首页 > 最新文献

IISA 2013最新文献

英文 中文
Identifying semantically meaningful sub-communities within Twitter blogosphere 在Twitter博客圈中识别语义上有意义的子社区
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623727
Dionisios N. Sotiropoulos, Chris D. Kounavis, G. Giaglis
This paper addresses the problem of semantically meaningful group detection within a sub-community of twitter micro-bloggers by utilizing a topic modeling, multi-objective clustering approach. The proposed group detection method is anchored on the Latent Dirichlet Allocation (LDA) topic modeling technique, aiming at identifying clusters of twitter users that are optimal in terms of both spatial and topical compactness. Specifically, the group detection problem is formulated as a multi-objective optimization problem taking into consideration two complementary cluster formation directives. The first objective, related to spatial compactness, is achieved by minimizing the overall deviation from the corresponding cluster centers. The second, related to topical compactness, is achieved by minimizing the portion of probability mass assigned to low probability topics for the corresponding cluster centroids. In our approach, optimization is performed by employing a multi-objective genetic algorithm, which results in a variety of cluster structures that are significantly more interpretable than cluster assignments obtained with traditional single-objective clustering algorithms.
本文利用主题建模、多目标聚类方法,解决了twitter微博用户子社区中语义有意义的群体检测问题。本文提出的组检测方法以潜在狄利克雷分配(Latent Dirichlet Allocation, LDA)主题建模技术为基础,旨在识别在空间和主题紧密度方面都最优的twitter用户聚类。具体而言,将群体检测问题表述为考虑两个互补的集群形成指令的多目标优化问题。第一个目标与空间紧凑性有关,通过最小化与相应集群中心的总体偏差来实现。第二,与局部紧密性相关,通过最小化分配给相应聚类质心的低概率主题的概率质量部分来实现。在我们的方法中,通过采用多目标遗传算法进行优化,从而产生各种聚类结构,这些结构比传统的单目标聚类算法获得的聚类分配具有更强的可解释性。
{"title":"Identifying semantically meaningful sub-communities within Twitter blogosphere","authors":"Dionisios N. Sotiropoulos, Chris D. Kounavis, G. Giaglis","doi":"10.1109/IISA.2013.6623727","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623727","url":null,"abstract":"This paper addresses the problem of semantically meaningful group detection within a sub-community of twitter micro-bloggers by utilizing a topic modeling, multi-objective clustering approach. The proposed group detection method is anchored on the Latent Dirichlet Allocation (LDA) topic modeling technique, aiming at identifying clusters of twitter users that are optimal in terms of both spatial and topical compactness. Specifically, the group detection problem is formulated as a multi-objective optimization problem taking into consideration two complementary cluster formation directives. The first objective, related to spatial compactness, is achieved by minimizing the overall deviation from the corresponding cluster centers. The second, related to topical compactness, is achieved by minimizing the portion of probability mass assigned to low probability topics for the corresponding cluster centroids. In our approach, optimization is performed by employing a multi-objective genetic algorithm, which results in a variety of cluster structures that are significantly more interpretable than cluster assignments obtained with traditional single-objective clustering algorithms.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Layered-based approach to virtual storage for smart power systems 基于分层的智能电力系统虚拟存储方法
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623732
M. Alamaniotis, L. Tsoukalas
The advent of data networks and the plethora of internet-based computing and control approaches have stimulated research on novel technologies for the intelligent management of electric power transmission and distribution networks (the “grid”). Such couplings of the conventional power infrastructure with information technologies is known under the term smart power grid. The Consortium of Intelligent Management of the Grid (CIMEG) has proposed a further evolution of a smart power grid to what is called an Energy Internet, which couples the basic principles and protocols of data networks with power flow. One of the key principles of the Energy Internet is the use of virtual buffers as large scale energy storage mechanisms. In this paper the idea of virtual buffer is extended into a multi-layer architecture and its main operational principles are introduced. Energy layers are controlled by intelligent agents, which bring power utilization to a higher level than that of a single user. Furthermore, they leverage the idea of virtual buffers and provide more stability in the power flow. The operability of layered based virtual storage in energy distribution and for grid stability is demonstrated through an illustrative example, where advantages and disadvantages in building future smart power systems are examined.
数据网络的出现以及大量基于互联网的计算和控制方法刺激了对电力传输和分配网络(“电网”)智能管理新技术的研究。传统电力基础设施与信息技术的这种耦合被称为智能电网。电网智能管理联盟(CIMEG)提出了智能电网的进一步发展,即所谓的能源互联网,它将数据网络的基本原理和协议与潮流相结合。能源互联网的关键原则之一是使用虚拟缓冲区作为大规模的能源存储机制。本文将虚拟缓冲区的思想扩展到一个多层体系结构,并介绍了它的主要工作原理。能量层由智能体控制,使电力利用率比单个用户更高。此外,它们利用了虚拟缓冲器的思想,并在功率流中提供了更多的稳定性。通过一个实例说明了分层虚拟存储在能量分配和电网稳定方面的可操作性,并分析了构建未来智能电力系统的优缺点。
{"title":"Layered-based approach to virtual storage for smart power systems","authors":"M. Alamaniotis, L. Tsoukalas","doi":"10.1109/IISA.2013.6623732","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623732","url":null,"abstract":"The advent of data networks and the plethora of internet-based computing and control approaches have stimulated research on novel technologies for the intelligent management of electric power transmission and distribution networks (the “grid”). Such couplings of the conventional power infrastructure with information technologies is known under the term smart power grid. The Consortium of Intelligent Management of the Grid (CIMEG) has proposed a further evolution of a smart power grid to what is called an Energy Internet, which couples the basic principles and protocols of data networks with power flow. One of the key principles of the Energy Internet is the use of virtual buffers as large scale energy storage mechanisms. In this paper the idea of virtual buffer is extended into a multi-layer architecture and its main operational principles are introduced. Energy layers are controlled by intelligent agents, which bring power utilization to a higher level than that of a single user. Furthermore, they leverage the idea of virtual buffers and provide more stability in the power flow. The operability of layered based virtual storage in energy distribution and for grid stability is demonstrated through an illustrative example, where advantages and disadvantages in building future smart power systems are examined.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133444626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Fuzzy logic for dynamic adaptation: Represent and manage changeable user states 用于动态适应的模糊逻辑:表示和管理可变的用户状态
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623690
K. Chrysafiadi, M. Virvou
In this paper a novel generic fuzzy adaptation tool (FAdapT) is presented. FAdapT uses fuzzy sets and a mechanism of rules over them in order to promote personalization in adaptive systems. It is applicable to systems, in which the user's changeable state and/or preferences are affected by the existing dependencies among the system's elements (like concepts, preferences, events, choices). FAdapT leads the system to make inferences about the changes of the user's state, preferences and/or choices and thus make useful adaptation decisions, offering dynamic adaptation to users' needs. To explain the operation of FAdapT, two case studies are described: an e-shop and an educational system.
本文提出了一种新的通用模糊自适应工具(FAdapT)。FAdapT利用模糊集和规则机制来促进自适应系统的个性化。它适用于这样的系统,其中用户的可变状态和/或偏好受到系统元素(如概念、偏好、事件、选择)之间现有依赖关系的影响。FAdapT引导系统对用户状态、偏好和/或选择的变化进行推断,从而做出有用的适应决策,为用户的需求提供动态适应。为了解释FAdapT的运作,本文描述了两个案例:一个电子商店和一个教育系统。
{"title":"Fuzzy logic for dynamic adaptation: Represent and manage changeable user states","authors":"K. Chrysafiadi, M. Virvou","doi":"10.1109/IISA.2013.6623690","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623690","url":null,"abstract":"In this paper a novel generic fuzzy adaptation tool (FAdapT) is presented. FAdapT uses fuzzy sets and a mechanism of rules over them in order to promote personalization in adaptive systems. It is applicable to systems, in which the user's changeable state and/or preferences are affected by the existing dependencies among the system's elements (like concepts, preferences, events, choices). FAdapT leads the system to make inferences about the changes of the user's state, preferences and/or choices and thus make useful adaptation decisions, offering dynamic adaptation to users' needs. To explain the operation of FAdapT, two case studies are described: an e-shop and an educational system.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116285258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated tool for virtual restoration of Byzantine icons 一个集成的工具,虚拟恢复拜占庭图标
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623685
A. Maronidis, C. Voutounos, A. Lanitis
An integrated tool that can be used for damage detection, shape restoration and texture restoration of faces appearing in Byzantine icons, is presented. The damage detection process involves the estimation of residuals obtained after the coding and reconstruction of face image regions using trained Principal Component Analysis (PCA) texture models. Shape restoration is accomplished using a model-based approach that employs a 3D shape model generated by taking into account a set of geometrical rules adopted by Byzantine style iconographers. Texture restoration is performed using a customized version of the recursive PCA technique. For this purpose dedicated PCA texture models representing different categories of faces appearing in icons, are used. All methods developed as part of the project are incorporated into a user-friendly application, which can be utilized by both amateurs and professionals. Indicative visual and quantitative results show the potential of the developed application.
提出了一种可用于拜占庭图标中出现的面部损伤检测、形状恢复和纹理恢复的集成工具。损伤检测过程包括使用训练好的主成分分析(PCA)纹理模型对人脸图像区域进行编码和重建后得到的残差进行估计。形状恢复是使用基于模型的方法完成的,该方法采用了考虑到拜占庭风格肖像画家采用的一组几何规则而生成的3D形状模型。使用自定义版本的递归PCA技术执行纹理恢复。为此,使用专用PCA纹理模型来表示图标中出现的不同类别的人脸。作为项目一部分开发的所有方法都被纳入一个用户友好的应用程序,业余爱好者和专业人士都可以使用。指示性的可视化和定量结果显示了所开发应用的潜力。
{"title":"An integrated tool for virtual restoration of Byzantine icons","authors":"A. Maronidis, C. Voutounos, A. Lanitis","doi":"10.1109/IISA.2013.6623685","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623685","url":null,"abstract":"An integrated tool that can be used for damage detection, shape restoration and texture restoration of faces appearing in Byzantine icons, is presented. The damage detection process involves the estimation of residuals obtained after the coding and reconstruction of face image regions using trained Principal Component Analysis (PCA) texture models. Shape restoration is accomplished using a model-based approach that employs a 3D shape model generated by taking into account a set of geometrical rules adopted by Byzantine style iconographers. Texture restoration is performed using a customized version of the recursive PCA technique. For this purpose dedicated PCA texture models representing different categories of faces appearing in icons, are used. All methods developed as part of the project are incorporated into a user-friendly application, which can be utilized by both amateurs and professionals. Indicative visual and quantitative results show the potential of the developed application.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123075994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reality mining in urban space 城市空间的现实挖掘
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623711
S. Nikolopoulos, S. Papadopoulos, Y. Kompatsiaris
The widespread adoption of smartphones and other sensor-capable devices and the availability of infrastructure capable of storing and sharing sensor information have been the main enablers for the intriguing and ambitious concept of Reality Mining. Reality mining is concerned with the collection and analysis of sensed data pertaining to different aspects of human social behavior, allowing to observe the societal dynamics and predict what individuals will do next, model the behavior of large organizations, detect trends, spot emerging phenomena and events, mine public opinion, etc. The concept of reality mining is even more intriguing when applied in the context of urban space, since user-generated content can be analyzed to reveal the citizens' perspective on various aspects of the city reality. In this paper, after elaborating on the concept of reality mining in urban space, we present three cases where user-generated content is employed to discover the citizens' perspective about: a) the city attractions, b) the city issues/problems, and c) major events in the city.
智能手机和其他具有传感器功能的设备的广泛采用,以及能够存储和共享传感器信息的基础设施的可用性,是现实挖掘这一有趣而雄心勃勃的概念的主要推动力。现实挖掘涉及收集和分析与人类社会行为的不同方面有关的感知数据,允许观察社会动态并预测个人下一步将做什么,为大型组织的行为建模,检测趋势,发现新出现的现象和事件,挖掘公众舆论等。现实挖掘的概念在城市空间的背景下更加有趣,因为用户生成的内容可以通过分析来揭示市民对城市现实的各个方面的看法。本文在阐述了城市空间中现实挖掘的概念之后,提出了三个案例,通过用户生成内容来发现市民对以下方面的看法:a)城市景点,b)城市议题/问题,c)城市重大事件。
{"title":"Reality mining in urban space","authors":"S. Nikolopoulos, S. Papadopoulos, Y. Kompatsiaris","doi":"10.1109/IISA.2013.6623711","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623711","url":null,"abstract":"The widespread adoption of smartphones and other sensor-capable devices and the availability of infrastructure capable of storing and sharing sensor information have been the main enablers for the intriguing and ambitious concept of Reality Mining. Reality mining is concerned with the collection and analysis of sensed data pertaining to different aspects of human social behavior, allowing to observe the societal dynamics and predict what individuals will do next, model the behavior of large organizations, detect trends, spot emerging phenomena and events, mine public opinion, etc. The concept of reality mining is even more intriguing when applied in the context of urban space, since user-generated content can be analyzed to reveal the citizens' perspective on various aspects of the city reality. In this paper, after elaborating on the concept of reality mining in urban space, we present three cases where user-generated content is employed to discover the citizens' perspective about: a) the city attractions, b) the city issues/problems, and c) major events in the city.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123733742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Agent agreement protocols based on golay error-correcting code 基于全局纠错码的代理协议协议
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623689
P. Nastou, P. Spirakis, Y. Stamatiou, Christina Vichou
In this paper, we propose simple protocols for enabling two communicating agents that may have never met before to extract common knowledge out of any initial knowledge that each of them possesses. The initial knowledge from which the agents start, may even be independent of each other, implying that the two agents need not have had previous access to common information sources. In addition, the common knowledge extracted upon the termination of the protocols depends, in a fair way, on the (possibly independent) information items initially known, separately, by the two agents. It is fair in the sense that there is a negotiation between the two agents instead of one agent forcing the other to conform to its own knowledge. These protocols, may be extended in order to support security applications where the establishment of a common knowledge is required. Moreover, the implementation of the protocols leads to reasonably small code that can also fit within resource limited devices involved in any communication network while, at the same time, it is efficient as simulation results demonstrate.
在本文中,我们提出了简单的协议,使两个通信代理可以从它们各自拥有的任何初始知识中提取共同知识。代理开始使用的初始知识甚至可能彼此独立,这意味着两个代理不需要事先访问公共信息源。此外,在协议终止时提取的共同知识以公平的方式依赖于两个代理最初分别知道的(可能独立的)信息项。它是公平的,因为在两个主体之间有一个协商,而不是一个主体强迫另一个主体遵守自己的知识。为了支持需要建立共同知识的安全应用,可以对这些协议进行扩展。此外,协议的实现导致代码相当小,也可以适应任何通信网络中涉及的资源有限的设备,同时,仿真结果表明,它是高效的。
{"title":"Agent agreement protocols based on golay error-correcting code","authors":"P. Nastou, P. Spirakis, Y. Stamatiou, Christina Vichou","doi":"10.1109/IISA.2013.6623689","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623689","url":null,"abstract":"In this paper, we propose simple protocols for enabling two communicating agents that may have never met before to extract common knowledge out of any initial knowledge that each of them possesses. The initial knowledge from which the agents start, may even be independent of each other, implying that the two agents need not have had previous access to common information sources. In addition, the common knowledge extracted upon the termination of the protocols depends, in a fair way, on the (possibly independent) information items initially known, separately, by the two agents. It is fair in the sense that there is a negotiation between the two agents instead of one agent forcing the other to conform to its own knowledge. These protocols, may be extended in order to support security applications where the establishment of a common knowledge is required. Moreover, the implementation of the protocols leads to reasonably small code that can also fit within resource limited devices involved in any communication network while, at the same time, it is efficient as simulation results demonstrate.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132464980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sound events and emotions: Investigating the relation of rhythmic characteristics and arousal 声音事件与情绪:节奏特征与觉醒的关系研究
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623709
K. Drossos, Rigas Kotsakis, George M. Kalliris, A. Floros
A variety of recent researches in Audio Emotion Recognition (AER) outlines high performance and retrieval accuracy results. However, in most works music is considered as the original sound content that conveys the identified emotions. One of the music characteristics that is found to represent a fundamental means for conveying emotions are the rhythm-related acoustic cues. Although music is an important aspect of everyday life, there are numerous non-linguistic and nonmusical sounds surrounding humans, generally defined as sound events (SEs). Despite this enormous impact of SEs to humans, a scarcity of investigations regarding AER from SEs is observed. There are only a few recent investigations concerned with SEs and AER, presenting a semantic connection between the former and the listener's triggered emotion. In this work we analytically investigate the connection of rhythm-related characteristics of a wide range of common SEs with the arousal of the listener using sound events with semantic content. To this aim, several feature evaluation and classification tasks are conducted using different ranking and classification algorithms. High accuracy results are obtained, demonstrating a significant relation of SEs rhythmic characteristics to the elicited arousal.
近年来在音频情感识别(AER)方面的各种研究都取得了优异的性能和检索精度。然而,在大多数作品中,音乐被认为是原始的声音内容,传达了已识别的情感。人们发现,与节奏相关的声音暗示是表达情感的基本手段之一。虽然音乐是日常生活的一个重要方面,但人类周围有许多非语言和非音乐的声音,通常被定义为声音事件(SEs)。尽管se对人类有如此巨大的影响,但观察到关于se的AER的调查很少。最近只有少数研究涉及到SEs和AER,显示了前者与听者触发的情感之间的语义联系。在这项工作中,我们分析研究了广泛的常见se的节奏相关特征与听众使用具有语义内容的声音事件的唤醒之间的联系。为此,使用不同的排序和分类算法进行了多个特征评估和分类任务。实验结果具有较高的准确性,表明SEs节律特征与被激发的觉醒有显著的关系。
{"title":"Sound events and emotions: Investigating the relation of rhythmic characteristics and arousal","authors":"K. Drossos, Rigas Kotsakis, George M. Kalliris, A. Floros","doi":"10.1109/IISA.2013.6623709","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623709","url":null,"abstract":"A variety of recent researches in Audio Emotion Recognition (AER) outlines high performance and retrieval accuracy results. However, in most works music is considered as the original sound content that conveys the identified emotions. One of the music characteristics that is found to represent a fundamental means for conveying emotions are the rhythm-related acoustic cues. Although music is an important aspect of everyday life, there are numerous non-linguistic and nonmusical sounds surrounding humans, generally defined as sound events (SEs). Despite this enormous impact of SEs to humans, a scarcity of investigations regarding AER from SEs is observed. There are only a few recent investigations concerned with SEs and AER, presenting a semantic connection between the former and the listener's triggered emotion. In this work we analytically investigate the connection of rhythm-related characteristics of a wide range of common SEs with the arousal of the listener using sound events with semantic content. To this aim, several feature evaluation and classification tasks are conducted using different ranking and classification algorithms. High accuracy results are obtained, demonstrating a significant relation of SEs rhythmic characteristics to the elicited arousal.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
S-Port: Collaborative security management of Port Information systems S-Port:港口信息系统协同安全管理
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623698
D. Polemi, Theodoros Ntouskas, Emmanouil Georgakakis, C. Douligeris, M. Theoharidou, D. Gritzalis
Port Information and Communication Technology (PICT) systems offer a series of critical services rendering their effective security management an issue of vital importance. Existing regulation, standardization, and risk management methodologies do not adequately address the cyber threats the dependent environment of PICT systems is exposed to. In the SPort project, we identified and addressed these needs by proposing a collaborative environment offering customized security management services targeted at the unique needs of port authorities. The success of S-Port has been deployed in three commercial ports, so as to assist them in self managing security and risks. In this paper, we present the main objectives and core functionalities of S-Port environment, as well as the overall results of its assessment.
港口信息和通信技术(PICT)系统提供一系列关键服务,使其有效的安全管理成为至关重要的问题。现有的法规、标准化和风险管理方法不能充分解决PICT系统的依赖环境所面临的网络威胁。在SPort项目中,我们通过提出一个协作环境,提供针对港口当局独特需求的定制安全管理服务,确定并解决了这些需求。S-Port的成功已经在三个商业港口部署,以帮助他们自我管理安全和风险。在本文中,我们介绍了S-Port环境的主要目标和核心功能,以及其评估的总体结果。
{"title":"S-Port: Collaborative security management of Port Information systems","authors":"D. Polemi, Theodoros Ntouskas, Emmanouil Georgakakis, C. Douligeris, M. Theoharidou, D. Gritzalis","doi":"10.1109/IISA.2013.6623698","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623698","url":null,"abstract":"Port Information and Communication Technology (PICT) systems offer a series of critical services rendering their effective security management an issue of vital importance. Existing regulation, standardization, and risk management methodologies do not adequately address the cyber threats the dependent environment of PICT systems is exposed to. In the SPort project, we identified and addressed these needs by proposing a collaborative environment offering customized security management services targeted at the unique needs of port authorities. The success of S-Port has been deployed in three commercial ports, so as to assist them in self managing security and risks. In this paper, we present the main objectives and core functionalities of S-Port environment, as well as the overall results of its assessment.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126761764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Packet classification using rule caching 使用规则缓存的包分类
Pub Date : 2013-07-10 DOI: 10.1109/IISA.2013.6623734
Nitesh B. Guinde, R. Rojas-Cessa, Sotirios G. Ziavras
Data rates on Internet links keep increasing with the deployment of optical technology. Packets coming into highspeed networks need to be classified quickly. Different packet classification schemes have been developed but they require a number of memory accesses as classification is complex and memory is slow. We follow the approach of providing support with fast memory, as cache, in computer systems, to support packet classification schemes. Here, we propose a scheme based on memory cache to support packet classification. The scheme not only makes use of faster and smaller memories but also reduces the number of memory accesses to perform packet classification. It can make the performance of the adopted classification scheme independent of the number of connection flows. We present various packet-classification caching schemes for performing classification and provide the cache hit ratio results for various traffic models generated with Classbench.
随着光学技术的应用,互联网链路上的数据速率不断提高。进入高速网络的数据包需要快速分类。不同的分组分类方案已经开发出来,但由于分类复杂且存储速度慢,它们需要大量的内存访问。我们遵循在计算机系统中提供快速存储器(如缓存)来支持包分类方案的方法。在此,我们提出了一种基于内存缓存的数据包分类方案。该方案不仅利用了更快、更小的内存,而且减少了对内存的访问次数来进行分组分类。它可以使所采用的分类方案的性能与连接流的数量无关。我们提出了各种数据包分类缓存方案来执行分类,并提供了使用Classbench生成的各种流量模型的缓存命中率结果。
{"title":"Packet classification using rule caching","authors":"Nitesh B. Guinde, R. Rojas-Cessa, Sotirios G. Ziavras","doi":"10.1109/IISA.2013.6623734","DOIUrl":"https://doi.org/10.1109/IISA.2013.6623734","url":null,"abstract":"Data rates on Internet links keep increasing with the deployment of optical technology. Packets coming into highspeed networks need to be classified quickly. Different packet classification schemes have been developed but they require a number of memory accesses as classification is complex and memory is slow. We follow the approach of providing support with fast memory, as cache, in computer systems, to support packet classification schemes. Here, we propose a scheme based on memory cache to support packet classification. The scheme not only makes use of faster and smaller memories but also reduces the number of memory accesses to perform packet classification. It can make the performance of the adopted classification scheme independent of the number of connection flows. We present various packet-classification caching schemes for performing classification and provide the cache hit ratio results for various traffic models generated with Classbench.","PeriodicalId":261368,"journal":{"name":"IISA 2013","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129483796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
IISA 2013
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1