Docstoc

Bibliography

Document Sample
Bibliography Powered By Docstoc
					Week 1, #1 (25 Jan 2010 - 31 Jan 2010)
Design Considerations for Web-based Applications
Abstract
The rapid growth of weblications—application-oriented software delivered as a service over the Web—
has revealed a lack of effective guidelines for their design and implementation. Existing Web usability
guidelines hinder weblication usability since they are primarily based on interactions within a browsing
metaphor. Interface design guidelines for client applications, on the other hand, do not address the
conventions of Web users, limitations of the Web environment, nor the new possibilities inherent in the
Web. This paper outlines a set of guidelines for weblication interfaces, which fuse translated client-
application guidelines and re-purposed Web usability guidelines together to form a solid foundation for
weblication interface design. The goal of these recommendations is to address the issues associated
with weblication interface design and to present an overall method for thinking about them,
emphasizing an understanding of how and why this approach should be adopted.

{
@This paper was originally published in the [[http://www.hfes.org/meetings/am-2001.html|2001
Human Factors and Ergonomics Society's Annual Meeting]] proceedings
 author = <Luke Wroblewski & Esa Rantanen>,
 title = <Design Considerations for Web-based Applications>
 year = <2001>
}


Week 1, #2 (25 Jan 2010 - 31 Jan 2010)
An Empirical Study of Web Interface Design on Small Display Devices
Abstract

This paper reports an empirical study that explores the problem of finding a highly-efficient, user-
friendly interface design method on small display devices. We compared
three models using our PDA interface simulator: presentation optimization method, semantic
conversion method, and zooming method.
A controlled experiment has been carried out to identify the pros and cons of each method. The results
show that of the three interface methods, the zooming method is slightly better than the
semantic conversion method, while they both outperform the optimizing presentation method.



{@This paper was originally published
source, ACM International Conference on **Web,2004
   author = " Qiu, K Zhang, M Huang ",
   title= " An Empirical Study of Web Interface Design on Small Display Devices ",
   publisher = " ACM International Conference on **Web,2004",
   year = 2001
   }




                                                   1
Week 2, #1 (1 Feb 2010 - 7 Feb 2010)
Evaluation of Web applications according to intelligence parameters
Abstract

This paper proposes a new approach to evaluate the Web applications. It considers few parameters to
evaluate the intelligence of web applications. Author have classified intelligence into 3 levels-User level which
considers the requirements from the end user definition of intelligence web ;Developer level- the developer
facilities which are related to intelligence and useful in development life cycle process of web; Performance
level which refers to performance of Web application. The parameters considered at each level are considered
to evaluate web as an intelligent application. Some of user level parameters are usability, data mining;
Developer level parameters are Search and query, Intelligence documenting\Visualization, Intelligence in
implementation; Performance level parameters are availability and resource usage. Overall, this paper
describes the parameters required to evaluate web intelligence at each level and offers a good framework or
foundation in developing future web applications.

{@This paper was originally published
source, 2008 International Conferences on Computational Intelligence for Modelling, Control and
Automation
    author = " Alireza Tabatabaei Tabrizi ,Mohsen Sadighi Moshkenani ",
 title= " Evaluation of Web applications according to intelligence parameters ",
 publisher = " IEEE 2008 ",
 year = 2008
 }


Week 2, #2 (1 Feb 2010 - 7 Feb 2010)
Interactive agent-based system for concept-based web search
Abstract

In this paper, authors design an interactive semantic search engine which collects feedback by
means of selection in order to better capture users’ personal concepts . The search algorithm
utilized in this model is an “iteratively cyclic mechanism”, which includes selecting upper classes
and generating lower classes. Selecting upper classes refers to searching for the most suitable web
pages by selecting the individuals from the current population and forming a new population;
generating lower classes refers to the application of a “genetic operator” on upper classes to
generate new lower classes.

{@This paper was originally published
source, Expert Systems with Applications, vol. 24,2003, pp. 365-373.
   author = " W.-P. Lee and T.-C. Tsai ",
   title= " An interactive agent-based system for concept-based web search,",
   publisher = " Expert Systems with Applications, vol. 24",
   year = 2003
   }




                                                        2
Week 3, #1(8 Feb 2010 – 14 Feb 2010)
A smart web query method for semantic retrieval of web data
Abstract

In this paper, authors present a semantic search engine based on the smart web query (SWQ)
method for web data retrieval . The SWQ architecture contains three main parts: SWQ search
engine and its subcomponents: “query parser” and “context ontology determination engine”;
context ontologies for domains of application; a semantic search filter which is to improve search
precision based on retrieving term properties in context ontologies.


{@This paper was originally published
source, Data & Knowledge Engineering,vol. 38, 2001, pp. 63-84
   author = " R. H. L. Chiang, C. E. H. Chua, and V. C. Storey ",
   title= " A smart web query method for semantic retrieval of web data,",
   publisher = " Expert Data & Knowledge Engineering ,vol.38",
   year = 2001
   }


Week 3, #2(8 Feb 2010 – 14 Feb 2010)
Cloud Computing- Benefits, risks and recommendations for information security
Abstract

In this paper, the security assessment of Cloud Computing is based on three use-case scenarios: 1)
SME migration to cloud computing services, 2) the impact of cloud computing on service resilience,
3) cloud computing in e-Government (e.g., eHealth). This paper allows an informed assessment of
the security risks and benefits of using cloud computing - providing security guidance for potential
and existing users of cloud computing. The key conclusion of this paper is that the cloud’s
economies of scale and flexibility are both a friend and a foe from a security point of view.
This paper speaks more about the risks involved and fails to recommend a strategy for information
security in Cloud computing.

{@This paper was originally published
source, Conference Proceedings of ENISA’s Emerging and Future Risk programme
   author = " Daniele Catteddu and Giles Hogben ",
   title= " A Cloud Computing- Benefits, risks and recommendations for
information security ",
   publisher = "The European Network and Information Security Agency(ENISA),
   year = 2009
   }




                                                 3
Week 4, #1 (15 Feb 2010 - 21 Feb 2010)

Above the Clouds: A Berkeley View of Cloud Computing
Abstract

This is a technical report of research study conducted in Berkeley RAD lab for analysis of Cloud
Computing. The report explains about Cloud Computing and in particular about private and public
cloud. According to study conducted, they uncovered the factors of 5 to 7 decrease in cost of
electricity, network bandwidth, operations, software, and hardware. The paper concludes that
construction and operation of extremely large-scale, computer datacenters at lowcost locations was
the key necessary enabler of Cloud Computing. Research predict Cloud Computing will grow, so
developers should take it into account while designing applications. Also, conducted research based
on CC economic models.

{@This paper was originally published
source, Technical Report No. UCB/EECS-2009-28,
http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
   author = " Michael Armbrust et.al",
   title= " Above the Clouds: A Berkeley View of Cloud Computing ",
   publisher = " Electrical Engineering and Computer Sciences
University of California at Berkeley ,Technical Report No. UCB/EECS-2009-28
   year = 2009
   }

Week 4, #2 (15 Feb 2010 - 21 Feb 2010)

Towards Trusted Cloud Computing
Abstract

This is a Research project report conducted by researchers at the Max Planck Institute for Software
Systems. The report provides a good approach on open source CC which I feel anyone could utilize
and modify according to their needs. The Authors have outlined a trusted Cloud Computing
platform that "enables Infrastructure as a Service (IaaS) providers such as Amazon EC2 to provide a
closed box execution environment that guarantees confidential execution of guest virtual
machines." Such a platform would assure customers that service providers haven't been messing
with their data and would enable service providers to secure data even across many VMs. They also
provide details of how cloud providers set up their data centers is held pretty close to the vest, but
base their system on an open source offering called Eucalyptus that they suspect is similar to at
least some commercial implementations. A prototype based on the design is this research team's
next step.

{@This paper was originally published
source, http://www.mpi-sws.org/~gummadi/papers/trusted_cloud.pdf
   author = " Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues",
   title= " Towards Trusted Cloud Computing",
   publisher = " Max Planck Institute for Software Systems
   year = 2009
   }




                                                  4
Week 5, #1 (22 Feb 2010 - 28 Feb 2010)

Does Virtualization Make Disk Scheduling Passé?
Abstract

This paper speaks about Virtual Machines and the various observations the authors examined
during a study on VM. They observed that different scheduler’s in the guest operating system are
optimal for different work-loads and there is no much benefit in throughput from performing
additional I/O reordering in the VMM. the best choice of I/O scheduler in a VMM appears to be a
minimal scheduler based on guest operating system. Overall, this paper presents the potential of
Cloud Computing by evaluating the Virtual Machines.

{@This paper was originally published
source, SOSP Workshop on Hot Topics in Storage and File Systems
(HotStorage'09), Big Sky, MT, October 2009
   author = " David Boutcher and Abhishek Chandra",
   title= " Towards Trusted Cloud Computing",
   publisher = " Department of Computer Science University of Minnesota”
   year = 2009
   }


Week 5, #2 (22 Feb 2010 - 28 Feb 2010)

CloudViews: Communal Data Sharing in Public Clouds

Abstract

This paper takes a different approach relating to Cloud Computing security issues. The Authors see
lots of opportunity in the fact that Web services and applications will be so closely situated. CloudViews
is a Hadoop HBase-supported common storage system being developed by the researchers to facilitate
collaboration through protected inter-service data sharing. The paper suggests that public cloud
providers must facilitate such collaboration -- in the form of data driven, server side mashups -- to
ensure the market's growth through development of new Web services.

{@This paper was originally published
source, Proceedings of the Workshop on Hot Topics in CloudComputing
(HotCloud), San Diego, USA, June 2009.
   author = " Roxana Geambasu Steven D. Gribble Henry M. Levy",
   title= " CloudViews: Communal Data Sharing in Public Clouds",
   publisher = " Proceedings of the Workshop on Hot Topics in CloudComputing
(HotCloud), San Diego, USA, June 2009.”
   year = 2009
   }




                                                    5
Week 6, #1 (1 Mar 2010 - 7 Mar 2010)
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
Abstract

This paper speaks about the problem of hiding access patterns from a storage provider. Not much
work has been done in the area and previous work done was too expensive. The still in progress
access patters allows queries to take on the order of 100s of ms. Some of the cost is due to the
implementation: lack of parallelism and use of Java. The protocol pattern proposed by authors
requires multiple round-trip times, and so the cost would still be too high.

{
source = {CCS '08: Proceedings of the 15th ACM conference on Computer and
communications security},
author = {Williams, Peter and Sion, Radu and Carbunar, Bogdan},
title = {Building castles out of mud: practical access pattern privacy and
correctness on untrusted storage},publisher = {ACM},
year = {2008},
}




Week 6, #2 (1 Mar 2010 - 7 Mar 2010)
TAP: a Semantic Web platform

Abstract

This paper deliver a semantic search engine in TAP – a comprehensive semantic web system .The
query language for semantic search in TAP is called the GetData interface, which allows programs
to visit properties of a resource in a semantic graph. Each graph is referenced by a URL, and
GetData specifies resource name and property name to access to the value of property. Two
additional search interfaces are provided by TAP, which are “Search” which searches for any
properties with titles containing a given string, and “Reflection” which searches for coming
and outgoing tracks for a given node in a semantic graph.
{@This paper was     originally published
   author = " R.     Guha and R. McCool ",
   title= " TAP:     a Semantic Web platform ",
   publisher = "     Computer Networks, vol. 42, 2003, pp. 557-577.”
   year = 2003
   }




                                                  6
Week 7, #1 (8 Mar 2010 - 14 Mar 2010)

Designing a composite e-service platform with recommendation function
Abstract

This paper proposes an e-service platform integrated with semantic search for e-service metadata .
E-service metadata refers to descriptions to e-services and providers, which is to publish and to
discover e-services. There are two types of metadata in the system: business level metadata –
the description of e-service providers, and service level metadata – the description of basic
information about e-service. The authors adopt Universal Description, Discovery and Integration
which is a web service standard to register and search e-services.


{
source = { Computer Standards & Interfaces, vol. 25, 2003, pp. 103-117.},
author = { D.-R. Liu, M. Shen, and C.-T. Liao },
title = { Designing a composite e-service platform with recommendation
function }, year = {2003},
}

Week 7, #2 (8 Mar 2010 - 14 Mar 2010)

Privacy Disclosure: Personal Information and Images on Social Networking Sites in Taiwan
Abstract

This paper names social networking site as double edged sword which extends one’s social network
and at the same time also pose privacy threat. It identifies the privacy risk involved in social
networking sites especially through webalbums and provides some suggestion to protect privacy.
One of leading Taiwan social networking site called Wretch.cc provides weblogs and web albums is
considered for example. Paper illustrates various cases of privacy intrusion through these social
sites. Some of the suggestions are: 1.) any country should have a strict legal Internet Privacy
regulation. 2.) Social networking sites should make users aware about the data which are displayed
to public and user should be notified if anyone needs access to user’s personal data(something like
a request sent to user for accessing personal information) 3.) For protecting web albums, author
suggests Photo Fingerprinting, a combination of watermark and color histogram of the photo and
no-print option. Even though this paper fails to identify all privacy risks involved in social
networking, it suggests simple solutions to most common privacy issues.

{
source = { Ninth Annual International Symposium on Applications and the
Internet},
author = { Chia-Lung Hsieh},
title = Privacy Disclosure: Personal Information and Images on Social
Networking Sites in Taiwan}, year = {2007},
}




                                                 7
Week 8, #1 (22 Mar 2010 - 28 Mar 2010)

An Empirical Evaluation on Semantic Search Performance of Keyword-Based and Semantic Search
Engines: Google, Yahoo, Msn and Hakia

Abstract
This paper compares the performance of three different keyword based search engines and one
semantic search engine. This paper discusses how studies have been conducted for evaluating the
retrieval effectiveness of key word based search engines. It also talks briefly about the performance
of key word based search engines in terms of precision and normalized recall. All the four search
engines (3 key word based and 1 semantic based) that were selected were subjected to ten queries
containing various topics. After each run of the query, the first twenty documents retrieved were
evaluated utilizing binary human relevance judgment and were further classified as “relevant” or
“nonrelevant. Precision and normalized recall ratios of keyword-based search engines were
calculated. Similar recall ratio was calculated for the semantic search engine ‘Hakia’. The results
obtained were really surprising as the key word search engines retrieved more relevant documents
overall in comparison to semantic search engine but semantic search engine retrieved more
relevant documents than all other. Also they generalized those precision ratios of search engines
decreased when the cut off values for calculating the recall ratios increased. Finally they conclude
saying that the performance of semantic search engines was low regardless of the type of search.

{
source = 2009 Fourth International Conference on Internet Monitoring and
Protectio},
author = { Duygu Tümer,Mohammad Ahmed Shah,Yiltan Bitirim },
title = An Empirical Evaluation on Semantic Search Performance of Keyword-
Based and Semantic Search Engines: Google, Yahoo, Msn and Hakia},

year = {2009},

DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/ICIMP.2009.16
}




Week 8, #2 (22 Mar 2010 - 28 Mar 2010)

Ontology of general concept for Semantic Searching

Abstract
This paper presents the importance of general semantic concepts & action for semantic searching.
There are three main factors that affect the performance of the search engine; natural language
recognition, the consummate organization of web information, knowledge and semantic reasoning.
This paper mainly focuses on knowledge organization & semantic reasoning. It also talk about using
ontology to organize text documents wherein knowledge can be represented in a way that
facilitates understanding between computers and humans. The Semantic web usually refers to a

                                                  8
knowledge-based system. It implicitly talks about a strategy for the structure of general concepts to
facilitate search engines to support knowledge sharing from the point of view of both humans and
machines and concludes by talking about ontology combined with facet classification which can
represent all kinds of concepts, particularly, general concepts in different expression.

{
source = 2010 Second International Conference on Computer Modeling and
Simulation},
author = { Lizhen Li, Zhifeng Dong, Keming Xie},
title = Ontology of General Concept for Semantic Searching},

year = {2010},

DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/ICCMS.2010.273
}



Week 9, #1 (28 Mar 2010 - 4 Apr 2010)

The Research of Search Engine Based on Semantic Web

Abstract
In this paper the author has presented the architecture of a semantic search engine, and their work
shows how the fundamental elements of the semantic search engine can be used in the fundamental
task of information retrieval. And then an improved algorithm based on TFIDF algorithm was
proposed to guarantee the retrieve information resources in a more efficient way. Metadat is the
building block between web data and semantic web. Currently, RDF and OWL documents are
forming the semantic web engines.

{
source = Intelligent Information Technology Application Workshops, 2008.
IITAW '08. International Symposium on },
author = { Yi Jin, Zhuying Lin, Hongwei Lin},
title = The Research of Search Engine Based on Semantic Web},

year = {2008},

DOI Bookmark: http://doi.ieeecomputersociety.org/
10.1109/IITA.Workshops.2008.193
}



Week 9, #2 (28 Mar 2010 - 4 Apr 2010)

Semantic-driven Management and Search for Resources in Research Community

Abstract
This paper, establishes a kind of semantic-driven resource management and search model, architecture


                                                  9
and its implementation in research community. Searching with the developed system, query results will
be returned in a more structural way. Besides, the relations among different concepts and instances are
listed explicitly, so the related resource can be acquired conveniently. Based on semantic mechanism,
this paper proposes a kind of semantic-driven resource management and search model, and provides an
implementation for the resources in research community. The paper presents two semantic authoring
tools for domain resources management, upon which, semantic search portal is constructed, which has
three sub-interfaces. In turn, the relationship can be further classified into three sub-types 1.
Relationship between concept and concept 2. Relationship between concept and instance 3.
Relationship between instance and instance.

{
source = Proceedings of the Second International Conference on Semantics,
Knowledge, and Grid},
author = { Junsheng Zhang Zhixian Yan},
title = Semantic-driven Management and Search for Resources in Research
Community},

year = {2006},

DOI Bookmark: http://doi.ieeecomputersociety.org/ 10.1109/SKG.2006.90
}




Week 10, #1 (5 Apr 2010 - 11 Apr 2010)

The Research of Search Engine Based on Semantic Web

Abstract
In this paper the author has presented the architecture of a semantic search engine, and their work
shows how the fundamental elements of the semantic search engine can be used in the fundamental
task of information retrieval. And then an improved algorithm based on TFIDF algorithm was
proposed to guarantee the retrieve information resources in a more efficient way. Metadat is the
building block between web data and semantic web. Currently, RDF and OWL documents are
forming the semantic web engines.

{
source = Intelligent Information Technology Application Workshops, 2008.
IITAW '08. International Symposium on },
author = { Yi Jin, Zhuying Lin, Hongwei Lin},
title = The Research of Search Engine Based on Semantic Web},

year = {2008},

DOI Bookmark: http://doi.ieeecomputersociety.org/
10.1109/IITA.Workshops.2008.193
}


                                                  10
Week 10, #1 (5 Apr 2010 - 11 Apr 2010)

OVERLAP AMONG MAJOR WEB SEARCH ENGINES

Abstract
This paper talks about how previous studies which show some consistencies in Web search engine
performance, overlap and limitations. However, most Web search engine overlap studies were
performed in the 1990’s using small samples of queries. This study examines the overlap among results
retrieved by three major Web search engines for a large set of more than 10,316 queries. The results of
this study also emphasize the fact that major Web search engines (Ask Jeeves, Google and Yahoo!), have
built and developed proprietary methods for indexing the Web and their ranking of query driven search
results differs greatly. This study shows that different Web search engines have different capabilities
and the overlap among Web search engine results is low. These differences contradict the widely held
notion that all Web search engines are the same and that searching one Web engine will yield the
absolute best results. The results also show that a Web meta-search engine provides a unique voice that
combines and filters other voices

{
source = Journal:Internet Research Volume:16 Issue:4 Page:419 – 426,Emerald
Group Publishing Limited
},
author = { Amanda Spink, Bernard J. Jansen, Chris Blakely, Sherry Koshman},
title = OVERLAP AMONG MAJOR WEB SEARCH ENGINES},

year = {2006},

Article URL:http://www.emeraldinsight.com/10.1108/10662240610690034
}

Week 10, #2 (5 Apr 2010 - 11 Apr 2010)

An Ontology-based Methodology for Semantic Expansion Search

Abstract
This paper proposes a novel ontology-based framework for semantic expansion search. Current
search engines face two main disadvantages 1. thousands of irrelevant web pages have been
returned from search engine 2. the display order of search results is rather in confusion

The essential reason of these two issues is that traditional web search lacks semantic
understanding to user’s search behaviors, which results in low recall ratio and precision ratio. It
further suggests that semantic query expansion of user’s keyword, retrieved documents of
semantic expansion search are markedly more than semantic search. Therefore, recall ratio has
obviously improved in comparison with semantic search. Meanwhile, precision ration does not
differ significantly from each other between semantic search and semantic expansion search. In


                                                  11
comparison with full text search and semantic search, semantic expansion search proposed in this
paper can overcome limitations and achieves higher recall ratio and precision ratio.



@inproceedings{1471246,
 author = {Zou, Guobing and Zhang, Bofeng and Gan, Yanglan and Zhang,
Jianwen},
 title = {An Ontology-Based Methodology for Semantic Expansion Search},
 booktitle = {FSKD '08: Proceedings of the 2008 Fifth International
Conference on Fuzzy Systems and Knowledge Discovery},
 year = {2008},
 isbn = {978-0-7695-3305-6},
 pages = {453--457},
 doi = {http://dx.doi.org/10.1109/FSKD.2008.475},
 publisher = {IEEE Computer Society},
 address = {Washington, DC, USA},
 }




Week 11, #1 (12 Apr 2010 - 18 Apr 2010)

Conceptual Architecture for Semantic Search Engine

Abstract
This paper describes a complete conceptual architecture for a semantic search engine. Various
parameters and components needed for the development of a semantic search engine were proposed
with special emphasis on inference engine like CWM and Euler and the use of a relational database for
knowledge storage which would enhance the efficiency of the system. After discussing the effect of
inference engines they suggest the use of prolog as the implementation language as it hads already
been used for logical reasoning for quite some time. Overall the article gives out a detailed description
on the various components like 1. ontology editor, 2. ontology mapper, 3. ontology translator, 4. web
page annotator, 5. ontology crawler,6. web crawler, 7. query builder and 8. knowledge base, along with
their proposed model which would help in eliminating the shortcomings present in the current systems.

{
source = TNMIC 2004},
author = { Qazi Mudassar Ilyas, Yang Zong Kai and Muhammad Adeel Talib},
title = Conceptual Architecture for Semantic Search Engine},
year = {2008},
ieeexplore.ieee.org/iel5/9991/32103/01492956.pdf
}




                                                   12
Week 11, #2 (12 Apr 2010 - 18 Apr 2010)

Semantic Computing, Cloud Computing, and Semantic Search Engine

Abstract
This paper demonstrates how Semantic Search/Computing can benefit Cloud Computing. Semantic
Computing addresses how retrieval of multimedia content may be facilitated by natural language
annotations, how embedded texts may be extracted from images, how programs may be derived from
requirements described in natural language, how security can be added based on contexts, how web
search can be accomplished effectively with a cell phone, etc. Paper describes in detail about 5 layers of
Semantic Computing 1.) Semantic Analysis(which analyses and converts pixels and words to meanings)
2.) Semantic Integration(integrates the content and semantics from different sources with a unified
model) 3.) Semantic Services(utilize the content and semantics to solve specific problems) 4.) Service
Integration(provides the interoperation methods between different services) and finally 5.) Semantic
Interface(that allows the user to access and manipulate the content and semantics of various sources,
eg natural language interface, multi-modal natural language interface and visual interface). After
briefing about Cloud Computing, the paper focuses on how the architecture of Semantic search engines,
the languages of SSE (SNL-interpreter, SQDL and SCDL-matcher, SSE invoker) can be embedded in cloud
Computing and benefit in searching more services offered in cloud. Also, SSE can be used stand-alone in
Cloud as SaaS. The Paper concludes that Semantic Computing helps Cloud Computing grow more rapidly
by utilizing semantic architecture and search engines.
{

@article{10.1109/ICSC.2009.51,
author = {Phillip C.-Y. Sheu and Shu Wang and Qi Wang and Ke Hao and Ray
Paul},
title = {Semantic Computing, Cloud Computing, and Semantic Search Engine},
journal ={International Conference on Semantic Computing},
volume = {0},
isbn = {978-0-7695-3800-6},
year = {2009},
pages = {654-657},
doi = {http://doi.ieeecomputersociety.org/10.1109/ICSC.2009.51},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}




                                                   13
Week 12, #1 (19 Apr 2010 - 25 Apr 2010)

The Research of the Semantic Search Engine based on the Ontology

Abstract
This paper tries to understand and solve the problems of the low query precision and the shortness in
understanding user’s query intention that occur in traditional search engine, a framework of semantic
search engine based on ontology is brought forwards. It need to extract information after the
information crawled by the spider, and an algorithm of information extraction based on ontology is
proposed. By using semantic reasoning which based on ontology, it helps the search engine to
understand user’s query intention. A prototype of search engine is developed by using of lucene, and
the search result is better than that of common search engine. The publication makes full use of the
merit of semantic of ontology, which can quickly get the information which is relevant to user’s
requirement in knowledge base. The author also talks about developing a prototype of search engine by
using of lucene, thisprototype runs in server of AMD with double CPU, the results show the effective and
semantic validity of search engine, but there also exists some problems, such as the search result is not
very good if the semantic of user’s requirement is beyond the range of ontology that they have build;
how to measure the similarity of ontology in query process is another problem.

{

author = { DU Zhi-Qiang, HU Jing, YIHong-Xia, HU Jin-Zhu},
title = { The Research of the Semantic Search Engine based on the Ontology},
journal ={ Wireless Communications, Networking },
 year = {2007},
publisher = {IEEE Computer Society},
http://ieeexplore.ieee.org/iel5/4339774/4339775/04341098.pdf

}


Week 12, #2 (19 Apr 2010 - 25 Apr 2010)

Privacy Protection Issues in Social Networking Sites

Abstract
This work conducts a preliminary study which examines the privacy protection issues on Social
Networking Sites (SNS) such as MySpace, Facebook and LinkedIn. Based on this study, the author
identifies three privacy problems in SNS and propose a Privacy Framework as a foundation to cope with
these problems. The three problems are as follows; 1. SNS do not inform users of the dangers of
divulging their personal information. 2. Privacy tools in SNS are not flexible enough to protect user data.
Most SNS only allow users to make their data either public (available for everyone) or private (available
only for Friends) the whole profile but not every part of it. 3. When users of SNS can control access to
their own profile, they cannot control what others reveal about them. It is possible for information to be
passed on without one’s consent. They further propose four privacy levels (No Privacy, Soft Privacy,
Hard Privacy, Full Privacy) and three tracking levels (Strong Tracking, Weak Tracking and No Tracking). In

                                                    14
order to help users choose the appropriate privacy levels, they also propose the default levels based on
user purpose and behavior in SNS.

{

@article{10.1109/AICCSA.2009.5069336,
author = {Ai Ho and Abdou Maiga and Esma Aimeur},
title = {Privacy protection issues in social networking sites},
journal ={Computer Systems and Applications, ACS/IEEE International
Conference on},
volume = {0},
isbn = {978-1-4244-3807-5},
year = {2009},
pages = {271-278},
doi = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2009.5069336},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}




                                                   15

				
DOCUMENT INFO