首页 > 最新文献

10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

英文 中文
A framework for component selection in collaborative sensing application development 协同传感应用开发中的组件选择框架
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257552
Jie Cao, Lingmei Ren, Weisong Shi, Zhifeng Yu
Wireless sensor network-based technologies and applications have attracted a lot of attention in the past two decades because of their huge potential to change people's way of life. These applications usually need close collaboration among multiple sensors, gateways, services and end users. When developing these applications, system designers and practitioners usually face several performance requirements such as the accuracy, battery life and system reliability. Given the hard requirements in system performance, how to choose an optimal combination from various sensors, algorithms and collaborative systems to form the application is the most important problem that practitioners need to address. Ad hoc solutions were proposed in specific applications in the past; however, a general methodology that can be easily applied to future applications is lacking. In this paper, we take the challenge and propose a general framework aiming to address the component selection problem, illustrate how this framework can be applied to real life applications through a case study, and discuss challenging issues and two interesting finds from our implementation.
基于无线传感器网络的技术和应用在过去二十年中引起了人们的广泛关注,因为它们具有改变人们生活方式的巨大潜力。这些应用程序通常需要多个传感器、网关、服务和最终用户之间的密切协作。在开发这些应用程序时,系统设计人员和从业人员通常面临一些性能要求,例如精度,电池寿命和系统可靠性。在系统性能要求较高的情况下,如何从各种传感器、算法和协同系统中选择最优组合形成应用是实践者需要解决的最重要问题。过去在特定应用中提出了临时解决方案;然而,缺乏一种可以很容易地应用于未来应用程序的通用方法。在本文中,我们接受挑战并提出了一个通用框架,旨在解决组件选择问题,通过案例研究说明该框架如何应用于现实生活中的应用,并讨论了具有挑战性的问题和我们实现中的两个有趣发现。
{"title":"A framework for component selection in collaborative sensing application development","authors":"Jie Cao, Lingmei Ren, Weisong Shi, Zhifeng Yu","doi":"10.4108/ICST.COLLABORATECOM.2014.257552","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257552","url":null,"abstract":"Wireless sensor network-based technologies and applications have attracted a lot of attention in the past two decades because of their huge potential to change people's way of life. These applications usually need close collaboration among multiple sensors, gateways, services and end users. When developing these applications, system designers and practitioners usually face several performance requirements such as the accuracy, battery life and system reliability. Given the hard requirements in system performance, how to choose an optimal combination from various sensors, algorithms and collaborative systems to form the application is the most important problem that practitioners need to address. Ad hoc solutions were proposed in specific applications in the past; however, a general methodology that can be easily applied to future applications is lacking. In this paper, we take the challenge and propose a general framework aiming to address the component selection problem, illustrate how this framework can be applied to real life applications through a case study, and discuss challenging issues and two interesting finds from our implementation.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128501957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Defending against device theft with human notarization 用人工公证来防范设备盗窃
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257706
Alana Libonati, Kelly E. Caine, Apu Kapadia, M. Reiter
People increasingly rely on mobile phones for storing sensitive information and credentials for access to services. Because these devices are vulnerable to theft, security of this data is put at higher risk-once the attacker is in physical possession of the device, recovering these credentials and impersonating the owner of the phone is hard to defend by purely local means. We introduce the concept of `notarization', a process by which a remote notary verifies the identity of the device user through video chat. We describe the design and implementation of a system that leverages notarization to protect cryptographic keys that the device uses to decrypt device data (e.g., website passwords) or perform signatures in support of client-side TLS, without trusting the notary with these keys. Through a lab-based study with 56 participants, we show that notarization even by strangers is effective for combating device theft.
人们越来越依赖手机来存储敏感信息和访问服务的凭据。由于这些设备很容易被盗,因此这些数据的安全性面临更高的风险——一旦攻击者实际拥有设备,恢复这些凭证并冒充手机的所有者很难通过纯粹的本地手段进行防御。我们引入了“公证”的概念,这是一个远程公证人通过视频聊天验证设备用户身份的过程。我们描述了一个系统的设计和实现,该系统利用公证来保护设备用于解密设备数据(例如,网站密码)或执行支持客户端TLS的签名的加密密钥,而无需信任这些密钥的公证人。通过一项有56名参与者的实验室研究,我们表明,即使是陌生人的公证对打击设备盗窃也是有效的。
{"title":"Defending against device theft with human notarization","authors":"Alana Libonati, Kelly E. Caine, Apu Kapadia, M. Reiter","doi":"10.4108/ICST.COLLABORATECOM.2014.257706","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257706","url":null,"abstract":"People increasingly rely on mobile phones for storing sensitive information and credentials for access to services. Because these devices are vulnerable to theft, security of this data is put at higher risk-once the attacker is in physical possession of the device, recovering these credentials and impersonating the owner of the phone is hard to defend by purely local means. We introduce the concept of `notarization', a process by which a remote notary verifies the identity of the device user through video chat. We describe the design and implementation of a system that leverages notarization to protect cryptographic keys that the device uses to decrypt device data (e.g., website passwords) or perform signatures in support of client-side TLS, without trusting the notary with these keys. Through a lab-based study with 56 participants, we show that notarization even by strangers is effective for combating device theft.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evolving stream classification using change detection 使用变更检测进化流分类
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257769
A. M. Mustafa, Ahsanul Haque, L. Khan, M. Baron, B. Thuraisingham
Classifying instances in evolving data stream is a challenging task because of its properties, e.g., infinite length, concept drift, and concept evolution. Most of the currently available approaches to classify stream data instances divide the stream data into fixed size chunks to fit the data in memory and process the fixed size chunk one after another. However, this may lead to failure of capturing the concept drift immediately. We try to determine the chunk size dynamically by exploiting change point detection (CPD) techniques on stream data. In general, the distribution families before and after the change point are unknown over the stream, therefore non-parametric CPD algorithms are used in this case. We propose a multi-dimensional non-parametric CPD technique to determine chunk boundary over data streams dynamically which leads to better models to classify instances of evolving data streams. Experimental results show that our approach can detect the change points and classify instances of evolving data stream with high accuracy as compared to other baseline approaches.
在演化数据流中对实例进行分类是一项具有挑战性的任务,因为它具有无限长、概念漂移和概念演化等特性。目前可用的流数据实例分类方法大多是将流数据划分为固定大小的块,以适应内存中的数据,然后逐个处理固定大小的块。然而,这可能导致无法立即捕捉到概念漂移。我们尝试通过利用流数据的变化点检测(CPD)技术来动态确定块大小。一般来说,变化点前后的分布族在流中是未知的,因此在这种情况下使用非参数CPD算法。我们提出了一种多维非参数CPD技术来动态确定数据流上的块边界,从而产生更好的模型来分类不断发展的数据流实例。实验结果表明,与其他基线方法相比,我们的方法可以检测到变化点并对不断变化的数据流实例进行分类,准确率很高。
{"title":"Evolving stream classification using change detection","authors":"A. M. Mustafa, Ahsanul Haque, L. Khan, M. Baron, B. Thuraisingham","doi":"10.4108/ICST.COLLABORATECOM.2014.257769","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257769","url":null,"abstract":"Classifying instances in evolving data stream is a challenging task because of its properties, e.g., infinite length, concept drift, and concept evolution. Most of the currently available approaches to classify stream data instances divide the stream data into fixed size chunks to fit the data in memory and process the fixed size chunk one after another. However, this may lead to failure of capturing the concept drift immediately. We try to determine the chunk size dynamically by exploiting change point detection (CPD) techniques on stream data. In general, the distribution families before and after the change point are unknown over the stream, therefore non-parametric CPD algorithms are used in this case. We propose a multi-dimensional non-parametric CPD technique to determine chunk boundary over data streams dynamically which leads to better models to classify instances of evolving data streams. Experimental results show that our approach can detect the change points and classify instances of evolving data stream with high accuracy as compared to other baseline approaches.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121765880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards a common platform for the support of routine and agile business processes 朝着支持常规和敏捷业务流程的通用平台迈进
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257269
Michael Zeising, Stefan Schönig, S. Jablonski
The spectrum of an organization's business processes ranges from routine processes with a well-defined flow to agile processes with a degree of uncertainty. The Process Navigation platform aims at supporting both types of processes as well as combinations of them. It offers execution support for traditional flow-oriented notations like BPMN as they are well-suited for the routine type of processes. Rule-based notations for agile processes like CMMN are on the way of getting established but still have a number of weaknesses. As a consequence, the platform's agile part does not target one single notation but relies on a rule-based cross-perspective and modal intermediate language. CMMN models are then translated to the intermediate language for execution. The contribution of this paper is built up in three parts: first of all, the overall architecture of the execution platform is explained. In a second step, the intermediate language is evaluated on the basis of a comprehensive and acknowledged framework of business process requirements. And finally, the translation of CMMN to the intermediate language is described by means of an example.
组织的业务流程范围从具有良好定义流的常规流程到具有一定程度不确定性的敏捷流程。过程导航平台旨在支持这两种类型的过程以及它们的组合。它为传统的面向流程的符号(如BPMN)提供了执行支持,因为它们非常适合常规类型的流程。针对敏捷过程(如CMMN)的基于规则的表示法正在逐渐建立起来,但仍然存在许多弱点。因此,平台的敏捷部分不以单一的符号为目标,而是依赖于基于规则的跨视角和模态中间语言。然后将CMMN模型翻译成中间语言以供执行。本文的贡献主要分为三个部分:首先,阐述了执行平台的总体架构。在第二步中,根据一个全面的、公认的业务流程需求框架对中间语言进行评估。最后,通过实例描述了CMMN到中间语言的翻译过程。
{"title":"Towards a common platform for the support of routine and agile business processes","authors":"Michael Zeising, Stefan Schönig, S. Jablonski","doi":"10.4108/ICST.COLLABORATECOM.2014.257269","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257269","url":null,"abstract":"The spectrum of an organization's business processes ranges from routine processes with a well-defined flow to agile processes with a degree of uncertainty. The Process Navigation platform aims at supporting both types of processes as well as combinations of them. It offers execution support for traditional flow-oriented notations like BPMN as they are well-suited for the routine type of processes. Rule-based notations for agile processes like CMMN are on the way of getting established but still have a number of weaknesses. As a consequence, the platform's agile part does not target one single notation but relies on a rule-based cross-perspective and modal intermediate language. CMMN models are then translated to the intermediate language for execution. The contribution of this paper is built up in three parts: first of all, the overall architecture of the execution platform is explained. In a second step, the intermediate language is evaluated on the basis of a comprehensive and acknowledged framework of business process requirements. And finally, the translation of CMMN to the intermediate language is described by means of an example.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127467410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Resilient hybrid Mobile Ad-hoc Cloud over collaborating heterogeneous nodes 基于协作异构节点的弹性混合移动自组织云
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257848
A. Khalifa, M. Azab, M. Eltoweissy
The emergence of Mobile Ad-hoc Clouds (MACs) promises more effective and collaborative elastic resource-infinite computing. However, the highly dynamic, mobile, heterogeneous, fractionized, and scattered nature of computing resources coupled with the isolated non-cooperative nature of current resource management systems make it impossible for current virtualization and resource management techniques to guarantee resilient cloud service delivery. In this paper, we present PlanetCloud, our MAC management platform with an intrinsic support for resilient, highly mobile, cooperative, and dynamically-configurable MACs. We use PlanetCloud for the construction and management of resilient hybrid MACs (HMACs) over mobile and stationary computing resources. PlanetCloud comprises a trustworthy fine-grained virtualization layer and a task management layer. PlanetCloud employs the concepts of application virtualization and fractionation using intrinsically-resilient and aware micro virtual machines, or Cells in our terminology, to encapsulate executable applicationfractions. Such employment isolates the running application from the underlying physical resource enabling seamless execution over heterogeneous resources, lightweight load migration, and low cost of failure. Integral to PlanetCloud is resource forecasting and selection mechanism, which provide a MAC with future appropriate resource availability in space and time. Further, these features enable a large set of mobile, heterogeneous, and scattered resources to collaborate through PlanetCloud smart management platforms that seamlessly consolidates such resources into a resilient HMAC. Using analysis and simulation, we evaluate a PlanetCloud-managed resilient HMAC. Results show that PlanetCloud can provision high level of resource availability transparently maintaining the applications' QoS while preventing service disruption even in highly dynamic environments. Additionally, results showed that our approach to minimizing the cost of failure and facilitating easy load migration elevates the resilience of the HMAC to a great extent.
移动自组织云(mac)的出现承诺了更有效和协作的弹性资源无限计算。然而,计算资源的高度动态性、移动性、异构性、分块性和分散性,加上当前资源管理系统孤立的非协作性,使得当前的虚拟化和资源管理技术无法保证弹性的云服务交付。在本文中,我们介绍了PlanetCloud,我们的MAC管理平台,具有对弹性,高度移动,协作和动态可配置MAC的内在支持。我们使用PlanetCloud在移动和固定计算资源上构建和管理弹性混合mac (hmac)。PlanetCloud包括一个可信赖的细粒度虚拟化层和一个任务管理层。PlanetCloud采用应用程序虚拟化和分块的概念,使用具有内在弹性和感知能力的微型虚拟机(在我们的术语中称为cell)来封装可执行的应用程序分块。这样的使用将运行的应用程序与底层物理资源隔离开来,从而支持在异构资源上无缝执行、轻量级负载迁移和低故障成本。PlanetCloud不可或缺的是资源预测和选择机制,它为MAC提供未来适当的空间和时间资源可用性。此外,这些功能使大量的移动、异构和分散的资源能够通过PlanetCloud智能管理平台进行协作,这些平台将这些资源无缝地整合到一个有弹性的HMAC中。通过分析和仿真,我们评估了planetcloud管理的弹性HMAC。结果表明,PlanetCloud可以提供高水平的资源可用性,透明地维护应用程序的QoS,同时防止服务中断,即使在高动态环境中也是如此。此外,结果表明,我们的方法可以最大限度地降低故障成本并促进负载迁移,从而在很大程度上提高了HMAC的弹性。
{"title":"Resilient hybrid Mobile Ad-hoc Cloud over collaborating heterogeneous nodes","authors":"A. Khalifa, M. Azab, M. Eltoweissy","doi":"10.4108/ICST.COLLABORATECOM.2014.257848","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257848","url":null,"abstract":"The emergence of Mobile Ad-hoc Clouds (MACs) promises more effective and collaborative elastic resource-infinite computing. However, the highly dynamic, mobile, heterogeneous, fractionized, and scattered nature of computing resources coupled with the isolated non-cooperative nature of current resource management systems make it impossible for current virtualization and resource management techniques to guarantee resilient cloud service delivery. In this paper, we present PlanetCloud, our MAC management platform with an intrinsic support for resilient, highly mobile, cooperative, and dynamically-configurable MACs. We use PlanetCloud for the construction and management of resilient hybrid MACs (HMACs) over mobile and stationary computing resources. PlanetCloud comprises a trustworthy fine-grained virtualization layer and a task management layer. PlanetCloud employs the concepts of application virtualization and fractionation using intrinsically-resilient and aware micro virtual machines, or Cells in our terminology, to encapsulate executable applicationfractions. Such employment isolates the running application from the underlying physical resource enabling seamless execution over heterogeneous resources, lightweight load migration, and low cost of failure. Integral to PlanetCloud is resource forecasting and selection mechanism, which provide a MAC with future appropriate resource availability in space and time. Further, these features enable a large set of mobile, heterogeneous, and scattered resources to collaborate through PlanetCloud smart management platforms that seamlessly consolidates such resources into a resilient HMAC. Using analysis and simulation, we evaluate a PlanetCloud-managed resilient HMAC. Results show that PlanetCloud can provision high level of resource availability transparently maintaining the applications' QoS while preventing service disruption even in highly dynamic environments. Additionally, results showed that our approach to minimizing the cost of failure and facilitating easy load migration elevates the resilience of the HMAC to a great extent.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114817709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Mobile peer-mentoring: An approach to make veterans seek mental health-care support a normality 移动同伴辅导:一种使退伍军人寻求心理保健支持成为常态的方法
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257844
Rizwana Rizia, Nadiyah Johnson, A. Patwary, G. Ahsan, Sheikh Iqbal Ahamed, Zeno Franco, Katinka Hooyer, Bob Curry, M. Flower
Veterans often face great difficulties during the community and family reintegration after military deployment. Mental health problems resulting from war related traumatic experiences often make social readjustment very difficult. Many research suggests that peer-mentorship can be very effective for mental-health problems. Dryhootch (DH), a community organization led by veterans, has implemented a veteran peer-mentor program. The primary objective of DH program is to provide peer-mentor support to veterans going through social readjustment. In this paper we propose to expand DH's paper-based peer-mentor program with a mobile-based system, iPeer. The proposed expansion improves the efficiency of the current DH approach by augmenting the existing social process with mobile technologies used extensively by younger veterans returning from Afghanistan and Iraq. We provide a description of the evolution of this mobile-based peer-mentor support tool through collaborative design research. We also present our initial usability findings in order to demonstrate the improved efficiency offered by the augmented technology.
退伍军人在军事部署后重返社区和家庭生活时往往面临巨大困难。与战争有关的创伤经历造成的心理健康问题往往使社会重新适应变得非常困难。许多研究表明,同侪指导对心理健康问题非常有效。由退伍军人领导的社区组织Dryhootch (DH)实施了一项退伍军人同侪导师计划。健康护理计划的主要目标是为退伍军人提供同伴辅导,帮助他们重新适应社会。在本文中,我们建议用基于移动的系统iPeer扩展卫生部基于纸张的同伴导师计划。从阿富汗和伊拉克返回的年轻退伍军人广泛使用移动技术,通过扩大现有的社会过程,拟议的扩展提高了当前卫生保健方法的效率。我们通过协作设计研究描述了这种基于移动的同伴导师支持工具的演变。我们还介绍了我们最初的可用性发现,以展示增强技术提供的改进效率。
{"title":"Mobile peer-mentoring: An approach to make veterans seek mental health-care support a normality","authors":"Rizwana Rizia, Nadiyah Johnson, A. Patwary, G. Ahsan, Sheikh Iqbal Ahamed, Zeno Franco, Katinka Hooyer, Bob Curry, M. Flower","doi":"10.4108/ICST.COLLABORATECOM.2014.257844","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257844","url":null,"abstract":"Veterans often face great difficulties during the community and family reintegration after military deployment. Mental health problems resulting from war related traumatic experiences often make social readjustment very difficult. Many research suggests that peer-mentorship can be very effective for mental-health problems. Dryhootch (DH), a community organization led by veterans, has implemented a veteran peer-mentor program. The primary objective of DH program is to provide peer-mentor support to veterans going through social readjustment. In this paper we propose to expand DH's paper-based peer-mentor program with a mobile-based system, iPeer. The proposed expansion improves the efficiency of the current DH approach by augmenting the existing social process with mobile technologies used extensively by younger veterans returning from Afghanistan and Iraq. We provide a description of the evolution of this mobile-based peer-mentor support tool through collaborative design research. We also present our initial usability findings in order to demonstrate the improved efficiency offered by the augmented technology.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Enhancing message collaboration through predictive modeling of user behavior 通过对用户行为进行预测建模来增强消息协作
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257317
Biswajyoti Pal, Anupama Pasumarthy, K. Dhara, V. Krishnaswamy
Research studies have shown that the effectiveness of collaboration and the choice of communication modality is intricately linked with the perceived presence and availability of the collaborating parties. Most collaboration systems offer users the ability to publish their presence for effective collaboration. However, a close observation of users' behavioral data shows a divergence such as in a published `busy' state a user is actually willing to collaborate with certain people or in a published `available' state a user is unwilling to collaborate with certain people. This behavior makes the notion of presence in collaboration systems ineffectual and often unreliable. In this paper, we propose a new predictive model of behavioral presence for collaborative messaging systems that automatically infers multiple presence states based on users expected collaboration behavior towards a contact. We present a novel confirmatory data mining technique that overlays a `cluster of interest' on standard clustering techniques such as k-means, fuzzy k-means, and consensus clustering. We present validation results of our predictive model on data obtained from real-world deployed enterprise servers across multiple locations over a period of seven months.
研究表明,合作的有效性和沟通方式的选择与合作各方的感知存在和可用性有着复杂的联系。大多数协作系统为用户提供发布其状态以进行有效协作的能力。然而,仔细观察用户的行为数据会发现一种差异,比如在发布的“忙碌”状态下,用户实际上愿意与某些人合作,而在发布的“可用”状态下,用户不愿意与某些人合作。这种行为使得协作系统中存在的概念无效且常常不可靠。在本文中,我们提出了一种新的行为在场预测模型,该模型基于用户对联系人的预期协作行为自动推断出多种在场状态。我们提出了一种新的验证性数据挖掘技术,该技术将“感兴趣的聚类”覆盖在标准聚类技术(如k-means,模糊k-means和共识聚类)上。我们展示了我们的预测模型在七个月期间从多个地点部署的实际企业服务器上获得的数据的验证结果。
{"title":"Enhancing message collaboration through predictive modeling of user behavior","authors":"Biswajyoti Pal, Anupama Pasumarthy, K. Dhara, V. Krishnaswamy","doi":"10.4108/ICST.COLLABORATECOM.2014.257317","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257317","url":null,"abstract":"Research studies have shown that the effectiveness of collaboration and the choice of communication modality is intricately linked with the perceived presence and availability of the collaborating parties. Most collaboration systems offer users the ability to publish their presence for effective collaboration. However, a close observation of users' behavioral data shows a divergence such as in a published `busy' state a user is actually willing to collaborate with certain people or in a published `available' state a user is unwilling to collaborate with certain people. This behavior makes the notion of presence in collaboration systems ineffectual and often unreliable. In this paper, we propose a new predictive model of behavioral presence for collaborative messaging systems that automatically infers multiple presence states based on users expected collaboration behavior towards a contact. We present a novel confirmatory data mining technique that overlays a `cluster of interest' on standard clustering techniques such as k-means, fuzzy k-means, and consensus clustering. We present validation results of our predictive model on data obtained from real-world deployed enterprise servers across multiple locations over a period of seven months.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124394299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault tolerance in heterogeneous distributed systems 异构分布式系统中的容错
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257585
Zhe Wang, N. Minsky
Dependability of heterogeneous distributed systems is an important issue. Coordination failures may occur even if the given coordination protocol is adhered to by all participants. The fault tolerance (FT) properties of systems are difficult to achieve, especially at application level. What is common to current FT-techniques is their reliance on the code of the various system components, which are often required to be written in a specific language. From the viewpoint of distributed systems, such techniques are feasible for homogeneous systems, or at least systems that are designed and maintained by a single administrative domain. But such code-based techniques are generally unreliable for open systems, due to the lack of overall control over the code of components. This leaves open distributed systems vulnerable to their own faults and to attack on them. However, certain types of FT measures can be established in distributed systems by controlling the flow of messages between system components, independently of the code of system components-which we plan to do via a distributed coordination and control mechanism called Law-Governed Interaction. We demonstrate in this paper, there is a substantial range of FT measures that can be established completely by controlling messaging. Moreover, although the FT-measures to be developed are meant mostly for open systems, some of them can be useful for distributed systems in general, even where traditional code-based techniques are feasible.
异构分布式系统的可靠性是一个重要的问题。即使所有参与者都遵守了给定的协调协议,也可能发生协调失败。系统的容错特性是难以实现的,特别是在应用层面。当前ft技术的共同之处在于它们依赖于各种系统组件的代码,这些组件通常需要用特定的语言编写。从分布式系统的角度来看,这些技术对于同构系统是可行的,或者至少对于由单个管理域设计和维护的系统是可行的。但是,由于缺乏对组件代码的全面控制,这种基于代码的技术对于开放系统来说通常是不可靠的。这使得开放的分布式系统容易受到自身错误的攻击。然而,通过控制系统组件之间的消息流,可以在分布式系统中建立某些类型的FT度量,而不依赖于系统组件的代码——我们计划通过一种称为“受法律约束的交互”的分布式协调和控制机制来实现这一点。我们在本文中证明,有大量的FT措施可以完全通过控制消息传递来建立。此外,尽管要开发的ft度量主要是针对开放系统的,但它们中的一些对于一般的分布式系统是有用的,甚至在传统的基于代码的技术是可行的情况下也是如此。
{"title":"Fault tolerance in heterogeneous distributed systems","authors":"Zhe Wang, N. Minsky","doi":"10.4108/ICST.COLLABORATECOM.2014.257585","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257585","url":null,"abstract":"Dependability of heterogeneous distributed systems is an important issue. Coordination failures may occur even if the given coordination protocol is adhered to by all participants. The fault tolerance (FT) properties of systems are difficult to achieve, especially at application level. What is common to current FT-techniques is their reliance on the code of the various system components, which are often required to be written in a specific language. From the viewpoint of distributed systems, such techniques are feasible for homogeneous systems, or at least systems that are designed and maintained by a single administrative domain. But such code-based techniques are generally unreliable for open systems, due to the lack of overall control over the code of components. This leaves open distributed systems vulnerable to their own faults and to attack on them. However, certain types of FT measures can be established in distributed systems by controlling the flow of messages between system components, independently of the code of system components-which we plan to do via a distributed coordination and control mechanism called Law-Governed Interaction. We demonstrate in this paper, there is a substantial range of FT measures that can be established completely by controlling messaging. Moreover, although the FT-measures to be developed are meant mostly for open systems, some of them can be useful for distributed systems in general, even where traditional code-based techniques are feasible.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"314 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120930650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
JPrivacy: A java privacy profiling framework for Big Data applications JPrivacy:大数据应用的java隐私分析框架
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257666
Mohamed Abdellatif, Iman Saleh, M. Blake
Businesses and government agencies are continuously generating and collecting huge amounts of data and building related Big Data applications. Big Data applications involve the collaborative integration of APIs from different providers. A challenge in this domain is to guarantee the conformance of the integration to privacy terms and regulations. In this paper, we present JPrivacy, a privacy profiling framework for Big Data applications. JPrivacy proposes a model for privacy rules and provide the algorithms and related tools to check Java code against these rules. We show through experimentation that JPrivacy can effectively detect privacy violations by statically analyzing a piece of code.
企业和政府机构不断产生和收集大量数据,并构建相关的大数据应用。大数据应用涉及来自不同提供商的api的协作集成。该领域的一个挑战是保证集成符合隐私条款和法规。在本文中,我们介绍了JPrivacy,一个用于大数据应用的隐私分析框架。JPrivacy为隐私规则提出了一个模型,并提供了算法和相关工具来根据这些规则检查Java代码。我们通过实验证明,JPrivacy可以通过静态分析一段代码来有效地检测隐私侵犯。
{"title":"JPrivacy: A java privacy profiling framework for Big Data applications","authors":"Mohamed Abdellatif, Iman Saleh, M. Blake","doi":"10.4108/ICST.COLLABORATECOM.2014.257666","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257666","url":null,"abstract":"Businesses and government agencies are continuously generating and collecting huge amounts of data and building related Big Data applications. Big Data applications involve the collaborative integration of APIs from different providers. A challenge in this domain is to guarantee the conformance of the integration to privacy terms and regulations. In this paper, we present JPrivacy, a privacy profiling framework for Big Data applications. JPrivacy proposes a model for privacy rules and provide the algorithms and related tools to check Java code against these rules. We show through experimentation that JPrivacy can effectively detect privacy violations by statically analyzing a piece of code.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125814760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recommending prime spots of a destination and time to visit from geo-tagged social data 根据地理标记的社交数据,推荐目的地的最佳景点和游览时间
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257674
V. Sharma, Kyumin Lee, Jin-Wook Chung
Planning a trip can be a tedious task. One has to search for what places to visit at a destination (i.e. area) and what time to visit the destination. Sometimes this can be a time-consuming task because there are too much information available, and it is hard for one to choose which information to trust. In this paper we present a recommendation system clustering geo-tagged social data in a destination from each information source - Flickr and Foursquare - and combining the results from these diverse information sources to recommend places to visit. Our experimental results show that our recommendation system automatically suggests prime spots in Yellowstone national park with 0.83 precision and 0.927 NDCG, and in Yosemite national park with 0.8 precision and 0.912 NDCG. In addition, visualizing temporal information of social data helps travelers to decide when to visit a destination.
计划旅行可能是一项乏味的任务。人们必须搜索目的地(即地区)的参观地点以及参观目的地的时间。有时这可能是一项耗时的任务,因为有太多可用的信息,而且很难选择信任哪些信息。在这篇论文中,我们提出了一个推荐系统,将来自每个信息源(Flickr和Foursquare)的带有地理标签的社交数据聚类到一个目的地,并结合这些不同信息源的结果来推荐旅游地点。实验结果表明,我们的推荐系统自动推荐黄石国家公园的最佳景点,精度为0.83,NDCG为0.927,优胜美地国家公园的最佳景点推荐精度为0.8,NDCG为0.912。此外,可视化社会数据的时间信息有助于旅行者决定何时访问目的地。
{"title":"Recommending prime spots of a destination and time to visit from geo-tagged social data","authors":"V. Sharma, Kyumin Lee, Jin-Wook Chung","doi":"10.4108/ICST.COLLABORATECOM.2014.257674","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257674","url":null,"abstract":"Planning a trip can be a tedious task. One has to search for what places to visit at a destination (i.e. area) and what time to visit the destination. Sometimes this can be a time-consuming task because there are too much information available, and it is hard for one to choose which information to trust. In this paper we present a recommendation system clustering geo-tagged social data in a destination from each information source - Flickr and Foursquare - and combining the results from these diverse information sources to recommend places to visit. Our experimental results show that our recommendation system automatically suggests prime spots in Yellowstone national park with 0.83 precision and 0.927 NDCG, and in Yosemite national park with 0.8 precision and 0.912 NDCG. In addition, visualizing temporal information of social data helps travelers to decide when to visit a destination.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128523034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1