首页 > 最新文献

2012 Ninth International Conference on Information Technology - New Generations最新文献

英文 中文
An Exploratory Study of the Users' Behavior on Social Network Sites 社交网站用户行为的探索性研究
Shwu-Min Horng
This study makes use of Google Analytics data from four social network sites under web 2.0 setting to analyze their users' behavior. Several statistical techniques are used to analyze the data based on the measures across the four companies with seven cases. Some interesting findings indicate that certain patterns emerge according to the characteristics of the web services. Managerial implications are discussed along with suggestions for future research.
本研究利用Google Analytics数据从四个社交网站在web2.0设置下分析其用户的行为。采用了几种统计技术,对四家公司的七个案例进行了数据分析。一些有趣的发现表明,根据web服务的特征出现了某些模式。讨论了管理意义以及对未来研究的建议。
{"title":"An Exploratory Study of the Users' Behavior on Social Network Sites","authors":"Shwu-Min Horng","doi":"10.1109/ITNG.2012.69","DOIUrl":"https://doi.org/10.1109/ITNG.2012.69","url":null,"abstract":"This study makes use of Google Analytics data from four social network sites under web 2.0 setting to analyze their users' behavior. Several statistical techniques are used to analyze the data based on the measures across the four companies with seven cases. Some interesting findings indicate that certain patterns emerge according to the characteristics of the web services. Managerial implications are discussed along with suggestions for future research.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130165065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Simulation of Multiple-Input Single-Output DC-DC Converter 多输入单输出DC-DC变换器的设计与仿真
T. Taufik, T. Wong, Owen Jong, D. Dolan
This paper presents the design and simulation of Multiple-Input Single-Output (MISO) dc-dc converter. The main purpose of the converter is to allow connection of multiple power sources to a single dc bus system. Design and modeling of the MISO converter will first be discussed. Results of the computer simulation will be presented which demonstrate the ability of the converter to accept multiple dc sources while outputting only one dc voltage.
本文介绍了多输入单输出(MISO) dc-dc变换器的设计与仿真。转换器的主要用途是允许将多个电源连接到单个直流母线系统。本文将首先讨论MISO变换器的设计和建模。计算机仿真结果将展示该变换器在只输出一个直流电压的情况下接受多个直流电源的能力。
{"title":"Design and Simulation of Multiple-Input Single-Output DC-DC Converter","authors":"T. Taufik, T. Wong, Owen Jong, D. Dolan","doi":"10.1109/ITNG.2012.109","DOIUrl":"https://doi.org/10.1109/ITNG.2012.109","url":null,"abstract":"This paper presents the design and simulation of Multiple-Input Single-Output (MISO) dc-dc converter. The main purpose of the converter is to allow connection of multiple power sources to a single dc bus system. Design and modeling of the MISO converter will first be discussed. Results of the computer simulation will be presented which demonstrate the ability of the converter to accept multiple dc sources while outputting only one dc voltage.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132153238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Distributed Sensor Objects for Intrusion Detection Systems 用于入侵检测系统的分布式传感器对象
R. Erbacher, Steve E. Hutchinson
Effective intrusion detection requires the analysis of enormous volumes of data collected from distributed sensor objects. Traditionally, this analysis has been performed on central servers. The alternative has been to limit data collection to network flow data, with the side effect of reducing intrusion detection effectiveness. This research examined an alternative, namely the incorporation of more intelligent sensor objects. We discuss the infrastructure required to support such a metaphor, the potential tradeoffs, and a novel algorithm for such an intelligent distributed sensor object.
有效的入侵检测需要分析从分布式传感器对象收集的大量数据。传统上,这种分析是在中央服务器上执行的。另一种选择是将数据收集限制为网络流数据,其副作用是降低入侵检测的有效性。这项研究考察了另一种选择,即结合更智能的传感器对象。我们讨论了支持这种隐喻所需的基础设施、潜在的权衡以及用于这种智能分布式传感器对象的新算法。
{"title":"Distributed Sensor Objects for Intrusion Detection Systems","authors":"R. Erbacher, Steve E. Hutchinson","doi":"10.1109/ITNG.2012.100","DOIUrl":"https://doi.org/10.1109/ITNG.2012.100","url":null,"abstract":"Effective intrusion detection requires the analysis of enormous volumes of data collected from distributed sensor objects. Traditionally, this analysis has been performed on central servers. The alternative has been to limit data collection to network flow data, with the side effect of reducing intrusion detection effectiveness. This research examined an alternative, namely the incorporation of more intelligent sensor objects. We discuss the infrastructure required to support such a metaphor, the potential tradeoffs, and a novel algorithm for such an intelligent distributed sensor object.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128839041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Tool for Teaching Risk 风险教学的工具
S. Rajendran, K. Gary, H. Koehnemann
Students tend to think optimistically about the software they construct. They believe the software will be defect free, and underestimate apparent risks to the development process. In the Software Enterprise, a 4-course upper division project sequence, student team failures to predict and prevent these risks lead to various problems like schedule delays, frustration, and dissatisfaction from external customer sponsors. The Enterprise uses the IBM Rational Jazz platform, but it does not have a native risk management capability. Instead, project teams were recording risks associated with their projects on paper reports. To facilitate maintaining and managing the risks associated with their projects, we developed a risk management component in the Jazz environment. This component complements Jazz by providing features of the risk management process like risk control and monitoring. The risk management component was used and evaluated by student capstone project teams.
学生们倾向于乐观地看待他们构建的软件。他们相信软件将是无缺陷的,并且低估了开发过程中的明显风险。在软件企业中,一个4门课程的高年级项目序列中,学生团队未能预测和预防这些风险,导致了各种各样的问题,如进度延迟、挫折和外部客户赞助商的不满。企业使用IBM Rational Jazz平台,但是它没有原生的风险管理能力。相反,项目团队在纸质报告中记录与项目相关的风险。为了便于维护和管理与他们的项目相关的风险,我们在Jazz环境中开发了一个风险管理组件。该组件通过提供风险控制和监视等风险管理过程的特性来补充Jazz。风险管理组件由学生顶点项目团队使用和评估。
{"title":"A Tool for Teaching Risk","authors":"S. Rajendran, K. Gary, H. Koehnemann","doi":"10.1109/ITNG.2012.172","DOIUrl":"https://doi.org/10.1109/ITNG.2012.172","url":null,"abstract":"Students tend to think optimistically about the software they construct. They believe the software will be defect free, and underestimate apparent risks to the development process. In the Software Enterprise, a 4-course upper division project sequence, student team failures to predict and prevent these risks lead to various problems like schedule delays, frustration, and dissatisfaction from external customer sponsors. The Enterprise uses the IBM Rational Jazz platform, but it does not have a native risk management capability. Instead, project teams were recording risks associated with their projects on paper reports. To facilitate maintaining and managing the risks associated with their projects, we developed a risk management component in the Jazz environment. This component complements Jazz by providing features of the risk management process like risk control and monitoring. The risk management component was used and evaluated by student capstone project teams.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125538959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fostering the User Interface Acceptance in Customer Relationship Management: A Multimedia-aided Approach 在客户关系管理中促进用户界面的接受:多媒体辅助方法
Mutlaq B. Al-Otaibi, D. Rigas
There has been an increasing demand for organizations to foster real-time interaction with customers, through the development of multimedia and Knowledge-enabled Customer Relationship Management (KCRM) systems. KCRM implementations encounter several challenges, such as information overload and lack of trust. Few empirical studies were devoted to assess the role of multimedia to tackle these issues. Therefore, this paper describes an empirical investigation into the implication of incorporating multimedia elements into KCRM interfaces. To achieve this, an experimental KCRM platform was implemented with three different modes of interaction: Visual-only KCRM (V-CRM) with text and graphics, Multimodal KCRM (M-CRM) with speech, earcons and auditory icons and Avatar-enhanced multimodal KCRM (A-CRM). The three platforms were evaluated by a group of forty-eight participants (n=48) of age group varies from 18 to 55 year old, by performing six common tasks and filling a questionnaire devised to measure the aspects of user acceptance. The results therein revealed that A-CRM was more acceptable than both M-CRM and V-CRM, whereas M-CRM was less acceptable than V-CRM.
通过开发多媒体和知识支持的客户关系管理(KCRM)系统,组织对促进与客户的实时交互的需求越来越大。KCRM实现遇到了几个挑战,比如信息过载和缺乏信任。很少有实证研究致力于评估多媒体在解决这些问题方面的作用。因此,本文描述了一项实证调查,探讨将多媒体元素纳入KCRM界面的含义。为了实现这一目标,一个实验性的KCRM平台采用了三种不同的交互模式:带有文本和图形的纯视觉KCRM (V-CRM),带有语音、耳机和听觉图标的多模式KCRM (M-CRM),以及avatar增强的多模式KCRM (A-CRM)。这三个平台由一组年龄在18岁到55岁之间的48名参与者(n=48)通过执行6项常见任务和填写一份旨在衡量用户接受程度的问卷来评估。结果表明,A-CRM比M-CRM和V-CRM更容易被接受,而M-CRM比V-CRM更难以被接受。
{"title":"Fostering the User Interface Acceptance in Customer Relationship Management: A Multimedia-aided Approach","authors":"Mutlaq B. Al-Otaibi, D. Rigas","doi":"10.1109/ITNG.2012.158","DOIUrl":"https://doi.org/10.1109/ITNG.2012.158","url":null,"abstract":"There has been an increasing demand for organizations to foster real-time interaction with customers, through the development of multimedia and Knowledge-enabled Customer Relationship Management (KCRM) systems. KCRM implementations encounter several challenges, such as information overload and lack of trust. Few empirical studies were devoted to assess the role of multimedia to tackle these issues. Therefore, this paper describes an empirical investigation into the implication of incorporating multimedia elements into KCRM interfaces. To achieve this, an experimental KCRM platform was implemented with three different modes of interaction: Visual-only KCRM (V-CRM) with text and graphics, Multimodal KCRM (M-CRM) with speech, earcons and auditory icons and Avatar-enhanced multimodal KCRM (A-CRM). The three platforms were evaluated by a group of forty-eight participants (n=48) of age group varies from 18 to 55 year old, by performing six common tasks and filling a questionnaire devised to measure the aspects of user acceptance. The results therein revealed that A-CRM was more acceptable than both M-CRM and V-CRM, whereas M-CRM was less acceptable than V-CRM.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122186465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Protecting Intellectual Property by Certified Component Quality Descriptions 通过认证组件质量描述保护知识产权
Henning Groenda
A major part of Component-Based Software Engineering (CBSE) focuses on composing systems of independent components and the re-use of components. Descriptions of the quality of components allow assuring the quality of the composed system. Certification addresses trust issues regarding the trustworthiness of the descriptions, e.g. in components of the shelf (COTS) scenarios. Selecting components based on quality descriptions allows protecting intellectual property (IP) of the component supplier during selection but the development process must support certification and compositional evaluations. Different certification levels are available which affect the distribution of certification effort across participating roles depending on the need for IP protection and described quality characteristic. Existing CBSE approaches neglect a clear integration of description-based selection in the development process and provide no guidelines on selecting the appropriate certification level for a component. In this paper, we show how certification of quality descriptions can be integrated into a CBSE development process. Additionally, we provide a guideline supporting the selection of a certification level and point out the implications on the effort distribution on the different participating roles. The application of the guideline is demonstrated in three different scenarios and the most suitable certification level is identified, which allows tailoring a CBSE-aware certification process.
基于组件的软件工程(CBSE)的一个主要部分是关注由独立组件组成的系统和组件的重用。对组件质量的描述可以保证组成系统的质量。认证解决了关于描述可信度的信任问题,例如在货架组件(COTS)场景中。根据质量描述选择组件可以在选择组件时保护组件供应商的知识产权(IP),但开发过程必须支持认证和组件评估。根据知识产权保护的需要和所描述的质量特性,不同的认证级别会影响认证工作在参与角色之间的分配。现有的CBSE方法忽略了开发过程中基于描述的选择的清晰集成,并且没有提供为组件选择适当的认证级别的指导方针。在本文中,我们展示了如何将质量描述的认证集成到CBSE开发过程中。另外,我们提供了支持认证级别选择的指导方针,并指出了不同参与角色的工作量分配的含义。在三种不同的场景中演示了指南的应用,并确定了最合适的认证级别,从而可以定制感知cbse的认证过程。
{"title":"Protecting Intellectual Property by Certified Component Quality Descriptions","authors":"Henning Groenda","doi":"10.1109/ITNG.2012.49","DOIUrl":"https://doi.org/10.1109/ITNG.2012.49","url":null,"abstract":"A major part of Component-Based Software Engineering (CBSE) focuses on composing systems of independent components and the re-use of components. Descriptions of the quality of components allow assuring the quality of the composed system. Certification addresses trust issues regarding the trustworthiness of the descriptions, e.g. in components of the shelf (COTS) scenarios. Selecting components based on quality descriptions allows protecting intellectual property (IP) of the component supplier during selection but the development process must support certification and compositional evaluations. Different certification levels are available which affect the distribution of certification effort across participating roles depending on the need for IP protection and described quality characteristic. Existing CBSE approaches neglect a clear integration of description-based selection in the development process and provide no guidelines on selecting the appropriate certification level for a component. In this paper, we show how certification of quality descriptions can be integrated into a CBSE development process. Additionally, we provide a guideline supporting the selection of a certification level and point out the implications on the effort distribution on the different participating roles. The application of the guideline is demonstrated in three different scenarios and the most suitable certification level is identified, which allows tailoring a CBSE-aware certification process.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121226850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Model for Social and Collaborative Social Network of Positive Reinforcement: Positive Reinforcement Online Social Network: PRSN 正强化的社会与协作社会网络模型:正强化在线社会网络:PRSN
H. Fardoun, Daniyal Algazzawi, S. R. López, Jose Antonio Gallud Lazarro
In the last years, online social networks (ONSs, online social networks) have grown to become one of the major medias for human beings on the Internet by having a wide distribution and acceptance by users. One of the critical aspects of developing this type of systems is the user interface. For this reason, a model-based approach is used to allow us collect interaction and collaboration aspects of social networks. Moreover, this paper based on ONSs and model-driven development provides a first approximation of social and collaborative model of a new online social network, which we have called PRSN (Positive Reinforcement Online Social Network).
在过去的几年里,在线社交网络(online social networks, ONSs, online social networks)已经发展成为人类在互联网上的主要媒体之一,具有广泛的分布和被用户接受。开发这类系统的一个关键方面是用户界面。出于这个原因,我们使用基于模型的方法来收集社交网络的交互和协作方面。此外,本文基于ONSs和模型驱动开发提供了一种新的在线社交网络的社会和协作模型的第一个近似,我们称之为PRSN (Positive Reinforcement online social network)。
{"title":"Proposed Model for Social and Collaborative Social Network of Positive Reinforcement: Positive Reinforcement Online Social Network: PRSN","authors":"H. Fardoun, Daniyal Algazzawi, S. R. López, Jose Antonio Gallud Lazarro","doi":"10.1109/ITNG.2012.75","DOIUrl":"https://doi.org/10.1109/ITNG.2012.75","url":null,"abstract":"In the last years, online social networks (ONSs, online social networks) have grown to become one of the major medias for human beings on the Internet by having a wide distribution and acceptance by users. One of the critical aspects of developing this type of systems is the user interface. For this reason, a model-based approach is used to allow us collect interaction and collaboration aspects of social networks. Moreover, this paper based on ONSs and model-driven development provides a first approximation of social and collaborative model of a new online social network, which we have called PRSN (Positive Reinforcement Online Social Network).","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Evaluation of Unit Testing Techniques on a Mobile Platform 移动平台上单元测试技术的比较评价
Selin Benli, A. Habash, A. Herrmann, Tyler Loftis, Devon M. Simmonds
Software testing is generally an expensive, ad hoc and unpredictable process. Therefore, a better understanding of and an improvement of unit testing methods may improve the overall software testing process leading to more efficient test method selection and increased fault detection accuracy. The aim of this study is evaluate Black Box and White Box unit testing methods for the Android operating system. While several investigations have looked at unit testing using Black Box and White Box techniques, our research focuses explicitly on unit testing for Android applications. Test cases were created using JUnit and the program under test was seeded with errors by an outside party. We evaluated the performance of these two test methods on the difficulty of developing test cases for each method and the effectiveness of finding software errors in a controlled environment. Our results showed benefits and challenges for both testing techniques. Inferences and implications are also presented.
软件测试通常是一个昂贵的、临时的和不可预测的过程。因此,更好地理解和改进单元测试方法可以改进整个软件测试过程,从而导致更有效的测试方法选择和提高故障检测的准确性。本研究的目的是评估黑盒和白盒单元测试方法的Android操作系统。虽然有一些调查研究使用黑盒和白盒技术进行单元测试,但我们的研究明确侧重于Android应用程序的单元测试。测试用例是使用JUnit创建的,并且被测试的程序是由外部方添加错误的。我们根据为每种方法开发测试用例的难度以及在受控环境中发现软件错误的有效性来评估这两种测试方法的性能。我们的结果显示了两种测试技术的优点和挑战。并提出了推论和启示。
{"title":"A Comparative Evaluation of Unit Testing Techniques on a Mobile Platform","authors":"Selin Benli, A. Habash, A. Herrmann, Tyler Loftis, Devon M. Simmonds","doi":"10.1109/ITNG.2012.45","DOIUrl":"https://doi.org/10.1109/ITNG.2012.45","url":null,"abstract":"Software testing is generally an expensive, ad hoc and unpredictable process. Therefore, a better understanding of and an improvement of unit testing methods may improve the overall software testing process leading to more efficient test method selection and increased fault detection accuracy. The aim of this study is evaluate Black Box and White Box unit testing methods for the Android operating system. While several investigations have looked at unit testing using Black Box and White Box techniques, our research focuses explicitly on unit testing for Android applications. Test cases were created using JUnit and the program under test was seeded with errors by an outside party. We evaluated the performance of these two test methods on the difficulty of developing test cases for each method and the effectiveness of finding software errors in a controlled environment. Our results showed benefits and challenges for both testing techniques. Inferences and implications are also presented.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121815496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios 面向支持协作场景的用户控制服务器的透明匿名
Mohamed Bourimi, M. Heupel, Benedikt Westermann, D. Kesdogan, Marc Planagumà, Rafael Giménez, Fatih Karatas, Philipp Schwarte
The increasing tendency of using user-controlled servers for supporting different scenarios from leisure and professional life raises new security challenges. Especially when those servers are used to support collaborative scenarios (e.g., communication and sharing with others), the requirement for anonymity at the network level should be supported in an efficient way. In this paper we present a specific communication scenario that could lead to link ability even though anonymous networks are used. The requirements gathering is based on realistic requirements from the EU FP7 di.me project requiring to empower lay end-users to collaborate with their contacts. Thereby anonymity at the network level also needs to be considered in order to disguise the physical location of the users and also of their server(s). We present an approach satisfying these anonymity requirements by means of a Tor based software component in order to overcome such privacy problems. First results are presented and the portability of the suggested solution for similar settings as well as future work directions are discussed.
使用用户控制的服务器来支持来自休闲和职业生活的不同场景的趋势日益增加,这带来了新的安全挑战。特别是当这些服务器用于支持协作场景(例如,与他人通信和共享)时,应该以有效的方式支持网络级别的匿名需求。在本文中,我们提出了一个特定的通信场景,即使使用匿名网络也可以导致链接能力。需求收集是基于来自EU FP7 di的实际需求。需要授权外行最终用户与其联系人协作的Me项目。因此,还需要考虑网络级别的匿名性,以掩盖用户及其服务器的物理位置。为了克服这些隐私问题,我们提出了一种通过基于Tor的软件组件来满足这些匿名要求的方法。提出了第一个结果,并讨论了建议解决方案在类似设置中的可移植性以及未来的工作方向。
{"title":"Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios","authors":"Mohamed Bourimi, M. Heupel, Benedikt Westermann, D. Kesdogan, Marc Planagumà, Rafael Giménez, Fatih Karatas, Philipp Schwarte","doi":"10.1109/ITNG.2012.23","DOIUrl":"https://doi.org/10.1109/ITNG.2012.23","url":null,"abstract":"The increasing tendency of using user-controlled servers for supporting different scenarios from leisure and professional life raises new security challenges. Especially when those servers are used to support collaborative scenarios (e.g., communication and sharing with others), the requirement for anonymity at the network level should be supported in an efficient way. In this paper we present a specific communication scenario that could lead to link ability even though anonymous networks are used. The requirements gathering is based on realistic requirements from the EU FP7 di.me project requiring to empower lay end-users to collaborate with their contacts. Thereby anonymity at the network level also needs to be considered in order to disguise the physical location of the users and also of their server(s). We present an approach satisfying these anonymity requirements by means of a Tor based software component in order to overcome such privacy problems. First results are presented and the portability of the suggested solution for similar settings as well as future work directions are discussed.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"25 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125217565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Probability-based Imputation Method for Fuzzy Cluster Analysis of Gene Expression Microarray Data 基因表达微阵列数据模糊聚类分析的概率归算方法
Thanh Le, T. Altman, K. Gardiner
Fuzzy clustering has been widely used for analysis of gene expression micro array data. However, most fuzzy clustering algorithms require complete datasets and, because of technical limitations, most micro array datasets have missing values. To address this problem, we present a new algorithm where genes are clustered using the Fuzzy C-Means algorithm, followed by approximating the fuzzy partition by a probabilistic data distribution model which is then used to estimate the missing values in the dataset. Using distribution-based approach, our method is most appropriate for datasets where the data are nonuniform. We show that our method outperforms six popular imputation algorithms on uniform and nonuniform artificial datasets as well as real datasets with unknown data distribution model.
模糊聚类已广泛应用于基因表达微阵列数据分析。然而,大多数模糊聚类算法需要完整的数据集,并且由于技术限制,大多数微阵列数据集存在缺失值。为了解决这个问题,我们提出了一种新的算法,其中使用模糊c均值算法对基因进行聚类,然后通过概率数据分布模型近似模糊划分,然后使用该模型来估计数据集中的缺失值。使用基于分布的方法,我们的方法最适合于数据不均匀的数据集。结果表明,该方法在均匀和非均匀人工数据集以及具有未知数据分布模型的真实数据集上都优于六种常用的插值算法。
{"title":"Probability-based Imputation Method for Fuzzy Cluster Analysis of Gene Expression Microarray Data","authors":"Thanh Le, T. Altman, K. Gardiner","doi":"10.1109/ITNG.2012.159","DOIUrl":"https://doi.org/10.1109/ITNG.2012.159","url":null,"abstract":"Fuzzy clustering has been widely used for analysis of gene expression micro array data. However, most fuzzy clustering algorithms require complete datasets and, because of technical limitations, most micro array datasets have missing values. To address this problem, we present a new algorithm where genes are clustered using the Fuzzy C-Means algorithm, followed by approximating the fuzzy partition by a probabilistic data distribution model which is then used to estimate the missing values in the dataset. Using distribution-based approach, our method is most appropriate for datasets where the data are nonuniform. We show that our method outperforms six popular imputation algorithms on uniform and nonuniform artificial datasets as well as real datasets with unknown data distribution model.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"75 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115174648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2012 Ninth International Conference on Information Technology - New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1