Design Considerations for Web-based Applications

economickiteInternet και Εφαρμογές Web

21 Οκτ 2013 (πριν από 3 χρόνια και 7 μήνες)

91 εμφανίσεις

1


Week 1, #1 (25 Jan 2010
-

31 Jan 2010)

Design Considerations for Web
-
based Applications

Abstract

The rapid growth of weblications

application
-
oriented software delivered as a service over the Web

has revealed a lack of effective guidelines for their design

and implementation. Existing Web usability
guidelines hinder weblication usability since they are primarily based on interactions within a browsing
metaphor. Interface design guidelines for client applications, on the other hand, do not address the
conven
tions of Web users, limitations of the Web environment, nor the new possibilities inherent in the
Web. This paper outlines a set of guidelines for weblication interfaces, which fuse translated client
-
application guidelines and re
-
purposed Web usability gui
delines together to form a solid foundation for
weblication interface design. The goal of these recommendations is to address the issues associated
with weblication interface design and to present an overall method for thinking about them,
emphasizing an u
nderstanding of how and why this approach should be adopted.

{

@This paper was originally published in the
[
[http://www.hfes.org/meetings/am
-
2001.html|2001
Human Factors and Ergonomics Society's Annual Meeting
]]

proceedings


author = <Luke Wroblewski
&

Esa

Rantanen>,


title = <Design Considerations for Web
-
based Applications>


year = <2001>

}


Week 1, #2 (25 Jan 2010
-

31 Jan 2010)

An Empirical Study of Web Interface Design on Small Display Devices

Abstract


This paper reports an empirical study that explor
es the problem of finding a highly
-
efficient, user
-
friendly interface design method on small display devices. We compared

three models using our PDA interface simulator: presentation optimization method, semantic
conversion method, and zooming method.

A co
ntrolled experiment has been carried out to identify the pros and cons of each method. The results
show that of the three interface methods, the zooming method is slightly better than the

semantic conversion method, while they both outperform the optimizin
g presentation method.


{
@This paper was originally published

source
,

ACM International Conference on **Web,2004


author = "

Qiu, K Zhang, M Huang
",


title= "

An Empirical Study of Web Interface Design on Small Display Devices
",


publisher = "

ACM
International Conference on **Web,2004
",


year =
2001


}



2


Week 2, #1 (1 Feb 2010
-

7 Feb 2010)

Evaluation of Web applications according to intelligence parameters

Abstract


This paper
proposes

a new approach to evaluate the Web applications. It consi
ders few parameters to
evaluate the intelligence of web applications.

Author have classified intelligence into 3 levels
-
User level which
considers the requirements from the end user

definition of intelligence web ;Developer level
-

the developer
facilities
which are related to intelligence and useful in development
life

cycle process of web;

Performance
level which
refers to

performance of Web application
. The parameters considered at each level are considered
to evaluate web as an intelligent application. S
ome of user level parameters are usability, data mining;
Developer level parameters are Search and query, Intelligence documenting
\
Visualization, Intelligence in
implementation; Performance level parameters are availability and resource usage. Overall, thi
s paper
describes the parameters required to evaluate web intelligence at each level and offers a good framework or
foundation in developing future web applications.


{
@This paper was originally published

source
,

2008 International Conferences on Computati
onal Intelligence for Modelling, Control and
Automation


author =
"
Alireza Tabatabaei Tabrizi

,
Mohsen Sadighi Moshkenani

",



title= "
Evaluation of Web applications according to intelligence parameters
",


publisher = "

IEEE 2008

",


year =
200
8


}


Week 2, #
2

(1 Feb 2010
-

7 Feb 2010)

I
nteractive agent
-
based system for

concept
-
based web search

Abstract


In this paper, au
thors
design an interactive semantic search engine

which collects feedback by
means of selection in order to

better capture users’

personal concepts
. The search algorithm

utilized in this model is an “iteratively cyclic

mechanism”, which includes selectin
g upper classes
and

generating lower classes. Selecting upper classes refers to

searching for the most suitable web
pages by selecting the

individuals from the current population and forming a new

population;
generating lower classes refers to the applicat
ion

of a “genetic operator” on upper classes to
generate new

lower classes.


{
@This paper was originally published

source
,

Expert Systems with Applications, vol. 24,2003, pp. 365
-
373.


author = "

W.
-
P. Lee and T.
-
C. Tsai
",


title= "

An interactive age
nt
-
based system for

concept
-
based web search,
",


publisher = "

Expert Systems with Applications, vol. 24
",


year =
200
3


}





3



Week
3
, #
1
(
8 Feb 2010


14
Feb 2010)

A smart web query

method for semantic retrieval of web data

Abstract


In this paper,

authors
present a semantic search engine based on

the smart web query (SWQ)
method for web data retrieval

.

The SWQ architecture contains three main parts: SWQ

search
engine and its subcomponents: “query parser” and

“context ontology determination engine”
;
context ontologies

for domains of application; a semantic search filter which is

to improve search
precision based on retrieving term properties

in context ontologies.



{
@This paper was originally published

source
,

Data & Knowledge Engineering,
vol. 38,
2001, pp. 63
-
84


author = "

R. H. L. Chiang, C. E. H. Chua, and V. C. Storey
",


title= "

A smart web query

method for semantic retrieval of web data,
",


publisher = "

Expert
Data & Knowledge Engineering

,vol.38
",


year =
200
1


}


Week
3
, #
2
(
8 Fe
b 2010


14
Feb 2010)

Cloud Computing
-

Benefits, risks and recommendations for information security

Abstract


In this paper,
t
he security assessment

of Cloud Computing

is based on three use
-
case scenarios: 1)
SME migration to cloud computing services, 2) t
he impact of cloud computing on service resilience,
3) cloud computing in e
-
Government (e.g., eHealth).

This paper allows an informed assessment of
the security risks and benefits of using cloud computing
-

providing security guidance for potential
and exi
sting users of cloud computing.

The key conclusion of this paper is that the cloud’s
e
conomies of scale and flexibility are both a friend and a foe from a security point of view
.

This paper speaks more about the risks involved and fails to recommend a stra
tegy for information
security in Cloud computing.


{
@This paper was originally published

source
,

Conference Proceedings of
ENISA’s Emerging and Future Risk programme


author = "

Daniele Catteddu and Giles Hogben
",


title= "

A
Cloud Computing
-

Benefits
, risks and recommendations for
information security

",


publisher = "
The European Network
and Information Security Agency
(ENISA)
,


year =
200
9


}






4


Week 4, #1 (15 Feb 2010
-

21 Feb 2010)

Above the Clouds: A Berkeley View of Cloud Computing

Abstr
act


This

is a technical report of research study conducted in Berkeley RAD lab for analysis of Cloud
Computing. The report explains about Cloud Computing and in particular about private and public
cloud. According to study conducted,
they uncovered the fa
ctors of 5 to 7 decrease

in cost of
e
lectricity, network bandwidth, operations, software, and hardware
. The paper concludes that
construction and operation of extremely large
-
scale,
c
omputer datacenters at lowcost

locations was
the key necessary enabler of

Cloud Computing
.

Research
predict Cloud Computing will grow, so
developers should take it into account

while designing applications. Also, conducted research based
on CC economic models.


{
@This paper was originally published

source
,

Technical Report No.

UCB/EECS
-
2009
-
28
,

h
ttp://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS
-
2009
-
28.html


author = "

Michael Armbrust

et.al
",


title= "

Above the Clouds: A Berkeley View of Cloud Computing

",


publisher = "

Electrical Engineering and Computer Sciences

Un
iversity of California at Berkeley
,
Technical Report No. UCB/EECS
-
2009
-
28


year =
200
9


}


Week 4, #
2

(15 Feb 2010
-

21 Feb 2010)

Towards Trusted Cloud Computing

Abstract


This is a Research project report conducted by
researchers at the Max Planck Ins
titute for Software
Systems. The report provides a good approach on open source CC which I feel anyone could utilize
and modify according to their needs.

The Authors
have outlined a
trusted Cloud Computing
p
latform that "enables Infrastructure as a Service

(IaaS) providers such as Amazon EC2 to provide a
closed box execution environment that guarantees confidential execution of guest virtual
machines." Such a platform would assure customers that service providers haven't been messing
with their data and wou
ld enable service providers to secure data even across many VMs.
They also
provide

details of how cloud providers set up their data centers is held pretty close to the vest, but
base their system on an open source offering called Eucalyptus that they suspe
ct is similar to at
least some commercial implementations. A prototype based on the design is

this research team's
next step.


{
@This paper was originally published

source
,

http://www.mpi
-
sws.org/~gummadi/papers/trusted_cloud.pdf


author = "

Nuno Santos
Krishna P. Gummadi Rodrigo Rodrigues
",


title= "

Towards Trusted Cloud Computing
",


publisher = "

Max Planck Institute for Software Systems


year =
200
9


}



5


Week 5, #1 (22 Feb 2010
-

28 Feb 2010)

Does Virtualization Make Disk Scheduling Passé?

Ab
stract


This paper speaks about Virtual Machines and the various observations the authors examined
during a study on VM.

They observed t
hat di
ff
erent scheduler’s in the guest oper
ating system are
optimal for diff
erent work
-
loads

and
there is no

much

bene
fi
t in throughput from

performing
additional I/O reordering in the VMM.

the best choice of I/O scheduler in a VMM appears to

be a
minimal scheduler based on guest operating system. Overall, this paper presents the potential of
Cloud Computing by evaluating t
he Virtual Machines.


{
@This paper was originally published

source
,

SOSP Workshop on Hot Topics in Storage and File Systems

(HotStorage'09), Big Sky, MT, October 2009


author = "

David Boutcher and Abhishek Chandra
",


title= "

Towards Trusted Cloud Com
puting
",


publisher = "

Department of Computer Science

University of Minnesota



year =
200
9


}


Week 5, #
2

(22 Feb 2010
-

28 Feb 2010)

CloudViews: Communal Data Sharing in Public Clouds


Abstract


This paper takes a different approach relating to Cl
oud Computing security issues.

The Authors see
lots of opportunity in the fact that Web services and applications will be so closely situated.
CloudV
iews

is a Hadoop HBase
-
supported common storage system being developed by the researchers to facilitate
collaboration through protected inter
-
service data sharing. The paper suggests
that public cloud
providers must facilitate such collaboration
--

in the

form of data driven, server side mashups
--

to
ensure the market's growth through development of new Web services.


{
@This paper was originally published

source
,

Proceedings of the Workshop on Hot Topics in CloudComputing
(HotCloud), San Diego, USA, June
2009.


author = "

Roxana Geambasu Steven D. Gribble

Henry M. Levy
",


title= "

CloudViews: Communal Data Sharing in Public Clouds
",


publisher = "

Proceedings of the Workshop on Hot Topics in CloudComputing
(HotCloud), San Diego, USA, June 2009.



y
ear =
200
9


}





6


Week 6, #1 (1 Mar 2010
-

7 Mar 2010)

Building castles out of mud: practical access pattern privacy and correctness on untrusted storage

Abstract


This
paper speaks about
the problem of hiding access patterns from a storage provider. Not

much
work has been done in the area and p
revious work
done was too expensive. The still in progress
access patters

allows queries to take on the order of 100s of ms. Some of the cost is due to the
implementation: lack of
parallelism and use of Java. T
he p
rotocol

pattern proposed by authors

requires multiple round
-
trip times, and so the cost would still be too high.


{

source

= {CCS '08: Proceedings of the 15th ACM conference on Computer and
communications security},

author = {Williams, Peter and Sion, Rad
u and Carbunar, Bogdan},

title = {Building castles out of mud: practical access pattern privacy and
correctness on untrusted storage},publisher = {ACM},

year = {2008},

}


Week 6, #
2

(1 Mar 2010
-

7 Mar 2010)

TAP: a Semantic Web platform


Abstract


This pap
er
deliver a semantic search engine in TAP


a

comprehensive semantic web system
.
The
query language

for semantic search in TAP is called the GetData interface,

which allows programs
to visit properties of a resource

in a semantic graph. Each graph is refe
renced by a

URL, and
GetData specifies resource name and property

name to access to the value of property. Two
additional

search interfaces are provided by TAP, which are “Search”

which searches for any
properties with titles containing a

given string, and

“Reflection” which searches for coming

and outgoing tracks for a given node in a semantic graph.

{
@This paper was originally published


author = "

R. Guha and R. McCool
",


title= "

TAP: a Semantic Web platform

",


publisher = "

Computer

Networks,
v
ol. 42, 2003, pp. 557
-
577
.



year =
200
3


}







7


Week 7, #1 (8 Mar 2010
-

14 Mar 2010)


Designing a composite e
-
service

platform with recommendation function

Abstract


This paper proposes
an e
-
service platform integrated with

semantic

search for e
-
ser
vice metadata
.
E
-
service

metadata refers to descriptions to e
-
services and providers,

which is to publish and to
discover e
-
services. There are two

types of metadata in the system: business level metadata


the description of e
-
service providers, and serv
ice level

metadata


the description of basic
information about

e
-
service. The authors adopt Universal Description, Discovery

and Integration
which is a web service standard to

register and search e
-
services.



{

source

= {

Computer Standards &

Interfaces,

vol. 25, 2003, pp. 103
-
117.
},

author = {

D.
-
R. Liu, M. Shen, and C.
-
T. Liao
},

title = {

Designing a composite e
-
service

platform with recommendation
function
},

year = {2003
},

}

Week 7, #
2

(8 Mar 2010
-

14 Mar 2010)


Privacy Disclosure: Personal Informat
ion and Images on Social

Networking Sites in Taiwan

Abstract


This paper names social networking site as double edged sword which extends one’s social network
and at the same time also pose privacy threat. It identifies the privacy risk involved in social
networking sites especially through webalbums and provides some suggestion to protect privacy.
One of leading Taiwan social networking site called Wretch.cc provide
s weblogs and web albums is
considered for example
. Paper illustrates various cases of priva
cy intrusion through these social
sites.
Some of the suggestions are: 1.) any

country should have a strict legal Internet Privacy
regulation.
2.)

Social networking sites should make u
sers aware about the data which are displayed
to

public and
user should b
e notified
if anyone
needs
access
to
user’s personal data
(
something like
a request sent to user for accessing personal information
)

3.)
For protecting web albums, author
suggests Photo Fingerprinting, a combination of watermark a
nd color histogram of the p
hoto and
no
-
print option. Even though this paper fails to identify all privacy risks involved in social
networking, it suggests simple solutions to most common privacy issues.


{

source

= {

Ninth Annual International Symposium on Applications and the
Inter
net
},

author = {

Chia
-
Lung Hsieh
},

title =
Privacy Disclosure: Personal Information and Images on Social
Networking Sites in Taiwan
},

year = {200
7
},

}



8



Week 8, #1 (22 Mar 2010
-

28 Mar 2010)

An Empirical Evaluation on Semantic Search Performance of Keyw
ord
-
Based

and Semantic Search
Engines: Google, Yahoo, Msn and Hakia

Abstract

This paper compares the performance of three different keyword based search engines and one
semantic search engine. This paper discusses how studies have been conducted for evalua
ting the
retrieval effectiveness of key word based search engines. It also talks briefly about the performance
of key word based search engines in terms of precision and normalized recall. All the four search
engines (3 key word based and 1 semantic based)

that were selected were subjected to ten queries
containing various topics. After each run of the query, the first twenty documents retrieved were
evaluated utilizing binary human relevance judgment and were further classified as “relevant” or
“nonrelevan
t. Precision and normalized recall ratios of keyword
-
based search engines were
calculated. Similar recall ratio was calculated for the semantic search engine ‘Hakia’. The results
obtained were really surprising as the key word search engines retrieved more

relevant documents
overall in comparison to semantic search engine but semantic search engine retrieved more
relevant documents than all other. Also they generalized those precision ratios of search engines
decreased when the cut off values for calculatin
g the recall ratios increased. Finally they conclude
saying that the performance of semantic search engines was low regardless of the type of search.

{

source

=
2009 Fourth International Conference on Internet Monitoring and
Protectio
},

author = {

Duygu Tü
mer
,
Mohammad Ahmed Shah
,
Yiltan Bitirim
},

title =
An Empirical Evaluation on Semantic Search Performance of Keyword
-
Based and Semantic Search Engines: Google, Yahoo, Msn and Hakia
},


year = {2009
},

DOI Bookmark:
http://doi.ieeecomputersociety.org/10.1109/ICIMP.2009.16

}


Week 8, #
2

(22 Mar 2010
-

28 Mar 2010)

Ontology of general concept for Semantic Searching

Abstract

This paper presents the importance of general semantic c
oncepts & action for semantic searching.
There are three main factors that affect the performance of the search engine; natural language
recognition, the consummate organization of web information, knowledge and semantic reasoning.
This paper mainly focuse
s on knowledge organization & semantic reasoning. It also talk about using
ontology to organize text documents wherein knowledge can be represented in a way that
facilitates understanding between computers and humans. The Semantic web usually refers to a
9


k
nowledge
-
based system. It implicitly talks about a strategy for the structure of general concepts to
facilitate search engines to support knowledge sharing from the point of view of both humans and
machines and concludes by talking about ontology combined
with facet classification which can
represent all kinds of concepts, particularly, general concepts in different expression.


{

source

=
2010 Second International Conference on Computer Modeling and
Simulation
},

author = {

Lizhen Li, Zhifeng Dong, Keming X
ie
},

title =
Ontology of General Concept for Semantic Searching
},


year = {2010
},

DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/ICCMS.2010.273

}


Week 9, #
1

(28 Mar 2010
-

4 Apr 2010)

The Research of Search Engine Based on Semantic Web

Abstract

In this paper the author has presented the architecture of a semantic search engine, and their work
shows how the fundamental elements of the semantic search engine can be used in the fundamental
task of information retrieval. And then an improved algorit
hm based on TFIDF algorithm was
proposed to guarantee the retrieve information resources in a more efficient way. Metadat is the
building block between web data and semantic web. Currently, RDF and OWL documents are
forming the semantic web engines.


{

sou
rce

=
Intelligent Information Technology Application Workshops, 2008.
IITAW '08. International Symposium on
},

author = {

Yi Jin, Zhuying Lin, Hongwei Lin
},

title =
The Research of Search Engine Based on Semantic Web
},


year = {2008
},

DOI Bookmark: http://
doi.ieeecomputersociety.org/
10.1109/IITA.Workshops.2008.193

}


Week 9, #
2

(28 Mar 2010
-

4 Apr 2010)

Semantic
-
driven Management and Search for Resources in Research Community

Abstract

This paper, establishes a kind of semantic
-
driven resource management a
nd search model, architecture
10


and its implementation in research community. Searching with the developed system, query results will
be returned in a more structural way. Besides, the relations among different concepts and instances are
listed explicitly, s
o the related resource can be acquired conveniently. Based on semantic mechanism,
this paper proposes a kind of semantic
-
driven resource management and search model, and provides an
implementation for the resources in research community. The paper presents

two semantic authoring
tools for domain resources management, upon which, semantic search portal is constructed, which has
three sub
-
interfaces. In turn, the relationship can be further classified into three sub
-
types 1.
Relationship between concept and c
oncept 2. Relationship between concept and instance 3.
Relationship between instance and instance.

{

source

=
Proceedings of the Second International Conference on Semantics,
Knowledge, and Grid
},

author = {


Junsheng Zhang Zhixian Yan
},

title =
Semantic
-
d
riven Management and Search for Resources in Research
Community
},


year = {200
6
},

DOI Bookmark: http://doi.ieeecomputersociety.org/
10.1109/SKG.2006.90

}



Week 10, #1 (5 Apr 2010
-

11 Apr 2010)

The Re
search of Search Engine Based on Semantic Web

Abstract

In this paper the author has presented the architecture of a semantic search engine, and their work
shows how the fundamental elements of the semantic search engine can be used in the fundamental
task
of information retrieval. And then an improved algorithm based on TFIDF algorithm was
proposed to guarantee the retrieve information resources in a more efficient way. Metadat is the
building block between web data and semantic web. Currently, RDF and OWL
documents are
forming the semantic web engines.


{

source

=
Intelligent Information Technology Application Workshops, 2008.
IITAW '08. International Symposium on
},

author = {

Yi Jin, Zhuying Lin, Hongwei Lin
},

title =
The Research of Search Engine Based o
n Semantic Web
},


year = {2008
},

DOI Bookmark: http://doi.ieeecomputersociety.org/
10.1109/IITA.Workshops.2008.193

}

11



Week 10, #1 (5 Apr 2010
-

11 Apr 2010)

OVERLAP AMONG MAJOR WEB SEARCH ENGINES

Abstract

This paper talks about how previous studies which s
how some consistencies in Web search engine
performance, overlap and limitations. However, most Web search engine overlap studies were
performed in the 1990’s using small samples of queries. This study examines the overlap among results
retrieved by three
major Web search engines for a large set of more than 10,316 queries. The results of
this study also emphasize the fact that major Web search engines (Ask Jeeves, Google and Yahoo!), have
built and developed proprietary methods for indexing the Web and the
ir ranking of query driven search
results differs greatly. This study shows that different Web search engines have different capabilities
and the overlap among Web search engine results is low. These differences contradict the widely held
notion that all W
eb search engines are the same and that searching one Web engine will yield the
absolute best results. The results also show that a Web meta
-
search engine provides a unique voice that
combines and filters other voices

{

source

=
Journal:Internet Research

V
olume:16

Issue:4

Page:419


426
,
Emerald
Group Publishing Limited

},

author = {


Amanda Spink, Bernard J. Jansen, Chris Blakely, Sherry Koshman
},

title =
OVERLAP AMONG MAJOR WEB SEARCH ENGINES
},


year = {2006
},

Article URL:http://www.emeraldinsight.com/10.1
108/10662240610690034

}

Week 10, #
2

(5 Apr 2010
-

11 Apr 2010)

An Ontology
-
based Methodology for Semantic Expansion Search

Abstract

This paper proposes a novel ontology
-
based framework for semantic expansion search. Current
search engines face two main dis
advantages 1. thousands of irrelevant web pages have been
returned from search engine 2. the display order of search results is rather in confusion

The essential reason of these two issues is that traditional web search lacks semantic
understanding to user
’s search behaviors, which results in low recall ratio and precision ratio. It
further suggests that semantic query expansion of user’s keyword, retrieved documents of
semantic expansion search are markedly more than semantic search. Therefore, recall rati
o has
obviously improved in comparison with semantic search. Meanwhile, precision ration does not
differ significantly from each other between semantic search and semantic expansion search. In
12


comparison with full text search and semantic search, semantic
expansion search proposed in this
paper can overcome limitations and achieves higher recall ratio and precision ratio.



@inproceedings{1471246,


author = {Zou, Guobing and Zhang, Bofeng and Gan, Yanglan and Zhang,
Jianwen},


title = {An Ontology
-
Based Met
hodology for Semantic Expansion Search},


booktitle = {FSKD '08: Proceedings of the 2008 Fifth International
Conference on Fuzzy Systems and Knowledge Discovery},


year = {2008},


isbn = {978
-
0
-
7695
-
3305
-
6},


pages = {453
--
457},


doi = {http://dx.doi.org/1
0.1109/FSKD.2008.475},


publisher = {IEEE Computer Society},


address = {Washington, DC, USA},


}



Week 11, #
1

(12 Apr 2010
-

18 Apr 2010)

Conceptual Architecture for Semantic Search Engine

Abstract

This paper describes a complete conceptual architecture

for a semantic search engine. Various
parameters and components needed for the development of a semantic search engine were proposed
with special emphasis on inference engine like CWM and Euler and the use of a relational database for
knowledge storage wh
ich would enhance the efficiency of the system. After discussing the effect of
inference engines they suggest the use of prolog as the implementation language as it hads already
been used for logical reasoning for quite some time. Overall the article gives

out a detailed description
on the various components like 1. ontology editor, 2. ontology mapper, 3. ontology translator, 4. web
page

annotator, 5. ontology crawler,6. web crawler, 7. query builder

and 8. knowledge base, along with
their proposed model wh
ich would help in eliminating the shortcomings present in the current systems
.


{

source =
TNMIC 2004
},

author = {
Qazi Mudassar Ilyas, Yang Zong Kai and Muhammad Adeel Talib
},

title =
Conceptual Architecture for Semantic Search Engine
},

year = {2008},

ie
eexplore.ieee.org/iel5/9991/32103/01492956.pdf

}





13


Week 11
, #
2

(12 Apr 2010
-

18 Apr 2010)

Semantic Computing, Cloud Computing, and Semantic Search Engine

Abstract

This paper demonstrates how Semantic Search/Computing can benefit Cloud Computing. Semant
ic
Computing addresses how retrieval of multimedia content may be facilitated by natural language
annotations, how embedded texts may be extracted from images, how


programs may be derived from
requirements described in natural language, how security can b
e added based on contexts, how web
search can be accomplished effectively with a cell phone, etc. Paper describes in detail about 5 layers of
Semantic Computing 1.) Semantic Analysis(which analyses and converts pixels and words to meanings)
2.) Semantic In
tegration(integrates the content and semantics from different sources with a unified
model) 3.) Semantic Services(utilize the content and semantics to solve specific problems) 4.) Service
Integration(provides the interoperation methods between different se
rvices) and finally 5.) Semantic
Interface(that allows the user to access and manipulate the content and semantics of various sources,
eg natural language interface, multi
-
modal natural language interface and visual interface). After
briefing about Cloud C
omputing, the paper focuses on how the architecture of Semantic search engines,
the languages of SSE (SNL
-
interpreter, SQDL and SCDL
-
matcher, SSE invoker) can be embedded in cloud
Computing and benefit in searching more services offered in cloud. Also, SSE

can be used stand
-
alone in
Cloud as SaaS. The Paper concludes that Semantic Computing helps Cloud Computing grow more rapidly
by utilizing semantic architecture and search engines.


{

@article{10.1109/ICSC.2009.51,

author = {Phillip C.
-
Y. Sheu and Shu Wan
g and Qi Wang and Ke Hao and Ray
Paul},

title = {Semantic Computing, Cloud Computing, and Semantic Search Engine},

journal ={International Conference on Semantic Computing},

volume = {0},

isbn = {978
-
0
-
7695
-
3800
-
6},

year = {2009},

pages = {654
-
657},

doi =
{http://doi.ieeecomputersociety.org/10.1109/ICSC.2009.51},

publisher = {IEEE Computer Society},

address = {Los Alamitos, CA, USA},

}












14


Week 12, #1 (19 Apr 2010
-

25 Apr 2010)


The Research of the Semantic Search Engine based

on the Ontology

Abstra
ct

This paper tries to understand and solve the problems of the low query precision and the shortness in
understanding user’s query intention that occur in traditional search engine, a framework of semantic
search engine based on ontology is brought forwar
ds. It need to extract information after the
information crawled by the spider, and an algorithm of information extraction based on ontology is
proposed. By using semantic reasoning which based on ontology, it helps the search engine to
understand user’s q
uery intention. A prototype of search engine is developed by using of lucene, and
the search result is better than that of common search engine
.
The publication makes full use of the
merit of semantic of ontology, which can quickly get the information whic
h is relevant to user’s
requirement in knowledge base. The author also talks about developing a prototype of search engine by
using of lucene, thisprototype runs in server of AMD with double CPU, the results show the effective and
semantic validity of sear
ch engine, but there also exists some problems, such as the search result is not
very good if the semantic of user’s requirement is beyond the range of ontology that they have build;
how to measure the similarity of ontology in query process is another pro
blem.


{

author = {

DU Zhi
-
Qiang, HU Jing, YIHong
-
Xia, HU Jin
-
Zhu
},

title = {

The Research of the Semantic Search Engine based on the Ontology
},

journal ={

Wireless Communications, Networking
},


year = {200
7
},

publisher = {IEEE Computer Society},

http://i
eeexplore.ieee.org/iel5/4339774/4339775/04341098.pdf

}


Week 12, #
2

(19 Apr 2010
-

25 Apr 2010)


Privacy Protection Issues in Social Networking Sites

Abstract

This work conducts a preliminary study which examines the privacy protection issues on Social
Net
working Sites (SNS) such as MySpace, Facebook and LinkedIn. Based on this study, the author
identifies three privacy problems in SNS and propose a Privacy Framework as a foundation to cope with
these problems. The three problems are as follows; 1. SNS do n
ot inform users of the dangers of
divulging their personal information. 2. Privacy tools in SNS are not flexible enough to protect user data
.
Most SNS only allow users to make their data either public (available for everyone) or private (available
only for

Friends) the whole profile but not every part of it. 3. When users of SNS can control access to
their own profile, they cannot control what others reveal about them. It is possible for information to be
passed on without one’s consent. They further propos
e four privacy levels (No Privacy, Soft Privacy,
Hard Privacy, Full Privacy) and three tracking levels (Strong Tracking, Weak Tracking and No Tracking). In
15


order to help users choose the appropriate privacy levels, they also propose the default levels base
d on
user purpose and behavior in SNS.


{

@article{10.1109/AICCSA.2009.5069336,

author = {Ai Ho and Abdou Maiga and Esma Aimeur},

title = {Privacy protection issues in social networking sites},

journal ={Computer Systems and Applications, ACS/IEEE Internat
ional
Conference on},

volume = {0},

isbn = {978
-
1
-
4244
-
3807
-
5},

year = {2009},

pages = {271
-
278},

doi = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2009.5069336},

publisher = {IEEE Computer Society},

address = {Los Alamitos, CA, USA},

}