首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
Offering Two-Way Privacy for Evolved Purchase Inquiries 为进化的购买查询提供双向隐私
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-25 DOI: https://dl.acm.org/doi/10.1145/3599968
Jan Pennekamp, Markus Dahlmanns, Frederik Fuhrmann, Timo Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, Robert H. Schmitt, Klaus Wehrle

Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today’s established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches’ scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.

动态和灵活的业务关系预计将在未来变得更加重要,以适应专门的变更请求或小批量生产。如今,买卖双方必须在实际生产前披露产品的敏感信息。但是,如果没有信任关系,企业的竞争力就会受到威胁。到目前为止,相关的工作忽略了这个问题:现有的方法只保护单个方的信息,阻碍了动态和随需应变的业务关系。为了弥补隐私保护信息不足的相应研究缺口,并与没有建立信任关系的公司打交道,我们追求创新的隐私保护采购查询方向,将其无缝集成到当今已建立的供应商管理和采购流程中。利用私有计算中成熟的构建块,如私有集交集和同态加密,我们提出了两种具有略微不同的隐私和性能含义的设计,以安全地实现互联网上的购买查询。特别是,我们允许买家在不分享敏感信息的情况下考虑更多潜在的卖家,并减轻卖家反复准备详细但被丢弃的报价的负担。我们使用来自生产技术领域的两个真实用例来演示我们的方法的可伸缩性。总的来说,我们提出了可部署的设计,为购买查询提供双向隐私,从而填补了目前阻碍建立动态和灵活业务关系的空白。在未来,我们期望在这个被忽视的领域显著增加研究活动,以满足不断变化的生产环境的需求。
{"title":"Offering Two-Way Privacy for Evolved Purchase Inquiries","authors":"Jan Pennekamp, Markus Dahlmanns, Frederik Fuhrmann, Timo Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, Robert H. Schmitt, Klaus Wehrle","doi":"https://dl.acm.org/doi/10.1145/3599968","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3599968","url":null,"abstract":"<p>Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today’s established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches’ scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offering Two-Way Privacy for Evolved Purchase Inquiries 为进化的购买查询提供双向隐私
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-25 DOI: 10.1145/3599968
J. Pennekamp, M. Dahlmanns, Frederik Fuhrmann, T. Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, R. Schmitt, Klaus Wehrle
Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today’s established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches’ scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.
动态和灵活的业务关系在未来将变得更加重要,以适应专门的变更请求或小批量生产。如今,买家和卖家必须在实际生产之前提前披露产品的敏感信息。然而,如果没有信任关系,这种情况对相关公司来说是不稳定的,因为他们担心自己的竞争力。到目前为止,相关工作忽略了这个问题:现有的方法只保护一方的信息,阻碍了动态和按需的业务关系。为了弥补隐私保护不足的信息的相应研究空白,并与没有建立信任关系的公司打交道,我们追求创新的隐私保护采购查询方向,将其无缝集成到当今既定的供应商管理和采购流程中。利用私有计算的成熟构建块,如私有集交集和同态加密,我们提出了两种隐私和性能影响略有不同的设计,以安全地实现互联网上的购买查询。特别是,我们允许买家在不分享敏感信息的情况下考虑更多潜在卖家,并减轻卖家反复准备精心设计但被丢弃的报价的负担。我们使用生产技术领域的两个真实世界用例来展示我们的方法的可扩展性。总的来说,我们提供了可部署的设计,为购买查询提供双向隐私,从而填补了目前阻碍建立动态灵活业务关系的空白。未来,我们预计这一被忽视领域的研究活动将大幅增加,以满足不断发展的生产环境的需求。
{"title":"Offering Two-Way Privacy for Evolved Purchase Inquiries","authors":"J. Pennekamp, M. Dahlmanns, Frederik Fuhrmann, T. Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, R. Schmitt, Klaus Wehrle","doi":"10.1145/3599968","DOIUrl":"https://doi.org/10.1145/3599968","url":null,"abstract":"Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: Existing approaches only protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today’s established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches’ scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46352687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Guest Editors’ Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services 《计算语言学在多媒体物联网服务中的应用》特刊特邀编辑简介
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-23 DOI: 10.1145/3591355
Quan Z. Sheng, A. K. Sangaiah, Ankit Chaudhary
The Internet of Multimedia Things (IoMT) [4] is the combination of interfaces, protocols, and associated multimedia-related information, which enables advanced services and applications based on the human-to-device and device-to-device interactions in physical and virtual environments. The rapid growth in multimedia-on-demand traffic that refers to audio, video, and images has drastically shifted on the vision of the Internet of Things (IoT) [1, 5] from scalar to IoMT, which is an integral part of multimedia services such as real-time content delivery, online games, and video conferencing on the global Internet [3, 4]. Complementarily, Computational Linguistics (CL) [2] is an interdisciplinary research field concerned with the processing of languages by computers. Since machine translation began to emerge in the early 1970s, CL has grown and developed exponentially. Nevertheless, the combination of IoT-based multimedia with CL services has received less attention so far and has emerged as a new research paradigm for future computing applications. The future of smart IoMT devices with NLP is more important in real-time systems such as speech understanding, emotion recognition, and home automation. There are several issues and technical challenges that need attention from the research community. The rapid growth of multimedia IoT services (data abstraction, data sharing, data mining) has led the way to incorporating CL techniques to meet its requirements. This special issue presents multimedia IoT services in real-time systems and highlights the open research challenges to get advantageous use of CL.
多媒体物联网(IoMT)[4]是接口、协议和相关多媒体相关信息的组合,它使基于物理和虚拟环境中人对设备和设备对设备交互的高级服务和应用成为可能。多媒体点播流量(包括音频、视频和图像)的快速增长,使物联网(IoT)[1,5]的愿景从标量急剧转变为IoMT,它是全球互联网上实时内容交付、在线游戏和视频会议等多媒体服务的组成部分[3,4]。与之相辅相成的是,计算语言学(CL)[2]是一个涉及计算机语言处理的跨学科研究领域。自从机器翻译在20世纪70年代初出现以来,CL已经成倍增长和发展。然而,基于物联网的多媒体与CL服务的结合迄今为止受到的关注较少,并已成为未来计算应用的新研究范式。具有NLP的智能IoMT设备的未来在语音理解、情感识别和家庭自动化等实时系统中更为重要。有几个问题和技术挑战需要引起研究界的注意。多媒体物联网服务(数据抽象、数据共享、数据挖掘)的快速增长,促使人们采用CL技术来满足其需求。本期专题介绍了实时系统中的多媒体物联网服务,并强调了利用CL的开放研究挑战。
{"title":"Guest Editors’ Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services","authors":"Quan Z. Sheng, A. K. Sangaiah, Ankit Chaudhary","doi":"10.1145/3591355","DOIUrl":"https://doi.org/10.1145/3591355","url":null,"abstract":"The Internet of Multimedia Things (IoMT) [4] is the combination of interfaces, protocols, and associated multimedia-related information, which enables advanced services and applications based on the human-to-device and device-to-device interactions in physical and virtual environments. The rapid growth in multimedia-on-demand traffic that refers to audio, video, and images has drastically shifted on the vision of the Internet of Things (IoT) [1, 5] from scalar to IoMT, which is an integral part of multimedia services such as real-time content delivery, online games, and video conferencing on the global Internet [3, 4]. Complementarily, Computational Linguistics (CL) [2] is an interdisciplinary research field concerned with the processing of languages by computers. Since machine translation began to emerge in the early 1970s, CL has grown and developed exponentially. Nevertheless, the combination of IoT-based multimedia with CL services has received less attention so far and has emerged as a new research paradigm for future computing applications. The future of smart IoMT devices with NLP is more important in real-time systems such as speech understanding, emotion recognition, and home automation. There are several issues and technical challenges that need attention from the research community. The rapid growth of multimedia IoT services (data abstraction, data sharing, data mining) has led the way to incorporating CL techniques to meet its requirements. This special issue presents multimedia IoT services in real-time systems and highlights the open research challenges to get advantageous use of CL.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43193173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios 一种异构复杂场景下的智能隐式实时步态认证系统
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-19 DOI: https://dl.acm.org/doi/10.1145/3594538
Li Yang, Xi Li, Zhuoru Ma, Lu Li, Neal Xiong, Jianfeng Ma

Gait authentication as a technique that can continuously provide identity recognition on mobile devices for security has been investigated by academics in the community for decades. However, most of the existing work achieves insufficient generalization to complex real-world environments due to the complexity of the noisy real-world gait data. To address this limitation, we propose an intelligent Implicit Real-time Gait Authentication (IRGA) system based on Deep Neural Networks (DNNs) for enhancing the adaptability of gait authentication in practice. In the proposed system, the gait data (whether with complex interference signals) will first be processed sequentially by the imperceptible collection module and data preprocessing module for improving data quality. In order to illustrate and verify the suitability of our proposal, we provide analysis of the impact of individual gait changes on data feature distribution. Finally, a fusion neural network composed of a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) is designed to perform feature extraction and user authentication. We evaluate the proposed IRGA system in heterogeneous complex scenarios and present start-of-the-art comparisons on three datasets. Extensive experiments demonstrate that the IRGA system achieves improved performance simultaneously in several different metrics.

步态认证作为一种能够在移动设备上持续提供身份识别的安全技术,已经被学界研究了几十年。然而,由于真实世界步态数据的复杂性,现有的大多数工作对复杂的真实环境泛化不足。为了解决这一问题,我们提出了一种基于深度神经网络(dnn)的智能隐式实时步态认证(IRGA)系统,以增强步态认证在实践中的适应性。在该系统中,无论步态数据是否具有复杂的干扰信号,首先由不可察觉采集模块和数据预处理模块对步态数据进行顺序处理,以提高数据质量。为了说明和验证我们的建议的适用性,我们提供了个体步态变化对数据特征分布的影响分析。最后,设计了一个由卷积神经网络(CNN)和长短期记忆(LSTM)组成的融合神经网络来进行特征提取和用户认证。我们在异构复杂场景中评估了所提出的IRGA系统,并在三个数据集上进行了初步的比较。大量的实验表明,IRGA系统在几个不同的指标上同时取得了更好的性能。
{"title":"IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios","authors":"Li Yang, Xi Li, Zhuoru Ma, Lu Li, Neal Xiong, Jianfeng Ma","doi":"https://dl.acm.org/doi/10.1145/3594538","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3594538","url":null,"abstract":"<p>Gait authentication as a technique that can continuously provide identity recognition on mobile devices for security has been investigated by academics in the community for decades. However, most of the existing work achieves insufficient generalization to complex real-world environments due to the complexity of the noisy real-world gait data. To address this limitation, we propose an intelligent Implicit Real-time Gait Authentication (IRGA) system based on Deep Neural Networks (DNNs) for enhancing the adaptability of gait authentication in practice. In the proposed system, the gait data (whether with complex interference signals) will first be processed sequentially by the imperceptible collection module and data preprocessing module for improving data quality. In order to illustrate and verify the suitability of our proposal, we provide analysis of the impact of individual gait changes on data feature distribution. Finally, a fusion neural network composed of a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) is designed to perform feature extraction and user authentication. We evaluate the proposed IRGA system in heterogeneous complex scenarios and present start-of-the-art comparisons on three datasets. Extensive experiments demonstrate that the IRGA system achieves improved performance simultaneously in several different metrics.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric Networking 利用混合信息中心网络保护可扩展的实时多方通信
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-19 DOI: https://dl.acm.org/doi/10.1145/3593585
Luca Muscariello, Michele Papalini, Olivier Roques, Mauro Sardara, Arthur Tran Van

In this article, we consider security aspects of online meeting applications based on protocols such as WebRTC that leverage the Information-centric Networking (ICN) architecture to make the system fundamentally more scalable. If the scalability properties provided by ICN have been proved in recent literature, the security challenges and implications for real-time applications have not been reviewed. We show that this class of applications can benefit from strong security and scalability jointly without any major tradeoff and with significant performance improvements over traditional WebRTC systems. To achieve this goal, some modifications to the current ICN architecture must be implemented in the way integrity and authentication are verified. Extensive performance analysis of the architecture based on the open source implementation of Hybrid-ICN proves that real-time applications can greatly benefit from this novel network architecture in terms of strong security and scalable communications.

在本文中,我们考虑基于WebRTC等协议的在线会议应用程序的安全方面,这些协议利用信息中心网络(Information-centric Networking, ICN)架构使系统从根本上更具可伸缩性。如果ICN提供的可扩展性属性已经在最近的文献中得到证明,则尚未审查实时应用程序的安全挑战和影响。我们表明,这类应用程序可以从强大的安全性和可扩展性中获益,而无需任何重大权衡,并且比传统的WebRTC系统具有显著的性能改进。为了实现这一目标,必须在验证完整性和身份验证的方式上对当前ICN体系结构进行一些修改。基于Hybrid-ICN开源实现的架构的广泛性能分析证明,实时应用程序可以从这种新颖的网络架构中获得强大的安全性和可扩展的通信。
{"title":"Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric Networking","authors":"Luca Muscariello, Michele Papalini, Olivier Roques, Mauro Sardara, Arthur Tran Van","doi":"https://dl.acm.org/doi/10.1145/3593585","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3593585","url":null,"abstract":"<p>In this article, we consider security aspects of online meeting applications based on protocols such as WebRTC that leverage the Information-centric Networking (ICN) architecture to make the system fundamentally more scalable. If the scalability properties provided by ICN have been proved in recent literature, the security challenges and implications for real-time applications have not been reviewed. We show that this class of applications can benefit from strong security and scalability jointly without any major tradeoff and with significant performance improvements over traditional WebRTC systems. To achieve this goal, some modifications to the current ICN architecture must be implemented in the way integrity and authentication are verified. Extensive performance analysis of the architecture based on the open source implementation of Hybrid-ICN proves that real-time applications can greatly benefit from this novel network architecture in terms of strong security and scalable communications.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taming Internet of Things Application Development with the IoTvar Middleware 用IoTvar中间件驯服物联网应用程序开发
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-19 DOI: https://dl.acm.org/doi/10.1145/3586010
Pedro Victor Borges, Chantal Taconet, Sophie Chabridon, Denis Conan, Everton Cavalcante, Thais Batista

In the last years, Internet of Things (IoT) platforms have been designed to provide IoT applications with various services such as device discovery, context management, and data filtering. The lack of standardization has led each IoT platform to propose its own abstractions, APIs, and data models. As a consequence, programming interactions between an IoT consuming application and an IoT platform is time-consuming, is error prone, and depends on the developers’ level of knowledge about the IoT platform. To address these issues, this article introduces IoTvar, a middleware library deployed on the IoT consumer application that manages all its interactions with IoT platforms. IoTvar relies on declaring variables automatically mapped to sensors whose values are transparently updated with sensor observations through proxies on the client side. This article presents the IoTvar architecture and shows how it has been integrated into the FIWARE, OM2M, and muDEBS platforms. We also report the results of experiments performed to evaluate IoTvar, showing that it reduces the effort required to declare and manage IoT variables and has no considerable impact on CPU, memory, and energy consumption.

在过去的几年里,物联网(IoT)平台被设计为为物联网应用提供各种服务,如设备发现、上下文管理和数据过滤。由于缺乏标准化,每个物联网平台都提出了自己的抽象、api和数据模型。因此,在物联网消费应用程序和物联网平台之间编程交互是耗时的,容易出错,并且取决于开发人员对物联网平台的知识水平。为了解决这些问题,本文介绍了IoTvar,这是一个部署在IoT消费者应用程序上的中间件库,用于管理其与IoT平台的所有交互。IoTvar依赖于声明自动映射到传感器的变量,这些变量的值通过客户端的代理透明地更新传感器观察值。本文介绍了IoTvar体系结构,并展示了如何将其集成到FIWARE、OM2M和muDEBS平台中。我们还报告了评估IoTvar的实验结果,表明它减少了声明和管理物联网变量所需的工作量,并且对CPU,内存和能耗没有相当大的影响。
{"title":"Taming Internet of Things Application Development with the IoTvar Middleware","authors":"Pedro Victor Borges, Chantal Taconet, Sophie Chabridon, Denis Conan, Everton Cavalcante, Thais Batista","doi":"https://dl.acm.org/doi/10.1145/3586010","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3586010","url":null,"abstract":"<p>In the last years, Internet of Things (IoT) platforms have been designed to provide IoT applications with various services such as device discovery, context management, and data filtering. The lack of standardization has led each IoT platform to propose its own abstractions, APIs, and data models. As a consequence, programming interactions between an IoT consuming application and an IoT platform is time-consuming, is error prone, and depends on the developers’ level of knowledge about the IoT platform. To address these issues, this article introduces <i>IoTvar</i>, a middleware library deployed on the IoT consumer application that manages all its interactions with IoT platforms. IoTvar relies on declaring variables automatically mapped to sensors whose values are transparently updated with sensor observations through proxies on the client side. This article presents the IoTvar architecture and shows how it has been integrated into the FIWARE, OM2M, and <span>muDEBS</span> platforms. We also report the results of experiments performed to evaluate IoTvar, showing that it reduces the effort required to declare and manage IoT variables and has no considerable impact on CPU, memory, and energy consumption.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts 基于细粒度上下文的动态个性化POI序列推荐
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-19 DOI: https://dl.acm.org/doi/10.1145/3583687
Jing Chen, Wenjun Jiang, Jie Wu, Kenli Li, Keqin Li

The Point Of Interest (POI) sequence recommendation is the key task in itinerary and travel route planning. Existing works usually consider the temporal and spatial factors in travel planning. However, the external environment, such as the weather, is usually overlooked. In fact, the weather is an important factor because it can affect a user’s check-in behaviors. Furthermore, most of the existing research is based on a static environment for POI sequence recommendation. While the external environment (e.g., the weather) may change during travel, it is difficult for existing works to adjust the POI sequence in time. What’s more, people usually prefer the attractive routes when traveling. To address these issues, we first conduct comprehensive data analysis on two real-world check-in datasets to study the effects of weather and time, as well as the features of the POI sequence. Based on this, we propose a model of Dynamic Personalized POI Sequence Recommendation with fine-grained contexts (DPSR for short). It extracts user interest and POI popularity with fine-grained contexts and captures the attractiveness of the POI sequence. Next, we apply the Monte Carlo Tree Search model (MCTS for short) to simulate the process of recommending POI sequence in the dynamic environment, i.e., the weather and time change after visiting a POI. What’s more, we consider different speeds to reflect the fact that people may take different transportation to transfer between POIs. To validate the efficacy of DPSR, we conduct extensive experiments. The results show that our model can improve the accuracy of the recommendation significantly. Furthermore, it can better meet user preferences and enhance experiences.

兴趣点(POI)顺序推荐是行程和旅行路线规划中的关键任务。现有的工作通常在旅行规划中考虑时间和空间因素。然而,外部环境,如天气,通常被忽视。事实上,天气是一个重要因素,因为它会影响用户的签到行为。此外,现有的研究大多是基于静态环境的POI序列推荐。在旅行过程中,外部环境(如天气)可能会发生变化,现有作品很难及时调整POI顺序。更重要的是,人们在旅行时通常更喜欢有吸引力的路线。为了解决这些问题,我们首先对两个现实世界的登记数据集进行了全面的数据分析,以研究天气和时间的影响,以及POI序列的特征。在此基础上,提出了一种基于细粒度上下文的动态个性化POI序列推荐模型(DPSR)。它通过细粒度上下文提取用户兴趣和POI流行程度,并捕获POI序列的吸引力。接下来,我们应用蒙特卡罗树搜索模型(简称MCTS)来模拟在动态环境下(即访问POI后的天气和时间变化)推荐POI序列的过程。此外,我们考虑了不同的速度,以反映人们在poi之间可能采取不同的交通方式。为了验证DPSR的有效性,我们进行了大量的实验。结果表明,该模型可以显著提高推荐的准确率。此外,它可以更好地满足用户的偏好,增强体验。
{"title":"Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts","authors":"Jing Chen, Wenjun Jiang, Jie Wu, Kenli Li, Keqin Li","doi":"https://dl.acm.org/doi/10.1145/3583687","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3583687","url":null,"abstract":"<p>The Point Of Interest (POI) sequence recommendation is the key task in itinerary and travel route planning. Existing works usually consider the temporal and spatial factors in travel planning. However, the external environment, such as the weather, is usually overlooked. In fact, the weather is an important factor because it can affect a user’s check-in behaviors. Furthermore, most of the existing research is based on a static environment for POI sequence recommendation. While the external environment (e.g., the weather) may change during travel, it is difficult for existing works to adjust the POI sequence in time. What’s more, people usually prefer the attractive routes when traveling. To address these issues, we first conduct comprehensive data analysis on two real-world check-in datasets to study the effects of weather and time, as well as the features of the POI sequence. Based on this, we propose a model of Dynamic Personalized POI Sequence Recommendation with fine-grained contexts (<i>DPSR</i> for short). It extracts user interest and POI popularity with fine-grained contexts and captures the attractiveness of the POI sequence. Next, we apply the Monte Carlo Tree Search model (MCTS for short) to simulate the process of recommending POI sequence in the dynamic environment, i.e., the weather and time change after visiting a POI. What’s more, we consider different speeds to reflect the fact that people may take different transportation to transfer between POIs. To validate the efficacy of <i>DPSR</i>, we conduct extensive experiments. The results show that our model can improve the accuracy of the recommendation significantly. Furthermore, it can better meet user preferences and enhance experiences.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process 支持大规模语言共识过程的个性化个体语义学习
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-19 DOI: https://dl.acm.org/doi/10.1145/3533432
Yucheng Dong, Qin Ran, Xiangrui Chao, Congcong Li, Shui Yu

When making decisions, individuals often express their preferences linguistically. The computing with words methodology is a key basis for supporting linguistic decision making, and the words in that methodology may mean different things to different individuals. Thus, in this article, we propose a continual personalized individual semantics learning model to support a consensus-reaching process in large-scale linguistic group decision making. Specifically, we first derive personalized numerical scales from the data of linguistic preference relations. We then perform a clustering ensemble method to divide large-scale group and conduct consensus management. Finally, we present a case study of intelligent route optimization in shared mobility to illustrate the usability of our proposed model. We also demonstrate its effectiveness and feasibility through a comparative analysis.

在做决定时,人们经常用语言来表达他们的偏好。单词计算方法是支持语言决策的关键基础,该方法中的单词对不同的人可能意味着不同的东西。因此,在本文中,我们提出了一个持续个性化的个体语义学习模型,以支持大规模语言群体决策中的共识达成过程。具体而言,我们首先从语言偏好关系的数据中推导出个性化的数值尺度。然后,我们采用聚类集成方法对大规模群体进行划分并进行共识管理。最后,我们给出了一个共享交通智能路径优化的案例研究,以说明我们提出的模型的可用性。通过对比分析,论证了该方法的有效性和可行性。
{"title":"Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process","authors":"Yucheng Dong, Qin Ran, Xiangrui Chao, Congcong Li, Shui Yu","doi":"https://dl.acm.org/doi/10.1145/3533432","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3533432","url":null,"abstract":"<p>When making decisions, individuals often express their preferences linguistically. The computing with words methodology is a key basis for supporting linguistic decision making, and the words in that methodology may mean different things to different individuals. Thus, in this article, we propose a continual personalized individual semantics learning model to support a consensus-reaching process in large-scale linguistic group decision making. Specifically, we first derive personalized numerical scales from the data of linguistic preference relations. We then perform a clustering ensemble method to divide large-scale group and conduct consensus management. Finally, we present a case study of intelligent route optimization in shared mobility to illustrate the usability of our proposed model. We also demonstrate its effectiveness and feasibility through a comparative analysis.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concept Drift in Software Defect Prediction: A Method for Detecting and Handling the Drift 软件缺陷预测中的概念漂移:一种检测和处理漂移的方法
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-19 DOI: https://dl.acm.org/doi/10.1145/3589342
Arvind Kumar Gangwar, Sandeep Kumar

Software Defect Prediction (SDP) is crucial towards software quality assurance in software engineering. SDP analyzes the software metrics data for timely prediction of defect prone software modules. Prediction process is automated by constructing defect prediction classification models using machine learning techniques. These models are trained using metrics data from historical projects of similar types. Based on the learned experience, models are used to predict defect prone modules in currently tested software. These models perform well if the concept is stationary in a dynamic software development environment. But their performance degrades unexpectedly in the presence of change in concept (Concept Drift). Therefore, concept drift (CD) detection is an important activity for improving the overall accuracy of the prediction model. Previous studies on SDP have shown that CD may occur in software defect data and the used defect prediction model may require to be updated to deal with CD. This phenomenon of handling the CD is known as CD adaptation. It is observed that still efforts need to be done in this direction in the SDP domain. In this article, we have proposed a pair of paired learners (PoPL) approach for handling CD in SDP. We combined the drift detection capabilities of two independent paired learners and used the paired learner (PL) with the best performance in recent time for next prediction. We experimented on various publicly available software defect datasets garnered from public data repositories. Experimentation results showed that our proposed approach performed better than the existing similar works and the base PL model based on various performance measures.

在软件工程中,软件缺陷预测是保证软件质量的关键。SDP分析软件度量数据,以便及时预测容易出现缺陷的软件模块。利用机器学习技术构建缺陷预测分类模型,实现了预测过程的自动化。这些模型使用来自类似类型的历史项目的度量数据进行训练。基于所学的经验,模型被用来预测当前测试软件中容易出现缺陷的模块。如果概念在动态软件开发环境中是固定的,那么这些模型表现良好。但当概念发生变化时,它们的性能会意外下降(概念漂移)。因此,概念漂移(CD)检测是提高预测模型整体精度的重要活动。以往关于SDP的研究表明,软件缺陷数据中可能出现CD,所使用的缺陷预测模型可能需要更新来处理CD。这种处理CD的现象被称为CD适应。可以观察到,在SDP领域,仍需要在这个方向上作出努力。在本文中,我们提出了一对配对学习器(PoPL)方法来处理SDP中的CD。我们结合了两个独立的配对学习器的漂移检测能力,并使用最近表现最好的配对学习器(PL)进行下一次预测。我们对从公共数据存储库中收集的各种公开可用的软件缺陷数据集进行了实验。实验结果表明,我们提出的方法比现有的类似工作和基于各种性能指标的基本PL模型表现得更好。
{"title":"Concept Drift in Software Defect Prediction: A Method for Detecting and Handling the Drift","authors":"Arvind Kumar Gangwar, Sandeep Kumar","doi":"https://dl.acm.org/doi/10.1145/3589342","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3589342","url":null,"abstract":"<p>Software Defect Prediction (SDP) is crucial towards software quality assurance in software engineering. SDP analyzes the software metrics data for timely prediction of defect prone software modules. Prediction process is automated by constructing defect prediction classification models using machine learning techniques. These models are trained using metrics data from historical projects of similar types. Based on the learned experience, models are used to predict defect prone modules in currently tested software. These models perform well if the concept is stationary in a dynamic software development environment. But their performance degrades unexpectedly in the presence of change in concept (Concept Drift). Therefore, concept drift (CD) detection is an important activity for improving the overall accuracy of the prediction model. Previous studies on SDP have shown that CD may occur in software defect data and the used defect prediction model may require to be updated to deal with CD. This phenomenon of handling the CD is known as CD adaptation. It is observed that still efforts need to be done in this direction in the SDP domain. In this article, we have proposed a pair of paired learners (PoPL) approach for handling CD in SDP. We combined the drift detection capabilities of two independent paired learners and used the paired learner (PL) with the best performance in recent time for next prediction. We experimented on various publicly available software defect datasets garnered from public data repositories. Experimentation results showed that our proposed approach performed better than the existing similar works and the base PL model based on various performance measures.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment NLoS声环境下智能手机高稳定融合定位系统
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-19 DOI: https://dl.acm.org/doi/10.1145/3589765
Hucheng Wang, Zhi Wang, Lei Zhang, Xiaonan Luo, Xinheng Wang

Fusion positioning technology requires stable and effective positioning data, but this is often challenging to achieve in complex Non-Line-of-Sight (NLoS) environments. This paper proposes a fusion positioning method that can achieve stable and no hop points by adjusting parameters and predicting trends, even with a one-sided lack of fusion data. The method combines acoustic signal and Inertial Measurement Unit (IMU) data, exploiting their respective advantages. The fusion is achieved using the Kalman filter and Bayesian parameter estimation is performed for tuning IMU parameters and predicting motion trends. The proposed method overcomes the problem of fusion failure caused by long-term unilateral data loss in traditional fusion positioning. The positioning trajectory and error distribution analysis show that the proposed method performs optimally in severe NLoS experiments.

融合定位技术需要稳定有效的定位数据,但在复杂的非视距(NLoS)环境中实现这一目标往往具有挑战性。本文提出了一种融合定位方法,在片面缺乏融合数据的情况下,通过调整参数和预测趋势,实现稳定无跳点的融合定位。该方法将声信号和惯性测量单元(IMU)数据相结合,发挥各自的优势。利用卡尔曼滤波实现融合,并利用贝叶斯参数估计对IMU参数进行调整和运动趋势预测。该方法克服了传统融合定位中由于长期单侧数据丢失而导致融合失效的问题。通过对定位轨迹和误差分布的分析,表明该方法在严重NLoS实验中具有最佳的定位效果。
{"title":"A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment","authors":"Hucheng Wang, Zhi Wang, Lei Zhang, Xiaonan Luo, Xinheng Wang","doi":"https://dl.acm.org/doi/10.1145/3589765","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3589765","url":null,"abstract":"<p>Fusion positioning technology requires stable and effective positioning data, but this is often challenging to achieve in complex <b>Non-Line-of-Sight (NLoS)</b> environments. This paper proposes a fusion positioning method that can achieve stable and no hop points by adjusting parameters and predicting trends, even with a one-sided lack of fusion data. The method combines acoustic signal and <b>Inertial Measurement Unit (IMU)</b> data, exploiting their respective advantages. The fusion is achieved using the Kalman filter and Bayesian parameter estimation is performed for tuning IMU parameters and predicting motion trends. The proposed method overcomes the problem of fusion failure caused by long-term unilateral data loss in traditional fusion positioning. The positioning trajectory and error distribution analysis show that the proposed method performs optimally in severe NLoS experiments.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1