veljko milutinovic, frédéric patricelli, school of ...sugawara/pdf/kurihara-ssgrr2002.pdftelecom...

23
General Chairman Veljko Milutinovic, School of Electrical Engineering, University of Belgrade Deputy General Chairman Frédéric Patricelli, Telecom Italia Learning Services (Head of International Education) Conference organization staff: Conference Managers: Miodrag Stefanovic Cesira Verticchio Conference Staff Renato Ciampa Veronica Ferrucci Maria Rosaria Fiori Maria Grazia Guidone Natasa Kukulj Bratislav Milic Zaharije Radivojevic Milan Savic These pages are optimized for Internet Explorer 4+ or Netscape Navigator v4+ and resolution of 1024x768 pixels in high color. Designed by SSGRR

Upload: others

Post on 13-Jan-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

General ChairmanVeljko Milutinovic,

School of Electrical Engineering,University of Belgrade

Deputy General ChairmanFrédéric Patricelli,Telecom Italia Learning Services(Head of International Education)

Conferenceorganization staff:

ConferenceManagers:

Miodrag StefanovicCesira Verticchio

Conference Staff

Renato CiampaVeronica Ferrucci

Maria Rosaria FioriMaria Grazia

GuidoneNatasa KukuljBratislav Milic

Zaharije RadivojevicMilan Savic

These pages are optimizedfor

Internet Explorer 4+ orNetscape Navigator v4+

and resolution of 1024x768pixels

in high color.

Designed by SSGRR

Page 2: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

1. .NET All New?

Jürgen Sellentin, Jochen Rütschlin

2. A center for Knowledge Factory Network Services (KoFNet) as a support to e-business

Giuseppe Visaggio, Piernicola Fiore

3. A concept-oriented math teaching and diagnosis system

Wei-Chang Shann, Peng-Chang Chen

4. A contradiction-free proof procedure with visualization for extended logic programs

Susumu Yamasaki, Mariko Sasakura

5. A Framework For Developing Emerging Information Technologies Strategic Plan

Amran Rasli

6. A Generic Approach to the Design of Linear Output Feedback Controllers

Yazdan Bavafa-Toosi, Ali Khaki-Sedigh

7. A Knowledge Management Framework for Integrated design

Niek du Preez, Bernard Katz

8. A Method Component Programming Tool with Object Databases

Masayoshi Aritsugi, Hidehisa Takamizawa, Yusuke Yoshida and Yoshinari Kanamori

9. A Model for Business Process Supporting Web Applications

Niko Kleiner, Joachim Herbst

10. A Natural Language Processor for Querying Cindi

Niculae Stratica, Leila Kosseim, Bipin C. Desai

11. A New Approach to the Construction of Parallel File Systems for Clusters

Felix Garcia, Alejandro Calderón, Jesús Carretero, Javier Fernández, Jose M. Perez

12. A New model of On-Line Learning

file:///F¦/papers.html (1/15)2004/03/22 13:16:33

Page 3: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

Marjan Gusev, Ljupco N. Antovski, Vangel V. Ajanovski

13. A New Paradigm for Network Management: Business Driven Device Management

John Strassner

14. A Prototype of a Retail Internet Banking for Thai Customers

Rawin Raviwongse, Pornpriya Koedrabruen

15. A Reuse-Oriented Approach for the Construction of Hypermedia Applications

Naoufel Kraiem

16. A Scientific Paradigm On Image Processing痴 Lecture

Sar Sardy

17. A Theory of Programming for e-Science and Software Engineering

Juris Reinfelds

18. A video based laboratory on the Internet, and the experiences obtained with high-school teachers

Fernando Gamboa Rodríguez, J.L. Pérez Silva, F. Lara Rosano, A. Miranda Vitela, F. Cabiedes Contreras

19. Web Engineering: Methods and Tools for Education

George E. Cormack, G. Griffiths, B. D. Hebbron, M. A. Lockyer, B. J. Oates

20. Adding Security to Quality of Service Architectures

Stefan Lindskog, Erland Jonsson

21. Advanced Mobile Multipoint Rela-Time Military Conferencing System (AMMCS)

R. Sureswaran, A. Osman, M. S. Mushardin, M. Yusof, B. Husain

22. Advanced Optical Infrastructure for the Emerging Optical Internet Services

Marian Marciniak, Marian Kowalewski, Miroslaw Klinkowski

23. Agent-based Intelligent Clinical Information System

Il Kon Kim, Ji Hyun Yun, Sang Wook Lee, Hang Chan Kim

24. An approach for implementing Object Persistence in C++ using Broker

Kulathu Sarma

25. Digital Learning: Infrastructure and Web Culture

Alexei L. Semenov

26. An Efficient and Adaptive Method for Reservation of Multiple Multicast Trees

file:///F¦/papers.html (2/15)2004/03/22 13:16:33

Page 4: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

Shiniji Inoue, Makoto Amamiya, Kasuga-shi, Yoshiaki Kakuda

27. Distributed Information Systems BuildingTechniques

Petr Smol勛, Tom癩 Hru嗅a

28. An eye-gaze input device for people with severe motor disabilities

Laura Farinetti, Fulvio Corno

29. Asia-Pacific and Australian Grid developments, the coming information Grid and the iSpace

Bernard A. Pailthorpe, Nicole S. Bordes

30. Askemos - a distributed settlement

J•g F. Wittenberger

31. Automatic Determination of Cluster Size Using Machine Learning Algorithm

Jihoon Yang, Sung-Hae Jun, Kyung-Whan Oh

32. B2E Business to Employee and Business to Everything

Prashant Killipara

33. Business Methods: Patent Practice at the European Patent Office

J•g Machek

34. CAL-Visual, an E-Education Tool for the Management of Digital Resources

Dino Bouchlaghem

35. Casual databases

Ken Roger Riggs

36. CLINICAL ANTHROPOLOGY - A NEW EDUCATIONAL METHOD FOR ETHICS AND HUMANITY USING INTERNET

Shinichi Shoji

37. Communication Behavior and Collaboration in Virtual Seminars - Experiences

Birgit Feldmann, G. Schlageter

38. DEC (Decision Making in Business Environment) Computer Age of business (Admiration or Admission?)

Nanayaa Owusu Prempeh

39. Symbolic Computation in Research

Qi Zheng

40. Computer 邦ediated Communication (CMC): A Shift Towards E-Education Systems In Malaysia

Rozhan M Idrus

file:///F¦/papers.html (3/15)2004/03/22 13:16:33

Page 5: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

41. Computer Simulation Of Combustion in Particulate 2-Phase Flow

Aleksandar Saljnikov, Simeon Oka, Elmira Karbozova, Miroslav Sijercic

42. COMPUTING OUR WAY TO THE ULTIMATE TOY

Kristinn R. Thorisson

43. Cooperative Learning: Multi-user Support for Advanced Distance Learning Services

Andrea B•

44. Coordinating Representations for Collaborative Systems

Richard Alterman, Alex Feinman, Seth Landsman, Josh Introne

45. Coordinatized Graphs: Interplay Between Graphical Properties and Adjacency Systems

Andrew Woldar

46. Cryptographic Schemes in Secure e-Course eXchange (eCX) for e-Course Workflow

Lucas C. K. Hui, Joe C.K. Yau

47. Data Mining from a Web Browser

David J. Haglin, Richard J. Roiger

48. Design and implementation of an adaptive learning management system

Giorgio Casadei, Matteo Magnani

49. E-learning, Metacognition and Visual design

David Kirsh

50. Development of Computer-Based Activities for Peer-Led Team Learning in University-Level General Chemistry

John Goodwin

51. Differentiated Multilayer Resilience in IP over Optical Networks

Achim Autenrieth

52. Distributed Medical Intelligence via Broadband Communication Networks

Constantinos Makropoulos

53. Multimedia based Learning and Working: a Cooperation of University with Industry

Peter Deussen, Hartmut Ehrich, Tim Young Weisssch臈el, Christian Zorn

54. Document Ontology: A Statistical Approach

Sadanand Srivastava, James Gil de Lamadrid, Chakravarthi S. Velvadapu

file:///F¦/papers.html (4/15)2004/03/22 13:16:33

Page 6: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

55. Does Attentional Load Affect Discourse Management in On-Line Communication?

Claude G. Cech, Sherri L. Condon

56. E-Book, an e-learning tool for Engineering Undergraduates

Eduardo Gomez-Ramirez

57. E-Business Management and Workflow Technologies

Zeljko Djuricic, Natasa Ilic, Zeljko Djuricic, Veljko Milutinovic

58. Economic Decision-making in a Technological Age

James R. Forcier

59. Complexity and the Emergent Web

Sorin Solomon, Eran Shir

60. E-Diagnosis Using GeneChip Technologies

Zhao Lue-Ping, S. Gilbert, C. Defty

61. e-DOCPROS: An e-Business Document Processing System

Zhenfu Cheng, Xuhong Li

62. Effects of Changing the Pedagogical Concept of a Part-time Bachelor of Science in Accounting from Traditional Lectures into an IT-supported Asynchronous and Flexible Teaching & Learning Concept

Lars Kiertzner, Maya Dole, Tage Rasmussen

63. e-Infrastructure in a complex environment

Julian Smith

64. E-learning at ENSAIT: a case study

Pierre Douillet, S. Pessé, A. M. Jolly

65. E-Learning Content Creation with MPEG-4

Michael Stepping

66. E-Learning of Spanish with Interactive Video and Blackboard Technologies for Elementary School Children

Julia Coll

67. EMERGENCY! Medicine and Modern Education Technology

Dag K.J. E. von Lubitz, Benjamin Carrasco, Francesco Gabbrielli, Frederic Patricelli, Tymoty Pletcher, Caleb Poirier, Simon Richir

68. e-Medicine Utilization: Socio-cultural issues

file:///F¦/papers.html (5/15)2004/03/22 13:16:33

Page 7: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

Robert Doktor, David Bangert

69. Emerging market mechanisms in Business-to-Business E Commerce A framework

B. Mahadevan

70. Enhanced Security Watermarking and Authentication based on Watermark Semantics

Dimitrios Koukopoulos, Y. C. Stamatiou

71. Environment for Teaching Support in the Medical Area

Rosa Maria Vicari, Cecilia Dias Flores, Louise Seixas, André Silvestre

72. Epidemic Communication Mechanisms in Distributed Computing

Oznur Ozkasap

73. Evaluating Java Applets for Teaching on the Internet

Michael R. Healy, Dale E. Berger, Victoria L. Romero, Amanda Saw

74. Evaluating network intrusion detection algorithm performance as attack complexity increases

Dirk Ourston, Bryan Hopkins, Sara Matzner, William Stump

75. Evaluating the Quality of Service for a Satellite Based Content Delivery Network

Helmut Hlavacs, Guido Aschenbrenner, Ewald Hotop, Aadarsh Baijal, Ashish Garg

76. Evaluation and perspectives of innovative Tunisian e-learning experimentation

Mohamed Jemni, Henda Chorfi

77. Evaluation of Minimal Deterministic Routing in Irregular Networks

Tor Skeie, Ingebjørg Theiss, Olav Lysne

78. Evolution and Convergence in Telecommunications

Gennady G. Yanovsky

79. Extending SOAP for handling lighweight transactional information

Mario Jeckle

80. Extending the Personal Response System (PRS) to Further Enhance Student Learning

Joan Wines, Julius Bianchi

81. Federated Profile Information Architecture

Guoping Jia

82. Fusion of Multiple Images with Robust Random Field Models

file:///F¦/papers.html (6/15)2004/03/22 13:16:34

Page 8: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

Kie B. Eom

83. e-Business MUSIC: New Ways to Perform Introspection Within the Corporation

Enrique Espinosa

84. Generating color palettes for compressed video sequences

Yuk-Hee Chan, Wan-Fung Cheung

85. Genetic Algorithms for Internet Search: Examining the Sensitivity of Internet Search by Varying the Relevant Components of Genetic Algorithm

Vesna 各嗽m, Dragana Cvetkovic

86. GroupIntelligence: Automated Support for Capitalising On Group Knowledge

Jules de Waart, Michiel van Genuchten

87. From Innovators to Laggards: Computer Scientists and E-learning

Roger Boyle, Martyn Clark

88. How to find similar web sites by using only link information

Satoshi Kurihara, Toshio Hirotsu, Toshihiro Takada, Osamu Akashi, Toshiharu Sugawara

89. Hardware RAID - 5 versus Non-RAID solution under UNIX Operating System

Borislav Djordjevic, Stanislav Miskovic, Nemanja Jovanovic, Veljko Milutinovic

90. Identity Management: a Key e-Business Enabler

Marco Casassa Mont, Pete Bramhall, Mickey Gittler, Joe Pato, Owen Rees

91. Impacts of the Global Information Society on the Banking Industry

Ondrej Slapak

92. Implementation of a remote-assistant application via Web over IP networks: CIMA Project

Francisco Sandoval, Francisco Javier González Cañete, Francisco Miguel García Palomo, Eduardo Casilari Pérez

93. Implementation of Feedback TM an Application for Quality Assurance, Learning and e-Communication of Diagnosis of Medical Images

M. Bergquist, H. Gater, O. Flodmark, J. Hedin, S. Hedin, M. Hellström, B. Jacobson, B. Johansson, N. Lundberg, K. Måre, J. Wallberg, P. Wenngren

94. The social infrastructure of E-Education

Peter Lyman

file:///F¦/papers.html (7/15)2004/03/22 13:16:34

Page 9: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

95. Information Publishing on FRIENDS

Alfons H. Salden, Ronald J. van Eijk, Mortaza S. Bargh, Johan de Heer

96. Infrastructure For E-Business, E-Education, E-Science, and E-Medicine; Challenges For Developing economies. The Nigerian Experience

Babatunde O.R. Ogundele

97. Observations and prescriptions for Web Standards

David Bodoff, Mordechai Ben-Mehachem

98. Infrastructure in Education time to learn lessons from elsewhere?

Tony Shaw

99. Infrastructure, requirements and applications for eScience: a European perspective

Ron Perrott

100. Infrastructures for Mobile Services in e-Medicine

Heinz Thielmann

101. SEMPEL: A Software Engineering Milieu for PEer-Learning

V.Lakshmi Narasimhan

102. Integrating Emerging E-Technologies into Traditional Classroom Settings

Jay M. Lightfoot

103. Integrating the Teaching of Psychology with Web-Based Distant Learning: Practicum and Internship

V. Wayne Leaver

104. Interconnecting Networks and the Performance of Multithreaded Mutiprocessors

Wlodek Zuberek

105. INTERNET PRIVACY CONCERNS AND TRADE-OFF FACTORS EMPIRICAL STUDY AND BUSINESS IMPLICATIONS

Tamara Dinev, Paul Hart

106. Internet: A Powerful Tool in Disseminating Medical Knowledge in Urban and Rural India

Deena Suresh, Dr. CB Sridhar

107. Introduction of Information Infrastructure for Medical Academic Activities in Japan - UMIN and MINCS-UH

Takahiro Kiuchi

108. Learning and Networking Concepts and Components of the Global Seminar

Dean Sutphin

file:///F¦/papers.html (8/15)2004/03/22 13:16:34

Page 10: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

109. Learning Objects -Pedagogy Based Structuring of Course Materials

Paul Juell, Elizabeth Smith, Lisa Daniels, Vijayakumar Shanmugasundaram

110. Living Book: an Interactive and Personalized Book

Margret Gross-Hardt, Peter Baumgartner, Anna B. Simon

111. Local telematics services for higher education

Joze Rugelj

112. Maestro: A Middleware for Distributed applications based in components software

Jorge Risco Becerra

113. Magenta Multi-Agent Engines For Decision-Making Support

Peter Skobelev, V. Andrejev, S. Batishchev, K. Ivkushkin, I. Minakov, G. Rzevski, A. Safronov

114. Mapping Object Oriented Models into Relational Models: a formal approach

Pedro Ramos, Luís Rio

115. Marketing and Engineering Criteria for the Implementation of a top level Tnternet Infrastructure

Enrique S. Draier

116. Marrying Sanskrit to Java - an e-tutor for Sanskrit

Sudhir Kaicker, Jayant Shekhar

117. m-commerce: why it does not fly (yet?)

Peter Langendoerfer

118. Measurement Technique for Object Oriented Systems

Sallie Henry, Cary Long

119. Measuring the Effectiveness of Internal Electronic Communication Channels in Achieving Business Goals

Angela Sinickas

120. Medical eLearning, eTraining and Interactive Telemedicine via Satellite in the operating room of the future

G. Graschew, T. A. Roelofs, S. Rakowsky, P. M. Schlag

121. Meta-Learning Functionality in eLearning Systems

Ulrik Schroeder

122. Mobile Commerce: Some Extensions of Core Concepts and Key Issues

Christer Carlsson, Pirkko Walden

file:///F¦/papers.html (9/15)2004/03/22 13:16:34

Page 11: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

123. Models for E-Learning environment evaluation: a proposal

Francesco Colace

124. Multidrop Generic Framing Procedure (GFP-MD)

Kari Sepp舅en

125. Multi-grid Parallel Algorithm with Virtual Boundary Forecast for Solving 2D Transient Equation

Guo Qingping, Yakup Paker, Dennis Parkinson, Wei Jialin, Zhang Sheng

126. Multilingual Multimedia Electronic Dictionary for Children

Valentin E. Brimkov, Reneta P. Barneva, Peter L. Stanchev

127. Mutual indexing of video and bulletin board for lecture video

Hirohide Haga

128. Navigation Support System for Live e-CRM

Hideto Ikeda, Nikolaos Vogiatzis, Aki Shibuya

129. New media - traditional universities: Success factors and obstacles for e-learning technologies

Georg J. Anker, Yuka Sasaki

130. Object Oriented Communication Design Tool usable for Everyone

Hajime Nonogaki

131. On the Viability on E-learning

Sunil Choenni

132. Optimal Link Allocation and Charging Model

Jyrki Joutsensalo, Timo Hamalainen

133. Oral Metaphor Construct. New direction in cognitive linguistics

Asa Stepak

134. Our Progress Into E-Business Education: How we have Incorporated Higher-Order Thinking Skills into our Web-based class

Rexford H. Draman, Robin Eanes

135. Overview of the role of ATM/AAL2 Aggregator in UMTS Access Network

Aleksandar D. Petrovic

136. Parallel Solutions of Coupled Problems

Felicja Okulicka Dluzewska

file:///F¦/papers.html (10/15)2004/03/22 13:16:34

Page 12: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

137. Practical Traffic Grooming Formulation for SONET/WDM Rings

Paul Ghobril

138. Privacy Issues Arising from a Smart_ID Application in eHealth

John Fulcher

139. The Brave New World of the Cyber Speech and Hearing Clinic: Treatment Possibilities

William R. Culbertson, Dennis C. Tanner

140. GIS and DGPS via Web: the GIS on line of the Everest National Park

Giorgio Vassena, Roberto Cantoni, Carlo Lanzi, Giuseppe Stefini

141. Holarchies on The Internet: Enabling Global Collaboration

Mihaela Ulieru

142. Purdue Center for Technology Roadmapping: A Resource for Research and Education in Technology Roadmapping

Edward J. Coyle

143. QUALITY MANAGEMENT SYSTEM BASED ON THE NATIONAL TRAUMA REGISTRY

Drago Brilej, Radko Komadina

144. Rationales for Consumer Adoption or Rejection of E-Commerce: Exploring the Impact of Product Characteristics

Bill Anckar

145. Some remarks on time modelling in interactive computing systems

Merik Meriste, Leo Motus

146. Schema Validation Applied to Native XML Databases

Gongzhu Hu, Qinglan Li

147. Search and Discover on the Web

Bipin C. Desai

148. Server Load Balancing in the Next Generation Internet

Jamalul-lail Abdul Manan, Habibah Hashim

149. Service Oriented Community Systems for Mobile Commerce

Kinji Mori

150. SIP and the Internet

Gianni Scandroglio

file:///F¦/papers.html (11/15)2004/03/22 13:16:34

Page 13: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

151. Socrates Meets The Web: Incorporating the Internet Into U.S. Law Classes

Anna Williams Shavers

152. Software Issues for Applying Conversation Theory For Effective Collaboration Via the Internet

William Klemm

153. Solving scaling problems with the modern GUI

Peter M. Bagnall

154. Some like it soft

Ole Lauridsen

155. A Monitoring System for Manufacturing Machines Based on SNMP

GSangyong Lee, Joongsoon Jang, Gihyun Jung, Kyunghee Choia

156. Enhancing IDS performance through dropping hacking-free packets

Jongwook Moon, Jongsu Kim, Gihyun Jung, Kangbin Yim, Kyunghee Choi, Haiyoung Yoo

157. Analysis on Utilization and Delay of Memory in a Lossless Packet Processing System

Jongsu Kim, Jongwook Moon, Gihyun Jung, Kangbin Yim, Kyunghee Choi, Joongsoon Jang

158. Protecting Mail Server using the CBT algorithm

Hyun-Suk Lee, Soo-Juong Lee, Hui-Sug Jung, Gihyun Jung, Kyunghee Choi

159. Storage Technologies for an Efficient e-Infrastructure

Satish Rege

160. Structured Metadata Analysis

Steve Probets

161. Superscalar in City-1: An Educational Guide to the next step beyond Pipelining

Ryuichi Takahashi, Noriyoshi Yoshida

162. Supervision of Electrical Utility Works Based on Internet

Felipe Alaniz, Pablo R. de Buen

163. Teaching Novices Programming Skills Efficiently: What, When and How?

Yuh-Huei Shyu

164. Teaching, Technology and Teamwork

Elaine Carbone, Shaun Stemmler, Jon Beal

file:///F¦/papers.html (12/15)2004/03/22 13:16:34

Page 14: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

165. Software solutions for Science e-Education: A case study from the VISIT Project

Yichun Xie

166. Technologies for Student-Generated Work in a Peer-Led, Peer-Review Instructional Environment

Brian P. Coppola, Ian C. Stewart

167. TEN WAYS TO IMPACT THE WEB WITHOUT A WEB MEISTER

Ken McNaughton

168. The Architecture of Knowledge: Representation and Theorization of Violence on the Internet

Lily Alexander

169. The emergence a of web-mediated genres: the home page

Anne Ellerup Nielsen

170. The Emerging Autosophy Internet

Klaus Holtz, Eric Holtz

171. The Future of Education

Lalita Rajasingham

172. The impact of internet technologies on the financial markets

Ross A. Lumley

173. The Mathematical Structure model of a Word-unit-based Program

Hamid Fujita, Osamu Arai

174. The Role of XML in E-Business

Betty Harvey

175. Think before you click customerschallenges in the e-commerce

Zita Zoltay Paprika

176. Topological Design of Multiple VPNs over MPLS Network

Anotai Srikitja, David Tipper

177. Toward logical-probabilistic modeling of complex systems

Taisuke Sato, Yoichi Motomura

178. Towards to e-transport

Miroslav Svítek, Mirko Nov疚

179. Emergence and Evolution of Microturbine Generators [MTGs] to Provide Infrastructure for E-Related Applications

file:///F¦/papers.html (13/15)2004/03/22 13:16:34

Page 15: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

Stephanie L. Hamilton

180. Using Building Blocks to Implement a Business-to-Supplier Portal

Shannon Fowler

181. Using CORBA Interceptors to Implement a Security Wrapper

Luigi Romano, D. Cotroneo, A. Mazzeo, S. Russo

182. Using Internet and Database Technology to Enable Collaboration between Researchers and Teachers Developing Educational Websites Featuring Endangered Species Research and Conservation

Mary A. Overby, Mark MacAllister, Jeffrey Hoffman, Chris Bulla

183. Using the Quick Look Methodology to Plan and Implement Complex Information Technology Transformations

Richard C. Staats

184. Verifying and Leveraging Software Frameworks

Trent Larson

185. Virtual Communities for Service Delivery: Transferring the Notion of Pro-Social Behavior from 撤laceto 鉄pace"

Ko de Ruyter, Caroline Wiertz, Sandra Streukens

186. Visualizing Molecules Helps Students 'See' Chemistry in a New Light

Harry Ungar, Albion Baucom

187. Wavelet-based Blind Watermark Embedding Technique

Sanghyun Joo, Yongseok Seo, Youngho Suh

188. Web-based Tools for Supporting Health Education

William B. Hansen

189. What can you do with a frozen leg of lamb? - Connecting products and information services in a web-based environment

Benkt Wangler, Ingi Jonasson, Eva Söderström

190. What is Virtual about the Web?

Murat Karamuftuoglu

191. Wireless Control of the Virtual Kiosk

Charles A. Milligan, Steven H. McCown

192. World-wide interaction with 3D-data

Gerd Kaupp, Svetlana Stepanenko, Andreas Herrmann

file:///F¦/papers.html (14/15)2004/03/22 13:16:34

Page 16: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

SSGRR-2002s - Papers

193. XML Technologies, Value-based Marketing, Franchising and the New Paradigm in Business

Dino Karabeg

194. Electronic Public Transmission Act of 2002 to cope with the Convergence and as the Minimum Regulations on the Internet

Koichiro Hayashi

195. Domain-Specific Language Agents

Merik Meriste, Jüri Helekivi, Tõnis Kelder, Leo Motus

196. Development of Distributed Package of Finite Element Method

F. Okulicka-Dluzewska, J.M. Dluzewski

197. Feasibility Study and Strategic Business Analysis of Fuel Ethanol Production in Indiana (May 2002)

Dusan V. Milutinovic

198. Virtual Marketplace on the Internet (May 2002)

Zaharije R. Radivojevic, Živoslav Adamovic, Veljko M. Milutinovic

199. Dissemination Of World Health Organisation Reproductive Health Library (WHO-RHL)Information To Doctors In IndiaRECON HEALTHCARE, BANGALORE MODEL

CB Sridhar, Deena Suresh

200. Technological High School Education through Internet

L. P駻ez Silva, F. Cabiedes Contreras, F. Gamboa Rodr刕uez, F. Lara Rosano, A. Viniegra Hern疣dez

201. Agent-based brokerage of personalised B2B mobile services

Alfons H. Salden, Ronald J. van Eijk, Mortaza S. Bargh, Johan de Heer

202. Denial of Service Attacks: methods, tools, defenses

Fred Darnell, Bratislav Milic, Milan Savic, Veljko Milutinovic

203. Scalability and Knowledge Reusability in Ontology Modeling

Mustafa Jarrar, Robert Meersman

204. (Web) Self Service

Tanja MILOŠEVIC

file:///F¦/papers.html (15/15)2004/03/22 13:16:34

Page 17: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

1

How to find similar web sites by using only link information

Satoshi Kurihara, Toshio Hirotsu, Toshihiro Takada, Osamu Akashi, and Toshiharu Sugawara

NTT Network Innovation Labs. 3-9-11, Midori-cho, Musashino-shi, Tokyo, 180-8585

JAPAN [email protected]

Abstract—We are studying techniques that allow even ordinary end users to make efficient use of the Internet. We previously proposed an algorithm for determining the degree of similarity between web sites by using link information to find web sites that are mirrors of each other and ones that are not mirrors but have similar content and can be used as substitutes for each other. As a result of verifying the basic effectiveness of that algorithm, we found that when trying to find similar web sites to site-A, in addition to ones found to have almost 100% similarity to site-A, there were also ones that were thoroughly adequate for use as substitutes for site-A, even though they had a low degree of similarity of 50% or less. Therefore, for practical use of that algorithm, it is essential to be able to automatically judge whether web sites that can be inferred to have some kind of similarity are actually mirror sites or similar sites that can be used as substitutes. To solve this problem, in this paper, we propose and evaluate the basic effectiveness of an automatic judgment methodology, and we focus on its operation and propose a methodology for effectively finding candidates for a similar site by using a user’s Internet access history. Index Terms—Internet, Mirror site, Access history, Link information

I. INTRODUCTION

Due to the rapid expansion of the Internet, it has become possible for ordinary end users to obtain many kinds of information easily. However, it is still difficult for them to use the network effectively. For example, although mirror servers and cache servers have been provided in order to improve scalability and response times, it is difficult for users to identify the optimal server.

To solve this problem we have already proposed a “URL Resolver” framework, which allows users to select the optimal server from multiple servers that provide various kinds of services via data storage facilities such as caches or mirror servers [1]. To enable users to select one of the servers, it is first necessary to gather information such as a list of servers that might be useful to the user. Initially, we focused on information related to mirror sites or

similar sites, and have already proposed a basic algorithm for detecting similar web sites by focusing on the link information embedded in web pages [2]. As a result of verifying the basic effectiveness of that algorithm, we then found that there are some sites that are thoroughly adequate for use as substitutes yet have a degree of similarity of no more than 50%. But to use this detection method in practice, it is necessary to employ a mechanism for automatically judging whether sites for which a low degree of similarity has been detected are mirrors or similar sites that can actually be used instead of mirrors. So, in this paper, we propose an automatic determination algorithm, in which web pages are divided into hub-type and content-type and the judgment is done based on the results of judgment algorithms specifically tailored to each type of web page. Initial trials of this approach have yielded favorable detection results. We also examine the operation of this detection methodology and propose an algorithm for effectively finding candidates for similar web sites by using the user’s access history to the Internet.

Section 2 reviews our previously proposed algorithm for detecting similar web sites based on link information and describes our new automatic similar web site detection method. Section 3 discusses a similar-web-site candidate finding method.

II. USING LINK INFORMATION TO FIND SIMILAR

WEB SITES

A. HOW TO FIND A SIMILAR WEB SITE? We define a mirror site as follows:

This definition is based on the observation that mirror sites or sites that hold information that is so similar that they closely resemble mirror sites should more or less match in terms of the number and types of links embedded within them, even if there are slight differences

If the link structure of site-A is very similar to that of site-B, then sites-A and -B are mirrors of each other.

Page 18: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

2

such as inserted advertising banners (This definition is based on [3]).

The detection method we proposed in reference [2] is as follows. Assume starting site-A and mirror candidate site-B. The degree of similarity between these two sites is as follows. The total number of embedded inward links that can be gathered when tracing the links of web pages to a depth of N levels from the top web page of site-A is referred to as url (Ain)N, and the total number of embedded outward links is referred to as url(Aout)N. Here, an inward link is one in which the host part of the link’s destination URL is the same as that of the current host, and an outward link is one link in which the host part of the link destination is different. The corresponding properties of site-B are similarly expressed as url(Bin)N and url(Bout)N. Then, the total number of inward links in url(Bin)N that are also included in url(Ain)N is expressed as url(Ain ∩ Bin)N, while the corresponding property of the outward links is expressed as url(Aout ∩ Bout)N. At this point, when determining the value of url(Ain ∩ Bin)N, the comparisons are made after replacing the host parts of site-A and -B with the same arbitrary text strings. So, the degree of similarity between site-A and -B when links are followed to a depth of N levels is denoted by the symbol α , which is given by

α = url(Ain ∩ Bin)N + url(Aout ∩ Bout)N

url(Ain)N + url(Aout)N × 100 (%).

Since this procedure only compares the link structures, it does not perform a text-level comparison of every character in every word on the web pages. The reasons for adopting this approach are as follows:

(1) As mentioned above, we think it is possible to judge the similarity of hypertext documents such as web pages by comparing only their link structures. The practicality of focusing on the link structure in web pages in also highlighted in other studies [4] and [5].

(2) In this procedure, although a lot of processing time is taken up by gathering web pages, the amount of text to be compared also increases substantially when links are followed to a depth of several levels and much more time is required for a comparing text than for comparing just the links. Besides, the gathering work can be speeded up by increasing the network bandwidth, so we decided not to compare the processing times required for a text-level comparison.

(3) We are planning to use this similar-web-site finding method even in environments with limited processing resources, such as users’ notebook PCs. Therefore, considering the storage of information obtained when calculating the degree of similarity, performing a text-level comparison would require all the text information to be stored, which would be a waste of resources. The link information takes up considerably less space than the text information, which is another

reason why we decided not to perform a text level comparison.

Next, we discuss the way to find candidates for mirror sites. Using a web robot to recursively access suitable sites indiscriminately and compare them with site-A to

find a candidate for site-B would be far too inefficient, so instead we adopted the following strategy:

For the actual trials, we extracted 1000 URLs entries from the access log stored in a proxy server used by our organization of about 200 people, and applied our similar-site detection program to each one (See α in Figure. 1). Similar site candidates were detected for 65% of these. It is interesting to note that we found that many sites can be used as substitutes, even though their degrees of similarity were less than 50% (see Table 1). So, if a way can be found to automatically judge whether or not they are actually capable of being used as substitutes, then it should be possible to present a greater number of sites to the users in addition to the sites having a high degree of similarity for which judgment is unnecessary.

Fig. 1: Detection results

Since web sites that employ mirror servers do so withthe aim of dispersing the load, they will probably wantto provide users accessing the site with informationabout these mirrors. In other words, it is reasonable toassume that the site will make some mention of whereits mirrors can be found. Accordingly, it is highlylikely that site-B can be found by gathering andanalyzing the content accessible within a certainnumber of link levels from the top page of site-A. It isalso highly likely that the web site will contain links tosites of a similar nature, so there should be a highlikelihood of being able to find similar sites bychecking the link structure.

Page 19: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

3

Degree of similarity

Strength of relationship between two sites

0%–10% Probably unrelated

10%–60% May include some sites of a similar nature

60%–90% Either a mirror site or a site that is highly similar

90%–100% Almost certainly a mirror site

Table 1: Results of classifying detected sites

B. SITES CAPABLE OF BEING USED AS SUBSTITUTES

Thus, we propose the following detection method. First, we divide web pages into the following two broad categories according to the style of user access.

• Web pages that are accessed as a starting point for net surfing are called hub-type sites.

• Web pages that are accessed in order to view the content on the page itself are called content-type sites.

Then, by considering the conditions of sites that can be considered as substitutes for hub- and content-type sites, respectively, we propose the following degree-of-similarity calculation methods.

1) METHODOLOGY FOR JUDGING A HUB-TYPE SITE

For example, consider hub-type sites-A and –B. If site-A has many embedded external links that are the same as those in site-B, then it is highly likely that the user will be able to use both sites equally.

That is, site-A and the possible substitute candidate site-B are deemed to have a greater degree of similarity with respect to their outward links if they satisfy the condition

α < β , (1)

where α is as defined in Section 2.1 and

β = url(Aout ∩ Bout)N

url(Aout)N x 100(%)

is the degree of similarity related to outward links only, from which it can be inferred that site-B is highly likely to be suitable for use as a substitute hub-type site. 2) METHODOLOGY FOR JUDGING A CONTENT-TYPE SITE

On the other hand, in a content-type site we think that there may be some differences in the page structure such

as the way of embedding links, even if a site is capable of being used as a substitute. To deal with this, in addition to the links, we also use the label strings of links as important elements expressing the attributes of the links, and add to the calculation of the degree of similarity as follows: we use these labels corresponding to the text enclosed within the links; e.g., the text string “XXXXXX” in the link “<A href="url">XXXXXX</A>”, and the text string “YYYYY” in the link “<Ahref="url"><IMG src="url" alt="YYYYY"> </A>”.

We decided to rate these links by scoring them according to the length of the text strings “XXXXXX” and “YYYYY” embedded in their labels when a match is found between a pair of labels. Note that the calculation is performed using only the text string “XXXXXX” for links where the text strings “XXXXXX” and “YYYYY” match.

In content-type sites like a news site, the headline of the article is usually used as a link label, and the string length of the headline is usually longer than that of a link label whose reference address is another Web site.

An example of a link in which the alt option is set is as follows: <a href = http://www.apple.com/store/ > < imgsrc = "http://a772.g.ak···/2.gif" width = "84"height="42" alt="The Apple Store." Border ="0"></A>

In the algorithm in [2], the degree of similarity was calculated using only the text string of the URL part “http://www.apple.com/store”, but here in addition to this, the link label “The Apple Store.” is also included in the calculation. The labels are scored according to the following rules:

(1) When the URL parts and label parts both match, the link is awarded a score corresponding to the number of characters in the label.

(2) When the URL parts match but the label parts are different, the link is awarded a score of 70% of the number of characters in the starting link label.

(3) When the label parts match but the URL parts are different, the link is awarded a score of 50% of the number of characters in the starting link label.

(4) When both parts are different, the link is awarded no score.

These scoring settings are made based on experience, and further study is required to investigate their validity. Also, for rule (3), since we focus on the similarity of the link structure, it could conceivably be wrong to consider cases where the URL parts are different. However, in the case of content-type sites, since we concentrate on the label parts, we decided to include cases where the URL parts are different in the detection by reducing the score awarded. In the above example of “The Apple Store.”, if a link is detected whose URL parts and label parts are identical when matching the link with the mirror candidate site,

Page 20: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

4

then this link is awarded 16 points (the number of characters in “The Apple Store.”). In calculating the number of characters in a label, all single-byte and double-byte characters (including English and Japanese characters, spaces, and so on) are each counted as one character.

The value of urllabel(Ain)N for the starting site is given by the sum of the number of characters in the labels added to each link in url(Ain)N, and is awarded the maximum possible score when matching is performed with an identical mirror site. The value of urllabel(Bin)N for a mirror candidate site-B is defined in the same way. Furthermore, the value of urllabel(Ain ∩ Bin)N is given by the sum of the scores awarded for matching combinations of the abovementioned URL parts and label parts in each respective label. If the degree of similarity between site-A and -B in terms of inward links is given by

γ = urllabel(Ain ∩ Bin)N

urllabel(Ain)N x 100(%) , then if

α <γ , (2)

it is judged to be likely that the mirror candidate can be used as a substitute for a content-type site.

When the number of links used as the denominator of α or β or γ, when judging Equations (1) and (2), is small (in the current version, less than 10), the degree of similarity is recalculated by following links to a greater depth. Unfortunately, this procedure is unable to detect sites that have a mirror relationship but have differences between both the link structure and the labels added to the links. However, it is doubtful whether many sites of this sort actually exist.

At present, the following simple techniques are used to select a URL from the list of URLs that are possibly mirrors: (1) select the site with the highest likelihood and (2) select the candidate with the highest transfer rate at the time of retrieval in the case of multiple candidates by phase (1). In the future, we also plan to make use of the transfer rate at the time of user access and feedback data from users, etc. Here we note that in terms of user access, the process of indicating the most suitable URL requires real-time properties unlike the mirror search process. In relation to the above, we are investigating using a technique that can flexibly select optimal strategies for selecting a URL at any time through an algorithm that executes multiple strategies in parallel [9]. For example, when a user is the first to access a certain URL, there is no time available that for measuring the transfer rate, and

the most suitable URL is selected on the basis of information from the mirror information managing agent. On the other hand, there may be a small amount of time available up until the user clicks an anchor within that URL, and if such is the case, it might be possible to select the most suitable URL according to new transfer rate information. If this can be accomplished, access will be forcibly changed to the most suitable URL when the user clicks the anchor. C. INITIAL TRIALS

As mentioned in Section 2.1, Fig. 1 shows the results of calculating β and γ for 1000 URLs. About 18% of the URLs were classified as hub-type sites with a degree of similarity of 30% or more, and about 6% of them were classified as content-type sites. Both these include URLs that were detected as hub-type and content-type pairs respectively. We then manually checked 50 sites for which either β or γ was 30% or more from among the sites classified as hub- or content-type sites, and found that all of them were indeed suitable for use as substitutes for these hub- and content-type sites. In future we plan to perform verifications with a greater number of access logs and to investigate and examine the reliability of the degree of similarity calculations.

III. USING USER’S ACCESS HISTORY

With the procedure in Section 2.1, we were able to detect similar sites by using an access log as a starting point. However, it will be more effective if it is possible to detect similar sites that are significant for each individual end user. Of course, facilities such as proxy servers contain access logs that reflect the character of the community that uses them, and can themselves be thought of as candidates for similar web sites that may match the users’ preferences. However, in the current version, we can only find mirror or similar sites that are limited to the range of sites traced from the starting host. That is, we do not evaluate the degree of similarity between different hosts in the access log. This is because it would lead to a combinatorial explosion and we judge it to be inefficient. However, it is clear that it is highly effective to detect similar sites including hosts that cannot be reached from the detection origin host, not just the hosts recorded in the access log. Therefore, we propose a method for retrieving mirror or similar sites by using the users’ access history to filter similar site candidates.

Page 21: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

5

Figure 2 shows excerpts from web pages related to the same content (new digital camera products) in four web sites. On finding an article about a new product on one web site, many people (certainly the authors do) often habitually browse through other related web sites and look for articles related to the same content. This is because the content of the articles changes slightly from one site to the next. In the example shown in Fig. 2, an article related to resolution and the number of pictures that can be taken was only mentioned at www.nikkeibp.co.jp, while an article relating to the manufacturer’s business strategy was only mentioned at

www.watch.impress.co.jp, and detailed specifications were only mentioned at www.zdnet.co.jp.

Here, when a user browses through some content zzz at a certain site-A, if sites-B, -C, and -D which are highly likely to contain similar articles related to content zzz—i.e., sites that have a high degree of similarity to site-A—have been detected, then the user will be more likely to obtain a greater amount of information if these sites are recommended to him/her. Next, we discuss how to efficiently extract sites-A, -B, -C, and -D.

1. First, acquiring the following user’s access history: every time the user clicks on a link, we extract site-R in which this link is embedded, site-T which is the destination site of the link, and label-L which is the text string of the link’s label. Moreover, label-L is subjected to morphological analysis (using widely used general-purpose morphological analysis software, like [7]) to extract several noun parts nN ⋅⋅⋅1

1, and {R, T, nN ⋅⋅⋅1 } triplets are recorded. In the example shown in Fig. 2, the following lists are recorded:

{biztech.nikkeibp.co.jp, www.kodak.co.jp,“Kodak”}{www.watch.impress.co.jp/pc, www.kodak.co.jp,“Kodak”}{www.watch.impress.co.jp/av, www.kodak.co.jp,

1 By the morphological analysis, a noun is classified into a proper noun or a general noun or an unknown word, and we use a proper noun and an unknown words to express a character of a link.

Fig. 2: Examples of the same conent in different web sites.

www.zdnet.co.j

www.watch.impress.co.jp/p

www.nikkeibp.co.j

www.watch.impress.co.jp/

Page 22: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

6

“Kodak”}{www.zdnet.co.jp/news, www.kodak.co.jp,“Kodak”}

2. When there are pages carrying the same content in

different sites, it is highly likely that the destinations of the outward links embedded within these pages will be the same, so there is a higher possibility that access histories such as {Ra, T, N} and {Rb, T, N} where only site-R is different can be extracted to evaluate similarity. In Fig. 2, a link to the manufacturer’s site “Kodak” is embedded in all the sites.

3. Then, by extracting from the access history the sites-R1...n for which the site-T and N terms are the same and only the R terms are different, we can obtain a list of sites where the same content appears, and the degree of similarity between these sites is calculated. Of course, a different site list could be accumulated from all the sites where only the noun parts N are the same, but in practice the content will have a lower likelihood of being related.

This procedure is very general-purpose because it can learn {R, T, N} triplets as soon as the user first accesses sites, even if they have not yet been registered in the access log.

As for a way to recommend detected sites to the users, several methodologies are considered as follows: When the user has accessed any one of these sites, he/she is recommended to browse other sites with priority given to those having a higher degree of similarity. Moreover, when the user has accessed site-T which has already been recorded in {R1...n, T, N}, he/she is recommended to browse other sites with priority given to pages in the individual Rm of R1...n whose content has been updated recently. Another effective measure is to pre-fetch the contents of similar sites related to sites accessed by the user and to display a compiled list of these sites.

If there is a similarity relationship between site-A and site-B, but site-B is the competitor of site-A, it may be difficult to find a similar web site-B from site-A by using the strategy proposed in section 2.1. But, by using user’s access history, it may be possible to find a similarity relationship between site-A and site-B.

To verify the basic efficiency of this methodology, we investigated how many {R, T, N}s, having the same noun part N and same URL of the destination site T could be found from two similar sites. Figure 3 shows the results of this investigation: First, we extracted the link information from www.watch.impress.co.jp and www.zdnet.co.jp, which are hub-type sites concerning new products in the computer or office automation fields, and from www.asahi.com and www.yomiuri.co.jp, which are web sites of newspapers. Specifically, we extracted noun parts and their destination sites of the outward links to a depth of 3 levels (N=3). And second, we searched for the following types of {R, T, N}s from this link information: Case-I: {R, T, N} in which noun part N and destination

site T are both the same. Case-II: {R, T, N} in which only noun part N is the same. Case-III: {R, T, N} in which only destination site T is the

same. Finally, we checked that among the searched {R, T, N}s in Case-I whether each {R, T, N} did indeed express the character of the site T or not. The results show that even though many {R, T, N}s were searched for Case-II and Case-III from every combination of the sites, in Case-I, {R, T, N}s were mainly extracted from only combinations of the similar sites (“watch vs. zdnet” and “asahi vs. yomiuri”). And although, several {R, T, N}s were also extracted from the combination of “watch vs. asahi” having no relationship between them, we could find only one {R, T, N} which indeed expressed the character of both sites (see the following partial lists of extracted {T, N}s). watch vs. zdnet {http://www.minolta.co.jp/, MINOLTA} (The company name) {http://www.newtech.co.jp/, NEWTECH} (The company name) {http://www.melcoinc.co.jp/, MELCO} (The company name) {http://www.tsutaya.co.jp/, TSUTAYA} (The company name) {http://www.sony.co.jp/sd/, SONY} (The company name)

All Both N and T are same Only N is same Only T is same When both N and T are same, Case-I Case-II Case-III N indeed expressed the character of T

watch vs. zdnet 24482 22 23966 494 20 asahi vs. yomiuri 2288 15 2198 76 14 watch vs. asahi 4389 8 4281 100 1 zdnet vs. asahi 15879 1 14789 89 0 watch vs. yomiuri 1869 1 1845 23 0 zdnet vs. yomiuri 6350 3 6289 58 0 ( watch: www.watch.impress.co.jp, zdnet: www.zenet.co.jp, asahi: www.asahi.com, yomiuri: www.yomiuri.co.jp )

Fig. 3: Number of extracted {R, T, N}s

Page 23: Veljko Milutinovic, Frédéric Patricelli, School of ...sugawara/pdf/kurihara-SSGRR2002.pdfTelecom Italia Learning Services (Head of International Education) Conference organization

7

watch vs. asahi {http://www.microsoft.com/japan/misc/cpyright.htm, Microsoft} (The company name) {http://www.microsoft.com/japan/misc/cpyright.htm, Corporation.} {http://www.microsoft.com/japan/misc/cpyright.htm, ALL} {http://www.microsoft.com/japan/misc/cpyright.htm, rights} {http://www.microsoft.com/japan/misc/cpyright.htm, reserved}

Therefore, from this initial investigation, we can infer that if two sites have links having the same noun parts and same destination sites, these two sites can be thought as being strongly candidates for having a similarity relationship. Of course, this procedure is still at the stage of initial trials, and we are planning to verify its effectiveness by conducting full-scale verification trials.

IV. CONCLUDING REMARKS

In this study, only link information was used to detect similarity on the grounds that in hypertext environments such as the WWW, links express the most information regarding the characteristics of content. On the other hand, a considerable amount of research is being done in the field of natural language processing for procedures that determine the degree of similarity by analyzing the text content. Reference [8] describes one example of a study in which this procedure is applied to the WWW. However, it has been concluded that this sort of conventional text-based procedure does not function effectively in hypertext environments such as the WWW [5],[6].

Studies of ways to detect mirror sites by focusing on the link structure include references [3] and [4]. However, the aim of those methods is to detect only complete mirror sites, and in these procedures, other information—such as the link connection relationships and the information from a DNS, etc—is used besides the calculated degree of similarity corresponding to α in this study. Our procedure is different in that it regards some sites as being capable of being used as substitutes even though they have a low α value, and aims to detect these sites as well. To do this, we broadly divide web sites into hub-type and content-type sites, and the degree of similarity is calculated using methods tailored to each type. By comparing the degrees of similarity thereby obtained, it is possible to automatically judge whether or not web pages can be used as substitutes for each other.

In this paper, we focused on the operation of this similar web site detection method and proposed an effective procedure for finding candidates for similar web site that match the user’s preferences. This involves storing the connection relationships and label parts of links in sites accessed by the user, and extracting similar site candidates by starting from sites where the noun parts of the labels are the same.

ACKNOWLEDGEMENTS We thank our executive manager, Dr. Keiichi Koyanagi of NTT Network Innovation Labs, and the researchers of the Computer Networking Principles Research Group.

REFERENCES [1] Toshio Hirotsu, Satoshi Kurihara, Toshihiro

Takada, and Toshiharu Sugawara: ARESAIN - Alternative Resource Access Information Navigator, Thirteenth IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS 2001), 2001.

[2] Satoshi Kurihara, Toshio Hirotsu, Toshihiro Takada, and Toshiharu Sugawara: Mirror Site Navigator using Link Information, Proceedings of World Multiconference on Systemics, Cybernetics and Informatics (SCI2000), pp. 283–290, 2000.

[3] Krishna Bharat, Andrei Z. Broder, Jeffrey Dean, Monika Rauch Henzinger: A Comparison of Techniques to Find Mirrored Hosts on the WWW, Journal of the American Society for Information Science (JASIS), Vol. 51, No. 12, Nov. 2000, pp. 1114–1122.

[4] Narayanan Shivakumar and Hector Garcia-Molina: Finding near-replicas of documents on the web, International Workshop on the World Wide Web and Databases (WebDB ’98), 1998.

[5] O. Zamir and O. Etzioni: Grouuper -A Dynamic Clustering Interface to Web Search Results-, The Eighth International WWW Conference, 1999.

[6] L. Page, S. Brin, R. Motwani, and T. Winograd: The PageRank Citation Ranking: Bringing Order to the Web, Work in progress. http://google.stanford.edu/~backrub/pageranksub.ps.

[7] http://chasen.aist-nara.ac.jp/ [8] S. Chakrabarti, B. Dom, R. P., S. Rajagopalan, D.

Gibsoon, and J. Kleinberg: Automatic Resource Compilation by Analyzing Hyperlink Structure and Associated Text, The Seventh International WWW Conference, pp. 65–74, 1998.

[9] S Kurihara, S, Aoyagi, S, Onai, R, and Sugawara, T: Adaptive Selection of Reactive/Deliberate Planning for the Dynamic Environment, Robotics and Autonomous Systems, vol. 24, No. 3--4, pp. 183--195, 1998.