首页 > 最新文献

International Conference on Enterprise Information Systems最新文献

英文 中文
A Canonical Data Model for Records Management in the Portuguese Public Administration 葡萄牙公共行政档案管理的规范化数据模型
Pub Date : 2019-05-03 DOI: 10.1007/978-3-030-40783-4_11
C. Viegas, André Vasconcelos, J. Borbinha, Zaida Chora
{"title":"A Canonical Data Model for Records Management in the Portuguese Public Administration","authors":"C. Viegas, André Vasconcelos, J. Borbinha, Zaida Chora","doi":"10.1007/978-3-030-40783-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_11","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130611658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Schema Matching with Frequent Changes on Semi-Structured Input Files: A Machine Learning Approach on Biological Product Data 半结构化输入文件中频繁变化的模式匹配:生物产品数据的机器学习方法
Pub Date : 2019-05-03 DOI: 10.5220/0007723602080215
Oliver Schmidts, B. Kraft, Ines Siebigteroth, Albert Zündorf
For small to medium sized enterprises matching schemas is still a time consuming manual task. Even expensive commercial solutions perform poorly, if the context is not suitable for the product. In this paper, we provide an approach based on concept name learning from known transformations to discover correspondences between two schemas. We solve schema matching as a classification task. Additionally, we provide a named entity recognition approach to analyze, how the classification task relates to named entity recognition. Benchmarking against other machine learning models shows that when choosing a good learning model, schema matching based on concept name similarity can outperform other approaches and complex algorithms in terms of precision and F1-measure. Hence, our approach is able to build the foundation for improved automation of complex data integration applications for small to medium sized enterprises.
对于中小型企业来说,匹配模式仍然是一项耗时的手动任务。如果上下文不适合产品,即使昂贵的商业解决方案也会表现不佳。在本文中,我们提供了一种基于从已知转换中学习概念名称的方法来发现两个模式之间的对应关系。我们将模式匹配作为一个分类任务来解决。此外,我们还提供了一种命名实体识别方法来分析分类任务与命名实体识别的关系。对其他机器学习模型的基准测试表明,在选择好的学习模型时,基于概念名称相似度的模式匹配在精度和F1-measure方面优于其他方法和复杂算法。因此,我们的方法能够为中小型企业的复杂数据集成应用程序的改进自动化构建基础。
{"title":"Schema Matching with Frequent Changes on Semi-Structured Input Files: A Machine Learning Approach on Biological Product Data","authors":"Oliver Schmidts, B. Kraft, Ines Siebigteroth, Albert Zündorf","doi":"10.5220/0007723602080215","DOIUrl":"https://doi.org/10.5220/0007723602080215","url":null,"abstract":"For small to medium sized enterprises matching schemas is still a time consuming manual task. Even expensive commercial solutions perform poorly, if the context is not suitable for the product. In this paper, we provide an approach based on concept name learning from known transformations to discover correspondences between two schemas. We solve schema matching as a classification task. Additionally, we provide a named entity recognition approach to analyze, how the classification task relates to named entity recognition. Benchmarking against other machine learning models shows that when choosing a good learning model, schema matching based on concept name similarity can outperform other approaches and complex algorithms in terms of precision and F1-measure. Hence, our approach is able to build the foundation for improved automation of complex data integration applications for small to medium sized enterprises.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
How to Manage Privacy in Photos after Publication 照片发布后如何管理隐私
Pub Date : 2019-05-03 DOI: 10.5220/0007614001620168
Srinivas Madhisetty, Mary-Anne Williams, John Massy-Greene, Luke Franco, Mark El Khoury
Photos and videos once published may stay available for people to view it unless they are deleted by the publisher of the photograph. If the content is downloaded and uploaded by others then they lose all the privacy settings once afforded by the publisher of the photograph or video via social media settings. This means that they could be modified or in some cases misused by others. Photos also contain tacit information, which cannot be completely interpreted at the time of their publication. Sensitive information may be revealed to others as the information is coded as tacit information. Tacit information allows different interpretations and creates difficulty in understanding loss of privacy. Free flow and availability of tacit information embedded in a photograph could have serious privacy problems. Our solution discussed in this paper illuminates the difficulty of managing privacy due the tacit information embedded in a photo. It also provides an offline solution for the photograph such that it cannot be modified or altered and gets automatically deleted over a period of time. By extending the Exif data of a photograph by incorporating an in-built feature of automatic deletion, and the access to an image by scrambling the image via adding a hash value. Only a customized application can unscramble the image therefore making it available. This intends to provide a novel offline solution to manage the availability of the image post publication.
照片和视频一旦发布,人们就可以继续查看,除非照片的发布者将其删除。如果内容被其他人下载和上传,那么他们就失去了所有曾经由照片或视频发布者通过社交媒体设置提供的隐私设置。这意味着它们可以被修改,或者在某些情况下被其他人滥用。照片还包含隐性信息,这些信息在发布时无法完全解释。敏感信息被编码为隐性信息,可能会向他人泄露。隐性信息允许不同的解释,并造成理解隐私丧失的困难。照片中隐含信息的自由流动和可用性可能会带来严重的隐私问题。本文讨论的解决方案说明了由于照片中嵌入的隐性信息而导致隐私管理的困难。它还为照片提供了离线解决方案,使其无法修改或更改,并在一段时间内自动删除。通过合并内置的自动删除功能来扩展照片的Exif数据,并通过添加哈希值来打乱图像来访问图像。只有定制的应用程序才能解译图像,从而使其可用。它旨在提供一种新颖的离线解决方案来管理发布后图像的可用性。
{"title":"How to Manage Privacy in Photos after Publication","authors":"Srinivas Madhisetty, Mary-Anne Williams, John Massy-Greene, Luke Franco, Mark El Khoury","doi":"10.5220/0007614001620168","DOIUrl":"https://doi.org/10.5220/0007614001620168","url":null,"abstract":"Photos and videos once published may stay available for people to view it unless they are deleted by the publisher of the photograph. If the content is downloaded and uploaded by others then they lose all the privacy settings once afforded by the publisher of the photograph or video via social media settings. This means that they could be modified or in some cases misused by others. Photos also contain tacit information, which cannot be completely interpreted at the time of their publication. Sensitive information may be revealed to others as the information is coded as tacit information. Tacit information allows different interpretations and creates difficulty in understanding loss of privacy. Free flow and availability of tacit information embedded in a photograph could have serious privacy problems. Our solution discussed in this paper illuminates the difficulty of managing privacy due the tacit information embedded in a photo. It also provides an offline solution for the photograph such that it cannot be modified or altered and gets automatically deleted over a period of time. By extending the Exif data of a photograph by incorporating an in-built feature of automatic deletion, and the access to an image by scrambling the image via adding a hash value. Only a customized application can unscramble the image therefore making it available. This intends to provide a novel offline solution to manage the availability of the image post publication.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating Some Heuristics to Find Hyponyms Between Ontologies 评价本体间下义查找的启发式方法
Pub Date : 2019-05-03 DOI: 10.1007/978-3-030-40783-4_13
Ignacio Huitzil, F. Bobillo, E. Mena, Carlos Bobed, J. Bermúdez
{"title":"Evaluating Some Heuristics to Find Hyponyms Between Ontologies","authors":"Ignacio Huitzil, F. Bobillo, E. Mena, Carlos Bobed, J. Bermúdez","doi":"10.1007/978-3-030-40783-4_13","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_13","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124654721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment User Interface: Supporting the Decision-making Process in Participatory Processes 评估用户界面:支持参与式过程中的决策过程
Pub Date : 2019-05-03 DOI: 10.5220/0007719603980409
Lars Schütz, Korinna Bade
We introduce a novel intelligent user interface for assessing contributions submitted in participatory planning and decision processes. It assists public administrations in decision making by recommending ranked contributions that are similar to a reference contribution based on their textual content. This allows the user to group contributions in order to treat them consistently which is crucial in this domain. Presently, the assessment process is done manually with no sophisticated computer-aided support. The assessment user interface provides a two-column layout with a basic list of contributions in the left column and a list of similar contributions in the right column. We present results of a user study that we conducted with 21 public administration workers to evaluate the proposed interface. We found that the assessment user interface is well suited to the assessment task and the related decision-making process. But there are also unclear elements in the ranking visualization as well as some distrust in the ranked contributions or intelligent methods among the participants.
我们介绍了一种新的智能用户界面,用于评估参与式规划和决策过程中提交的贡献。它通过根据文本内容推荐与参考贡献相似的排名贡献来协助公共行政部门决策。这允许用户对贡献进行分组,以便一致地对待它们,这在这个领域是至关重要的。目前,评估过程是手工完成的,没有复杂的计算机辅助支持。评估用户界面提供了一个两列布局,左列是基本贡献列表,右列是类似贡献列表。我们提出了一项用户研究的结果,我们对21名公共行政工作人员进行了研究,以评估拟议的界面。我们发现评估用户界面非常适合评估任务和相关决策过程。但在排名可视化中也存在不明确的因素,以及参与者对排名贡献或智能方法的一些不信任。
{"title":"Assessment User Interface: Supporting the Decision-making Process in Participatory Processes","authors":"Lars Schütz, Korinna Bade","doi":"10.5220/0007719603980409","DOIUrl":"https://doi.org/10.5220/0007719603980409","url":null,"abstract":"We introduce a novel intelligent user interface for assessing contributions submitted in participatory planning and decision processes. It assists public administrations in decision making by recommending ranked contributions that are similar to a reference contribution based on their textual content. This allows the user to group contributions in order to treat them consistently which is crucial in this domain. Presently, the assessment process is done manually with no sophisticated computer-aided support. The assessment user interface provides a two-column layout with a basic list of contributions in the left column and a list of similar contributions in the right column. We present results of a user study that we conducted with 21 public administration workers to evaluate the proposed interface. We found that the assessment user interface is well suited to the assessment task and the related decision-making process. But there are also unclear elements in the ranking visualization as well as some distrust in the ranked contributions or intelligent methods among the participants.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1994 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127320537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Template-Driven Documentation for Enterprise Recruitment Best Practices 企业招聘最佳实践的模板驱动文档
Pub Date : 2019-05-03 DOI: 10.5220/0007766602380248
Saleh Alamro, H. Dogan, Raian Ali, Keith Phalp
Recruitment Best Practices (RBPs) are useful when building complex Enterprise Recruitment Architectures (ERAs). However, they have some limitations that reduce their reusability. A key limitation is the lack of capturing and documenting recruitment problems and their solutions from an enterprise perspective. To address this gap, a template for Enterprise Recruitment Best Practice (ERBP) documentation is defined. This template provides a model-driven environment and incorporates all elements that must be considered for a better documentation, sharing and reuse of ERBPs. For this purpose, we develop a precise metamodel and five UML diagrams to describe the template of the ERBPs. This template will facilitate the identification and selection of ERBPs and provide enterprise recruitment stakeholders with the guidelines of how to share and reuse them. The template is produced using design science method and a detailed analysis of three case studies. The evaluation results demonstrated that the template can contribute to a better documentation of ERBPs.
招聘最佳实践(rbp)在构建复杂的企业招聘架构(era)时非常有用。然而,它们有一些限制,降低了它们的可重用性。一个关键的限制是缺乏从企业角度捕捉和记录招聘问题及其解决方案。为了解决这一差距,定义了企业招聘最佳实践(ERBP)文档的模板。该模板提供了一个模型驱动的环境,并包含了为了更好地记录、共享和重用erbp而必须考虑的所有元素。为此,我们开发了一个精确的元模型和五个UML图来描述erbp的模板。该模板将有助于识别和选择erbp,并为企业招聘利益相关者提供如何共享和重用erbp的指导方针。该模板采用设计科学方法,并对三个案例进行了详细分析。评价结果表明,该模板有助于更好地记录erbp。
{"title":"Template-Driven Documentation for Enterprise Recruitment Best Practices","authors":"Saleh Alamro, H. Dogan, Raian Ali, Keith Phalp","doi":"10.5220/0007766602380248","DOIUrl":"https://doi.org/10.5220/0007766602380248","url":null,"abstract":"Recruitment Best Practices (RBPs) are useful when building complex Enterprise Recruitment Architectures \u0000(ERAs). However, they have some limitations that reduce their reusability. A key limitation is the lack of \u0000capturing and documenting recruitment problems and their solutions from an enterprise perspective. To \u0000address this gap, a template for Enterprise Recruitment Best Practice (ERBP) documentation is defined. This \u0000template provides a model-driven environment and incorporates all elements that must be considered for a \u0000better documentation, sharing and reuse of ERBPs. For this purpose, we develop a precise metamodel and \u0000five UML diagrams to describe the template of the ERBPs. This template will facilitate the identification and \u0000selection of ERBPs and provide enterprise recruitment stakeholders with the guidelines of how to share and \u0000reuse them. The template is produced using design science method and a detailed analysis of three case \u0000studies. The evaluation results demonstrated that the template can contribute to a better documentation of \u0000ERBPs.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real-time Big Data Framework for Network Security Situation Monitoring 面向网络安全态势监测的实时大数据框架
Pub Date : 2019-05-03 DOI: 10.5220/0007708301670175
Guanyao Du, Chun Long, Jianjun Yu, Wei Wan, Jing Zhao, Jinxia Wei
In this paper, we provide a real-time calculation and visualization framework for network security situation monitoring based on big data technology, and it mainly realizes the real-time massive multi-dimensional network attack dynamic display with Data-Driven Documents (D3). Firstly, we propose an integration and storage management mechanism of massive heterogeneous multi-source data for the network security data fusion. Then, we provide a general real time data computation and visualization framework for massive network security data. Based on the framework, we use the real security data of the network security cloud service platform of Chinese Academy of Sciences (CAS) to realize the visualization monitoring of network security dynamic attacks nationwide and worldwide, respectively. Experiment results are given to analyze the performance of our proposed framework on the efficiency of the data integration and computation stages.
本文提供了一种基于大数据技术的网络安全态势监控实时计算与可视化框架,主要实现了基于数据驱动文档(data - driven Documents, D3)的海量多维网络攻击实时动态显示。首先,针对网络安全数据融合,提出了海量异构多源数据的集成与存储管理机制。然后,为海量网络安全数据提供了通用的实时数据计算和可视化框架。基于该框架,利用中科院网络安全云服务平台的真实安全数据,分别实现了全国和全球范围内网络安全动态攻击的可视化监控。实验结果分析了该框架在数据集成和计算阶段的效率。
{"title":"A Real-time Big Data Framework for Network Security Situation Monitoring","authors":"Guanyao Du, Chun Long, Jianjun Yu, Wei Wan, Jing Zhao, Jinxia Wei","doi":"10.5220/0007708301670175","DOIUrl":"https://doi.org/10.5220/0007708301670175","url":null,"abstract":"In this paper, we provide a real-time calculation and visualization framework for network security situation monitoring based on big data technology, and it mainly realizes the real-time massive multi-dimensional network attack dynamic display with Data-Driven Documents (D3). Firstly, we propose an integration and storage management mechanism of massive heterogeneous multi-source data for the network security data fusion. Then, we provide a general real time data computation and visualization framework for massive network security data. Based on the framework, we use the real security data of the network security cloud service platform of Chinese Academy of Sciences (CAS) to realize the visualization monitoring of network security dynamic attacks nationwide and worldwide, respectively. Experiment results are given to analyze the performance of our proposed framework on the efficiency of the data integration and computation stages.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"75 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128057378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Practical Guide to Support Change-proneness Prediction 支持变化倾向预测的实用指南
Pub Date : 2019-05-03 DOI: 10.5220/0007727702690276
Cristiano Sousa Melo, Matheus Cruz, Antônio Diogo Forte Martins, Tales Matos, J. M. S. M. Filho, Javam C. Machado
During the development and maintenance of a system of software, changes can occur due to new features, bug fix, code refactoring or technological advancements. In this context, software change prediction can be very useful in guiding the maintenance team to identify change-prone classes in early phases of software development to improve their quality and make them more flexible for future changes. A myriad of related works use machine learning techniques to lead with this problem based on different kinds of metrics. However, inadequate description of data source or modeling process makes research results reported in many works hard to interpret or reproduce. In this paper, we firstly propose a practical guideline to support change-proneness prediction for optimal use of predictive models. Then, we apply the proposed guideline over a case study using a large imbalanced data set extracted from a wide commercial software. Moreover, we analyze some papers which deal with change-proneness prediction and discuss them about missing points.
在软件系统的开发和维护过程中,由于新特性、错误修复、代码重构或技术进步,可能会发生变化。在这种情况下,软件变更预测在指导维护团队在软件开发的早期阶段识别易发生变更的类,以提高它们的质量,并使它们更灵活地应对未来的变更方面非常有用。无数的相关工作使用机器学习技术来解决基于不同类型指标的问题。然而,由于对数据来源或建模过程的描述不足,使得许多研究报告的研究结果难以解释或重现。在本文中,我们首先提出了一个实用的指导方针来支持变化倾向预测,以优化预测模型的使用。然后,我们使用从广泛的商业软件中提取的大型不平衡数据集将所提出的指南应用于案例研究。此外,我们还对一些关于变化倾向预测的论文进行了分析,并对其缺失点进行了讨论。
{"title":"A Practical Guide to Support Change-proneness Prediction","authors":"Cristiano Sousa Melo, Matheus Cruz, Antônio Diogo Forte Martins, Tales Matos, J. M. S. M. Filho, Javam C. Machado","doi":"10.5220/0007727702690276","DOIUrl":"https://doi.org/10.5220/0007727702690276","url":null,"abstract":"During the development and maintenance of a system of software, changes can occur due to new features, bug fix, code refactoring or technological advancements. In this context, software change prediction can be very useful in guiding the maintenance team to identify change-prone classes in early phases of software development to improve their quality and make them more flexible for future changes. A myriad of related works use machine learning techniques to lead with this problem based on different kinds of metrics. However, inadequate description of data source or modeling process makes research results reported in many works hard to interpret or reproduce. In this paper, we firstly propose a practical guideline to support change-proneness prediction for optimal use of predictive models. Then, we apply the proposed guideline over a case study using a large imbalanced data set extracted from a wide commercial software. Moreover, we analyze some papers which deal with change-proneness prediction and discuss them about missing points.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129334996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
No More Hiding! WALDO: Easily Locating with a Wi-Fi Opportunistic Approach 别再躲了!WALDO:使用Wi-Fi机会主义方法轻松定位
Pub Date : 2019-05-03 DOI: 10.5220/0007677505710578
B. Silva, J. C. D. Lima, Celio Trois, W. B. Pereira, C. C. Rocha
The popularization of mobile devices and increasing the number of sensors and embedded resources boosted a large amount of research in the area of context-aware. Among the most relevant contextual information is the location. In outdoor environments, the GPS technology is already widespread and used. However, the people tend to spend most of their time indoors, such as universities, hospitals, malls, and supermarkets, where the GPS location is compromised. Several approaches using mainly radio frequency technologies have been proposed to solve the problem of indoor location. So far, no widely accepted solution solves the problem of location indoors. In this way, this work to use an opportunistic approach, making use of the Wi-Fi infrastructure available in the environment, to provide the location of mobile stations. Based on this objective, the WALDO architecture was developed that unites the characteristics of different approaches of the works that have been produced in recent years, taking into account the techniques that present better results at each stage, in conjunction with a zone-based approach and ranking, on phase online of the fingerprint technique, which makes ignoring RSS readings that present noises.
移动设备的普及以及传感器和嵌入式资源数量的增加推动了上下文感知领域的大量研究。位置是最相关的上下文信息之一。在户外环境中,GPS技术已经得到了广泛的应用。然而,人们往往在室内度过大部分时间,如大学、医院、商场和超市,在这些地方,GPS位置会受到影响。已经提出了几种主要使用射频技术的方法来解决室内定位问题。到目前为止,还没有一个被广泛接受的解决方案可以解决室内定位问题。通过这种方式,这项工作使用了一种机会主义的方法,利用环境中可用的Wi-Fi基础设施,提供移动站的位置。基于这一目标,开发了WALDO架构,将近年来产生的作品的不同方法的特征结合起来,考虑到在每个阶段呈现更好结果的技术,结合基于区域的方法和排名,指纹技术的在线阶段,这使得忽略了呈现噪音的RSS读数。
{"title":"No More Hiding! WALDO: Easily Locating with a Wi-Fi Opportunistic Approach","authors":"B. Silva, J. C. D. Lima, Celio Trois, W. B. Pereira, C. C. Rocha","doi":"10.5220/0007677505710578","DOIUrl":"https://doi.org/10.5220/0007677505710578","url":null,"abstract":"The popularization of mobile devices and increasing the number of sensors and embedded resources boosted a large amount of research in the area of context-aware. Among the most relevant contextual information is the location. In outdoor environments, the GPS technology is already widespread and used. However, the people tend to spend most of their time indoors, such as universities, hospitals, malls, and supermarkets, where the GPS location is compromised. Several approaches using mainly radio frequency technologies have been proposed to solve the problem of indoor location. So far, no widely accepted solution solves the problem of location indoors. In this way, this work to use an opportunistic approach, making use of the Wi-Fi infrastructure available in the environment, to provide the location of mobile stations. Based on this objective, the WALDO architecture was developed that unites the characteristics of different approaches of the works that have been produced in recent years, taking into account the techniques that present better results at each stage, in conjunction with a zone-based approach and ranking, on phase online of the fingerprint technique, which makes ignoring RSS readings that present noises.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134241242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Function Point Tree-Based Function Point Analysis: Improving Reproducibility Whilst Maintaining Accuracy in Function Point Counting 基于功能点树的功能点分析:在保持功能点计算准确性的同时提高再现性
Pub Date : 2019-05-03 DOI: 10.1007/978-3-030-40783-4_10
Marcos de Freitas, M. Fantinato, Violeta Sun, L. Thom, V. Garaj
{"title":"Function Point Tree-Based Function Point Analysis: Improving Reproducibility Whilst Maintaining Accuracy in Function Point Counting","authors":"Marcos de Freitas, M. Fantinato, Violeta Sun, L. Thom, V. Garaj","doi":"10.1007/978-3-030-40783-4_10","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_10","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131894392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Enterprise Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1