首页 > 最新文献

Proceedings of the Symposium on Applied Computing最新文献

英文 中文
Reduction techniques for efficient behavioral model checking in adaptive case management 自适应案例管理中高效行为模型检查的约简技术
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019617
Christoph Czepa, Huy Tran, Uwe Zdun, T. Tran, E. Weiss, C. Ruhsam
Case models in Adaptive Case Management (ACM) are business process models ranging from unstructured over semi-structured to structured process models. Due to this versatility, both industry and academia show growing interest in this approach. This paper discusses a model checking approach for the behavioral verification of ACM case models. To counteract the high computational demands of model checking techniques, our approach includes state space reduction techniques as a preprocessing step before state-transition system generation. Consequently, the problem size is decreased, which decreases the computational demands needed by the subsequent model checking as well. An evaluation of the approach with a large set of LTL specifications on two real-world case models, which are representative for semi-structured and structured process models and realistic in size, shows an acceptable performance of the proposed approach.
自适应案例管理(ACM)中的案例模型是业务流程模型,范围从非结构化到半结构化再到结构化流程模型。由于这种多功能性,工业界和学术界都对这种方法表现出越来越大的兴趣。本文讨论了一种用于ACM案例模型行为验证的模型检查方法。为了抵消模型检查技术的高计算需求,我们的方法包括状态空间缩减技术作为状态转换系统生成之前的预处理步骤。因此,问题的大小减小了,这也减少了后续模型检查所需的计算量。在两个实际案例模型上使用大量LTL规范对该方法进行了评估,这两个实际案例模型代表了半结构化和结构化流程模型,并且在大小上切合实际,结果表明所建议的方法具有可接受的性能。
{"title":"Reduction techniques for efficient behavioral model checking in adaptive case management","authors":"Christoph Czepa, Huy Tran, Uwe Zdun, T. Tran, E. Weiss, C. Ruhsam","doi":"10.1145/3019612.3019617","DOIUrl":"https://doi.org/10.1145/3019612.3019617","url":null,"abstract":"Case models in Adaptive Case Management (ACM) are business process models ranging from unstructured over semi-structured to structured process models. Due to this versatility, both industry and academia show growing interest in this approach. This paper discusses a model checking approach for the behavioral verification of ACM case models. To counteract the high computational demands of model checking techniques, our approach includes state space reduction techniques as a preprocessing step before state-transition system generation. Consequently, the problem size is decreased, which decreases the computational demands needed by the subsequent model checking as well. An evaluation of the approach with a large set of LTL specifications on two real-world case models, which are representative for semi-structured and structured process models and realistic in size, shows an acceptable performance of the proposed approach.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81335994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human enabled green IoT in 5G networks 5G网络中人类启用的绿色物联网
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019689
Sadia Din, Awais Ahmad, Anand Paul
Internet of Things (IoT) plays a major role in connecting the physical world with the cyber world through new services and seamless interconnection between heterogeneous devices. Such heterogeneous devices tend to generate a massive volume of Big Data. However, exploiting green schemes for IoT is still a challenge since IoT attains a large scale and becomes more multifaceted, the current trends of analyzing Big Data are not directly applicable to it. Similarly, achieving green IoT through the use of 5G also poses new challenges when it comes to transferring huge volume of data in an efficient way. To address the challenges above, this paper presents a scheme for human- enabled green IoT in 5G network. Green IoT is achieved by grouping mobile nodes in a cluster. Also, a mobility management model is designed that helps in triggering efficient handover and selecting optimal networks based on multi-criteria decision modeling. Afterward, we design a network architecture that integrates green IoT with 5G network. Moreover, the 5G network architecture is supported by proposed protocol stack, which maps Internet Protocol (IP), Medium Access Protocol (MAC), and Location identifiers (LOC). The proposed scheme is also implemented using C programming language to validate mobility model in 5G, regarding cost, energy, and Quality of Service.
物联网(IoT)通过新型服务和异构设备之间的无缝连接,在连接物理世界与网络世界方面发挥着重要作用。这种异构设备往往会产生大量的大数据。然而,物联网的绿色方案开发仍然是一个挑战,因为物联网达到了大规模,变得更加多方面,目前的大数据分析趋势并不直接适用于它。同样,通过使用5G实现绿色物联网也带来了新的挑战,当涉及到以有效的方式传输大量数据时。为了解决上述挑战,本文提出了5G网络中人为绿色物联网的方案。绿色物联网是通过将移动节点分组在一个集群中实现的。此外,还设计了基于多准则决策建模的移动性管理模型,该模型有助于触发高效的切换和选择最优网络。随后,我们设计了绿色物联网与5G网络相结合的网络架构。此外,5G网络架构由提议的协议栈支持,该协议栈映射了互联网协议(IP)、介质访问协议(MAC)和位置标识符(LOC)。该方案还使用C编程语言实现,以验证5G中的移动模型,包括成本,能源和服务质量。
{"title":"Human enabled green IoT in 5G networks","authors":"Sadia Din, Awais Ahmad, Anand Paul","doi":"10.1145/3019612.3019689","DOIUrl":"https://doi.org/10.1145/3019612.3019689","url":null,"abstract":"Internet of Things (IoT) plays a major role in connecting the physical world with the cyber world through new services and seamless interconnection between heterogeneous devices. Such heterogeneous devices tend to generate a massive volume of Big Data. However, exploiting green schemes for IoT is still a challenge since IoT attains a large scale and becomes more multifaceted, the current trends of analyzing Big Data are not directly applicable to it. Similarly, achieving green IoT through the use of 5G also poses new challenges when it comes to transferring huge volume of data in an efficient way. To address the challenges above, this paper presents a scheme for human- enabled green IoT in 5G network. Green IoT is achieved by grouping mobile nodes in a cluster. Also, a mobility management model is designed that helps in triggering efficient handover and selecting optimal networks based on multi-criteria decision modeling. Afterward, we design a network architecture that integrates green IoT with 5G network. Moreover, the 5G network architecture is supported by proposed protocol stack, which maps Internet Protocol (IP), Medium Access Protocol (MAC), and Location identifiers (LOC). The proposed scheme is also implemented using C programming language to validate mobility model in 5G, regarding cost, energy, and Quality of Service.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80986446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proceedings of the Symposium on Applied Computing 应用计算研讨会论文集
Pub Date : 2017-04-03 DOI: 10.1145/3019612
Sung Y. Shin, Dongwan Shin, Maria Lencastre
On behalf of the Organizing Committee, we welcome you to the 32nd Annual ACM Symposium on Applied Computing (SAC 2017). This international forum has been dedicated to computer scientists, engineers and practitioners for the purpose of presenting their findings and research outputs in numerous areas of computer applications. The organizing committee is grateful for your participation in this exiting international event. We hope that this conference proves interesting and beneficial. The Symposium is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP), whose mission is to further the interests of computing professionals engaged in the design and development of new computing applications, interdisciplinary applications areas, and applied research. This conference is dedicated to the study of applied research of real-world problems. This event provides an opportunity to discuss and exchange new ideas in the wide spectrum of application areas. We all recognize the importance of keeping up with the latest developments in our current areas of expertise.
我们谨代表组委会,欢迎您参加第32届ACM应用计算年会(SAC 2017)。这个国际论坛一直致力于计算机科学家、工程师和实践者,目的是展示他们在计算机应用的许多领域的发现和研究成果。组委会非常感谢您参加这次精彩的国际盛会。我们希望这次会议是有趣和有益的。本次研讨会由ACM应用计算特别兴趣小组(SIGAPP)主办,该小组的使命是促进从事新计算应用、跨学科应用领域和应用研究的设计和开发的计算专业人员的兴趣。本次会议致力于研究现实世界问题的应用研究。这次活动为讨论和交流广泛应用领域的新想法提供了机会。我们都认识到在我们目前的专业领域跟上最新发展的重要性。
{"title":"Proceedings of the Symposium on Applied Computing","authors":"Sung Y. Shin, Dongwan Shin, Maria Lencastre","doi":"10.1145/3019612","DOIUrl":"https://doi.org/10.1145/3019612","url":null,"abstract":"On behalf of the Organizing Committee, we welcome you to the 32nd Annual ACM Symposium on Applied Computing (SAC 2017). This international forum has been dedicated to computer scientists, engineers and practitioners for the purpose of presenting their findings and research outputs in numerous areas of computer applications. The organizing committee is grateful for your participation in this exiting international event. We hope that this conference proves interesting and beneficial. \u0000 \u0000The Symposium is sponsored by the ACM Special Interest Group on Applied Computing (SIGAPP), whose mission is to further the interests of computing professionals engaged in the design and development of new computing applications, interdisciplinary applications areas, and applied research. This conference is dedicated to the study of applied research of real-world problems. This event provides an opportunity to discuss and exchange new ideas in the wide spectrum of application areas. We all recognize the importance of keeping up with the latest developments in our current areas of expertise.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81032014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improving service time with a multicore aware middleware 使用多核感知中间件改进服务时间
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019741
M. García-Valls, Christian Calva-Urrego
One of the major advantages of communication middleware is its independence from the underlying hardware platform. This improves portability and interoperability, whereas following the mainstream trend of favoring abstraction over performance or execution optimization. However, for time sensitive applications, this lack of integration with the hardware may fall short as performance is lowered and attention to priority requests is not sufficiently differentiated. In this paper, we propose a middleware that has a higher degree of integration with the underlying hardware platform; it uses the mechanisms of the operating system to control the use of the processing cores, reserving them as needed for supporting differentiated service to higher priority invoking nodes or clients. Results show that our middleware improves the service time of high priority clients and it offers stable communication times.
通信中间件的主要优点之一是它独立于底层硬件平台。这提高了可移植性和互操作性,而遵循了倾向于抽象而不是性能或执行优化的主流趋势。然而,对于时间敏感的应用程序,缺乏与硬件的集成可能会导致性能降低,并且对优先级请求的关注没有充分区分。在本文中,我们提出了一种与底层硬件平台具有较高集成程度的中间件;它使用操作系统的机制来控制处理核心的使用,根据需要保留它们,以支持对高优先级调用节点或客户端的差异化服务。结果表明,该中间件提高了高优先级客户端的服务时间,提供了稳定的通信时间。
{"title":"Improving service time with a multicore aware middleware","authors":"M. García-Valls, Christian Calva-Urrego","doi":"10.1145/3019612.3019741","DOIUrl":"https://doi.org/10.1145/3019612.3019741","url":null,"abstract":"One of the major advantages of communication middleware is its independence from the underlying hardware platform. This improves portability and interoperability, whereas following the mainstream trend of favoring abstraction over performance or execution optimization. However, for time sensitive applications, this lack of integration with the hardware may fall short as performance is lowered and attention to priority requests is not sufficiently differentiated. In this paper, we propose a middleware that has a higher degree of integration with the underlying hardware platform; it uses the mechanisms of the operating system to control the use of the processing cores, reserving them as needed for supporting differentiated service to higher priority invoking nodes or clients. Results show that our middleware improves the service time of high priority clients and it offers stable communication times.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81040799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network 电信网络中智能垃圾邮件发送者的分散隐私感知协同过滤
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019792
M. A. Azad, Samiran Bag
Smart spammers and telemarketers circumvent the standalone spam detection systems by making low rate spam-ming activity to a large number of recipients distributed across many telecommunication operators. The collaboration among multiple telecommunication operators (OPs) will allow operators to get rid of unwanted callers at the early stage of their spamming activity. The challenge in the design of collaborative spam detection system is that OPs are not willing to share certain information about behaviour of their users/customers because of privacy concerns. Ideally, operators agree to share certain aggregated statistical information if collaboration process ensures complete privacy protection of users and their network data. To address this challenge and convince OPs for the collaboration, this paper proposes a decentralized reputation aggregation protocol that enables OPs to take part in a collaboration process without use of a trusted third party centralized system and without developing a predefined trust relationship with other OPs. To this extent, the collaboration among operators is achieved through the exchange of cryptographic reputation scores among OPs thus fully protects relationship network and reputation scores of users even in the presence of colluders. We evaluate the performance of proposed protocol over the simulated data consisting of five collaborators. Experimental results revealed that proposed approach outperforms standalone systems in terms of true positive rate and false positive rate.
聪明的垃圾邮件发送者和电话营销人员通过向分布在许多电信运营商中的大量收件人进行低费率的垃圾邮件活动来绕过独立的垃圾邮件检测系统。多家电信运营商之间的合作将允许运营商在垃圾邮件活动的早期阶段摆脱不受欢迎的呼叫者。设计协作式垃圾邮件检测系统的挑战是,由于隐私问题,OPs不愿意分享有关其用户/客户行为的某些信息。理想情况下,如果合作过程能够确保用户及其网络数据的完全隐私保护,运营商同意共享某些汇总的统计信息。为了解决这一挑战并说服OPs进行协作,本文提出了一种分散的声誉聚合协议,该协议使OPs能够在不使用受信任的第三方集中式系统的情况下参与协作过程,并且无需与其他OPs建立预定义的信任关系。在这种程度上,运营商之间的协作是通过OPs之间的加密信誉分数交换来实现的,即使存在串谋者,也能充分保护用户的关系网络和信誉分数。我们在由五个合作者组成的模拟数据上评估了所提出协议的性能。实验结果表明,该方法在真阳性率和假阳性率方面优于独立系统。
{"title":"Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network","authors":"M. A. Azad, Samiran Bag","doi":"10.1145/3019612.3019792","DOIUrl":"https://doi.org/10.1145/3019612.3019792","url":null,"abstract":"Smart spammers and telemarketers circumvent the standalone spam detection systems by making low rate spam-ming activity to a large number of recipients distributed across many telecommunication operators. The collaboration among multiple telecommunication operators (OPs) will allow operators to get rid of unwanted callers at the early stage of their spamming activity. The challenge in the design of collaborative spam detection system is that OPs are not willing to share certain information about behaviour of their users/customers because of privacy concerns. Ideally, operators agree to share certain aggregated statistical information if collaboration process ensures complete privacy protection of users and their network data. To address this challenge and convince OPs for the collaboration, this paper proposes a decentralized reputation aggregation protocol that enables OPs to take part in a collaboration process without use of a trusted third party centralized system and without developing a predefined trust relationship with other OPs. To this extent, the collaboration among operators is achieved through the exchange of cryptographic reputation scores among OPs thus fully protects relationship network and reputation scores of users even in the presence of colluders. We evaluate the performance of proposed protocol over the simulated data consisting of five collaborators. Experimental results revealed that proposed approach outperforms standalone systems in terms of true positive rate and false positive rate.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83346779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On computing similarity of android executables using text mining: student research abstract 基于文本挖掘的android可执行文件相似度计算:学生研究摘要
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019926
Gyoosik Kim
According to Comscore1, Android users in the U.S spend an average of 2.8 hours per day using mobile media. On the other hand, according to Statista reports2, Android users were able to choose between 2.2 million applications on June 2016. Among these applications, there are ones reported by Google Android Security Service3 as malware, virus, or illegal theft. Many tools such as Dex2Jar4, apktool5, and jd-gui6 analyze and reverse engineer Android applications and can be used to illegally copy or transform the applications as well. In order to protect applications from piracy or illegal theft, it is necessary to detect theft by measuring application similarity. In the literature, previous studies on theft detection have measured application similarity at two levels, source or executable code level, which have some limitations. Source codes are not available if the codes are legacy one or are developed by upstream suppliers. In the case of the executable codes, application similarity is measured 1) using the source codes decompiled from the executables, or 2) using the characteristics extracted from the executables (i.e., birthmark). For example, DroidMoss [5] applied a fuzzy hashing technique to effectively localize and detect the changes from app-repackaging behavior. Reference [4] proposed software birthmarks to show the unique characteristics of a program and detected software theft based on the birthmarks.
Comscore1的数据显示,美国Android用户平均每天使用移动媒体的时间为2.8小时。另一方面,根据Statista的报告,2016年6月,安卓用户可以选择220万个应用程序。在这些应用程序中,有一些被谷歌安卓安全服务报告为恶意软件、病毒或非法盗窃。许多工具,如Dex2Jar4、apktool5和jd-gui6,可以分析和逆向工程Android应用程序,也可以用于非法复制或转换应用程序。为了保护应用程序免受盗版或非法窃取,有必要通过测量应用程序相似度来检测盗窃。在文献中,以往的盗窃检测研究都是在源代码或可执行代码两个层次上测量应用程序的相似度,存在一定的局限性。如果代码是遗留代码或由上游供应商开发的,则源代码不可用。在可执行代码的情况下,应用程序的相似性是1)使用从可执行文件反编译的源代码,或者2)使用从可执行文件中提取的特征(例如,胎记)来测量的。例如,DroidMoss[5]应用模糊哈希技术来有效地定位和检测应用程序重新包装行为的变化。文献[4]提出了软件胎记来显示程序的独特性,并基于胎记来检测软件盗窃。
{"title":"On computing similarity of android executables using text mining: student research abstract","authors":"Gyoosik Kim","doi":"10.1145/3019612.3019926","DOIUrl":"https://doi.org/10.1145/3019612.3019926","url":null,"abstract":"According to Comscore1, Android users in the U.S spend an average of 2.8 hours per day using mobile media. On the other hand, according to Statista reports2, Android users were able to choose between 2.2 million applications on June 2016. Among these applications, there are ones reported by Google Android Security Service3 as malware, virus, or illegal theft. Many tools such as Dex2Jar4, apktool5, and jd-gui6 analyze and reverse engineer Android applications and can be used to illegally copy or transform the applications as well. In order to protect applications from piracy or illegal theft, it is necessary to detect theft by measuring application similarity. In the literature, previous studies on theft detection have measured application similarity at two levels, source or executable code level, which have some limitations. Source codes are not available if the codes are legacy one or are developed by upstream suppliers. In the case of the executable codes, application similarity is measured 1) using the source codes decompiled from the executables, or 2) using the characteristics extracted from the executables (i.e., birthmark). For example, DroidMoss [5] applied a fuzzy hashing technique to effectively localize and detect the changes from app-repackaging behavior. Reference [4] proposed software birthmarks to show the unique characteristics of a program and detected software theft based on the birthmarks.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90811866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A computational model to evaluate honesty in social internet of things 社会物联网诚信评价的计算模型
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019840
Upul Jayasinghe, Hyun-Woo Lee, G. Lee
Trust in Social Internet of Things has allowed to open new horizons in collaborative networking, particularly by allowing objects to communicate with their service providers, based on their relationships analogy to human world. However, strengthening trust is a challenging task as it involves identifying several influential factors in each domain of social-cyber-physical systems in order to build a reliable system. In this paper, we address the issue of understanding and evaluating honesty that is an important trust metric in trustworthiness evaluation process in social networks. First, we identify and define several trust attributes, which affect directly to the honesty. Then, a subjective computational model is derived based on experiences of objects and opinions from friendly objects with respect to identified attributes. Based on the outputs of this model a final honest level is predicted using regression analysis. Finally, the effectiveness of our model is tested using simulations.
对社交物联网的信任为协作网络开辟了新的视野,特别是允许对象基于与人类世界的关系类比与服务提供商进行通信。然而,增强信任是一项具有挑战性的任务,因为它涉及到在社会-网络-物理系统的每个领域中识别几个影响因素,以建立一个可靠的系统。在本文中,我们解决了理解和评估诚信的问题,这是一个重要的信任指标,在可信度评估过程中,社会网络。首先,我们识别并定义了几个直接影响诚信的信任属性。然后,基于对象的经验和友好对象关于识别属性的意见,推导出主观计算模型。基于该模型的输出,使用回归分析预测了最终的诚实水平。最后,通过仿真验证了模型的有效性。
{"title":"A computational model to evaluate honesty in social internet of things","authors":"Upul Jayasinghe, Hyun-Woo Lee, G. Lee","doi":"10.1145/3019612.3019840","DOIUrl":"https://doi.org/10.1145/3019612.3019840","url":null,"abstract":"Trust in Social Internet of Things has allowed to open new horizons in collaborative networking, particularly by allowing objects to communicate with their service providers, based on their relationships analogy to human world. However, strengthening trust is a challenging task as it involves identifying several influential factors in each domain of social-cyber-physical systems in order to build a reliable system. In this paper, we address the issue of understanding and evaluating honesty that is an important trust metric in trustworthiness evaluation process in social networks. First, we identify and define several trust attributes, which affect directly to the honesty. Then, a subjective computational model is derived based on experiences of objects and opinions from friendly objects with respect to identified attributes. Based on the outputs of this model a final honest level is predicted using regression analysis. Finally, the effectiveness of our model is tested using simulations.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89945860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Session details: DTTA - database theory, technology and applications track 课程详细内容:DTTA -数据库理论、技术及应用跟踪
Pub Date : 2017-04-03 DOI: 10.1145/3243959
The world nowadays revolves around dealing with extreme large amount of data presented in various formats. So it is inevitable that researchers focus on advancing the state of managing information. From here, the importance of database technology ranks amongst the hottest areas of research, taking into account the consistent need for faster query processing as well as for managing huge amounts of data. This year the track has received many papers covering different areas of databases.
当今世界围绕着处理以各种格式呈现的海量数据展开。因此,研究人员致力于提高信息管理水平是必然的。从这里开始,数据库技术的重要性被列为最热门的研究领域之一,考虑到对更快的查询处理以及管理大量数据的一致需求。今年,该专题收到了许多涉及数据库不同领域的论文。
{"title":"Session details: DTTA - database theory, technology and applications track","authors":"","doi":"10.1145/3243959","DOIUrl":"https://doi.org/10.1145/3243959","url":null,"abstract":"The world nowadays revolves around dealing with extreme large amount of data presented in various formats. So it is inevitable that researchers focus on advancing the state of managing information. From here, the importance of database technology ranks amongst the hottest areas of research, taking into account the consistent need for faster query processing as well as for managing huge amounts of data. This year the track has received many papers covering different areas of databases.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86687657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontology-based workflow pattern mining: application to bioinformatics expertise acquisition 基于本体的工作流模式挖掘:在生物信息学专业知识获取中的应用
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019866
Ahmed Halioui, Tomas Martin, Petko Valtchev, Abdoulaye Baniré Diallo
Workflow platforms enable the construction of solutions to complex problems as step-wise processes made of components including methods, tools, data formats, parameters, etc. Successful workflow solutions require a mastering of the different components paving the way to automated acquisition of problem solving expertise. Thus, process mining could be applied to discover workflow patterns. Due to the combinatorics of component instances in rich domains such as bioinformatics, generalized patterns could be a relevant way of abstraction. Here, we propose an approach for mining workflow patterns, defined on the top of a domain ontology which categorizes workflow elements and their interactions. While original workflows are doubly-labelled DAGs, the underlying problem is transformed into a mining of generalized sequential patterns with links between their items. The proposed mining method traverses the ensuing pattern space using five refinement primitives that exploit the is-a links from the ontology. To assess the prediction power of the approach, we applied the generated patterns as templates in a recommendation platform to complete partial workflows under construction. The analyses of recommendations vs. actual content of a real-world dataset reveals that non trivial patterns can be found and further used to provide plausible recommendations with high accuracies (fMeasure >75+).
工作流平台可以将复杂问题的解决方案构建为由方法、工具、数据格式、参数等组成的逐步过程。成功的工作流解决方案需要掌握不同的组件,为自动获取解决问题的专业知识铺平道路。因此,流程挖掘可以应用于发现工作流模式。在生物信息学等丰富的领域中,由于组件实例的组合性,广义模式可能是一种相关的抽象方式。在这里,我们提出了一种挖掘工作流模式的方法,该模式定义在对工作流元素及其交互进行分类的领域本体之上。虽然原始工作流是双重标记的dag,但潜在的问题被转换为对具有项目之间链接的广义顺序模式的挖掘。所提出的挖掘方法使用利用本体中的is-a链接的五个改进原语遍历随后的模式空间。为了评估该方法的预测能力,我们将生成的模式作为模板应用于推荐平台中,以完成正在构建的部分工作流。对推荐与真实数据集的实际内容的分析表明,可以找到非平凡模式,并进一步用于提供具有高准确性的可信推荐(fMeasure >75+)。
{"title":"Ontology-based workflow pattern mining: application to bioinformatics expertise acquisition","authors":"Ahmed Halioui, Tomas Martin, Petko Valtchev, Abdoulaye Baniré Diallo","doi":"10.1145/3019612.3019866","DOIUrl":"https://doi.org/10.1145/3019612.3019866","url":null,"abstract":"Workflow platforms enable the construction of solutions to complex problems as step-wise processes made of components including methods, tools, data formats, parameters, etc. Successful workflow solutions require a mastering of the different components paving the way to automated acquisition of problem solving expertise. Thus, process mining could be applied to discover workflow patterns. Due to the combinatorics of component instances in rich domains such as bioinformatics, generalized patterns could be a relevant way of abstraction. Here, we propose an approach for mining workflow patterns, defined on the top of a domain ontology which categorizes workflow elements and their interactions. While original workflows are doubly-labelled DAGs, the underlying problem is transformed into a mining of generalized sequential patterns with links between their items. The proposed mining method traverses the ensuing pattern space using five refinement primitives that exploit the is-a links from the ontology. To assess the prediction power of the approach, we applied the generated patterns as templates in a recommendation platform to complete partial workflows under construction. The analyses of recommendations vs. actual content of a real-world dataset reveals that non trivial patterns can be found and further used to provide plausible recommendations with high accuracies (fMeasure >75+).","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87775512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An effective and efficient hybrid scan matching algorithm for mobile object applications 一种有效的移动目标混合扫描匹配算法
Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019720
K. Lenac, A. Cuzzocrea, E. Mumolo
In this paper we analyze hybrid scan matching algorithms and we test their performances in typical mobile applications. Since the genetic algorithm is robust but not very accurate, and ICP is accurate but not very robust, it is natural to use the two algorithms in a cascade fashion: first we run a genetic optimization to find an approximate but robust matching solution and then we run the Iterative Closest Point (ICP) algorithm to increase the accuracy. The proposed genetic algorithm is very fast due to a look-up table formulation and very robust against large errors in both distance and angle during scan data acquisition. It is worth mentioning that large scan errors arise very commonly in mobile object applications due, for instance, to wheel slippage or when closing loops. We show experimentally that the proposed algorithm successfully copes with large localization errors.
本文分析了混合扫描匹配算法,并在典型的移动应用中测试了它们的性能。由于遗传算法是鲁棒的,但不是很精确,ICP是准确的,但不是很鲁棒,所以很自然地以级联方式使用这两种算法:首先我们运行遗传优化来找到一个近似但鲁棒的匹配解,然后我们运行迭代最近点(ICP)算法来提高精度。由于采用了查找表的形式,该算法的速度非常快,并且对于扫描数据采集过程中距离和角度的较大误差具有很强的鲁棒性。值得一提的是,在移动对象应用程序中,由于车轮滑动或闭合循环,通常会出现大的扫描错误。实验结果表明,该算法能够成功地处理较大的定位误差。
{"title":"An effective and efficient hybrid scan matching algorithm for mobile object applications","authors":"K. Lenac, A. Cuzzocrea, E. Mumolo","doi":"10.1145/3019612.3019720","DOIUrl":"https://doi.org/10.1145/3019612.3019720","url":null,"abstract":"In this paper we analyze hybrid scan matching algorithms and we test their performances in typical mobile applications. Since the genetic algorithm is robust but not very accurate, and ICP is accurate but not very robust, it is natural to use the two algorithms in a cascade fashion: first we run a genetic optimization to find an approximate but robust matching solution and then we run the Iterative Closest Point (ICP) algorithm to increase the accuracy. The proposed genetic algorithm is very fast due to a look-up table formulation and very robust against large errors in both distance and angle during scan data acquisition. It is worth mentioning that large scan errors arise very commonly in mobile object applications due, for instance, to wheel slippage or when closing loops. We show experimentally that the proposed algorithm successfully copes with large localization errors.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88110666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the Symposium on Applied Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1