Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2009
Development of database auditing infrastructure
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 78, Pages 1–6https://doi.org/10.1145/1838002.1838092A database is considered as a core asset of an organization. Information about customers, employees and employers of the organization is stored in the database. Allowing authorized access to information and it's shielding against unauthorized access is ...
- research-articleDecember 2009
Enhanced text steganography by changing word's spelling
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 70, Pages 1–4https://doi.org/10.1145/1838002.1838082Digitization of electronic signals has brought a stir in the telecommunication field. From copper wire to fiber optics, technology has gone through a mammoth change rendering a variety of communication media available for use by people, at the cheapest ...
- research-articleDecember 2009
Contextual advertising using keyword extraction through collocation
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 69, Pages 1–5https://doi.org/10.1145/1838002.1838081Contextual advertising is to place an ad in the web page by analyzing content of the web page. Different contextual advertising approaches are used to make a content match. We analyzed different contextual approaches in this paper to find out how the ...
- research-articleDecember 2009
Digital steganography for ASCII text documents Ph.D. research proposal
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 59, Pages 1–4https://doi.org/10.1145/1838002.1838069The digitization of analog signals has inadvertently opened doors for Covert Channel communication which is being exploited as an innocent carrier of Secret information. A number of techniques have been proposed and are in use to attain confidentiality, ...
- research-articleDecember 2009
Intelligent semantic oriented agent based search (I-SOAS)
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 55, Pages 1–4https://doi.org/10.1145/1838002.1838065This research paper is the brief presentation of a PhD research and development conducted in the fields of Product Data Management (PDM). This research paper briefly presents targeted problems i.e. unfriendly graphical user interfaces and unintelligent ...
- research-articleDecember 2009
A systematic approach for transformation of ER schema to dimensional schema
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 51, Pages 1–6https://doi.org/10.1145/1838002.1838060Development of Star model for data warehouse (DW) requires ample amount of time, experience, expertise and adequate knowledge of data warehouse designing steps. As an alternative to data warehouse designing steps, transformation techniques are used. ...
- research-articleDecember 2009
Agent assignment for process management: agent performance evaluation
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 46, Pages 1–6https://doi.org/10.1145/1838002.1838055Workflow Management Systems not only need to provide a mechanism to represent the organizational elements involved during the execution of workflow processes but they also must provide the mechanism for continuous improvements within these elements. But,...
- research-articleDecember 2009
An ontology based approach to automating data integration in scientific workflows
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 44, Pages 1–6https://doi.org/10.1145/1838002.1838052Due to the proliferation of data generating devices such as sensors in scientific applications, data integration has become most challenging task since the data stemming from these devices are extremely heterogeneous in terms of structure (schema) and ...
- research-articleDecember 2009
Discovery and visualization of expertise in a scientific community
- Muhammad Tanvir Afzal,
- Atif Latif,
- Anwar Us Saeed,
- Philipp Sturm,
- Salman Aslam,
- Keith Andrews,
- Klaus Tochtermann,
- Hermann Maurer
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 43, Pages 1–6https://doi.org/10.1145/1838002.1838051In numerous contexts and environments, it is necessary to identify and assign (potential) experts to subject fields. In the context of an academic journal for computer science (J.UCS), papers and reviewers are classified using the ACM classification ...
- research-articleDecember 2009
Leveraging semantic web technologies for standardized knowledge modeling and retrieval from the Holy Qur'an and religious texts
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 42, Pages 1–6https://doi.org/10.1145/1838002.1838050In recent years, the desire to automate religious learning using the emerging technologies has led to a number of applications being introduced to ease the retrieval of knowledge from religious literature, especially the holy books. In this paper we ...
- research-articleDecember 2009
SAuthMash: mobile agent based self authorization in mashups
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 41, Pages 1–6https://doi.org/10.1145/1838002.1838049Mashups are web based applications that merge contents (data and code) from multiple sources, and provide an integrated view to the user. One of the main requirements in mashup is the authorization of user to the backend services. Current protocols for ...
- research-articleDecember 2009
A survey of quantum key distribution protocols
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 39, Pages 1–5https://doi.org/10.1145/1838002.1838046Quantum cryptography offers a promising unbreakable cryptographic solution as it ensures perfect secrecy in applications such as quantum key distribution and bit commitment. The focus of this paper is to trace the development of quantum key distribution ...
- research-articleDecember 2009
MFP: a mechanism for determining associated patterns of stock
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 30, Pages 1–7https://doi.org/10.1145/1838002.1838036Decision making in the business sector is considered one of the sensitive tasks. The business managers always makes decisions one thing in mind the power selling of items. The objective of the study is to develop a mechanism for the identification of ...
- research-articleDecember 2009
Comparative analysis of data mining techniques for financial data using parallel processing
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information TechnologyArticle No.: 25, Pages 1–6https://doi.org/10.1145/1838002.1838030The purpose of this research paper is to study the application of data mining techniques in risk analysis of financial credit related data. In the first part we will apply data mining techniques like Classification, Decision Trees, Clustering and ...