition and classification. Adopting a ”refinement-and-classification” principle, the framework comprises two components: 1) a classifier to generate advanced probabilistic features from low level gait parameters; and 2) a hidden classifier layer (based on multilayer perceptron neural network) to model the statistical properties of different subject classes. To validate our framework, we have conducted comprehensive experiments with a large test collection, and observed significant improvements in identification accuracy relative to ...


Anonymous Query Processing In Road Networks, Kyriakos MOURATIDIS, Man Lung YIU 2010 Singapore Management University

Anonymous Query Processing In Road Networks, Kyriakos Mouratidis, Man Lung Yiu

Research Collection School Of Information Systems

The increasing availability of location-aware mobile devices has given rise to a flurry of location-based services (LBSs). Due to the nature of spatial queries, an LBS needs the user position in order to process her requests. On the other hand, revealing exact user locations to a (potentially untrusted) LBS may pinpoint their identities and breach their privacy. To address this issue, spatial anonymity techniques obfuscate user locations, forwarding to the LBS a sufficiently large region instead. Existing methods explicitly target processing in the euclidean space and do not apply when proximity to the users is defined according to network distance ...


Digital Commons powered by bepress