首页 > 最新文献

Applied Computing Review最新文献

英文 中文
A Semantic Evidence-based Approach to Continuous Cloud Service Certification 基于语义证据的持续云服务认证方法
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577600
Christian Banse, Immanuel Kunz, Nico Haas, Angelika Schneider
Continuous certification of cloud services requires a high degree of automation in collecting and evaluating evidences. Prior approaches to this topic are often specific to a cloud provider or a certain certification catalog. This makes it costly and complex to achieve conformance to multiple certification schemes and covering multi-cloud solutions. In this paper, we present a novel approach to continuous certification which is scheme- and vendor-independent. Leveraging an ontology of cloud resources and their security features, we generalize vendor- and scheme-specific terminology into a new model of so-called semantic evidence. In combination with generalized metrics that we elicited out of requirements from the EUCS and the CCMv4, we present a framework for the collection and assessment of such semantic evidence across multiple cloud providers. This allows to conduct continuous cloud certification while achieving re-usability of metrics and evidences in multiple certification schemes. The performance benchmark of the framework's prototype implementation shows that up to 200,000 evidences can be processed in less than a minute, making it suitable for short time intervals used in continuous certification.
云服务的持续认证要求证据的收集和评估高度自动化。此主题的先前方法通常特定于云提供商或某个认证目录。这使得实现与多个认证方案的一致性并覆盖多云解决方案的成本高昂且复杂。本文提出了一种独立于方案和供应商的连续认证方法。利用云资源本体及其安全特性,我们将特定于供应商和方案的术语概括为所谓的语义证据的新模型。结合我们从EUCS和CCMv4的需求中得出的广义指标,我们提出了一个框架,用于跨多个云提供商收集和评估此类语义证据。这允许进行持续的云认证,同时在多个认证方案中实现指标和证据的可重用性。该框架原型实现的性能基准表明,在不到一分钟的时间内可以处理多达20万个证据,适用于短时间间隔的连续认证。
{"title":"A Semantic Evidence-based Approach to Continuous Cloud Service Certification","authors":"Christian Banse, Immanuel Kunz, Nico Haas, Angelika Schneider","doi":"10.1145/3555776.3577600","DOIUrl":"https://doi.org/10.1145/3555776.3577600","url":null,"abstract":"Continuous certification of cloud services requires a high degree of automation in collecting and evaluating evidences. Prior approaches to this topic are often specific to a cloud provider or a certain certification catalog. This makes it costly and complex to achieve conformance to multiple certification schemes and covering multi-cloud solutions. In this paper, we present a novel approach to continuous certification which is scheme- and vendor-independent. Leveraging an ontology of cloud resources and their security features, we generalize vendor- and scheme-specific terminology into a new model of so-called semantic evidence. In combination with generalized metrics that we elicited out of requirements from the EUCS and the CCMv4, we present a framework for the collection and assessment of such semantic evidence across multiple cloud providers. This allows to conduct continuous cloud certification while achieving re-usability of metrics and evidences in multiple certification schemes. The performance benchmark of the framework's prototype implementation shows that up to 200,000 evidences can be processed in less than a minute, making it suitable for short time intervals used in continuous certification.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"16 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79252397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topic Aware Influential Member Detection in Meetup 主题感知的Meetup中有影响力的成员检测
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577684
Arpan Dam, Surya Kumar, Debjyoti Bhattacharjee, Sayan D. Pathak, Bivas Mitra
Hosting popular Meetup events is one of the primary objectives of the Meetup organizers. This paper explores the possibility of inviting a few key influential members to attend Meetup events, who may further influence their followers to attend and boost the popularity of those Meetup events. Importantly, our pilot study reveals that topics of the Meetup events play a key role behind the effectiveness of the influential members. Leveraging this observation, in this paper, we develop Topic Aware Influencer Detection (TAID) heuristics, which recommends (i) top-k influential members Ik, and (ii) top-b influence badges Rb based on the topical interest of a Meetup group. This indicates that Ik. will be most effective in influencing the Meetup members to attend the events hosted on topic Rb. TAID heuristics contains two major blocks (a) influence propagation graph construction, and (b) recommendation generation. Rigorous evaluation of TAID on 1447 Meetup groups with three different topics reveals that TAID comfortably outperforms the baselines by influencing (on average) 15% more Meetup members.
举办受欢迎的Meetup活动是Meetup组织者的主要目标之一。本文探讨了邀请一些关键的有影响力的成员参加Meetup活动的可能性,这些成员可能会进一步影响他们的追随者参加Meetup活动,从而提高这些Meetup活动的知名度。重要的是,我们的试点研究表明,Meetup活动的主题在有影响力的成员的有效性背后起着关键作用。利用这一观察结果,在本文中,我们开发了话题感知影响者检测(TAID)启发式方法,该方法根据Meetup小组的主题兴趣推荐(i) top-k有影响力的成员Ik和(ii) top-b有影响力的徽章Rb。这表明Ik。将最有效地影响Meetup成员参加主题Rb举办的活动。TAID启发式包含两个主要块(a)影响传播图构建和(b)推荐生成。对1447个有三个不同主题的Meetup小组的TAID进行的严格评估显示,TAID对Meetup成员的影响(平均)增加了15%,远远超过了基线。
{"title":"Topic Aware Influential Member Detection in Meetup","authors":"Arpan Dam, Surya Kumar, Debjyoti Bhattacharjee, Sayan D. Pathak, Bivas Mitra","doi":"10.1145/3555776.3577684","DOIUrl":"https://doi.org/10.1145/3555776.3577684","url":null,"abstract":"Hosting popular Meetup events is one of the primary objectives of the Meetup organizers. This paper explores the possibility of inviting a few key influential members to attend Meetup events, who may further influence their followers to attend and boost the popularity of those Meetup events. Importantly, our pilot study reveals that topics of the Meetup events play a key role behind the effectiveness of the influential members. Leveraging this observation, in this paper, we develop Topic Aware Influencer Detection (TAID) heuristics, which recommends (i) top-k influential members Ik, and (ii) top-b influence badges Rb based on the topical interest of a Meetup group. This indicates that Ik. will be most effective in influencing the Meetup members to attend the events hosted on topic Rb. TAID heuristics contains two major blocks (a) influence propagation graph construction, and (b) recommendation generation. Rigorous evaluation of TAID on 1447 Meetup groups with three different topics reveals that TAID comfortably outperforms the baselines by influencing (on average) 15% more Meetup members.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"316 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84482779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DISO: A Domain Ontology for Modeling Dislocations in Crystalline Materials 晶体材料位错建模的领域本体
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578739
Ahmad Zainul Ihsan, S. Fathalla, S. Sandfeld
Crystalline materials, such as metals and semiconductors, nearly always contain a special defect type called dislocation. This defect decisively determines many important material properties, e.g., strength, fracture toughness, or ductility. Over the past years, significant effort has been put into understanding dislocation behavior across different length scales via experimental characterization techniques and simulations. This paper introduces the dislocation ontology (DISO), which defines the concepts and relationships related to linear defects in crystalline materials. We developed DISO using a top-down approach in which we start defining the most general concepts in the dislocation domain and subsequent specialization of them. DISO is published through a persistent URL following W3C best practices for publishing Linked Data. Two potential use cases for DISO are presented to illustrate its usefulness in the dislocation dynamics domain. The evaluation of the ontology is performed in two directions, evaluating the success of the ontology in modeling a real-world domain and the richness of the ontology.
晶体材料,如金属和半导体,几乎总是包含一种特殊的缺陷类型,称为位错。这种缺陷决定性地决定了许多重要的材料性能,例如强度、断裂韧性或延展性。在过去的几年中,通过实验表征技术和模拟,已经投入了大量的努力来理解不同长度尺度上的位错行为。本文介绍了位错本体(DISO),它定义了晶体材料中线性缺陷的相关概念和关系。我们采用自上而下的方法开发了DISO,在这种方法中,我们开始定义位错域中最一般的概念,并随后对它们进行专业化。DISO遵循发布关联数据的W3C最佳实践,通过持久URL发布。提出了DISO的两个潜在用例来说明它在位错动力学领域的有用性。对本体的评价从两个方面进行,即评价本体在现实世界领域建模的成功程度和本体的丰富性。
{"title":"DISO: A Domain Ontology for Modeling Dislocations in Crystalline Materials","authors":"Ahmad Zainul Ihsan, S. Fathalla, S. Sandfeld","doi":"10.1145/3555776.3578739","DOIUrl":"https://doi.org/10.1145/3555776.3578739","url":null,"abstract":"Crystalline materials, such as metals and semiconductors, nearly always contain a special defect type called dislocation. This defect decisively determines many important material properties, e.g., strength, fracture toughness, or ductility. Over the past years, significant effort has been put into understanding dislocation behavior across different length scales via experimental characterization techniques and simulations. This paper introduces the dislocation ontology (DISO), which defines the concepts and relationships related to linear defects in crystalline materials. We developed DISO using a top-down approach in which we start defining the most general concepts in the dislocation domain and subsequent specialization of them. DISO is published through a persistent URL following W3C best practices for publishing Linked Data. Two potential use cases for DISO are presented to illustrate its usefulness in the dislocation dynamics domain. The evaluation of the ontology is performed in two directions, evaluating the success of the ontology in modeling a real-world domain and the richness of the ontology.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"33 5 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85565649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Personalized Graph Attention Network for Multivariate Time-series Change Analysis: A Case Study on Long-term Maternal Monitoring 多变量时间序列变化分析的个性化图关注网络——以长期产妇监测为例
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577675
Yuning Wang, I. Azimi, M. Feli, A. Rahmani, P. Liljeberg
Internet-of-Things-based systems have recently emerged, enabling long-term health monitoring systems for the daily activities of individuals. The data collected from such systems are multivariate and longitudinal, which call for tailored analysis techniques to extract the trends and abnormalities in the monitoring. Different methods in the literature have been proposed to identify trends in data. However, they do not include the time dependency and cannot distinguish changes in long-term health data. Moreover, their evaluations are limited to lab settings or short-term analysis. Long-term health monitoring applications require a modeling technique to merge the multisensory data into a meaningful indicator. In this paper, we propose a personalized neural network method to track changes and abnormalities in multivariate health data. Our proposed method leverages convolutional and graph attention layers to produce personalized scores indicating the abnormality level (i.e., deviations from the baseline) of users' data throughout the monitoring. We implement and evaluate the proposed method via a case study on long-term maternal health monitoring. Sleep and stress of pregnant women are remotely monitored using a smartwatch and a mobile application during pregnancy and 3-months postpartum. Our analysis includes 46 women. We build personalized sleep and stress models for each individual using the data from the beginning of the monitoring. Then, we compare the two groups by measuring the data variations. The abnormality scores produced by the proposed method are compared with the findings from the self-report questionnaire data collected in the monitoring and abnormality scores generated by an autoencoder method. The proposed method outperforms the baseline methods in exploring the changes between high-risk and low-risk pregnancy groups. The proposed method's scores also show correlations with the self-report data. Consequently, the results indicate that the proposed method effectively detects the abnormality in multivariate long-term health monitoring.
最近出现了基于物联网的系统,使个人日常活动的长期健康监测系统成为可能。从这些系统收集的数据是多变量的和纵向的,这就需要有针对性的分析技术来提取监测中的趋势和异常。文献中提出了不同的方法来确定数据的趋势。然而,它们不包括时间依赖性,不能区分长期健康数据的变化。此外,他们的评估仅限于实验室环境或短期分析。长期健康监测应用需要一种建模技术,将多感官数据合并为有意义的指标。在本文中,我们提出了一种个性化的神经网络方法来跟踪多变量健康数据的变化和异常。我们提出的方法利用卷积和图形关注层来生成个性化分数,表明在整个监测过程中用户数据的异常水平(即与基线的偏差)。我们通过一个关于长期产妇健康监测的案例研究来实施和评估拟议的方法。在怀孕期间和产后3个月,通过智能手表和移动应用程序远程监测孕妇的睡眠和压力。我们的分析包括46名女性。我们利用监测开始时的数据为每个人建立个性化的睡眠和压力模型。然后,我们通过测量数据变化来比较两组。将该方法生成的异常分数与监测中收集的自我报告问卷数据和自动编码器方法生成的异常分数进行比较。该方法在探索高危和低危妊娠组之间的变化方面优于基线方法。该方法的得分也显示出与自我报告数据的相关性。结果表明,该方法能有效地检测出多变量长期健康监测中的异常。
{"title":"Personalized Graph Attention Network for Multivariate Time-series Change Analysis: A Case Study on Long-term Maternal Monitoring","authors":"Yuning Wang, I. Azimi, M. Feli, A. Rahmani, P. Liljeberg","doi":"10.1145/3555776.3577675","DOIUrl":"https://doi.org/10.1145/3555776.3577675","url":null,"abstract":"Internet-of-Things-based systems have recently emerged, enabling long-term health monitoring systems for the daily activities of individuals. The data collected from such systems are multivariate and longitudinal, which call for tailored analysis techniques to extract the trends and abnormalities in the monitoring. Different methods in the literature have been proposed to identify trends in data. However, they do not include the time dependency and cannot distinguish changes in long-term health data. Moreover, their evaluations are limited to lab settings or short-term analysis. Long-term health monitoring applications require a modeling technique to merge the multisensory data into a meaningful indicator. In this paper, we propose a personalized neural network method to track changes and abnormalities in multivariate health data. Our proposed method leverages convolutional and graph attention layers to produce personalized scores indicating the abnormality level (i.e., deviations from the baseline) of users' data throughout the monitoring. We implement and evaluate the proposed method via a case study on long-term maternal health monitoring. Sleep and stress of pregnant women are remotely monitored using a smartwatch and a mobile application during pregnancy and 3-months postpartum. Our analysis includes 46 women. We build personalized sleep and stress models for each individual using the data from the beginning of the monitoring. Then, we compare the two groups by measuring the data variations. The abnormality scores produced by the proposed method are compared with the findings from the self-report questionnaire data collected in the monitoring and abnormality scores generated by an autoencoder method. The proposed method outperforms the baseline methods in exploring the changes between high-risk and low-risk pregnancy groups. The proposed method's scores also show correlations with the self-report data. Consequently, the results indicate that the proposed method effectively detects the abnormality in multivariate long-term health monitoring.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"64 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85777674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nioh-PT: Virtual I/O Filtering for Agile Protection against Vulnerability Windows Nioh-PT:针对漏洞窗口的敏捷保护的虚拟I/O过滤
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577687
Mana Senuki, Ken-Ichi Ishiguro, K. Kono
Hypervisor vulnerabilities cause severe security issues in multi-tenant cloud environments because hypervisors guarantee isolation among virtual machines (VMs). Unfortunately, hypervisor vulnerabilities are continuously reported, and device emulation in hypervisors is one of the hotbeds because of its complexity. Although applying patches to fix the vulnerabilities is a common way to protect hypervisors, it takes time to develop the patches because the internal knowledge on hypervisors is mandatory. The hypervisors are exposed to the threat of the vulnerabilities exploitation until the patches are released. This paper proposes Nioh-PT, a framework for filtering illegal I/O requests, which reduces the vulnerability windows of the device emulation. The key insight of Nioh-PT is that malicious I/O requests contain illegal I/O sequences, a series of I/O requests that are not issued during normal I/O operations. Nioh-PT filters out those illegal I/O sequences and protects device emulators against the exploitation. The filtering rules, which define illegal I/O sequences for virtual device exploits, can be specified without the knowledge on the internal implementation of hypervisors and virtual devices, because Nioh-PT is decoupled from hypervisors and the device emulators. We develop 11 filtering rules against four real-world vulnerabilities in device emulation, including CVE-2015-3456 (VENOM) and CVE-2016-7909. We demonstrate that Nioh-PT with these filtering rules protects against the virtual device exploits and introduces negligible overhead by up to 8% for filesystem and storage benchmarks.
在多租户云环境中,Hypervisor的漏洞会导致严重的安全问题,因为Hypervisor保证了虚拟机之间的隔离。不幸的是,管理程序漏洞不断被报道,管理程序中的设备模拟由于其复杂性而成为温床之一。尽管应用补丁来修复漏洞是保护管理程序的常用方法,但是开发补丁需要时间,因为管理程序的内部知识是强制性的。在补丁发布之前,管理程序暴露在漏洞利用的威胁之下。本文提出了Nioh-PT框架来过滤非法I/O请求,减少了设备仿真的漏洞窗口。Nioh-PT的关键洞察是,恶意I/O请求包含非法I/O序列,即在正常I/O操作期间不发出的一系列I/O请求。Nioh-PT过滤掉那些非法的I/O序列,并保护设备模拟器免受利用。过滤规则为虚拟设备漏洞定义了非法I/O序列,可以在不了解管理程序和虚拟设备的内部实现的情况下指定,因为Nioh-PT与管理程序和设备模拟器解耦。我们针对设备仿真中的四个真实漏洞开发了11个过滤规则,包括CVE-2015-3456 (VENOM)和CVE-2016-7909。我们证明了Nioh-PT使用这些过滤规则可以防止虚拟设备被利用,并为文件系统和存储基准测试引入了高达8%的可忽略不计的开销。
{"title":"Nioh-PT: Virtual I/O Filtering for Agile Protection against Vulnerability Windows","authors":"Mana Senuki, Ken-Ichi Ishiguro, K. Kono","doi":"10.1145/3555776.3577687","DOIUrl":"https://doi.org/10.1145/3555776.3577687","url":null,"abstract":"Hypervisor vulnerabilities cause severe security issues in multi-tenant cloud environments because hypervisors guarantee isolation among virtual machines (VMs). Unfortunately, hypervisor vulnerabilities are continuously reported, and device emulation in hypervisors is one of the hotbeds because of its complexity. Although applying patches to fix the vulnerabilities is a common way to protect hypervisors, it takes time to develop the patches because the internal knowledge on hypervisors is mandatory. The hypervisors are exposed to the threat of the vulnerabilities exploitation until the patches are released. This paper proposes Nioh-PT, a framework for filtering illegal I/O requests, which reduces the vulnerability windows of the device emulation. The key insight of Nioh-PT is that malicious I/O requests contain illegal I/O sequences, a series of I/O requests that are not issued during normal I/O operations. Nioh-PT filters out those illegal I/O sequences and protects device emulators against the exploitation. The filtering rules, which define illegal I/O sequences for virtual device exploits, can be specified without the knowledge on the internal implementation of hypervisors and virtual devices, because Nioh-PT is decoupled from hypervisors and the device emulators. We develop 11 filtering rules against four real-world vulnerabilities in device emulation, including CVE-2015-3456 (VENOM) and CVE-2016-7909. We demonstrate that Nioh-PT with these filtering rules protects against the virtual device exploits and introduces negligible overhead by up to 8% for filesystem and storage benchmarks.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"13 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76072650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differences in performance, scalability, and cost of using microservice and monolithic architecture 使用微服务和单片架构在性能、可伸缩性和成本上的差异
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578725
Przemysław Jatkiewicz, Szymon Okrój
A microservices-based architecture is a set of small components that communicate with each other using a programming language-independent API [1]. It has been gaining popularity for more than a decade. One of its advantages is greater agility in software development and following modern, agile software development practices [2]. The article presents an experimental study. Two applications with the same business logic and different architecture were developed. Both applications were tested using prepared test cases on the local computer of one of the authors and the Microsoft Azure platform. The results were collected and compared using the JMeter tool. In almost all cases, the monolithic architecture proved to be more efficient. The comparable performance of both architectures occurred when queries were handled by the business logic layer for a relatively long time.
基于微服务的架构是一组使用独立于编程语言的API相互通信的小组件[1]。十多年来,它一直越来越受欢迎。它的优点之一是在软件开发中具有更高的敏捷性,并遵循现代的敏捷软件开发实践[2]。本文进行了实验研究。开发了两个具有相同业务逻辑和不同架构的应用程序。这两个应用程序都在一位作者的本地计算机和Microsoft Azure平台上使用准备好的测试用例进行了测试。使用JMeter工具收集和比较结果。在几乎所有的情况下,单片架构被证明是更高效的。当查询由业务逻辑层处理较长时间时,两种体系结构的性能可比较。
{"title":"Differences in performance, scalability, and cost of using microservice and monolithic architecture","authors":"Przemysław Jatkiewicz, Szymon Okrój","doi":"10.1145/3555776.3578725","DOIUrl":"https://doi.org/10.1145/3555776.3578725","url":null,"abstract":"A microservices-based architecture is a set of small components that communicate with each other using a programming language-independent API [1]. It has been gaining popularity for more than a decade. One of its advantages is greater agility in software development and following modern, agile software development practices [2]. The article presents an experimental study. Two applications with the same business logic and different architecture were developed. Both applications were tested using prepared test cases on the local computer of one of the authors and the Microsoft Azure platform. The results were collected and compared using the JMeter tool. In almost all cases, the monolithic architecture proved to be more efficient. The comparable performance of both architectures occurred when queries were handled by the business logic layer for a relatively long time.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"66 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74103822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MUTUAL: Multi-Domain Sentiment Classification via Uncertainty Sampling MUTUAL:基于不确定性采样的多领域情感分类
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577765
K. Katsarou, Roxana Jeney, K. Stefanidis
Multi-domain sentiment classification trains a classifier using multiple domains and then tests the classifier on one of the domains. Importantly, no domain is assumed to have sufficient labeled data; instead, the goal is leveraging information between domains, making multi-domain sentiment classification a very realistic scenario. Typically, labeled data is costly because humans must classify it manually. In this context, we propose the MUTUAL approach that learns general and domain-specific sentence embeddings that are also context-aware due to the attention mechanism. In this work, we propose using a stacked BiLSTM-based Autoencoder with an attention mechanism to generate the two above-mentioned types of sentence embeddings. Then, using the Jensen-Shannon (JS) distance, the general sentence embeddings of the four most similar domains to the target domain are selected. The selected general sentence embeddings and the domain-specific embeddings are concatenated and fed into a dense layer for training. Evaluation results on public datasets with 16 different domains demonstrate the efficiency of our model. In addition, we propose an active learning algorithm that first applies the elliptic envelope for outlier removal to a pool of unlabeled data that the MUTUAL model then classifies. Next, the most uncertain data points are selected to be labeled based on the least confidence metric. The experiments show higher accuracy for querying 38% of the original data than random sampling.
多领域情感分类利用多个领域训练分类器,然后在其中一个领域上对分类器进行测试。重要的是,没有假设领域有足够的标记数据;相反,目标是利用域之间的信息,使多域情感分类成为一个非常现实的场景。通常,标记数据的成本很高,因为人类必须手动对其进行分类。在这种情况下,我们提出了MUTUAL方法,该方法学习一般和特定领域的句子嵌入,由于注意机制,它们也具有上下文感知能力。在这项工作中,我们提出使用一种带有注意机制的基于堆叠bilstm的自动编码器来生成上述两种类型的句子嵌入。然后,利用Jensen-Shannon (JS)距离,选择与目标域最相似的4个域的一般句子嵌入。将选择的一般句子嵌入和特定领域嵌入连接并馈送到密集层中进行训练。在16个不同领域的公共数据集上的评估结果证明了该模型的有效性。此外,我们提出了一种主动学习算法,该算法首先将椭圆包络用于异常值去除,然后对MUTUAL模型进行分类的未标记数据池进行分类。其次,选择最不确定的数据点,根据最小置信度度量进行标记。实验表明,与随机抽样相比,对原始数据的查询精度提高了38%。
{"title":"MUTUAL: Multi-Domain Sentiment Classification via Uncertainty Sampling","authors":"K. Katsarou, Roxana Jeney, K. Stefanidis","doi":"10.1145/3555776.3577765","DOIUrl":"https://doi.org/10.1145/3555776.3577765","url":null,"abstract":"Multi-domain sentiment classification trains a classifier using multiple domains and then tests the classifier on one of the domains. Importantly, no domain is assumed to have sufficient labeled data; instead, the goal is leveraging information between domains, making multi-domain sentiment classification a very realistic scenario. Typically, labeled data is costly because humans must classify it manually. In this context, we propose the MUTUAL approach that learns general and domain-specific sentence embeddings that are also context-aware due to the attention mechanism. In this work, we propose using a stacked BiLSTM-based Autoencoder with an attention mechanism to generate the two above-mentioned types of sentence embeddings. Then, using the Jensen-Shannon (JS) distance, the general sentence embeddings of the four most similar domains to the target domain are selected. The selected general sentence embeddings and the domain-specific embeddings are concatenated and fed into a dense layer for training. Evaluation results on public datasets with 16 different domains demonstrate the efficiency of our model. In addition, we propose an active learning algorithm that first applies the elliptic envelope for outlier removal to a pool of unlabeled data that the MUTUAL model then classifies. Next, the most uncertain data points are selected to be labeled based on the least confidence metric. The experiments show higher accuracy for querying 38% of the original data than random sampling.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89737340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning for VRUs accidents prediction using V2X data 使用V2X数据进行vru事故预测的机器学习
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578263
B. Ribeiro, M. J. Nicolau, Alexandre J. T. Santos
Intelligent Transportation Systems (ITS) are systems that consist on an complex set of technologies that are applied to road agents, aiming to provide a more efficient and safe usage of the roads. The aspect of safety is particularly important for Vulnerable Road Users (VRUs), which are entities for whose implementation of automatic safety solutions is challenging for their agility and hard to anticipate behavior. However, the usage of ML techniques on Vehicle to Anything (V2X) data has the potential to implement such systems. This paper proposes a VRUs (motorcycles) accident prediction system by using Long Short-Term Memorys (LSTMs) on top of communication data that is generated using the VEINS simulation framework (pairing SUMO and ns-3). Results show that the proposed system is able to predict 96% of the accidents on Scenario A (with a 4.53s Average Prediction Time and a 41% Correct Decision Percentage (CDP) - 78 False Positives (FP)) and 95% on Scenario B (with a 4.44s Average Prediction Time and a 43% CDP - 68 FP).
智能交通系统(ITS)是由一套应用于道路代理的复杂技术组成的系统,旨在提供更有效和更安全的道路使用。对于弱势道路使用者(vru)来说,安全方面尤为重要,因为他们的灵活性和难以预测的行为,对他们来说,实施自动安全解决方案是一项挑战。然而,在V2X数据上使用机器学习技术有可能实现这样的系统。本文提出了一种基于基于vein仿真框架(配对SUMO和ns-3)生成的通信数据的长短期记忆(LSTMs)的vru(摩托车)事故预测系统。结果表明,该系统对情景A的预测准确率为96%(平均预测时间为4.53秒,正确决策百分比(CDP)为41%,误报率为78),对情景B的预测准确率为95%(平均预测时间为4.44秒,正确决策百分比为43%,误报率为68)。
{"title":"Machine Learning for VRUs accidents prediction using V2X data","authors":"B. Ribeiro, M. J. Nicolau, Alexandre J. T. Santos","doi":"10.1145/3555776.3578263","DOIUrl":"https://doi.org/10.1145/3555776.3578263","url":null,"abstract":"Intelligent Transportation Systems (ITS) are systems that consist on an complex set of technologies that are applied to road agents, aiming to provide a more efficient and safe usage of the roads. The aspect of safety is particularly important for Vulnerable Road Users (VRUs), which are entities for whose implementation of automatic safety solutions is challenging for their agility and hard to anticipate behavior. However, the usage of ML techniques on Vehicle to Anything (V2X) data has the potential to implement such systems. This paper proposes a VRUs (motorcycles) accident prediction system by using Long Short-Term Memorys (LSTMs) on top of communication data that is generated using the VEINS simulation framework (pairing SUMO and ns-3). Results show that the proposed system is able to predict 96% of the accidents on Scenario A (with a 4.53s Average Prediction Time and a 41% Correct Decision Percentage (CDP) - 78 False Positives (FP)) and 95% on Scenario B (with a 4.44s Average Prediction Time and a 43% CDP - 68 FP).","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"25 5 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80725191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
POI types characterization based on geographic feature embeddings 基于地理特征嵌入的POI类型表征
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577659
Salatiel Dantas Silva, C. E. Campelo, Maxwell Guimarães De Oliveira
Representing Points of Interest (POI) types, such as restaurants and shopping malls, is crucial to develop computational mechanisms that may assist in tasks such as urban planning and POI recommendation. The POI co-occurrences in different spatial regions have been used to represent POI types in high-dimensional vectors. However, such representations do not consider the geographic features (e.g. streets, buildings, rivers, parks) in the vicinity of POIs which may contribute to characterize such types. In this context, we propose the Geographic Context to Vector (GeoContext2Vec), an approach that relies on geographic features in the POIs' vicinity to generate POI types representation based on embeddings. We carried out an experiment to evaluate the GeoContext2Vec by using a POI type representation from the state-of-the-art that it does not consider geographic features. The promising results show that the geographic information provided by the GeoContext2Vec outperforms the state-of-the-art and demonstrates the relevance of surrouding geographic features on representing POI type more precisely.
表示兴趣点(POI)类型,如餐馆和购物中心,对于开发可能有助于城市规划和POI推荐等任务的计算机制至关重要。利用不同空间区域的POI共现来表示高维向量上的POI类型。然而,这种表述没有考虑到poi附近的地理特征(例如街道、建筑物、河流、公园),这些特征可能有助于描述这类类型。在这种情况下,我们提出了地理上下文到向量(GeoContext2Vec),这是一种依赖于POI附近的地理特征来基于嵌入生成POI类型表示的方法。我们进行了一项实验,通过使用不考虑地理特征的最先进的POI类型表示来评估GeoContext2Vec。结果表明,GeoContext2Vec提供的地理信息优于目前最先进的地理信息,并证明了周围地理特征与更精确地表示POI类型的相关性。
{"title":"POI types characterization based on geographic feature embeddings","authors":"Salatiel Dantas Silva, C. E. Campelo, Maxwell Guimarães De Oliveira","doi":"10.1145/3555776.3577659","DOIUrl":"https://doi.org/10.1145/3555776.3577659","url":null,"abstract":"Representing Points of Interest (POI) types, such as restaurants and shopping malls, is crucial to develop computational mechanisms that may assist in tasks such as urban planning and POI recommendation. The POI co-occurrences in different spatial regions have been used to represent POI types in high-dimensional vectors. However, such representations do not consider the geographic features (e.g. streets, buildings, rivers, parks) in the vicinity of POIs which may contribute to characterize such types. In this context, we propose the Geographic Context to Vector (GeoContext2Vec), an approach that relies on geographic features in the POIs' vicinity to generate POI types representation based on embeddings. We carried out an experiment to evaluate the GeoContext2Vec by using a POI type representation from the state-of-the-art that it does not consider geographic features. The promising results show that the geographic information provided by the GeoContext2Vec outperforms the state-of-the-art and demonstrates the relevance of surrouding geographic features on representing POI type more precisely.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"185 3 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80002939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep-Learning based Trust Management with Self-Adaptation in the Internet of Behavior 行为网络中基于深度学习的自适应信任管理
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577694
Hind Bangui, Emilia Cioroaica, Mouzhi Ge, Barbora Buhnova
Internet of Behavior (IoB) has emerged as a new research paradigm within the context of digital ecosystems, with the support for understanding and positively influencing human behavior by merging behavioral sciences with information technology, and fostering mutual trust building between humans and technology. For example, when automated systems identify improper human driving behavior, IoB can support integrated behavioral adaptation to avoid driving risks that could lead to hazardous situations. In this paper, we propose an ecosystem-level self-adaptation mechanism that aims to provide runtime evidence for trust building in interaction among IoB elements. Our approach employs an indirect trust management scheme based on deep learning, which has the ability to mimic human behaviour and trust building patterns. In order to validate the model, we consider Pay-How-You-Drive vehicle insurance as a showcase of a IoB application aiming to advance the adaptation of business incentives based on improving driver behavior profiling. The experimental results show that the proposed model can identify different driving states with high accuracy, to support the IoB applications.
行为互联网(Internet of Behavior, IoB)是数字生态系统背景下的一种新的研究范式,通过将行为科学与信息技术相结合,促进人与技术之间的相互信任,支持理解和积极影响人类行为。例如,当自动系统识别出人类不当驾驶行为时,IoB可以支持综合行为适应,以避免可能导致危险情况的驾驶风险。在本文中,我们提出了一种生态系统级的自适应机制,旨在为IoB元素之间相互作用中的信任建立提供运行时证据。我们的方法采用了基于深度学习的间接信任管理方案,该方案具有模仿人类行为和信任建立模式的能力。为了验证该模型,我们将按需付费汽车保险作为IoB应用的一个展示,该应用旨在通过改进驾驶员行为分析来促进商业激励的适应。实验结果表明,该模型能较准确地识别不同的驾驶状态,支持IoB应用。
{"title":"Deep-Learning based Trust Management with Self-Adaptation in the Internet of Behavior","authors":"Hind Bangui, Emilia Cioroaica, Mouzhi Ge, Barbora Buhnova","doi":"10.1145/3555776.3577694","DOIUrl":"https://doi.org/10.1145/3555776.3577694","url":null,"abstract":"Internet of Behavior (IoB) has emerged as a new research paradigm within the context of digital ecosystems, with the support for understanding and positively influencing human behavior by merging behavioral sciences with information technology, and fostering mutual trust building between humans and technology. For example, when automated systems identify improper human driving behavior, IoB can support integrated behavioral adaptation to avoid driving risks that could lead to hazardous situations. In this paper, we propose an ecosystem-level self-adaptation mechanism that aims to provide runtime evidence for trust building in interaction among IoB elements. Our approach employs an indirect trust management scheme based on deep learning, which has the ability to mimic human behaviour and trust building patterns. In order to validate the model, we consider Pay-How-You-Drive vehicle insurance as a showcase of a IoB application aiming to advance the adaptation of business incentives based on improving driver behavior profiling. The experimental results show that the proposed model can identify different driving states with high accuracy, to support the IoB applications.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"163 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80312584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Applied Computing Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1