Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

4,542 Full-Text Articles 5,009 Authors 1,167,439 Downloads 161 Institutions

All Articles in Databases and Information Systems

Faceted Search

4,542 full-text articles. Page 161 of 162.

Understanding Events Through Analysis Of Social Media, Amit P. Sheth, Hemant Purohit, Ashutosh Sopan Jadhav, Pavan Kapanipathi, Lu Chen 2010 Wright State University - Main Campus

Understanding Events Through Analysis Of Social Media, Amit P. Sheth, Hemant Purohit, Ashutosh Sopan Jadhav, Pavan Kapanipathi, Lu Chen

Kno.e.sis Publications

Users are sharing vast amounts of social data through social networking platforms accessible by Web and increasingly via mobile devices. This opens an exciting opportunity to extract social perceptions as well as obtain insights relevant to events around us. We discuss the significant need and opportunity for analyzing event-centric user generated content on social networks, present some of the technical challenges and our approach to address them. This includes aggregating social data related to events of interest, along with Web resources (news, Wikipedia pages, multimedia) related to an event of interest, and supporting analysis along spatial, temporal, thematic, and sentiment ...


Automated Isolation Of Translational Efficiency Bias That Resists The Confounding Effect Of Gc(At)-Content, Douglas W. Raiford, Dan E. Krane, Travis E. Doom, Michael L. Raymer 2010 Wright State University - Main Campus

Automated Isolation Of Translational Efficiency Bias That Resists The Confounding Effect Of Gc(At)-Content, Douglas W. Raiford, Dan E. Krane, Travis E. Doom, Michael L. Raymer

Kno.e.sis Publications

Genomic sequencing projects are an abundant source of information for biological studies ranging from the molecular to the ecological in scale; however, much of the information present may yet be hidden from casual analysis. One such information domain, trends in codon usage, can provide a wealth of information about an organism's genes and their expression. Degeneracy in the genetic code allows more than one triplet codon to code for the same amino acid, and usage of these codons is often biased such that one or more of these synonymous codons is preferred. Detection of this bias is an important ...


Approximate Instance Retrieval On Ontologies, Tuvshintur Tserendorj, Stephan Grimm, Pascal Hitzler 2010 Wright State University - Main Campus

Approximate Instance Retrieval On Ontologies, Tuvshintur Tserendorj, Stephan Grimm, Pascal Hitzler

Computer Science and Engineering Faculty Publications

With the development of more expressive description logics (DLs) for the Web Ontology Language OWL the question arises how we can properly deal with the high computational complexity for efficient reasoning. In application cases that require scalable reasoning with expressive ontologies, non-standard reasoning solutions such as approximate reasoning are necessary to tackle the intractability of reasoning in expressive DLs. In this paper, we are concerned with the approximation of the reasoning task of instance retrieval on DL knowledge bases, trading correctness of retrieval results for gain of speed. We introduce our notion of an approximate concept extension and we provide ...


Continuous Semantics To Analyze Real-Time Data, Amit P. Sheth, Christopher Thomas, Pankaj Mehra 2010 Wright State University - Main Campus

Continuous Semantics To Analyze Real-Time Data, Amit P. Sheth, Christopher Thomas, Pankaj Mehra

Kno.e.sis Publications

Increasingly we are presented with dynamic domains involved in social, mobile, and sensor webs. Such domains are spontaneous (arising suddenly), follow a period of rapid evolution, involving real-time or near real-time data, involve many distributed participants and diverse viewpoints involving topical or contentious subjects, and involve feature context colored by local knowledge and sociocultural backgrounds. This article present continuous semantics can help us model such dynamic domains and analyze the related real-time data. Capabilities include crating dynamic domain model by mining social data, and using dynamic models for semantic analysis of real-time data.


Supporting Multiple Paths To Objects In Information Hierarchies: Faceted Classification, Faceted Search, And Symbolic Links, Saverio Perugini 2010 University of Dayton

Supporting Multiple Paths To Objects In Information Hierarchies: Faceted Classification, Faceted Search, And Symbolic Links, Saverio Perugini

Computer Science Faculty Publications

We present three fundamental, interrelated approaches to support multiple access paths to each terminal object in information hierarchies: faceted classification, faceted search, and web directories with embedded symbolic links. This survey aims to demonstrate how each approach supports users who seek information from multiple perspectives. We achieve this by exploring each approach, the relationships between these approaches, including tradeoffs, and how they can be used in concert, while focusing on a core set of hypermedia elements common to all. This approach provides a foundation from which to study, understand, and synthesize applications which employ these techniques. This survey does not ...


Updated Bus Routes And Text Messaging System For San Luis Obispo Public Transit System Web Application, Matthew Bojorquez 2010 California Polytechnic State University - San Luis Obispo

Updated Bus Routes And Text Messaging System For San Luis Obispo Public Transit System Web Application, Matthew Bojorquez

Computer Engineering

As gas prices continue to rise and people become more aware of their carbon footprint, public transportation becomes more economically, environmentally, and sustainably viable. Currently, bus route timetables are available inside buses and at the transit center, but many users have little knowledge of how to read them. Therefore, to entice more people into using public transportation, we must make riding the buses less of a hassle for users. The Efficient Deployment of Advanced Public Transportation Systems (EDAPTS) system attempts to accomplish this. Building upon a web application designed by Jeff Tikkanen, a former Cal Poly student, that places bus ...


A Primer On Digital Object Identifiers For Law Librarians, Benjamin J. Keele 2010 Indiana University - Purdue University Indianapolis

A Primer On Digital Object Identifiers For Law Librarians, Benjamin J. Keele

Library Staff Publications

No abstract provided.


Early Detection Of Online Auction Opportunistic Sellers Through The Use Of Negative-Positive Feedback, Gregory J. Reinert 2010 Nova Southeastern University

Early Detection Of Online Auction Opportunistic Sellers Through The Use Of Negative-Positive Feedback, Gregory J. Reinert

CCE Theses and Dissertations

Apparently fraud is a growth industry. The monetary losses from Internet fraud have increased every year since first officially reported by the Internet Crime Complaint Center (IC3) in 2000. Prior research studies and third-party reports of fraud show rates substantially higher than eBay’s reported negative feedback rate of less than 1%. The conclusion is most buyers are withholding reports of negative feedback.

Researchers Nikitov and Stone in a forensic case study of a single opportunistic eBay seller found buyers sometimes embedded negative comments in positive feedback as a means of avoiding retaliation from sellers and damage to their reputation ...


Mining Antagonistic Communities From Social Networks, Kuan ZHANG 2010 Singapore Management University

Mining Antagonistic Communities From Social Networks, Kuan Zhang

Dissertations and Theses Collection (Open Access)

In this thesis, we examine the problem of mining antagonistic communities from social networks. In social networks, people with opposite opinions normally behave differently and form sub-communities each of which containing people sharing some common behaviors. In one scenario, people with opposite opinions show differences in their views on a set of items. Another scenario is people explicitly expressing whom they agree with, like or trust as well as whom they disagree with, dislike or distrust. We defined the indirect and direct antagonistic groups based on the two scenarios. We have developed algorithms to mine the two types of antagonistic ...


Comparing The Effects Of Two Asynchronous Teaching Methods, Wikis And Eboards, On Spanish Students' Cultural Proficiency, Kristopher D. Muir 2010 Walden University

Comparing The Effects Of Two Asynchronous Teaching Methods, Wikis And Eboards, On Spanish Students' Cultural Proficiency, Kristopher D. Muir

Walden Dissertations and Doctoral Studies

Culture tends to be misplaced as a secondary instructional goal in most foreign language classrooms. Although research has suggested that a strong link exists between language and culture, the problem resides in how best to teach culture in the classroom. While this problem impacts all learners, it may affect high school students more because they are entering a multilingual and multicultural world through higher education, study abroad, and employment. Based on Moran's conceptual framework of culture, this study addressed a gap in the literature by examining the effects of 2 innovative technologies, wikis and eBoards, and their potential to ...


Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle 2010 Technological University Dublin

Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle

Conference papers

The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed ...


A Structural Equation Model Of The Factors Associated With Influence And Power Of It Departments And Their Relationship To Firm's It Orientation And Business Performance, Raghu V. Kowshik 2010 Walden University

A Structural Equation Model Of The Factors Associated With Influence And Power Of It Departments And Their Relationship To Firm's It Orientation And Business Performance, Raghu V. Kowshik

Walden Dissertations and Doctoral Studies

Although few firms can function without an information technology (IT) department, senior executives often consider IT as secondary. Historically, studies have found IT departments to have low influence and power status compared to other departments. Few, if any, studies have investigated what factors contribute to this subservient position. Three research questions that inspired this study regarding the IT department's influence and power included factors that shape the IT influence and power, the consequences for the firm's IT orientation and business performance, and how firm's IT orientation affects business performance. This quantitative study explored the notion that accountability ...


The Use Of Human Patient Simulators To Enhance The Clinical Decision Making Of Nursing Students, Sharon Kay Powell-Laney 2010 Walden University

The Use Of Human Patient Simulators To Enhance The Clinical Decision Making Of Nursing Students, Sharon Kay Powell-Laney

Walden Dissertations and Doctoral Studies

One of the newest teaching modalities in nursing education is the use of human patient simulators (HPS). An HPS simulation scenario creates a software program vignette in which students interact with a manikin to practice caring for critical patients in a risk-free environment. Although used extensively in schools of nursing, there is little research that examines if these expensive simulators improve the clinical decision-making ability of nursing students. The purpose of this experimental differentiated treatment study was to assess if HPS technology leads to increased clinical decision-making ability and clinical performance more than the teaching modality of a paper and ...


A Correlational Study Of Telework Frequency, Information Communication Technology, And Job Satisfaction Of Home-Based Teleworkers, Shana P. Webster-Trotman 2010 Walden University

A Correlational Study Of Telework Frequency, Information Communication Technology, And Job Satisfaction Of Home-Based Teleworkers, Shana P. Webster-Trotman

Walden Dissertations and Doctoral Studies

In 2008, 33.7 million Americans teleworked from home. The Telework Enhancement Act (S. 707) and the Telework Improvements Act (H.R. 1722) of 2009 were designed to increase the number of teleworkers. The research problem addressed was the lack of understanding of factors that influence home-based teleworkers' job satisfaction. Job dissatisfaction has been found to have a significant impact on voluntary turnover. The purpose of the study was to assess the relationship among telework frequency, information communication technology (ICT), and job satisfaction. The research questions were designed to answer whether correlational relationships exist among telework frequency, ICT, and job ...


Anonymous Query Processing In Road Networks, Kyriakos MOURATIDIS, Man Lung YIU 2010 Singapore Management University

Anonymous Query Processing In Road Networks, Kyriakos Mouratidis, Man Lung Yiu

Research Collection School Of Information Systems

The increasing availability of location-aware mobile devices has given rise to a flurry of location-based services (LBSs). Due to the nature of spatial queries, an LBS needs the user position in order to process her requests. On the other hand, revealing exact user locations to a (potentially untrusted) LBS may pinpoint their identities and breach their privacy. To address this issue, spatial anonymity techniques obfuscate user locations, forwarding to the LBS a sufficiently large region instead. Existing methods explicitly target processing in the euclidean space and do not apply when proximity to the users is defined according to network distance ...


Keep It Simple With Time: A Reexamination Of Probabilistic Topic Detection Models, Qi HE, Kuiyu CHANG, Ee Peng LIM, Arindam Banerjee 2010 Pennsylvania State University

Keep It Simple With Time: A Reexamination Of Probabilistic Topic Detection Models, Qi He, Kuiyu Chang, Ee Peng Lim, Arindam Banerjee

Research Collection School Of Information Systems

Topic detection (TD) is a fundamental research issue in the Topic Detection and Tracking (TDT) community with practical implications; TD helps analysts to separate the wheat from the chaff among the thousands of incoming news streams. In this paper, we propose a simple and effective topic detection model called the temporal Discriminative Probabilistic Model (DPM), which is shown to be theoretically equivalent to the classic vector space model with feature selection and temporally discriminative weights. We compare DPM to its various probabilistic cousins, ranging from mixture models like von-Mises Fisher (vMF) to mixed membership models like Latent Dirichlet Allocation (LDA ...


Trust-Oriented Composite Service Selection With Qos Constraints, Lei LI, Yang WANG, Ee Peng LIM 2010 Singapore Management University

Trust-Oriented Composite Service Selection With Qos Constraints, Lei Li, Yang Wang, Ee Peng Lim

Research Collection School Of Information Systems

In Service-Oriented Computing (SOC) environments, service clients interact with service providers for consuming services. From the viewpoint of service clients, the trust level of a service or a service provider is a critical factor to consider in service selection, particularlywhen a client is looking for a service from a large set of services or service providers. However, a invoked service may be composed of other services. The complex invocations in composite services greatly increase the complexity of trust-oriented service selection. In this paper, we propose novel approaches for composite service representation, trust evaluation and trust-oriented com-posite service selection (with QoS ...


The Role Of An Effective It Intervention For Microenterprises, Changsoo Song, Sajda Qureshi 2010 University of Nebraska at Omaha

The Role Of An Effective It Intervention For Microenterprises, Changsoo Song, Sajda Qureshi

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Information technology (IT) interventions for micro-enterprises are fragmented and their approach lacks theoretical foundations. While various researchers have conducted studies on the effects of IT adoption in micro-enterprises, little research has been conducted to explain critical aspects of an effective IT intervention for micro-enterprises from a theoretical perspective. This study aims to fill this gap and empirically investigate how IT interventions can effectively facilitate the process of IT adoption by micro-enterprises. This paper suggests that effective IT interventions may have considerable potential for facilitating IT adoption among micro-enterprises across the United States and the world. Following an analysis of four ...


Information Technology Adoption In Latin American Microenterprises, Travis Good, Mehruz Kamal, Sajda Qureshi, Nancy Jimenez 2010 University of Nebraska at Omaha

Information Technology Adoption In Latin American Microenterprises, Travis Good, Mehruz Kamal, Sajda Qureshi, Nancy Jimenez

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

The majority of businesses in developing regions across the world are microenterprises. In recent years, this form of business has been particularly resilient to economic downturns. While microenterprises are the least likely to succeed, when they do, their growth increases by a factor of 3.4% when they adopt technology. However, the challenges faced by microenterprises make it very difficult for them to adopt technology successfully. Existing theoretical models of ICT adoption have centered on intent to adopt in large organizations, and thus lack applicability to microenterprises, wherein the intent to adopt is an individual decision. This paper builds on ...


Questioning Cultural Commons, Lawrence B. Solum 2010 Georgetown University Law Center

Questioning Cultural Commons, Lawrence B. Solum

Georgetown Law Faculty Publications and Other Works

In Constructing Commons in the Cultural Environment, Michael J. Madison, Brett M. Frischmann, and Katherine J. Strandburg offer an innovative and attractive vision of the future of cultural and scientific knowledge through the construction of “cultural commons,” which they define as “environments for developing and distributing cultural and scientific knowledge through institutions that support pooling and sharing that knowledge in a managed way.” The kind of “commons” they have in mind is modeled on the complex arrangement of social norms that allocate lobstering rights among fishermen in Maine and extends to arrangements such as patent pools, open-source software development (e ...


Digital Commons powered by bepress