Luciano Barreto, Leomar Scheunemann, J. Fraga, Frank Siqueira
The use of cloud computing and cloud federations has been the focus of studies in the last years. Many of these infrastructures delegate user authentication to Identity Providers. Once these services are available through the Internet, concerns about the confidentiality of user credentials and attributes are high. The main focus of this work is the security of the credentials and user attributes in authentication infrastructures, exploring secret sharing techniques and using cloud federations as a base for storing this information.
{"title":"Secure storage of user credentials and attributes in federation of clouds","authors":"Luciano Barreto, Leomar Scheunemann, J. Fraga, Frank Siqueira","doi":"10.1145/3019612.3019627","DOIUrl":"https://doi.org/10.1145/3019612.3019627","url":null,"abstract":"The use of cloud computing and cloud federations has been the focus of studies in the last years. Many of these infrastructures delegate user authentication to Identity Providers. Once these services are available through the Internet, concerns about the confidentiality of user credentials and attributes are high. The main focus of this work is the security of the credentials and user attributes in authentication infrastructures, exploring secret sharing techniques and using cloud federations as a base for storing this information.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91156543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cherie Ho, Kimberly Joly, A. Nosal, C. Lowe, C. Clark
This paper presents a method for modeling and then tracking the 2D planar size, location, orientation, and number of individuals of an animal aggregation using Autonomous Underwater Vehicles (AUVs). It is assumed that the AUVs are equipped with sensors that can measure the position states of a subset of individuals from within the aggregation being tracked. A new aggregation model based on provably stable Markov Process Matrices is shown as a viable model for representing aggregations. Then, a multi-stage state estimation architecture based on Particle Filters is presented that can estimate the time-varying model parameters in real-time using sensor measurements obtained by AUVs. To validate the approach, a historical data set is used consisting of >100 shark trajectories from a leopard shark aggregation observed in the La Jolla, CA coast area. The method is generalizable to any stable group movement model constructed using a Markov Matrix. Simulation results show that, when at least 40+ of sharks are tagged, the estimated number of sharks in the aggregation has an error of 6+. This error increased to 27+ when the system was tested with real data.
{"title":"Predicting coordinated group movements of sharks with limited observations using AUVs","authors":"Cherie Ho, Kimberly Joly, A. Nosal, C. Lowe, C. Clark","doi":"10.1145/3019612.3019711","DOIUrl":"https://doi.org/10.1145/3019612.3019711","url":null,"abstract":"This paper presents a method for modeling and then tracking the 2D planar size, location, orientation, and number of individuals of an animal aggregation using Autonomous Underwater Vehicles (AUVs). It is assumed that the AUVs are equipped with sensors that can measure the position states of a subset of individuals from within the aggregation being tracked. A new aggregation model based on provably stable Markov Process Matrices is shown as a viable model for representing aggregations. Then, a multi-stage state estimation architecture based on Particle Filters is presented that can estimate the time-varying model parameters in real-time using sensor measurements obtained by AUVs. To validate the approach, a historical data set is used consisting of >100 shark trajectories from a leopard shark aggregation observed in the La Jolla, CA coast area. The method is generalizable to any stable group movement model constructed using a Markov Matrix. Simulation results show that, when at least 40+ of sharks are tagged, the estimated number of sharks in the aggregation has an error of 6+. This error increased to 27+ when the system was tested with real data.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91283705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Clinical practice guidelines are assuming a major role in the medical area, to provide physicians with evidence-based recommendations for the treatment of single pathologies. The treatment of comorbid patients (i.e., patients affected by multiple diseases) is one of the main challenges for the modern healthcare. It requires the development of new methodologies, supporting physicians in the treatment of interactions between guidelines. Several Artificial Intelligence approaches have started to face such a challenging problem. However, current approaches have a substantial limitation: they do not take into account the temporal dimension. This is a strong limitation. For instance, the effects of two actions taken from different guidelines may potentially conflict, but practical conflicts happen only if effects of such actions overlaps in time. In this paper, we propose an approach to support the temporal detection of interactions. Artificial intelligence temporal reasoning techniques, based on temporal constraint propagation, are widely exploited to such a purpose.
{"title":"Temporal reasoning techniques for the analysis of interactions in the treatment of comorbid patients","authors":"Luca Anselma, Luca Piovesan, P. Terenziani","doi":"10.1145/3019612.3019713","DOIUrl":"https://doi.org/10.1145/3019612.3019713","url":null,"abstract":"Clinical practice guidelines are assuming a major role in the medical area, to provide physicians with evidence-based recommendations for the treatment of single pathologies. The treatment of comorbid patients (i.e., patients affected by multiple diseases) is one of the main challenges for the modern healthcare. It requires the development of new methodologies, supporting physicians in the treatment of interactions between guidelines. Several Artificial Intelligence approaches have started to face such a challenging problem. However, current approaches have a substantial limitation: they do not take into account the temporal dimension. This is a strong limitation. For instance, the effects of two actions taken from different guidelines may potentially conflict, but practical conflicts happen only if effects of such actions overlaps in time. In this paper, we propose an approach to support the temporal detection of interactions. Artificial intelligence temporal reasoning techniques, based on temporal constraint propagation, are widely exploited to such a purpose.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"63 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76967464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a revision of Real Logic and its implementation with Logic Tensor Networks and its application to Semantic Image Interpretation. Real Logic is a framework where learning from numerical data and logical reasoning are integrated using first order logic syntax. The symbols of the signature of Real Logic are interpreted in the data-space, i.e, on the domain of real numbers. The integration of learning and reasoning obtained in Real Logic allows us to formalize learning as approximate satisfiability in the presence of logical constraints, and to perform inference on symbolic and numerical data. After introducing a refined version of the formalism, we describe its implementation into Logic Tensor Networks which uses deep learning within Google's TensorFlow™. We evaluate LTN on the task of classifying objects and their parts in images, where we combine state-of-the-art-object detectors with a part-of ontology. LTN outperforms the state-of-the-art on object classification, and improves the performances on part-of relation detection with respect to a rule-based baseline.
{"title":"Learning and reasoning in logic tensor networks: theory and application to semantic image interpretation","authors":"L. Serafini, Ivan Donadello, A. Garcez","doi":"10.1145/3019612.3019642","DOIUrl":"https://doi.org/10.1145/3019612.3019642","url":null,"abstract":"This paper presents a revision of Real Logic and its implementation with Logic Tensor Networks and its application to Semantic Image Interpretation. Real Logic is a framework where learning from numerical data and logical reasoning are integrated using first order logic syntax. The symbols of the signature of Real Logic are interpreted in the data-space, i.e, on the domain of real numbers. The integration of learning and reasoning obtained in Real Logic allows us to formalize learning as approximate satisfiability in the presence of logical constraints, and to perform inference on symbolic and numerical data. After introducing a refined version of the formalism, we describe its implementation into Logic Tensor Networks which uses deep learning within Google's TensorFlow™. We evaluate LTN on the task of classifying objects and their parts in images, where we combine state-of-the-art-object detectors with a part-of ontology. LTN outperforms the state-of-the-art on object classification, and improves the performances on part-of relation detection with respect to a rule-based baseline.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78004039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The AUTOSAR standard acknowledges the need for improved security in automotive communications by providing a set of standard modules for encryption and authentication, to ensure confidentiality and integrity. However, these modules are not currently matched by corresponding models for security at the application level, and their use is somewhat in violation of the established AUTOSAR methodology that relies on code generation from high level specifications for all the communications and scheduling features. In this paper we present modeling extensions and code generation features, developed in the context of the EU project Sahire, that aim at bridging this gap.
{"title":"Modeling and generation of secure component communications in AUTOSAR","authors":"C. Bernardeschi, M. Natale, G. Dini, Dario Varano","doi":"10.1145/3019612.3019682","DOIUrl":"https://doi.org/10.1145/3019612.3019682","url":null,"abstract":"The AUTOSAR standard acknowledges the need for improved security in automotive communications by providing a set of standard modules for encryption and authentication, to ensure confidentiality and integrity. However, these modules are not currently matched by corresponding models for security at the application level, and their use is somewhat in violation of the established AUTOSAR methodology that relies on code generation from high level specifications for all the communications and scheduling features. In this paper we present modeling extensions and code generation features, developed in the context of the EU project Sahire, that aim at bridging this gap.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74906152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The software platforms are in a constant state of change with new devices and technologies introduced almost every day. As a result, software platform developers and researchers continue to evolve software technologies that are used for increasing mobile conversions and enhancing relationships among users. The structure of software systems involves working with a wide variety of software platforms and technologies range from embedded devices and smart-phones on the low end, to enterprise and distributed systems on the high end. Many research questions remain open from limited battery to remote access control, interaction with external devices, assurance in quality of service, context-aware adaptation to the environment, interface modeling or other issues (security and privacy problems) that are obstacles to thrive software platform technologies. This track aims to share research results and experiences in Software Platforms field with researchers and developers, the track addresses all of these research issues related to software platforms.
{"title":"Session details: SP - software platforms track","authors":"Jinmang Jung, Jun Huang, Hong Min","doi":"10.1145/3243977","DOIUrl":"https://doi.org/10.1145/3243977","url":null,"abstract":"The software platforms are in a constant state of change with new devices and technologies introduced almost every day. As a result, software platform developers and researchers continue to evolve software technologies that are used for increasing mobile conversions and enhancing relationships among users. The structure of software systems involves working with a wide variety of software platforms and technologies range from embedded devices and smart-phones on the low end, to enterprise and distributed systems on the high end. Many research questions remain open from limited battery to remote access control, interaction with external devices, assurance in quality of service, context-aware adaptation to the environment, interface modeling or other issues (security and privacy problems) that are obstacles to thrive software platform technologies. This track aims to share research results and experiences in Software Platforms field with researchers and developers, the track addresses all of these research issues related to software platforms.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"117 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75759135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The World Wide Web is changing. The advent of HTML5, the increasing importance of AJAX and client-side scripting, the explosion of Web-based Social Networks as well as the advent of the Federated Social Web, the new frontiers of Semantic Web, and the importance of the integration of Web technology and Mobile Computing are some examples of this general trend. Web applications are relentlessly evolving into rich and flexible environments where users can easily access information sources, publish content, listen to music, watch videos, draw pictures, and play directly via browsers. This class of ubiquitous software systems is gaining momentum and fosters the evolution of new ways for people to interact, collaborate and cooperate. Hence, novel approaches and techniques, new tools and frameworks are needed to address the increasing complexity of these applications. This track aims at bringing together researchers and practitioners from industry and academia working on both practical and foundational aspects of Web technologies, as well as other technologies that in the Web framework have found new and unexpected application fields.
{"title":"Session details: WT - web technologies track","authors":"","doi":"10.1145/3243955","DOIUrl":"https://doi.org/10.1145/3243955","url":null,"abstract":"The World Wide Web is changing. The advent of HTML5, the increasing importance of AJAX and client-side scripting, the explosion of Web-based Social Networks as well as the advent of the Federated Social Web, the new frontiers of Semantic Web, and the importance of the integration of Web technology and Mobile Computing are some examples of this general trend. Web applications are relentlessly evolving into rich and flexible environments where users can easily access information sources, publish content, listen to music, watch videos, draw pictures, and play directly via browsers. This class of ubiquitous software systems is gaining momentum and fosters the evolution of new ways for people to interact, collaborate and cooperate. Hence, novel approaches and techniques, new tools and frameworks are needed to address the increasing complexity of these applications. This track aims at bringing together researchers and practitioners from industry and academia working on both practical and foundational aspects of Web technologies, as well as other technologies that in the Web framework have found new and unexpected application fields.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72780423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Detecting irony in texts attracts computer scientists' attention as a recent research problem. Automatic detection of irony on microblog texts, i.e., microposts, poses additional challenges. Microposts have limited number of characters, and generally include typing errors, therefore traditional methods of text mining cannot be applied easily. This study aims to automatically detect irony in microposts. The proposed solution is based on supervised learning through a limited set of features extracted from the text. Experimental results show the effectiveness of the approach for Turkish and English informal texts.
{"title":"Irony detection on microposts with limited set of features","authors":"Hande Taslioglu, P. Senkul","doi":"10.1145/3019612.3019818","DOIUrl":"https://doi.org/10.1145/3019612.3019818","url":null,"abstract":"Detecting irony in texts attracts computer scientists' attention as a recent research problem. Automatic detection of irony on microblog texts, i.e., microposts, poses additional challenges. Microposts have limited number of characters, and generally include typing errors, therefore traditional methods of text mining cannot be applied easily. This study aims to automatically detect irony in microposts. The proposed solution is based on supervised learning through a limited set of features extracted from the text. Experimental results show the effectiveness of the approach for Turkish and English informal texts.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"98 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80543805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, most aspects of our daily life are affected by pervasive technology, referred to as Collective Adaptive Systems (CAS), consisting of massive numbers of heterogeneous units/nodes, complex interactions, and humans-in-the-loop. These systems have to be equipped with dynamic and autonomous adaptation capabilities, to deal with changes in their working environments and within themselves. The development of CAS is closely related to the area of production-level enterprise applications, with a special interest in the development, design, maintenance, scalability and other software quality attributes of Middleware. The Special Track on Collective Adaptive Systems and Middleware takes deliberately a broad view of what CAS and related middleware are and how they should be designed, analysed, built and deployed. In particular, we welcomed papers both in the foundational view (e.g., theories, methods, formalisms, models) and the practical aspects (e.g., development methodologies, programming languages, development and runtime environments, tools).
{"title":"Session details: CASM - collective adaptive system and middleware track","authors":"","doi":"10.1145/3243942","DOIUrl":"https://doi.org/10.1145/3243942","url":null,"abstract":"Nowadays, most aspects of our daily life are affected by pervasive technology, referred to as Collective Adaptive Systems (CAS), consisting of massive numbers of heterogeneous units/nodes, complex interactions, and humans-in-the-loop. These systems have to be equipped with dynamic and autonomous adaptation capabilities, to deal with changes in their working environments and within themselves. The development of CAS is closely related to the area of production-level enterprise applications, with a special interest in the development, design, maintenance, scalability and other software quality attributes of Middleware. The Special Track on Collective Adaptive Systems and Middleware takes deliberately a broad view of what CAS and related middleware are and how they should be designed, analysed, built and deployed. In particular, we welcomed papers both in the foundational view (e.g., theories, methods, formalisms, models) and the practical aspects (e.g., development methodologies, programming languages, development and runtime environments, tools).","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80777569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Program slicing is a technique to extract the part of a program (the slice) that influences or is influenced by a set of variables at a given point. Computing minimal slices is undecidable in the general case, and obtaining the minimal slice of a given program is computationally prohibitive even for very small programs. Hence, no matter what program sheer we use, in general, we cannot be sure that our slices are minimal. In this work, we present a method to automatically produce a new notion of slice that we call super reduced slice because it is constructed with the combination of different slicing techniques, including the composition of standard program sheers.
{"title":"Computing super reduced program slices by composing slicing techniques","authors":"David Insa, Sergio Pérez, Josep Silva","doi":"10.1145/3019612.3019896","DOIUrl":"https://doi.org/10.1145/3019612.3019896","url":null,"abstract":"Program slicing is a technique to extract the part of a program (the slice) that influences or is influenced by a set of variables at a given point. Computing minimal slices is undecidable in the general case, and obtaining the minimal slice of a given program is computationally prohibitive even for very small programs. Hence, no matter what program sheer we use, in general, we cannot be sure that our slices are minimal. In this work, we present a method to automatically produce a new notion of slice that we call super reduced slice because it is constructed with the combination of different slicing techniques, including the composition of standard program sheers.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80354986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}