首页 > 最新文献

2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)最新文献

英文 中文
Boosting Optimum-Path Forest clustering through harmony Search and its applications for intrusion detection in computer networks 和谐搜索增强最优路径森林聚类及其在计算机网络入侵检测中的应用
K. Costa, C. R. Pereira, R. Nakamura, Luís A. M. Pereira, J. Papa
In this paper we propose a nature-inspired approach that can boost the Optimum-Path Forest (OPF) clustering algorithm by optimizing its parameters in a discrete lattice. The experiments in two public datasets have shown that the proposed algorithm can achieve similar parameters' values compared to the exhaustive search. Although, the proposed technique is faster than the traditional one, being interesting for intrusion detection in large scale traffic networks.
在本文中,我们提出了一种自然启发的方法,可以通过在离散晶格中优化最优路径森林(OPF)聚类算法的参数来增强它。在两个公共数据集上的实验表明,与穷举搜索相比,该算法可以获得相似的参数值。虽然该方法比传统方法速度快,但对于大规模流量网络中的入侵检测很有意义。
{"title":"Boosting Optimum-Path Forest clustering through harmony Search and its applications for intrusion detection in computer networks","authors":"K. Costa, C. R. Pereira, R. Nakamura, Luís A. M. Pereira, J. Papa","doi":"10.1109/CASoN.2012.6412399","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412399","url":null,"abstract":"In this paper we propose a nature-inspired approach that can boost the Optimum-Path Forest (OPF) clustering algorithm by optimizing its parameters in a discrete lattice. The experiments in two public datasets have shown that the proposed algorithm can achieve similar parameters' values compared to the exhaustive search. Although, the proposed technique is faster than the traditional one, being interesting for intrusion detection in large scale traffic networks.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116744019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An intrusion detection framework for supporting SLA assessment in Cloud Computing 一种支持云计算SLA评估的入侵检测框架
M. Ficco, M. Rak, B. D. Martino
Cloud Computing is the emerging paradigm in distributed environment. It is an opportunity for users to reduce costs and increase efficiency. Cloud Computing represents both a technology for using computing infrastructures in a more efficient way, and a business model for selling computing services and resources. In this context, cyber attacks represent a serious danger, which can compromise the quality of service delivered to the customers. In this paper, a mOSAIC-based framework for providing distributed intrusion detection in Cloud Computing is proposed. It is an architectural framework that collects information at different Cloud architectural levels, using multiple distributed security components, which can be used to perform complex event correlation analysis to identify intrusions in the Cloud system that involve Service Level Agreement violations.
云计算是分布式环境下的新兴范式。这是用户降低成本、提高效率的机会。云计算既代表了一种以更有效的方式使用计算基础设施的技术,也代表了一种销售计算服务和资源的商业模式。在这种情况下,网络攻击代表着一种严重的危险,它可能会损害向客户提供的服务质量。本文提出了一种基于mosaic的云计算分布式入侵检测框架。它是一个架构框架,在不同的云架构级别收集信息,使用多个分布式安全组件,可用于执行复杂的事件关联分析,以识别云系统中涉及违反服务水平协议的入侵。
{"title":"An intrusion detection framework for supporting SLA assessment in Cloud Computing","authors":"M. Ficco, M. Rak, B. D. Martino","doi":"10.1109/CASoN.2012.6412410","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412410","url":null,"abstract":"Cloud Computing is the emerging paradigm in distributed environment. It is an opportunity for users to reduce costs and increase efficiency. Cloud Computing represents both a technology for using computing infrastructures in a more efficient way, and a business model for selling computing services and resources. In this context, cyber attacks represent a serious danger, which can compromise the quality of service delivered to the customers. In this paper, a mOSAIC-based framework for providing distributed intrusion detection in Cloud Computing is proposed. It is an architectural framework that collects information at different Cloud architectural levels, using multiple distributed security components, which can be used to perform complex event correlation analysis to identify intrusions in the Cloud system that involve Service Level Agreement violations.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Middleware architecture for cross-border eID 跨界eID的中间件体系结构
Bernd Zwattendorfer, Ivo Sumelong, H. Leitold
Many European states have issued electronic identities (eID) to its citizens since the early 2000s. Several have reached full coverage and usually high assurance credentials, such as smartcards, USB crypto tokens, or mobile phone eIDs are used. This lead to an impressive security infrastructure to authenticate at online services that, however, evolved as national silos - interoperability was no priority for a while. To overcome this, 18 European states have joined forces in the large scale pilot STORK. A SAML-based technical solution for cross-border eID federation between states has been designed, implemented, and finally piloted in a number of production services. In this paper we present the STORK middleware architecture that has been developed by Austria and Germany. Its main characteristic is a decentralized deployment that gives some end-to-end security and privacy advantages, but also needs particular attention to meet scalability challenges. This is compared to the STORK proxy model, an alternative centralized deployment approach that was chosen by other states. Federation between the two architectures is described, with particular attention to security and privacy aspects.
自21世纪初以来,许多欧洲国家都向其公民发放了电子身份(eID)。有几个已经达到了全覆盖,通常是高保证凭证,如智能卡、USB加密令牌或移动电话识别码。这导致了一个令人印象深刻的安全基础设施,用于在线服务的身份验证,然而,这些服务演变为国家筒仓——互操作性在一段时间内没有优先考虑。为了克服这个问题,18个欧洲国家联合起来进行了大规模的STORK试点。一种基于saml的技术解决方案已经被设计、实施,并最终在许多生产服务中进行了试点。本文介绍了奥地利和德国开发的STORK中间件体系结构。它的主要特点是分散式部署,提供了一些端到端的安全和隐私优势,但也需要特别注意满足可伸缩性挑战。这与STORK代理模型进行了比较,后者是其他州选择的另一种集中式部署方法。本文描述了两个体系结构之间的联合,并特别关注了安全性和隐私方面。
{"title":"Middleware architecture for cross-border eID","authors":"Bernd Zwattendorfer, Ivo Sumelong, H. Leitold","doi":"10.1109/CASoN.2012.6412419","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412419","url":null,"abstract":"Many European states have issued electronic identities (eID) to its citizens since the early 2000s. Several have reached full coverage and usually high assurance credentials, such as smartcards, USB crypto tokens, or mobile phone eIDs are used. This lead to an impressive security infrastructure to authenticate at online services that, however, evolved as national silos - interoperability was no priority for a while. To overcome this, 18 European states have joined forces in the large scale pilot STORK. A SAML-based technical solution for cross-border eID federation between states has been designed, implemented, and finally piloted in a number of production services. In this paper we present the STORK middleware architecture that has been developed by Austria and Germany. Its main characteristic is a decentralized deployment that gives some end-to-end security and privacy advantages, but also needs particular attention to meet scalability challenges. This is compared to the STORK proxy model, an alternative centralized deployment approach that was chosen by other states. Federation between the two architectures is described, with particular attention to security and privacy aspects.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Quantifying social network dynamics 量化社会网络动态
Radosław Michalski, Piotr Bródka, Przemyslaw Kazienko, K. Juszczyszyn
The dynamic character of most social networks requires to model evolution of networks in order to enable complex analysis of theirs dynamics. The following paper focuses on the definition of differences between network snapshots by means of Graph Differential Tuple. These differences enable to calculate the diverse distance measures as well as to investigate the speed of changes. Four separate measures are suggested in the paper with experimental study on real social network data.
大多数社会网络的动态特性要求对网络的演化进行建模,以便对其动态进行复杂的分析。下面的文章重点讨论了用图差分元组(Graph Differential Tuple)来定义网络快照之间的差异。这些差异使我们能够计算不同的距离度量以及研究变化的速度。本文通过对真实社会网络数据的实验研究,提出了四种独立的度量方法。
{"title":"Quantifying social network dynamics","authors":"Radosław Michalski, Piotr Bródka, Przemyslaw Kazienko, K. Juszczyszyn","doi":"10.1109/CASoN.2012.6412380","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412380","url":null,"abstract":"The dynamic character of most social networks requires to model evolution of networks in order to enable complex analysis of theirs dynamics. The following paper focuses on the definition of differences between network snapshots by means of Graph Differential Tuple. These differences enable to calculate the diverse distance measures as well as to investigate the speed of changes. Four separate measures are suggested in the paper with experimental study on real social network data.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123766303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Spam detection using compression and PSO 使用压缩和PSO的垃圾邮件检测
Michal Prilepok, T. Ježowicz, J. Platoš, V. Snás̃el
The problem of spam emails is still growing. Therefore, developing of algorithms which are able to solve this problem is also very active area. This paper presents two different algorithms for spam detection. The first algorithm is based on Bayesian filter, but it is improved using data compression algorithms in case that the Bayesian filter cannot decide. The second algorithm is based on document classification algorithm using Particle Swarm Optimization. Results of presented algorithms are promising.
垃圾邮件的问题仍在增长。因此,开发能够解决这一问题的算法也是一个非常活跃的领域。本文提出了两种不同的垃圾邮件检测算法。第一种算法是基于贝叶斯滤波的,但在贝叶斯滤波不能确定的情况下,使用数据压缩算法进行改进。第二种算法是基于粒子群算法的文档分类算法。所提出的算法的结果是有希望的。
{"title":"Spam detection using compression and PSO","authors":"Michal Prilepok, T. Ježowicz, J. Platoš, V. Snás̃el","doi":"10.1109/CASoN.2012.6412413","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412413","url":null,"abstract":"The problem of spam emails is still growing. Therefore, developing of algorithms which are able to solve this problem is also very active area. This paper presents two different algorithms for spam detection. The first algorithm is based on Bayesian filter, but it is improved using data compression algorithms in case that the Bayesian filter cannot decide. The second algorithm is based on document classification algorithm using Particle Swarm Optimization. Results of presented algorithms are promising.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122138620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A credible cost-sensitive model for intrusion response selection 一个可靠的成本敏感的入侵响应选择模型
A. Ikuomola, A. Sodiya
The goal of co st-sensitive response system is to ensure that response cost does not outweigh the intrusion cost. In order to ensure this, some cost-sensitive response models have been developed. Some of these models do not consider the effectiveness of previous actions and lack standard approach for estimating associated cost. In this work, we present a model for assessing cost of responses based on three factors, the cost of damage caused by the intrusion, the cost of automatic response to an intrusion and the operational cost. The proposed approach provides consistent basis for response assessment across different systems and environment. In addition, the performance analysis indicates that automated responses systems using this cost metric COSIRS, when deployed can responds quickly enough to thwart active attacks in real time using optimal responses. The results of evaluation show that the design has better performance over existing ones.
成本敏感响应系统的目标是确保响应成本不超过入侵成本。为了确保这一点,开发了一些对成本敏感的响应模型。其中一些模型没有考虑先前行动的有效性,并且缺乏估计相关成本的标准方法。在这项工作中,我们提出了一个基于三个因素的响应成本评估模型,即入侵造成的损害成本、入侵自动响应成本和操作成本。建议的方法为跨不同系统和环境的响应评估提供了一致的基础。此外,性能分析表明,使用这种成本度量COSIRS的自动响应系统在部署时可以快速响应,使用最佳响应来实时阻止主动攻击。评价结果表明,该设计比现有设计具有更好的性能。
{"title":"A credible cost-sensitive model for intrusion response selection","authors":"A. Ikuomola, A. Sodiya","doi":"10.1109/CASoN.2012.6412406","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412406","url":null,"abstract":"The goal of co st-sensitive response system is to ensure that response cost does not outweigh the intrusion cost. In order to ensure this, some cost-sensitive response models have been developed. Some of these models do not consider the effectiveness of previous actions and lack standard approach for estimating associated cost. In this work, we present a model for assessing cost of responses based on three factors, the cost of damage caused by the intrusion, the cost of automatic response to an intrusion and the operational cost. The proposed approach provides consistent basis for response assessment across different systems and environment. In addition, the performance analysis indicates that automated responses systems using this cost metric COSIRS, when deployed can responds quickly enough to thwart active attacks in real time using optimal responses. The results of evaluation show that the design has better performance over existing ones.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129412535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A survivability model for object-oriented software systems 面向对象软件系统的生存能力模型
A. Sodiya, D. O. Aborisade, A. Ikuomola
In this paper, we proposed a survivability model for object-oriented software system for solving the problem of software degradation commonly caused by increasing growth in classes and methods. This is achieved through threshold scheme and software rejuvenation technique. Threshold value (TV) is set as the degradation point for the software system with consideration given to the critical region values (CV) as defined standard metrics like McCabeCyclomatic Complexity (CC) risk thresholds and NASA SATC WMC risk thresholds metrics. A mechanism is also integrated into the model to monitor and determine the continuous growth of methods and classes such that when threshold value (TV) <;= critical value (CV) set within the critical region, the software codes are refreshed and re-initiated. The model is tested using two software programs developed to implement a treemap algorithm using nine (9) attributes. It is observed that software programs with this proposed model embedded into it would prevent code degradation.
本文提出了面向对象软件系统的生存性模型,以解决由于类和方法的增加而导致的软件退化问题。这是通过阈值方案和软件复原技术来实现的。阈值(TV)被设置为软件系统的退化点,并考虑到临界区域值(CV)作为定义的标准度量,如mccabeccyclatic Complexity (CC)风险阈值和NASA SATC WMC风险阈值度量。模型中还集成了一种机制来监视和确定方法和类的持续增长,以便当临界值(TV) <;=临界值(CV)在临界区域内设置时,刷新并重新启动软件代码。使用两个软件程序对该模型进行了测试,该软件程序用于实现使用九(9)个属性的树图算法。可以观察到,将该模型嵌入其中的软件程序可以防止代码退化。
{"title":"A survivability model for object-oriented software systems","authors":"A. Sodiya, D. O. Aborisade, A. Ikuomola","doi":"10.1109/CASoN.2012.6412416","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412416","url":null,"abstract":"In this paper, we proposed a survivability model for object-oriented software system for solving the problem of software degradation commonly caused by increasing growth in classes and methods. This is achieved through threshold scheme and software rejuvenation technique. Threshold value (TV) is set as the degradation point for the software system with consideration given to the critical region values (CV) as defined standard metrics like McCabeCyclomatic Complexity (CC) risk thresholds and NASA SATC WMC risk thresholds metrics. A mechanism is also integrated into the model to monitor and determine the continuous growth of methods and classes such that when threshold value (TV) <;= critical value (CV) set within the critical region, the software codes are refreshed and re-initiated. The model is tested using two software programs developed to implement a treemap algorithm using nine (9) attributes. It is observed that software programs with this proposed model embedded into it would prevent code degradation.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying focal patterns in social networks 识别社会网络中的焦点模式
Fatih Şen, R. Wigand, Nitin Agarwal, Debanjan Mahata, Halil Bisgin
Identifying authoritative individuals is a well-known approach in extracting actionable knowledge, known as “Knowledge Representation”, in a social network. Previous researches suggest measures to identify influential individuals, however, such individuals might not represent the appropriate context (relationships, interactions, etc.). For example, it is nearly an impossible task for a single individual to organize a mass protest of the scale of Occupy Wall Street. Similarly, other events such as the Arab Spring, coordinating crisis responses for natural disasters (e.g., the Haiti earthquake), or even organizing flash mobs would require a key set of individuals rather than a single or the most authoritative one. These events demonstrate the need and importance of examining influential structures rather than single individuals in social networks. A new methodology is proposed to identify such influential structures and recognizing their importance. The proposed methodology is evaluated empirically with real-world data from NIST's Tweets2011 corpus. We also introduce a novel and objective evaluation strategy to ascertain the efficacy of the focal patterns. Challenges with future research directions are outlined.
在社会网络中,识别权威个体是提取可操作知识的一种众所周知的方法,被称为“知识表示”。先前的研究提出了识别有影响力个体的措施,然而,这些个体可能并不代表适当的背景(关系、互动等)。例如,一个人组织一场像“占领华尔街”那样规模的大规模抗议活动几乎是不可能完成的任务。类似地,其他事件,如阿拉伯之春,协调对自然灾害的危机反应(如海地地震),甚至组织快闪族,都需要一组关键的个人,而不是一个单一的或最权威的人。这些事件表明,检查社会网络中有影响力的结构而不是单个个人的必要性和重要性。提出了一种新的方法来确定这些有影响的结构并认识到它们的重要性。我们用NIST的Tweets2011语料库中的真实数据对所提出的方法进行了实证评估。我们还介绍了一种新的客观评价策略来确定焦点模式的有效性。展望了未来研究方向的挑战。
{"title":"Identifying focal patterns in social networks","authors":"Fatih Şen, R. Wigand, Nitin Agarwal, Debanjan Mahata, Halil Bisgin","doi":"10.1109/CASoN.2012.6412386","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412386","url":null,"abstract":"Identifying authoritative individuals is a well-known approach in extracting actionable knowledge, known as “Knowledge Representation”, in a social network. Previous researches suggest measures to identify influential individuals, however, such individuals might not represent the appropriate context (relationships, interactions, etc.). For example, it is nearly an impossible task for a single individual to organize a mass protest of the scale of Occupy Wall Street. Similarly, other events such as the Arab Spring, coordinating crisis responses for natural disasters (e.g., the Haiti earthquake), or even organizing flash mobs would require a key set of individuals rather than a single or the most authoritative one. These events demonstrate the need and importance of examining influential structures rather than single individuals in social networks. A new methodology is proposed to identify such influential structures and recognizing their importance. The proposed methodology is evaluated empirically with real-world data from NIST's Tweets2011 corpus. We also introduce a novel and objective evaluation strategy to ascertain the efficacy of the focal patterns. Challenges with future research directions are outlined.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116368895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A reputation-based approach for consumer protection in Saudi Arabia 沙特阿拉伯以声誉为基础的消费者保护方法
Hmood Al-Dossari
Consumer protection is an issue of great importance to Saudi Arabia, leading to the formation of a consumer protection agency as part of the Ministry of Commerce and Industry. However, studies have shown that this agency has not ensured adequate protection for consumers. This paper investigates whether better consumer protection may be achieved in Saudi Arabia through the design and implementation of an “independent” quality monitoring system. That is, we propose to develop a system that collects consumers' ratings on the services delivered to them, either physically or electronically, and to then aggregate these ratings over time to establish a useable measure of the reputations of service providers. While certain techniques have been proposed in the literature to calculate reputation, these tend to concentrate on the manipulation of ratings, and do not consider the context within which a rating may be given by a consumer. In other words, these proposed techniques neither consider the subjectivity of consumers' ratings nor the dynamic behaviour of service providers, potentially leading to the allocation of biased or unfair reputation calculations. In order to address this problem, the expectations of consumers have been collected alongside their ratings and then manipulated to distinguish between subjective and unfair ratings to produce a more robust reputation calculations. The proposed approach has been demonstrated using a simple example.
消费者保护对沙特阿拉伯来说是一个非常重要的问题,因此成立了一个消费者保护机构,作为商业和工业部的一部分。然而,研究表明,该机构并没有确保对消费者的充分保护。本文调查是否更好的消费者保护可以实现在沙特阿拉伯通过设计和实施一个“独立”的质量监控系统。也就是说,我们建议开发一个系统,收集消费者对交付给他们的服务的评级,无论是物理的还是电子的,然后随着时间的推移,汇总这些评级,以建立一个可用的衡量服务提供商声誉的标准。虽然文献中提出了某些计算声誉的技术,但这些技术往往集中在对评级的操纵上,而没有考虑消费者可能给出评级的背景。换句话说,这些提议的技术既不考虑消费者评级的主观性,也不考虑服务提供商的动态行为,这可能导致分配有偏见或不公平的声誉计算。为了解决这个问题,消费者的期望和他们的评分一起被收集起来,然后被操纵来区分主观和不公平的评分,以产生更可靠的声誉计算。用一个简单的例子证明了所提出的方法。
{"title":"A reputation-based approach for consumer protection in Saudi Arabia","authors":"Hmood Al-Dossari","doi":"10.1109/CASoN.2012.6412422","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412422","url":null,"abstract":"Consumer protection is an issue of great importance to Saudi Arabia, leading to the formation of a consumer protection agency as part of the Ministry of Commerce and Industry. However, studies have shown that this agency has not ensured adequate protection for consumers. This paper investigates whether better consumer protection may be achieved in Saudi Arabia through the design and implementation of an “independent” quality monitoring system. That is, we propose to develop a system that collects consumers' ratings on the services delivered to them, either physically or electronically, and to then aggregate these ratings over time to establish a useable measure of the reputations of service providers. While certain techniques have been proposed in the literature to calculate reputation, these tend to concentrate on the manipulation of ratings, and do not consider the context within which a rating may be given by a consumer. In other words, these proposed techniques neither consider the subjectivity of consumers' ratings nor the dynamic behaviour of service providers, potentially leading to the allocation of biased or unfair reputation calculations. In order to address this problem, the expectations of consumers have been collected alongside their ratings and then manipulated to distinguish between subjective and unfair ratings to produce a more robust reputation calculations. The proposed approach has been demonstrated using a simple example.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124413284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Searching similar images — Vector quantization with S-tree 搜索相似的图像-矢量量化与s树
J. Platoš, P. Krömer, V. Snás̃el, A. Abraham
Searching of similar pictures was in the past based mainly on searching of similar picture names. We try to find an effective method how to search pictures by searching of similar information in the picture (histograms, shapes, blocks,). There already are some methods but still not effective enough. In this paper we describe a method where we combine vector quantization (VQ) and fuzzy S-trees. Work contains testing of our approach and you can see results in a final chapter of this paper. The benefit of this work is not the final solution but we put a key-stone for further research and for optimizations. First tests show up the efficiency and usefulness of our approach, which is under laid by executed tests.
过去,相似图片的搜索主要基于相似图片名称的搜索。我们试图通过搜索图片中的相似信息(直方图、形状、块等)来寻找一种有效的搜索方法。已经有了一些方法,但还不够有效。本文描述了一种将矢量量化(VQ)与模糊s树相结合的方法。工作中包含了对我们的方法的测试,您可以在本文的最后一章中看到结果。这项工作的好处并不是最终的解决方案,但我们为进一步的研究和优化奠定了基础。第一个测试显示了我们的方法的效率和有用性,这是在执行测试的基础上实现的。
{"title":"Searching similar images — Vector quantization with S-tree","authors":"J. Platoš, P. Krömer, V. Snás̃el, A. Abraham","doi":"10.1109/CASoN.2012.6412433","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412433","url":null,"abstract":"Searching of similar pictures was in the past based mainly on searching of similar picture names. We try to find an effective method how to search pictures by searching of similar information in the picture (histograms, shapes, blocks,). There already are some methods but still not effective enough. In this paper we describe a method where we combine vector quantization (VQ) and fuzzy S-trees. Work contains testing of our approach and you can see results in a final chapter of this paper. The benefit of this work is not the final solution but we put a key-stone for further research and for optimizations. First tests show up the efficiency and usefulness of our approach, which is under laid by executed tests.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121593080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1