首页 > 最新文献

Applied Computing Review最新文献

英文 中文
DIWS-LCR-Rot-hop++: A Domain-Independent Word Selector for Cross-Domain Aspect-Based Sentiment Classification 面向跨领域基于方面的情感分类的领域独立词选择器
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1145/3626307.3626309
Junhee Lee, Flavius Frasincar, Maria Mihaela Truşcă
The Aspect-Based Sentiment Classification (ABSC) models often suffer from a lack of training data in some domains. To exploit the abundant data from another domain, this work extends the original state-of-the-art LCR-Rot-hop++ model that uses a neural network with a rotatory attention mechanism for a cross-domain setting. More specifically, we propose a Domain-Independent Word Selector (DIWS) model that is used in combination with the LCR-Rot-hop++ model (DIWS-LCR-Rot-hop++). DIWS-LCR-Rot-hop++ uses attention weights from the domain classification task to determine whether a word is domain-specific or domain-independent, and discards domain-specific words when training and testing the LCR-Rot-hop++ model for cross-domain ABSC. Overall, our results confirm that DIWS-LCR-Rot-hop++ outperforms the original LCR-Rot-hop++ model under a cross-domain setting in case we impose an optimal domain-dependent attention threshold value for deciding whether a word is domain-specific or domain-independent. For a target domain that is highly similar to the source domain, we find that imposing moderate restrictions on classifying domain-independent words yields the best performance. Differently, a dissimilar target domain requires a strict restriction that classifies a small proportion of words as domain-independent. Also, we observe information loss which deteriorates the performance of DIWS-LCR-Rot-hop++ when we categorize an excessive amount of words as domain-specific and discard them.
基于方面的情感分类(ABSC)模型在某些领域缺乏训练数据。为了利用来自另一个领域的丰富数据,本工作扩展了原始的最先进的LCR-Rot-hop++模型,该模型使用具有旋转注意机制的神经网络进行跨领域设置。更具体地说,我们提出了一个与LCR-Rot-hop++模型(DIWS-LCR-Rot-hop++)结合使用的领域独立词选择器(DIWS-LCR-Rot-hop++)模型。DIWS-LCR-Rot-hop++使用来自领域分类任务的关注权值来确定一个词是特定于领域的还是独立于领域的,并在训练和测试跨领域ABSC的LCR-Rot-hop++模型时丢弃特定于领域的词。总的来说,我们的结果证实,在跨领域设置下,如果我们施加一个最佳的领域依赖的注意力阈值来决定一个词是特定于领域的还是独立于领域的,DIWS-LCR-Rot-hop++优于原始的LCR-Rot-hop++模型。对于与源域高度相似的目标域,我们发现对与域无关的词进行适度的分类限制可以产生最佳的性能。不同的是,不同的目标领域需要严格的限制,将一小部分单词分类为领域独立的。此外,我们还观察到,当我们将过多的单词分类为特定领域并丢弃它们时,信息丢失会降低DIWS-LCR-Rot-hop++的性能。
{"title":"DIWS-LCR-Rot-hop++: A Domain-Independent Word Selector for Cross-Domain Aspect-Based Sentiment Classification","authors":"Junhee Lee, Flavius Frasincar, Maria Mihaela Truşcă","doi":"10.1145/3626307.3626309","DOIUrl":"https://doi.org/10.1145/3626307.3626309","url":null,"abstract":"The Aspect-Based Sentiment Classification (ABSC) models often suffer from a lack of training data in some domains. To exploit the abundant data from another domain, this work extends the original state-of-the-art LCR-Rot-hop++ model that uses a neural network with a rotatory attention mechanism for a cross-domain setting. More specifically, we propose a Domain-Independent Word Selector (DIWS) model that is used in combination with the LCR-Rot-hop++ model (DIWS-LCR-Rot-hop++). DIWS-LCR-Rot-hop++ uses attention weights from the domain classification task to determine whether a word is domain-specific or domain-independent, and discards domain-specific words when training and testing the LCR-Rot-hop++ model for cross-domain ABSC. Overall, our results confirm that DIWS-LCR-Rot-hop++ outperforms the original LCR-Rot-hop++ model under a cross-domain setting in case we impose an optimal domain-dependent attention threshold value for deciding whether a word is domain-specific or domain-independent. For a target domain that is highly similar to the source domain, we find that imposing moderate restrictions on classifying domain-independent words yields the best performance. Differently, a dissimilar target domain requires a strict restriction that classifies a small proportion of words as domain-independent. Also, we observe information loss which deteriorates the performance of DIWS-LCR-Rot-hop++ when we categorize an excessive amount of words as domain-specific and discard them.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Semantic Technologies for Collaborative Inference of Threatening IoT Dependencies 利用语义技术进行威胁物联网依赖关系的协同推理
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1145/3626307.3626310
Amal Guittoum, François Aïssaoui, Sébastien Bolle, Fabienne Boyer, Noel De Palma
IoT Device Management (DM) refers to the remote administration of customer devices. In practice, DM is ensured by multiple actors such as operators or device manufacturers, each operating independently via their DM solution. These siloed DM solutions are limited in addressing IoT threats related to device dependencies, such as cascading failures, as these threats spread across devices managed by different DM actors, and their mitigation can no longer be performed without collaborative DM efforts. The first step toward collaborative mitigation of these threats is the identification of threatening dependency topology. However, this task is challenging, requiring the inference of dependencies from the data held by different actors. In this work, we propose a collaborative framework that infers the threatening topology of dependencies by accessing and aggregating data from legacy DM solutions. It combines the assets of Semantic Web standards and Digital Twin technology to capture on-demand the topology of dependencies, and it is designed to be used in business applications such as customer care to enhance customer Quality of Experience. We integrate our solution within the in-use Orange's Digital Twin platform Thing in the future and demonstrate its effectiveness by automatically inferring threatening dependencies in the two settings: a simulated smart home scenario managed by ground-truth DM solutions, such as Orange's implementation of the USP Controller and Samsung's SmartThings Platform , and a realistic smart home called DOMUS testbed.
物联网设备管理(DM)是指对客户设备的远程管理。实际上,DM由多个参与者(如运营商或设备制造商)确保,每个参与者都通过其DM解决方案独立运行。这些孤立的数据管理解决方案在解决与设备依赖关系相关的物联网威胁(如级联故障)方面受到限制,因为这些威胁在不同数据管理参与者管理的设备之间传播,如果没有数据管理的协作努力,就无法再执行缓解威胁的措施。协作缓解这些威胁的第一步是识别具有威胁的依赖关系拓扑。然而,这项任务具有挑战性,需要从不同参与者持有的数据中推断依赖关系。在这项工作中,我们提出了一个协作框架,通过访问和聚合来自遗留DM解决方案的数据来推断依赖关系的威胁拓扑。它结合了语义Web标准和Digital Twin技术的资产,以按需捕获依赖关系的拓扑,并且它被设计用于业务应用程序,例如客户服务,以提高客户体验质量。我们将我们的解决方案集成到未来正在使用的Orange的数字孪生平台Thing中,并通过自动推断两种设置中的威胁依赖性来证明其有效性:由真实DM解决方案管理的模拟智能家居场景,例如Orange的USP控制器和三星的SmartThings平台的实施,以及一个名为DOMUS的现实智能家居测试平台。
{"title":"Leveraging Semantic Technologies for Collaborative Inference of Threatening IoT Dependencies","authors":"Amal Guittoum, François Aïssaoui, Sébastien Bolle, Fabienne Boyer, Noel De Palma","doi":"10.1145/3626307.3626310","DOIUrl":"https://doi.org/10.1145/3626307.3626310","url":null,"abstract":"IoT Device Management (DM) refers to the remote administration of customer devices. In practice, DM is ensured by multiple actors such as operators or device manufacturers, each operating independently via their DM solution. These siloed DM solutions are limited in addressing IoT threats related to device dependencies, such as cascading failures, as these threats spread across devices managed by different DM actors, and their mitigation can no longer be performed without collaborative DM efforts. The first step toward collaborative mitigation of these threats is the identification of threatening dependency topology. However, this task is challenging, requiring the inference of dependencies from the data held by different actors. In this work, we propose a collaborative framework that infers the threatening topology of dependencies by accessing and aggregating data from legacy DM solutions. It combines the assets of Semantic Web standards and Digital Twin technology to capture on-demand the topology of dependencies, and it is designed to be used in business applications such as customer care to enhance customer Quality of Experience. We integrate our solution within the in-use Orange's Digital Twin platform Thing in the future and demonstrate its effectiveness by automatically inferring threatening dependencies in the two settings: a simulated smart home scenario managed by ground-truth DM solutions, such as Orange's implementation of the USP Controller and Samsung's SmartThings Platform , and a realistic smart home called DOMUS testbed.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relating Optimal Repairs in Ontology Engineering with Contraction Operations in Belief Change 本体工程中的最优修复与信念变化中的收缩操作的关系
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1145/3626307.3626308
Franz Baader
The question of how a given knowledge base can be modified such that certain unwanted consequences are removed has been investigated in the area of ontology engineering under the name of repair and in the area of belief change under the name of contraction. Whereas in the former area the emphasis was more on designing and implementing concrete repair algorithms, the latter area concentrated on characterizing classes of contraction operations by certain postulates they satisfy. In the classical setting, repairs and contractions are subsets of the knowledge base that no longer have the unwanted consequence. This makes these approaches syntax-dependent and may result in removal of more consequences than necessary. To alleviate this problem, gentle repairs and pseudo-constractions have been introduced in the respective research areas, and their connections have been investigated in recent work. Optimal repairs preserve a maximal amount of consequences, but they may not always exist. We show that, if they exist, then they can be obtained by certain pseudo-contraction operations, and thus they comply with the postulates that these operations satisfy. Conversely, under certain conditions, pseudo-contractions are guaranteed to produce optimal repairs. Recently, contraction operations have also been defined for concepts rather than for whole knowledge bases. We show that there is again a close connection between such operations and optimal repairs of a restricted form of knowledge bases.
如何修改给定的知识库以消除某些不想要的结果的问题,在本体工程领域以修复的名义进行了研究,在信念改变领域以收缩的名义进行了研究。在前一个领域,重点更多地放在设计和实现混凝土修复算法上,而后一个领域则集中在通过它们满足的某些假设来表征收缩操作的类别。在经典设置中,修复和收缩是知识库的子集,不再有不想要的结果。这使得这些方法依赖于语法,并可能导致删除不必要的结果。为了缓解这一问题,在各自的研究领域中引入了温和修复和伪构造,并在最近的工作中研究了它们之间的联系。最佳修复保留了最大数量的结果,但它们可能并不总是存在。我们证明,如果它们存在,那么它们可以通过某些伪收缩运算得到,因此它们符合这些运算所满足的公设。相反,在一定条件下,伪收缩保证产生最佳修复。最近,收缩操作也被定义为概念而不是整个知识库。我们再次表明,这种操作与有限形式的知识库的最佳修复之间存在密切联系。
{"title":"Relating Optimal Repairs in Ontology Engineering with Contraction Operations in Belief Change","authors":"Franz Baader","doi":"10.1145/3626307.3626308","DOIUrl":"https://doi.org/10.1145/3626307.3626308","url":null,"abstract":"The question of how a given knowledge base can be modified such that certain unwanted consequences are removed has been investigated in the area of ontology engineering under the name of repair and in the area of belief change under the name of contraction. Whereas in the former area the emphasis was more on designing and implementing concrete repair algorithms, the latter area concentrated on characterizing classes of contraction operations by certain postulates they satisfy. In the classical setting, repairs and contractions are subsets of the knowledge base that no longer have the unwanted consequence. This makes these approaches syntax-dependent and may result in removal of more consequences than necessary. To alleviate this problem, gentle repairs and pseudo-constractions have been introduced in the respective research areas, and their connections have been investigated in recent work. Optimal repairs preserve a maximal amount of consequences, but they may not always exist. We show that, if they exist, then they can be obtained by certain pseudo-contraction operations, and thus they comply with the postulates that these operations satisfy. Conversely, under certain conditions, pseudo-contractions are guaranteed to produce optimal repairs. Recently, contraction operations have also been defined for concepts rather than for whole knowledge bases. We show that there is again a close connection between such operations and optimal repairs of a restricted form of knowledge bases.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Block-RACS: Towards Reputation-Aware Client Selection and Monetization Mechanism for Federated Learning 区块- racs:面向联邦学习的声誉感知客户选择和货币化机制
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1145/3626307.3626311
Zahra Batool, Kaiwen Zhang, Matthew Toews
Federated Learning (FL) is a promising solution for training using data collected from heterogeneous sources (e.g., mobile devices) while avoiding the transmission of large amounts of raw data and preserving privacy. Current FL approaches operate in an iterative manner by selecting a subset of participants each round, asking them to training using their latest local data over the most recent version of the global model, before collecting these local model updates and aggregating them to form the next iteration of the global model, and so forth until convergence is reached. Unfortunately, existing FL approaches typically select randomly the set of clients to use each round, which can negatively impact the quality of the model trained, as well the training round time due to the straggler problem. Moreover, clients, especially mobile devices with limited resources, should be incentivized to participate as federated learning is essentially a form of crowdsourcing for AI which requires monetization. We argue that integrating blockchain and smart contract technologies into FL can solve the two aforementioned issues. In this paper, we present Block-RACS (Blockchain-based Reputation Aware Client Selection), a mechanism for FL operating in a smart contract which rewards clients for their participation using cryptocurrencies. Block-RACS employs a multidimensional auction mechanism for selecting users based on the compute and network resources offered by each client, as well as the quality of their local data. This auction is realized in a reliable and auditable manner through a smart contract. This allows Block-RACS to measure the relative contribution of each client by calculating a Shapley value and allocating rewards accordingly. Moreover, a blockchain-based reputation mechanism enables audibility and non-repudiation. The security analysis of the system is also presented to check the security vulnerabilities. We have implemented Block-RACS using Solidity and tested on the Ethereum blockchain with various popular datasets. Our results show that Block-RACS outperforms existing baseline schemes by improving accuracy and reducing the number of FL rounds.
联邦学习(FL)是一种很有前途的解决方案,可以使用从异构来源(例如,移动设备)收集的数据进行训练,同时避免传输大量原始数据并保护隐私。当前的FL方法以迭代的方式操作,通过每轮选择参与者的子集,要求他们在全局模型的最新版本上使用最新的本地数据进行训练,然后收集这些本地模型更新并将它们聚集起来形成全局模型的下一个迭代,等等,直到达到收敛。不幸的是,现有的FL方法通常会随机选择每轮使用的客户端集,这可能会对训练模型的质量产生负面影响,并且由于离散问题而影响了训练周期。此外,应该鼓励客户,特别是资源有限的移动设备参与,因为联邦学习本质上是人工智能的一种众包形式,需要盈利。我们认为,将区块链和智能合约技术集成到FL中可以解决上述两个问题。在本文中,我们提出了Block-RACS(基于区块链的声誉感知客户端选择),这是一种在智能合约中运行的FL机制,该机制奖励客户端使用加密货币的参与。Block-RACS采用一种多维拍卖机制,根据每个客户端提供的计算和网络资源以及本地数据的质量来选择用户。该拍卖通过智能合约以可靠和可审计的方式实现。这允许block - rac通过计算Shapley值并相应地分配奖励来衡量每个客户端的相对贡献。此外,基于区块链的声誉机制实现了可审计性和不可抵赖性。对系统进行了安全分析,检查系统存在的安全漏洞。我们已经使用solididity实现了Block-RACS,并在以太坊区块链上使用各种流行的数据集进行了测试。我们的研究结果表明,Block-RACS通过提高精度和减少FL回合数来优于现有的基线方案。
{"title":"Block-RACS: Towards Reputation-Aware Client Selection and Monetization Mechanism for Federated Learning","authors":"Zahra Batool, Kaiwen Zhang, Matthew Toews","doi":"10.1145/3626307.3626311","DOIUrl":"https://doi.org/10.1145/3626307.3626311","url":null,"abstract":"Federated Learning (FL) is a promising solution for training using data collected from heterogeneous sources (e.g., mobile devices) while avoiding the transmission of large amounts of raw data and preserving privacy. Current FL approaches operate in an iterative manner by selecting a subset of participants each round, asking them to training using their latest local data over the most recent version of the global model, before collecting these local model updates and aggregating them to form the next iteration of the global model, and so forth until convergence is reached. Unfortunately, existing FL approaches typically select randomly the set of clients to use each round, which can negatively impact the quality of the model trained, as well the training round time due to the straggler problem. Moreover, clients, especially mobile devices with limited resources, should be incentivized to participate as federated learning is essentially a form of crowdsourcing for AI which requires monetization. We argue that integrating blockchain and smart contract technologies into FL can solve the two aforementioned issues. In this paper, we present Block-RACS (Blockchain-based Reputation Aware Client Selection), a mechanism for FL operating in a smart contract which rewards clients for their participation using cryptocurrencies. Block-RACS employs a multidimensional auction mechanism for selecting users based on the compute and network resources offered by each client, as well as the quality of their local data. This auction is realized in a reliable and auditable manner through a smart contract. This allows Block-RACS to measure the relative contribution of each client by calculating a Shapley value and allocating rewards accordingly. Moreover, a blockchain-based reputation mechanism enables audibility and non-repudiation. The security analysis of the system is also presented to check the security vulnerabilities. We have implemented Block-RACS using Solidity and tested on the Ethereum blockchain with various popular datasets. Our results show that Block-RACS outperforms existing baseline schemes by improving accuracy and reducing the number of FL rounds.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying and Categorizing Challenges in Large-Scale Agile Software Development Projects: Insights from Two Swedish Companies 识别和分类大规模敏捷软件开发项目中的挑战:来自两家瑞典公司的见解
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1145/3610019.3610021
Hina Saeeda, Muhammad Ovais, Ahmad
We conducted a case study to examine the challenges encountered in large-scale agile development (LSAD) within two Swedish software companies. While agile methodologies have proven successful in small and medium-sized projects, their implementation in large-scale software development projects can be problematic. To identify these challenges, we employed thematic analysis, which revealed a total of 26 distinct challenges. These challenges were categorized into three main themes: Processes and practices, Teams, and Organizational-level challenges in LSAD. By recognizing and addressing these challenges, projects operating in similar contexts can synchronize their activities and harness the advantages of agile methodologies at a large scale. The article delves into comprehensive discussions on these challenges, offering valuable insights and directions for future research endeavors.
我们进行了一项案例研究,以考察两家瑞典软件公司在大规模敏捷开发(LSAD)中遇到的挑战。虽然敏捷方法论在中小型项目中已经证明是成功的,但在大型软件开发项目中的实施可能会有问题。为了确定这些挑战,我们采用了主题分析,共揭示了26个不同的挑战。这些挑战分为三个主要主题:流程和实践、团队和LSAD中的组织级挑战。通过认识和解决这些挑战,在类似环境中运行的项目可以同步其活动,并大规模利用敏捷方法的优势。这篇文章深入探讨了这些挑战,为未来的研究工作提供了宝贵的见解和方向。
{"title":"Identifying and Categorizing Challenges in Large-Scale Agile Software Development Projects: Insights from Two Swedish Companies","authors":"Hina Saeeda, Muhammad Ovais, Ahmad","doi":"10.1145/3610019.3610021","DOIUrl":"https://doi.org/10.1145/3610019.3610021","url":null,"abstract":"We conducted a case study to examine the challenges encountered in large-scale agile development (LSAD) within two Swedish software companies. While agile methodologies have proven successful in small and medium-sized projects, their implementation in large-scale software development projects can be problematic. To identify these challenges, we employed thematic analysis, which revealed a total of 26 distinct challenges. These challenges were categorized into three main themes: Processes and practices, Teams, and Organizational-level challenges in LSAD. By recognizing and addressing these challenges, projects operating in similar contexts can synchronize their activities and harness the advantages of agile methodologies at a large scale. The article delves into comprehensive discussions on these challenges, offering valuable insights and directions for future research endeavors.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":" ","pages":"23 - 43"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49431639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Behavioral Factors Leading to Differential Polarization Effects of Adversarial Botnets 识别导致敌对僵尸网络差异极化效应的行为因素
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1145/3610409.3610412
Yeonjung Lee, M. Ozer, S. Corman, H. Davulcu
In this paper, we utilize a Twitter dataset collected between December 8, 2021 and February 18, 2022, during the lead-up to the 2022 Russian invasion of Ukraine. Our aim is to design a data processing pipeline featuring a high-accuracy Graph Convolutional Network (GCN) based political camp classifier, a botnet detection algorithm, and a robust measure of botnet effects. Our experiments reveal that while the pro-Russian botnet contributes significantly to network polarization, the pro-Ukrainian botnet contributes with moderating effects. To understand the factors leading to these different effects, we analyze the interactions between the botnets and the users, distinguishing between barrier-crossing users, who navigate across different political camps, and barrier-bound users, who remain within their own camps. We observe that the pro-Russian botnet amplifies the barrier-bound partisan users within their own camp most of the time. In contrast, the pro-Ukrainian botnet amplifies the barrier-crossing users on their own camp alongside themselves for the majority of the time.
在本文中,我们利用了2021年12月8日至2022年2月18日期间收集的推特数据集,该数据集是在2022年俄罗斯入侵乌克兰之前收集的。我们的目标是设计一个数据处理管道,该管道具有基于高精度图卷积网络(GCN)的政治阵营分类器、僵尸网络检测算法和僵尸网络效应的稳健度量。我们的实验表明,虽然亲俄罗斯的僵尸网络对网络两极分化有很大贡献,但亲乌克兰的僵尸网络有缓和作用。为了理解导致这些不同影响的因素,我们分析了僵尸网络和用户之间的互动,区分了跨越不同政治阵营的障碍用户和留在自己阵营中的障碍用户。我们观察到,亲俄罗斯的僵尸网络在大多数时候都会放大自己阵营中的党派用户。相比之下,亲乌克兰的僵尸网络在大多数情况下都会放大自己阵营中的跨国界用户。
{"title":"Identifying Behavioral Factors Leading to Differential Polarization Effects of Adversarial Botnets","authors":"Yeonjung Lee, M. Ozer, S. Corman, H. Davulcu","doi":"10.1145/3610409.3610412","DOIUrl":"https://doi.org/10.1145/3610409.3610412","url":null,"abstract":"In this paper, we utilize a Twitter dataset collected between December 8, 2021 and February 18, 2022, during the lead-up to the 2022 Russian invasion of Ukraine. Our aim is to design a data processing pipeline featuring a high-accuracy Graph Convolutional Network (GCN) based political camp classifier, a botnet detection algorithm, and a robust measure of botnet effects. Our experiments reveal that while the pro-Russian botnet contributes significantly to network polarization, the pro-Ukrainian botnet contributes with moderating effects. To understand the factors leading to these different effects, we analyze the interactions between the botnets and the users, distinguishing between barrier-crossing users, who navigate across different political camps, and barrier-bound users, who remain within their own camps. We observe that the pro-Russian botnet amplifies the barrier-bound partisan users within their own camp most of the time. In contrast, the pro-Ukrainian botnet amplifies the barrier-crossing users on their own camp alongside themselves for the majority of the time.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"23 1","pages":"44 - 56"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44011215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Behavioral Factors Leading to Differential Polarization Effects of Adversarial Botnets 识别导致敌对僵尸网络差异极化效应的行为因素
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1145/3610019.3610022
Yeonjung Lee
In this paper, we utilize a Twitter dataset collected between December 8, 2021 and February 18, 2022, during the lead-up to the 2022 Russian invasion of Ukraine. Our aim is to design a data processing pipeline featuring a high-accuracy Graph Convolutional Network (GCN) based political camp classifier, a botnet detection algorithm, and a robust measure of botnet effects. Our experiments reveal that while the pro-Russian botnet contributes significantly to network polarization, the pro-Ukrainian botnet contributes with moderating effects. To understand the factors leading to these different effects, we analyze the interactions between the botnets and the users, distinguishing between barrier-crossing users, who navigate across different political camps, and barrier-bound users, who remain within their own camps. We observe that the pro-Russian botnet amplifies the barrier-bound partisan users within their own camp most of the time. In contrast, the pro-Ukrainian botnet amplifies the barrier-crossing users on their own camp alongside themselves for the majority of the time.
在本文中,我们利用了2021年12月8日至2022年2月18日期间收集的推特数据集,该数据集是在2022年俄罗斯入侵乌克兰之前收集的。我们的目标是设计一个数据处理管道,该管道具有基于高精度图卷积网络(GCN)的政治阵营分类器、僵尸网络检测算法和僵尸网络效应的稳健度量。我们的实验表明,虽然亲俄罗斯的僵尸网络对网络两极分化有很大贡献,但亲乌克兰的僵尸网络有缓和作用。为了理解导致这些不同影响的因素,我们分析了僵尸网络和用户之间的互动,区分了跨越不同政治阵营的障碍用户和留在自己阵营中的障碍用户。我们观察到,亲俄罗斯的僵尸网络在大多数时候都会放大自己阵营中的党派用户。相比之下,亲乌克兰的僵尸网络在大多数情况下都会放大自己阵营中的跨国界用户。
{"title":"Identifying Behavioral Factors Leading to Differential Polarization Effects of Adversarial Botnets","authors":"Yeonjung Lee","doi":"10.1145/3610019.3610022","DOIUrl":"https://doi.org/10.1145/3610019.3610022","url":null,"abstract":"In this paper, we utilize a Twitter dataset collected between December 8, 2021 and February 18, 2022, during the lead-up to the 2022 Russian invasion of Ukraine. Our aim is to design a data processing pipeline featuring a high-accuracy Graph Convolutional Network (GCN) based political camp classifier, a botnet detection algorithm, and a robust measure of botnet effects. Our experiments reveal that while the pro-Russian botnet contributes significantly to network polarization, the pro-Ukrainian botnet contributes with moderating effects. To understand the factors leading to these different effects, we analyze the interactions between the botnets and the users, distinguishing between barrier-crossing users, who navigate across different political camps, and barrier-bound users, who remain within their own camps. We observe that the pro-Russian botnet amplifies the barrier-bound partisan users within their own camp most of the time. In contrast, the pro-Ukrainian botnet amplifies the barrier-crossing users on their own camp alongside themselves for the majority of the time.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":" ","pages":"44 - 56"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44132003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elastic Data Binning: Time-Series Sketching for Time-Domain Astrophysics Analysis 弹性数据分仓:用于时域天体物理分析的时间序列绘制
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1145/3610019.3610020
S. Sako
Time-domain astrophysics analysis (TDAA) involves observational surveys of celestial phenomena that may contain irrelevant information because of several factors, one of which is the sensitivity of the optical telescopes. Data binning is a typical technique for removing inconsistencies and clarifying the main characteristics of the original data in astrophysics analysis. It splits the data sequence into smaller bins with a fixed size and subsequently sketches them into a new representation form. In this study, we introduce a novel approach, called elastic data binning (EBinning), to automatically adjust each bin size using two statistical metrics based on the Student's t-test for linear regression and Hoeffding inequality. EBinning outperforms well-known algorithms in TDAA for extracting relevant characteristics of time-series data, called lightcurve. We demonstrate the successful representation of various characteristics in the lightcurve gathered from the Kiso Schmidt telescope using EBinning and its applicability for transient detection in TDAA.
时域天体物理学分析(TDAA)涉及对可能包含不相关信息的天体现象的观测调查,因为几个因素,其中之一是光学望远镜的灵敏度。数据装仓是天体物理学分析中消除不一致性和澄清原始数据主要特征的典型技术。它将数据序列拆分为具有固定大小的较小的仓,然后将它们绘制成一种新的表示形式。在这项研究中,我们引入了一种新方法,称为弹性数据仓(EBinning),使用两种基于线性回归和Hoeffding不等式的Student t检验的统计指标自动调整每个仓的大小。EBinning在提取时间序列数据的相关特征(称为光曲线)方面优于TDAA中的知名算法。我们证明了使用EBinning成功地表示了从Kiso Schmidt望远镜收集的光曲线中的各种特性,以及它在TDAA瞬态检测中的适用性。
{"title":"Elastic Data Binning: Time-Series Sketching for Time-Domain Astrophysics Analysis","authors":"S. Sako","doi":"10.1145/3610019.3610020","DOIUrl":"https://doi.org/10.1145/3610019.3610020","url":null,"abstract":"Time-domain astrophysics analysis (TDAA) involves observational surveys of celestial phenomena that may contain irrelevant information because of several factors, one of which is the sensitivity of the optical telescopes. Data binning is a typical technique for removing inconsistencies and clarifying the main characteristics of the original data in astrophysics analysis. It splits the data sequence into smaller bins with a fixed size and subsequently sketches them into a new representation form. In this study, we introduce a novel approach, called elastic data binning (EBinning), to automatically adjust each bin size using two statistical metrics based on the Student's t-test for linear regression and Hoeffding inequality. EBinning outperforms well-known algorithms in TDAA for extracting relevant characteristics of time-series data, called lightcurve. We demonstrate the successful representation of various characteristics in the lightcurve gathered from the Kiso Schmidt telescope using EBinning and its applicability for transient detection in TDAA.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":" ","pages":"5 - 22"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47321661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying and Categorizing Challenges in Large-Scale Agile Software Development Projects: Insights from Two Swedish Companies 识别和分类大规模敏捷软件开发项目中的挑战:来自两个瑞典公司的见解
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1145/3610409.3610411
Hina Saeeda, M. Ahmad, Tomas Gustavsson
We conducted a case study to examine the challenges encountered in large-scale agile development (LSAD) within two Swedish software companies. While agile methodologies have proven successful in small and medium-sized projects, their implementation in large-scale software development projects can be problematic. To identify these challenges, we employed thematic analysis, which revealed a total of 26 distinct challenges. These challenges were categorized into three main themes: Processes and practices, Teams, and Organizational-level challenges in LSAD. By recognizing and addressing these challenges, projects operating in similar contexts can synchronize their activities and harness the advantages of agile methodologies at a large scale. The article delves into comprehensive discussions on these challenges, offering valuable insights and directions for future research endeavors.
我们进行了一项案例研究,以考察两家瑞典软件公司在大规模敏捷开发(LSAD)中遇到的挑战。虽然敏捷方法论在中小型项目中已经证明是成功的,但在大型软件开发项目中的实施可能会有问题。为了确定这些挑战,我们采用了主题分析,共揭示了26个不同的挑战。这些挑战分为三个主要主题:流程和实践、团队和LSAD中的组织级挑战。通过认识和解决这些挑战,在类似环境中运行的项目可以同步其活动,并大规模利用敏捷方法的优势。这篇文章深入探讨了这些挑战,为未来的研究工作提供了宝贵的见解和方向。
{"title":"Identifying and Categorizing Challenges in Large-Scale Agile Software Development Projects: Insights from Two Swedish Companies","authors":"Hina Saeeda, M. Ahmad, Tomas Gustavsson","doi":"10.1145/3610409.3610411","DOIUrl":"https://doi.org/10.1145/3610409.3610411","url":null,"abstract":"We conducted a case study to examine the challenges encountered in large-scale agile development (LSAD) within two Swedish software companies. While agile methodologies have proven successful in small and medium-sized projects, their implementation in large-scale software development projects can be problematic. To identify these challenges, we employed thematic analysis, which revealed a total of 26 distinct challenges. These challenges were categorized into three main themes: Processes and practices, Teams, and Organizational-level challenges in LSAD. By recognizing and addressing these challenges, projects operating in similar contexts can synchronize their activities and harness the advantages of agile methodologies at a large scale. The article delves into comprehensive discussions on these challenges, offering valuable insights and directions for future research endeavors.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"23 1","pages":"23 - 43"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42979558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elastic Data Binning: Time-Series Sketching for Time-Domain Astrophysics Analysis 弹性数据分组:时域天体物理分析的时间序列草图
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1145/3610409.3610410
Thanapol Phungtua-Eng, S. Sako, Yushi Nishikawa, Yoshitaka Yamamoto
Time-domain astrophysics analysis (TDAA) involves observational surveys of celestial phenomena that may contain irrelevant information because of several factors, one of which is the sensitivity of the optical telescopes. Data binning is a typical technique for removing inconsistencies and clarifying the main characteristics of the original data in astrophysics analysis. It splits the data sequence into smaller bins with a fixed size and subsequently sketches them into a new representation form. In this study, we introduce a novel approach, called elastic data binning (EBinning), to automatically adjust each bin size using two statistical metrics based on the Student's t-test for linear regression and Hoeffding inequality. EBinning outperforms well-known algorithms in TDAA for extracting relevant characteristics of time-series data, called lightcurve. We demonstrate the successful representation of various characteristics in the lightcurve gathered from the Kiso Schmidt telescope using EBinning and its applicability for transient detection in TDAA.
时域天体物理学分析(TDAA)涉及对可能包含不相关信息的天体现象的观测调查,因为几个因素,其中之一是光学望远镜的灵敏度。数据装仓是天体物理学分析中消除不一致性和澄清原始数据主要特征的典型技术。它将数据序列拆分为具有固定大小的较小的仓,然后将它们绘制成一种新的表示形式。在这项研究中,我们引入了一种新方法,称为弹性数据仓(EBinning),使用两种基于线性回归和Hoeffding不等式的Student t检验的统计指标自动调整每个仓的大小。EBinning在提取时间序列数据的相关特征(称为光曲线)方面优于TDAA中的知名算法。我们证明了使用EBinning成功地表示了从Kiso Schmidt望远镜收集的光曲线中的各种特性,以及它在TDAA瞬态检测中的适用性。
{"title":"Elastic Data Binning: Time-Series Sketching for Time-Domain Astrophysics Analysis","authors":"Thanapol Phungtua-Eng, S. Sako, Yushi Nishikawa, Yoshitaka Yamamoto","doi":"10.1145/3610409.3610410","DOIUrl":"https://doi.org/10.1145/3610409.3610410","url":null,"abstract":"Time-domain astrophysics analysis (TDAA) involves observational surveys of celestial phenomena that may contain irrelevant information because of several factors, one of which is the sensitivity of the optical telescopes. Data binning is a typical technique for removing inconsistencies and clarifying the main characteristics of the original data in astrophysics analysis. It splits the data sequence into smaller bins with a fixed size and subsequently sketches them into a new representation form. In this study, we introduce a novel approach, called elastic data binning (EBinning), to automatically adjust each bin size using two statistical metrics based on the Student's t-test for linear regression and Hoeffding inequality. EBinning outperforms well-known algorithms in TDAA for extracting relevant characteristics of time-series data, called lightcurve. We demonstrate the successful representation of various characteristics in the lightcurve gathered from the Kiso Schmidt telescope using EBinning and its applicability for transient detection in TDAA.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"23 1","pages":"5 - 22"},"PeriodicalIF":1.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42206751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Applied Computing Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1