首页 > 最新文献

2013 International Conference on Social Computing最新文献

英文 中文
Controlling Break-the-Glass through Alignment 通过对齐控制玻璃破碎
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.91
A. Adriansyah, B. V. Dongen, Nicola Zannone
Modern IT systems have to deal with unpredictable situations and exceptions more and more often. In contrast, security mechanisms are usually very rigid. Functionality like break-the-glass is thus employed to allow users to bypass security mechanisms in case of emergencies. However, break-the-glass introduces a weak point in the system. In this paper, we present a flexible framework for controlling the use of break-the-glass using the notion of alignments. The framework measures to what extent a process execution diverges from the specification (i.e., using optimal alignments) and revokes the exceptional permissions granted to cope with the emergency when the severity of deviations cannot be tolerated. For the quantification of the severity of deviations, we extend alignment-based deviation analysis techniques by supporting the detection of high-level deviations such as activity replacements and swaps, hence providing a more accurate diagnosis of deviations than classical optimal alignments.
现代IT系统必须越来越频繁地处理不可预测的情况和异常。相反,安全机制通常非常严格。因此,像“打破玻璃”这样的功能允许用户在紧急情况下绕过安全机制。然而,打破玻璃会给系统带来一个弱点。在本文中,我们提出了一个灵活的框架来控制使用使用的玻璃破碎使用对齐的概念。框架度量流程执行偏离规范的程度(即,使用最优对齐),并在无法容忍偏离的严重程度时撤销为处理紧急情况而授予的异常权限。为了量化偏差的严重程度,我们扩展了基于校准的偏差分析技术,通过支持检测高水平偏差,如活动替换和交换,从而提供比经典最佳校准更准确的偏差诊断。
{"title":"Controlling Break-the-Glass through Alignment","authors":"A. Adriansyah, B. V. Dongen, Nicola Zannone","doi":"10.1109/SocialCom.2013.91","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.91","url":null,"abstract":"Modern IT systems have to deal with unpredictable situations and exceptions more and more often. In contrast, security mechanisms are usually very rigid. Functionality like break-the-glass is thus employed to allow users to bypass security mechanisms in case of emergencies. However, break-the-glass introduces a weak point in the system. In this paper, we present a flexible framework for controlling the use of break-the-glass using the notion of alignments. The framework measures to what extent a process execution diverges from the specification (i.e., using optimal alignments) and revokes the exceptional permissions granted to cope with the emergency when the severity of deviations cannot be tolerated. For the quantification of the severity of deviations, we extend alignment-based deviation analysis techniques by supporting the detection of high-level deviations such as activity replacements and swaps, hence providing a more accurate diagnosis of deviations than classical optimal alignments.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128056428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Towards Network Reduction on Big Data 面向大数据的网络精简
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.103
Xing Fang, J. Zhan, Nicholas Koceja
The increasing ease of data collection experience and the increasing availability of large data storage space lead to the existence of very large datasets that are commonly referred as "Big Data". Such data not only take over large amount of database storage, but also increase the difficulties for data analysis due to data diversity, which, also makes the datasets seemingly isolated with each other. In this paper, we present a solution to the problem that is to build up connections among the diverse datasets, based upon their similarities. Particularly, a concept of similarity graph along with a similarity graph generation algorithm were introduced. We then proposed a similarity graph reduction algorithm that reduces vertices of the graph for the purpose of graph simplification.
数据收集体验的日益便利和大数据存储空间的日益可用性导致了通常被称为“大数据”的超大型数据集的存在。这些数据不仅占用了大量的数据库存储空间,而且由于数据的多样性增加了数据分析的难度,也使得数据集看起来彼此孤立。在本文中,我们提出了一种解决方案,即根据不同数据集的相似性在不同数据集之间建立联系。特别介绍了相似图的概念和相似图生成算法。然后,我们提出了一种相似图约简算法,该算法通过减少图的顶点来简化图。
{"title":"Towards Network Reduction on Big Data","authors":"Xing Fang, J. Zhan, Nicholas Koceja","doi":"10.1109/SocialCom.2013.103","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.103","url":null,"abstract":"The increasing ease of data collection experience and the increasing availability of large data storage space lead to the existence of very large datasets that are commonly referred as \"Big Data\". Such data not only take over large amount of database storage, but also increase the difficulties for data analysis due to data diversity, which, also makes the datasets seemingly isolated with each other. In this paper, we present a solution to the problem that is to build up connections among the diverse datasets, based upon their similarities. Particularly, a concept of similarity graph along with a similarity graph generation algorithm were introduced. We then proposed a similarity graph reduction algorithm that reduces vertices of the graph for the purpose of graph simplification.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125577761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Integrative Approach for Measuring Privacy Impact of Identifiers in the Automotive Domain 汽车领域标识符隐私影响的综合测量方法
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.159
Naim Asaj, A. Held, M. Weber
Information technology is commonly used in automotive applications, and has introduced associated opportunities and threats. At the same time, the dissemination and use of certain privacy-sensitive data (i.e., identifying data) continues to increase, raising serious questions about privacy and anonymity. However, the effect of identifying data on privacy depends on various aspects, such as their basic structure. We propose that the preemptive assessment of privacy levels is a key factor for reliable privacy processes in vehicular development, extending the existing assessment during runtime. Thus, we identify a comprehensive and classified set of privacy indicators for identifiers, and explore the possible application of a single indicator by proposing privacy impact metrics that are based on entropy. We demonstrate the feasibility of our approach using a real dataset of vehicle identification numbers (VINs).
信息技术通常用于汽车应用程序,并引入了相关的机会和威胁。与此同时,某些隐私敏感数据(即识别数据)的传播和使用继续增加,引发了关于隐私和匿名的严重问题。然而,识别数据对隐私的影响取决于各个方面,比如数据的基本结构。我们提出,先发制人的隐私级别评估是车辆开发中可靠的隐私过程的关键因素,可以在运行时扩展现有的评估。因此,我们为标识符确定了一套全面和分类的隐私指标,并通过提出基于熵的隐私影响指标来探索单一指标的可能应用。我们使用车辆识别号码(vin)的真实数据集证明了我们方法的可行性。
{"title":"An Integrative Approach for Measuring Privacy Impact of Identifiers in the Automotive Domain","authors":"Naim Asaj, A. Held, M. Weber","doi":"10.1109/SocialCom.2013.159","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.159","url":null,"abstract":"Information technology is commonly used in automotive applications, and has introduced associated opportunities and threats. At the same time, the dissemination and use of certain privacy-sensitive data (i.e., identifying data) continues to increase, raising serious questions about privacy and anonymity. However, the effect of identifying data on privacy depends on various aspects, such as their basic structure. We propose that the preemptive assessment of privacy levels is a key factor for reliable privacy processes in vehicular development, extending the existing assessment during runtime. Thus, we identify a comprehensive and classified set of privacy indicators for identifiers, and explore the possible application of a single indicator by proposing privacy impact metrics that are based on entropy. We demonstrate the feasibility of our approach using a real dataset of vehicle identification numbers (VINs).","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three Fiscal Policy Experiments in an Agent-Based Macroeconomic Model 基于主体的宏观经济模型中的三个财政政策实验
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.115
Carl M. Gustafson
In this paper, I build from scratch a basic agent-based macroeconomic model, featuring fifty representative agents whose decisions to consume and save depend on the current relative performance of the economy at-large. I run three different experiments in the framework: the first, on the effects of tax and spending "flexibility" on stabilizing output, the second, on the ability of spending stimulus to stabilize output, and the third, on redistributive measures across income groups and their effects on aggregate economic performance. I find that tax and spending flexibility accelerates the path back to stability after an initial imposed downturn, that spending stimulus does much the same, though with a greater initial "kick", and that redistribution in this model may take place and increase the welfare of lower-income agents without imposing a significant burden on overall performance.
在本文中,我从零开始建立了一个基本的基于主体的宏观经济模型,其中有50个代表主体,他们的消费和储蓄决策取决于当前整体经济的相对表现。我在这个框架中进行了三个不同的实验:第一个是关于税收和支出“灵活性”对稳定产出的影响,第二个是关于支出刺激稳定产出的能力,第三个是关于跨收入群体的再分配措施及其对总体经济表现的影响。我发现,税收和支出的灵活性加速了在最初强加的低迷之后回归稳定的道路,支出刺激也起到了同样的作用,尽管最初的“推力”更大,而且该模型中的再分配可能会发生,并增加低收入主体的福利,而不会对整体表现造成重大负担。
{"title":"Three Fiscal Policy Experiments in an Agent-Based Macroeconomic Model","authors":"Carl M. Gustafson","doi":"10.1109/SocialCom.2013.115","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.115","url":null,"abstract":"In this paper, I build from scratch a basic agent-based macroeconomic model, featuring fifty representative agents whose decisions to consume and save depend on the current relative performance of the economy at-large. I run three different experiments in the framework: the first, on the effects of tax and spending \"flexibility\" on stabilizing output, the second, on the ability of spending stimulus to stabilize output, and the third, on redistributive measures across income groups and their effects on aggregate economic performance. I find that tax and spending flexibility accelerates the path back to stability after an initial imposed downturn, that spending stimulus does much the same, though with a greater initial \"kick\", and that redistribution in this model may take place and increase the welfare of lower-income agents without imposing a significant burden on overall performance.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132814718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust, Scalable Anomaly Detection for Large Collections of Images 鲁棒的、可扩展的大型图像异常检测
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.170
Michael S. Kim
A novel robust anomaly detection algorithm is applied to an image dataset using Apache Pig, Jython and GNU Octave. Each image in the set is transformed into a feature vector that represents color, edges, and texture numerically. Data is streamed using Pig through standard and user defined GNU Octave functions for feature transformation. Once the image set is transformed into the feature space, the dataset matrix (where the rows are distinct images, and the columns are features) is input into an original anomaly detection algorithm written by the author. This unsupervised outlier detection method scores outliers in linear time. The method is linear in the number of outliers but still suffers from the curse of dimensionality (in the feature space). The top scoring images are considered anomalies. Two experiments are conducted. The first experiment tests if top scoring images coincide with images which are marked as outliers in a prior image selection step. The second examines the scalability of the implementation in Pig using a larger data set. The results are analyzed quantitatively and qualitatively.
基于Apache Pig、Jython和GNU Octave,提出了一种新的鲁棒异常检测算法。集合中的每个图像都被转换成一个特征向量,该特征向量以数字形式表示颜色、边缘和纹理。数据流使用Pig通过标准和用户定义的GNU Octave函数进行特征转换。将图像集转换为特征空间后,将数据集矩阵(行为不同图像,列为特征)输入到作者编写的原始异常检测算法中。这种无监督异常点检测方法在线性时间内对异常点进行评分。该方法在异常值的数量上是线性的,但仍然受到维度的诅咒(在特征空间中)。得分最高的图像被认为是异常的。进行了两个实验。第一个实验测试得分最高的图像是否与先前图像选择步骤中标记为异常值的图像一致。第二部分使用更大的数据集检查Pig中实现的可伸缩性。对结果进行了定量和定性分析。
{"title":"Robust, Scalable Anomaly Detection for Large Collections of Images","authors":"Michael S. Kim","doi":"10.1109/SocialCom.2013.170","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.170","url":null,"abstract":"A novel robust anomaly detection algorithm is applied to an image dataset using Apache Pig, Jython and GNU Octave. Each image in the set is transformed into a feature vector that represents color, edges, and texture numerically. Data is streamed using Pig through standard and user defined GNU Octave functions for feature transformation. Once the image set is transformed into the feature space, the dataset matrix (where the rows are distinct images, and the columns are features) is input into an original anomaly detection algorithm written by the author. This unsupervised outlier detection method scores outliers in linear time. The method is linear in the number of outliers but still suffers from the curse of dimensionality (in the feature space). The top scoring images are considered anomalies. Two experiments are conducted. The first experiment tests if top scoring images coincide with images which are marked as outliers in a prior image selection step. The second examines the scalability of the implementation in Pig using a larger data set. The results are analyzed quantitatively and qualitatively.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130271455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applications of Social Networks and Crowdsourcing for Disaster Management Improvement 社会网络和众包在灾害管理改进中的应用
Pub Date : 2013-09-08 DOI: 10.1109/MC.2016.133
Liliya I. Besaleva, A. Weaver
Emergency resources are often insufficient to satisfy fully the demands for professional help and supplies after a public disaster. Furthermore, in a mass casualty situation, the emphasis shifts from ensuring the best possible outcome for each individual patient to ensuring the best possible outcome for the greatest number of patients. Historically, various manual and electronic medical triage systems have been used both under civil and military conditions to determine the order and priority of emergency treatment, transport, and best possible destination for the patients [12][13][15][16][17][18]. Unfortunately, none of those solutions has proven flexible, accurate, scalable or unobtrusive enough to meet the public's expectations [7]. In this paper, we provide insights into the trends, innovations, and challenges of contemporary crowdsourced e-Health and medical informatics applications in the context of emergency preparedness and response. Additionally, we demonstrate a system, called CrowdHelp, for real-time patient assessment which uses mobile electronic triaging accomplished via crowdsourced information. With the use of our system, emergency management professionals receive most of the information they need for preparing themselves to provide timely and accurate treatments of their patients even before dispatching a response team to the event.
紧急资源往往不足以完全满足公共灾害后对专业帮助和用品的需求。此外,在大规模伤亡的情况下,重点从确保每个病人的最佳可能结果转变为确保尽可能多的病人的最佳可能结果。历史上,各种手动和电子医疗分诊系统已在民用和军用条件下使用,以确定紧急治疗、运输的顺序和优先级,以及患者的最佳目的地[12][13][15][16][17][18]。不幸的是,这些解决方案都没有被证明足够灵活、准确、可扩展或不显眼,以满足公众的期望。在本文中,我们提供了在应急准备和响应的背景下,当代众包电子卫生和医疗信息学应用的趋势、创新和挑战的见解。此外,我们还演示了一个名为CrowdHelp的系统,用于实时患者评估,该系统使用通过众包信息完成的移动电子分诊。通过使用我们的系统,应急管理专业人员可以收到他们所需的大部分信息,以便在派遣响应小组之前为他们的病人提供及时准确的治疗。
{"title":"Applications of Social Networks and Crowdsourcing for Disaster Management Improvement","authors":"Liliya I. Besaleva, A. Weaver","doi":"10.1109/MC.2016.133","DOIUrl":"https://doi.org/10.1109/MC.2016.133","url":null,"abstract":"Emergency resources are often insufficient to satisfy fully the demands for professional help and supplies after a public disaster. Furthermore, in a mass casualty situation, the emphasis shifts from ensuring the best possible outcome for each individual patient to ensuring the best possible outcome for the greatest number of patients. Historically, various manual and electronic medical triage systems have been used both under civil and military conditions to determine the order and priority of emergency treatment, transport, and best possible destination for the patients [12][13][15][16][17][18]. Unfortunately, none of those solutions has proven flexible, accurate, scalable or unobtrusive enough to meet the public's expectations [7]. In this paper, we provide insights into the trends, innovations, and challenges of contemporary crowdsourced e-Health and medical informatics applications in the context of emergency preparedness and response. Additionally, we demonstrate a system, called CrowdHelp, for real-time patient assessment which uses mobile electronic triaging accomplished via crowdsourced information. With the use of our system, emergency management professionals receive most of the information they need for preparing themselves to provide timely and accurate treatments of their patients even before dispatching a response team to the event.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"1209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131516348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A Framework for Secure Service Composition 用于安全服务组合的框架
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.97
Achim D. Brucker, Francesco Malmignati, M. Merabti, Q. Shi, Bo Zhou
Modern applications are inherently heterogeneous: they are built by composing loosely coupled services that are, usually, offered and operated by different service providers. While this approach increases the flexibility of the composed applications, it makes the implementation of security and trustworthiness requirements difficult. As the number of security requirements is increasing dramatically, there is a need for new approaches that integrate security requirements right from the beginning while composing service-based applications. In this paper, we present a framework for secure service composition using a model-based approach for specifying, building, and executing composed services. As a unique feature, this framework integrates security requirements as a first class citizen and, thus, avoids the ``security as an afterthought'' paradigm.
现代应用程序本质上是异构的:它们是通过组合松散耦合的服务构建的,这些服务通常由不同的服务提供者提供和操作。虽然这种方法增加了组合应用程序的灵活性,但它使安全性和可信性需求的实现变得困难。由于安全需求的数量急剧增加,因此需要一种新的方法,在组合基于服务的应用程序时从一开始就集成安全需求。在本文中,我们提出了一个安全服务组合的框架,该框架使用基于模型的方法来指定、构建和执行组合的服务。作为一个独特的特性,该框架将安全性需求作为头等公民集成,从而避免了“事后考虑安全性”的范例。
{"title":"A Framework for Secure Service Composition","authors":"Achim D. Brucker, Francesco Malmignati, M. Merabti, Q. Shi, Bo Zhou","doi":"10.1109/SocialCom.2013.97","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.97","url":null,"abstract":"Modern applications are inherently heterogeneous: they are built by composing loosely coupled services that are, usually, offered and operated by different service providers. While this approach increases the flexibility of the composed applications, it makes the implementation of security and trustworthiness requirements difficult. As the number of security requirements is increasing dramatically, there is a need for new approaches that integrate security requirements right from the beginning while composing service-based applications. In this paper, we present a framework for secure service composition using a model-based approach for specifying, building, and executing composed services. As a unique feature, this framework integrates security requirements as a first class citizen and, thus, avoids the ``security as an afterthought'' paradigm.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131644532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Conjunction for Private Stream Searching 用于私有流搜索的连接
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.69
Michael J. Oehler, D. Phatak
Our contribution defines a conjunction operator for private stream searching. Private stream searching is a system of cryptographic methods that preserves the confidentiality of the search criteria and the result. The system uses an encrypted filter to conceal the search terms, processes a search without decrypting these terms, and saves the result to an encrypted buffer. Fundamentally, the system provides a private search capability based on a logical disjunction of search terms. Our conjunction operator broadens the search capability, and achieves this without significantly increasing the complexity of the private search system. The conjunction is processed as a bit wise summation of hashed keyword values to reference an encrypted entry in the filter. The method is best suited for a conjunction of fields from a record, does not impute a calculation of bilinear map, as required in prior research, and offers a practical utility that integrates into private stream searching. We demonstrate the practicality by including the conjunction operator into our domain specific language for private packet filtering.
我们的贡献定义了一个用于私有流搜索的连接运算符。私有流搜索是一种保护搜索标准和结果机密性的加密方法系统。该系统使用加密过滤器来隐藏搜索项,在不解密这些搜索项的情况下处理搜索,并将结果保存到加密缓冲区中。从根本上说,该系统提供了基于搜索词的逻辑分离的私有搜索功能。我们的联合运算符拓宽了搜索能力,并且在不显著增加私有搜索系统复杂性的情况下实现了这一目标。连接被处理为哈希关键字值的逐位求和,以引用过滤器中的加密条目。该方法最适合于记录中字段的连接,不需要像以前的研究那样计算双线性映射,并且提供了集成到私有流搜索中的实用工具。我们通过将连接运算符包含到我们的领域特定语言中用于私有包过滤来证明其实用性。
{"title":"A Conjunction for Private Stream Searching","authors":"Michael J. Oehler, D. Phatak","doi":"10.1109/SocialCom.2013.69","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.69","url":null,"abstract":"Our contribution defines a conjunction operator for private stream searching. Private stream searching is a system of cryptographic methods that preserves the confidentiality of the search criteria and the result. The system uses an encrypted filter to conceal the search terms, processes a search without decrypting these terms, and saves the result to an encrypted buffer. Fundamentally, the system provides a private search capability based on a logical disjunction of search terms. Our conjunction operator broadens the search capability, and achieves this without significantly increasing the complexity of the private search system. The conjunction is processed as a bit wise summation of hashed keyword values to reference an encrypted entry in the filter. The method is best suited for a conjunction of fields from a record, does not impute a calculation of bilinear map, as required in prior research, and offers a practical utility that integrates into private stream searching. We demonstrate the practicality by including the conjunction operator into our domain specific language for private packet filtering.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131728012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantifying Social Influence in Epinions 量化Epinions的社会影响
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.20
Akshay Patil, Golnaz Ghasemiesfeh, Roozbeh Ebrahimi, Jie Gao
In many eCommerce websites and consumer review websites, users can review products they purchased as well as the reviews others wrote. Users can also rate each other as trusted or untrusted relationships. By studying a data set from Epinions, we examine and quantify the correlation between trust/distrust relationships among the users and their ratings of the reviews. We discover that there is a strong alignment between the opinions of one's friends and his/her ratings. Our findings also suggest that there is a strong alignment between the collective opinion of a user's friends and the formation of his/her future relationships.
在许多电子商务网站和消费者评论网站上,用户可以评论他们购买的产品以及其他人写的评论。用户还可以对彼此的关系进行信任或不信任的评级。通过研究Epinions的数据集,我们检验并量化了用户之间的信任/不信任关系与他们对评论的评级之间的相关性。我们发现,一个人的朋友的意见和他/她的评分之间有很强的一致性。我们的研究结果还表明,用户朋友的集体意见与他/她未来关系的形成之间存在很强的一致性。
{"title":"Quantifying Social Influence in Epinions","authors":"Akshay Patil, Golnaz Ghasemiesfeh, Roozbeh Ebrahimi, Jie Gao","doi":"10.1109/SocialCom.2013.20","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.20","url":null,"abstract":"In many eCommerce websites and consumer review websites, users can review products they purchased as well as the reviews others wrote. Users can also rate each other as trusted or untrusted relationships. By studying a data set from Epinions, we examine and quantify the correlation between trust/distrust relationships among the users and their ratings of the reviews. We discover that there is a strong alignment between the opinions of one's friends and his/her ratings. Our findings also suggest that there is a strong alignment between the collective opinion of a user's friends and the formation of his/her future relationships.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134455846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Twitter Sentiment Analysis: A Bootstrap Ensemble Framework Twitter情感分析:一个Bootstrap集成框架
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.56
Ammar Hassan, A. Abbasi, D. Zeng
Twitter sentiment analysis has become widely popular. However, stable Twitter sentiment classification performance remains elusive due to several issues: heavy class imbalance in a multi-class problem, representational richness issues for sentiment cues, and the use of diverse colloquial linguistic patterns. These issues are problematic since many forms of social media analytics rely on accurate underlying Twitter sentiments. Accordingly, a text analytics framework is proposed for Twitter sentiment analysis. The framework uses an elaborate bootstrapping ensemble to quell class imbalance, sparsity, and representational richness issues. Experiment results reveal that the proposed approach is more accurate and balanced in its predictions across sentiment classes, as compared to various comparison tools and algorithms. Consequently, the bootstrapping ensemble framework is able to build sentiment time series that are better able to reflect events eliciting strong positive and negative sentiments from users. Considering the importance of Twitter as one of the premiere social media platforms, the results have important implications for social media analytics and social intelligence.
推特情绪分析已经变得非常流行。然而,由于几个问题,稳定的Twitter情感分类性能仍然难以捉摸:在多类问题中严重的类不平衡,情感线索的代表性丰富性问题,以及使用多样化的口语语言模式。这些问题是有问题的,因为许多形式的社交媒体分析依赖于准确的潜在Twitter情绪。在此基础上,提出了一个用于Twitter情感分析的文本分析框架。该框架使用一个精心设计的自举集合来平息类不平衡、稀疏性和代表性丰富性问题。实验结果表明,与各种比较工具和算法相比,所提出的方法在跨情感类别的预测中更加准确和平衡。因此,自举集成框架能够构建情感时间序列,该序列能够更好地反映引起用户强烈积极和消极情绪的事件。考虑到Twitter作为首要社交媒体平台之一的重要性,研究结果对社交媒体分析和社交智能具有重要意义。
{"title":"Twitter Sentiment Analysis: A Bootstrap Ensemble Framework","authors":"Ammar Hassan, A. Abbasi, D. Zeng","doi":"10.1109/SocialCom.2013.56","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.56","url":null,"abstract":"Twitter sentiment analysis has become widely popular. However, stable Twitter sentiment classification performance remains elusive due to several issues: heavy class imbalance in a multi-class problem, representational richness issues for sentiment cues, and the use of diverse colloquial linguistic patterns. These issues are problematic since many forms of social media analytics rely on accurate underlying Twitter sentiments. Accordingly, a text analytics framework is proposed for Twitter sentiment analysis. The framework uses an elaborate bootstrapping ensemble to quell class imbalance, sparsity, and representational richness issues. Experiment results reveal that the proposed approach is more accurate and balanced in its predictions across sentiment classes, as compared to various comparison tools and algorithms. Consequently, the bootstrapping ensemble framework is able to build sentiment time series that are better able to reflect events eliciting strong positive and negative sentiments from users. Considering the importance of Twitter as one of the premiere social media platforms, the results have important implications for social media analytics and social intelligence.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129723841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 143
期刊
2013 International Conference on Social Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1