Volume 9 Issue 1 February 2011


Task-oriented Dialogue Agent Architecture

Tomáš Nestorovič

https://doi.org/

Abstract This paper focuses our agent-based approach to dialogue management equipped with a deliberation mechanism further extensible with additional features. The aim of this study has been to create a manager which can exhibit complex behaviour from two points of view – the development and runtime ones. To support the fi rst case, the domain developer needs to provide a set... Read More


An Ontology-Based Approach for Detecting Knowledge Intensive Tasks

Andreas S. Rath, Didier Devaurs, Stefanie N. Lindstaedt

https://doi.org/

Abstract In the context detection field, an important challenge is automatically detecting the user’s task, for providing contextualized and personalized user support. Several approaches have been proposed to perform task classification, all advocating the window title as the best discriminative feature. In this paper we present a new ontology-based task detection approach, and evaluate it against previous work. We show that... Read More


Application of Esscher Transformed Laplace Distribution in Web Server Data

Dais George, Sebastian George

https://doi.org/

Abstract In this article, we introduce an alternative distribution, namely Esscher transformed Laplace distribution good enough to model the fi le size distribution of Web servers. It exhibits asymmetry, peakedness and tail heaviness, which are common features of fi le size data. Esscher transformed Laplace distribution belongs to one parameter regular exponential family. We derive their representations and obtain explicit forms... Read More


LTSC-128: Stream Cipher Based on the Intractable Shortest Vector Problem in Lattice

Khaled Suwais, Azman Samsudin

https://doi.org/

Abstract LTSC-128 is a high secure stream cipher based on the hardness of the Shortest Vector Problem in Lattice space. The cipher is based on vectors multiplication over finite field, where these vectors are represented by polynomials to enhance the per formance of keystream generation. The key size is 128 bits and there is no attack faster than exhaustive key search... Read More


Enhanced Learning and Educational Management Through Online Collaborative Technologies

Adrian Florea, Arpad Gellert, Traian Anghel, Delilah Florea

https://doi.org/

Abstract Merging traditional ways of teaching with modern approaches as e-Learning, focused on online multimedia applications and technologies, developed in a collaborative manner, became a real necessity in order to enhance learning and educational management. In this paper we introduce our developed Education Management Tool (EDM), a visual, interactive and collaborative e-Learning solution, dedicated for optimizing the teaching, learning and testing... Read More


A Practical and Secure Buyer-Seller Watermarking Protocol

Defa Hu, Qiaoliang Li

https://doi.org/

Abstract Digital watermarking is an emerging technology for combating copyright piracy. In real applications, the transaction between a buyer and a seller is done through a specific watermarking protocol, which enables the seller to successfully identify a traitor from a pirated copy, while preventing the dishonest seller from framing an inno cent buyer. In this paper, we propose a new buyer-seller... Read More