Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)最新文献

筛选
英文 中文
Reducing search space for Web Service ranking using semantic logs and Semantic FP-Tree based association rule mining 使用语义日志和基于语义fp树的关联规则挖掘减少Web服务排名的搜索空间
M. O. Shafiq, R. Alhajj, J. Rokne
{"title":"Reducing search space for Web Service ranking using semantic logs and Semantic FP-Tree based association rule mining","authors":"M. O. Shafiq, R. Alhajj, J. Rokne","doi":"10.1109/ICOSC.2015.7050771","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050771","url":null,"abstract":"Ranking and Adaptation (used interchangeably) is often carried out using functional and non-functional information of Web Services. Such approaches are dependent on heavy and rich semantic descriptions as well as unstructured and scattered information about any past interactions between clients and Web Services. Existing approaches are either found to be focusing on semantic modeling and representation only, or using data mining and machine learning based approaches on unstructured and raw data to perform discovery and ranking. We propose a novel approach to allow semantically empowered representation of logs during Web Service execution and then use such logs to perform ranking and adaptation of discovered Web Services. We have found that combining both approaches together into a hybrid approach would enable formal representation of Web Services data which would boost data mining as well as machine learning based solutions to process such data. We have built Semantic FP-Trees based technique to perform association rule learning on functional and non-functional characteristics of Web Services. The process of automated execution of Web Services is improved in two steps, i.e., (1) we provide semantically formalized logs that maintain well-structured and formalized information about past interactions of Services Consumers and Web Services, (2) we perform an extended association rule mining on semantically formalized logs to find out any possible correlations that can used to pre-filter Web Services and reduce search space during the process of automated ranking and adaptation of Web Services. We have conducted comprehensive evaluation to demonstrate the efficiency, effectiveness and usability of our proposed approach.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114796438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Semantic analysis of dialogs to detect social engineering attacks 对对话进行语义分析,以检测社会工程攻击
Ram Bhakta, I. Harris
{"title":"Semantic analysis of dialogs to detect social engineering attacks","authors":"Ram Bhakta, I. Harris","doi":"10.1109/ICOSC.2015.7050843","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050843","url":null,"abstract":"Cyberattackers often attack the weakest point of system, which is increasingly the people who use and interact with a computer-based system. A great deal of research has been dedicated to protection of computer-based assets, but by exploiting human vulnerabilities, an attacker can circumvent many computer-based defenses. Phishing emails are a common form of social engineering attack, but the most effective attacks involve dialog between the attacker and the target. A robust approach to detecting a social engineering attack must be broadly applicable to a range of different attack vectors. We present an approach to detecting a social engineering attack which uses a pre-defined Topic Blacklist (TBL) to verify the discussion topics of each line of text generated by the potential attacker. If a line of text from the attacker involves a topic in the blacklist, an attack is detected and a warning message is generated. Our approach is generally applicable to any attack vector since it relies only on the dialog text. Our approach is robust in the presence of the incorrect grammar often used in casual English dialog. We have applied our approach to analyze the transcripts of several attack dialogs and we have achieved high detection accuracy and low false positive rates in our experiments.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129839697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
An approximation of betweenness centrality for Social Networks 社交网络的中间性中心性近似
D. Ostrowski
{"title":"An approximation of betweenness centrality for Social Networks","authors":"D. Ostrowski","doi":"10.1109/ICOSC.2015.7050857","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050857","url":null,"abstract":"A challenge in the research of Social Networks is the large scale analysis of graphs. One of the most valuable metrics in the evaluation of graphs is betweenness-centrality. In this paper, we define an approximation of betweenness-centrality for the purpose of building a predictive model of Social Networks. The methodology presented describes a bounded distance approximation of betweenness-centrality designed for implementation within a parallel architecture. Through our proposed design pattern, we are able to leverage Big Data technologies to determine metrics in the context of ever expanding internet-based data resources.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115537845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Advisory services for user composition tools 用户组合工具的咨询服务
Kevin Nam, Ronald Taylor Locke, S. Yenson, K. Chang, Lars H. Fiedler
{"title":"Advisory services for user composition tools","authors":"Kevin Nam, Ronald Taylor Locke, S. Yenson, K. Chang, Lars H. Fiedler","doi":"10.1109/ICOSC.2015.7050772","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050772","url":null,"abstract":"We have developed an ontology based framework that evaluates compatibility between processing modules within an end user development framework, using MIT Lincoln Laboratory's Composable Analytics environment [1] as a test case. In particular, we focus on inter-module semantic compatibility as well as compatibility between data and modules. Our framework includes a core ontology that provides an extendible vocabulary that can describe module attributes, module input and output requirements and preferences, and data characteristics that are pertinent to selecting appropriate modules in a given situation. Based on the ontological description of the modules and data, we first present a framework that takes a rule based approach in measuring semantic compatibility. Later, we extend the rule based approach to a flexible fuzzy logic based semantic compatibility evaluator. We have built an initial simulator to test module compatibility under varying situations. The simulator takes in the ontological description of the modules and data and calculates semantic compatibility. We believe the framework and simulation environment together will help both the developers test new modules they create as well as support end users in composing new capabilities. In this paper, we describe the details of the framework, the simulation environment, and our iterative process in developing the module ontology.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130287053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating formal hardware verification properties from Natural Language documentation 从自然语言文档生成正式的硬件验证属性
Christopher B. Harris, I. Harris
{"title":"Generating formal hardware verification properties from Natural Language documentation","authors":"Christopher B. Harris, I. Harris","doi":"10.1109/ICOSC.2015.7050777","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050777","url":null,"abstract":"In the modern Application Specific Integrated Circuit (ASIC) design cycle, correctness properties for functional verification are usually created by an engineer whose task is to read the system documentation and manually generate a set of formal statements in the chosen verification language. This process is typical of the reason why up to 60% of engineering effort is spent on verification and test activities. We present a formal attribute grammar as the basis for a Natural Language based translation system which automatically generates syntactically correct verification properties in Computation Tree Logic (CTL) from Hardware Description Language (HDL) code comments written in English. The system is evaluated using verification information from an implementation of the PCI bus specification included in the Texas-97 Verification Benchmark suite and successfully translates English to valid CTL in 91% of test cases. The automatically generated CTL properties are compared to CTL properties included in the benchmark and model checking is used to determine the equivalency of generated and benchmark properties. While most generated properties are equivalent, some were found to include additional terms which result in CTL which more closely reflects designer intent.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126558070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An analysis of scene change detection in HEVC bitstream HEVC码流中场景变化检测分析
Yumi Eom, Sang-il Park, Sunggeun Yoo, J. Choi, Sukhee Cho
{"title":"An analysis of scene change detection in HEVC bitstream","authors":"Yumi Eom, Sang-il Park, Sunggeun Yoo, J. Choi, Sukhee Cho","doi":"10.1109/ICOSC.2015.7050854","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050854","url":null,"abstract":"An improved method of scene change detection (SCD) is required for content-based video analysis, indexing, searching and editing. Many researchers have suggested various SCD techniques in recent years. However, it is difficult to detect a scene change in the video context with a variety of camera movements and shot transitions. Moreover, data volume becomes an issue in the influx of ultra-high definition (UHD) video with the resolution of 4K (3820×2160) or larger formats. The traditional SCD approach takes too much time to run with UHD video. In this paper four different SCD methods are suggested for UHD video which is coded with advanced codec programs. Then, the analysis of traditional SCD methods is presented. And these experimental SCD techniques for UHD video bit streams are tested with the different structures of advanced video codecs. Finally, the experiments are conducted to evaluate the performances of the techniques.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122359022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Filtering technique for high speed database sequence comparison 高速数据库序列比较的过滤技术
Talal Bonny, B. Soudan
{"title":"Filtering technique for high speed database sequence comparison","authors":"Talal Bonny, B. Soudan","doi":"10.1109/ICOSC.2015.7050781","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050781","url":null,"abstract":"Sequence comparison is one of the important database computing applications used in computer science, computational linguistics, social science, biology, etc. This kind of applications processes large database sequences and considered to be high consumers of computation time. Traditional methods apply comparing algorithms on the whole database to find the most matched sequences. We introduce novel and efficient technique to accelerate the sequence comparison by filtering the database to reduce the scope of searching. This will exclude a large number of the database sequences from the searching and will provide the results in reasonable time. Using our filtering technique, we explicitly accelerate the database sequence comparison by 50% in comparison to the traditional known methods.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128476409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using latent dirichlet allocation for topic modelling in twitter 基于潜在狄利克雷分配的twitter主题建模
D. Ostrowski
{"title":"Using latent dirichlet allocation for topic modelling in twitter","authors":"D. Ostrowski","doi":"10.1109/ICOSC.2015.7050858","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050858","url":null,"abstract":"Due to its predictive nature, Social Media has proved to be an important resource in support of the identification of trends. In Customer Relationship Management there is a need beyond trend identification which includes understanding the topics propagated through Social Networks. In this paper, we explore topic modeling by considering the techniques of Latent Dirichlet Allocation which is a generative probabilistic model for a collection of discrete data. We evaluate this technique from the perspective of classification as well as identification of noteworthy topics as it is applied to a filtered collection of Twitter messages. Experiments show that these methods are effective for the identification of sub-topics as well as to support classification within large-scale corpora.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Pedagogical potentials of IEEE 802.11 WLAN to higher educational institutions: A case study of Nigerian based University IEEE 802.11无线局域网对高等教育机构的教学潜力:以尼日利亚大学为例
I. M. Hassan, H. Khan, Rami Zeitun, Ghassan H. Mardini
{"title":"Pedagogical potentials of IEEE 802.11 WLAN to higher educational institutions: A case study of Nigerian based University","authors":"I. M. Hassan, H. Khan, Rami Zeitun, Ghassan H. Mardini","doi":"10.1109/ICOSC.2015.7050799","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050799","url":null,"abstract":"The research on `Pedagogical potentials of IEEE 802.11 WLAN to Nigerian based University' is an in depth study to evaluate the potentials of its implementation to the entire teaching and tutoring vertical in Nigerian universities. While conducting this research study, the campus did not have the facility of Wireless internet service. Researchers are to provide the WLAN-Wireless local area network service to support the communication protocol limiting to shorter distances within a definite range with aid of infrared signals and radio networks. For this study, data collection is made over two periods, i.e., first, at the time of launching WLAN in order to gain an overview of the academic performance of the students and in the second instance, after providing the training to use WLAN, at the end of the semester. This study is conducted over a period equivalent to one semester. The objective of this is to identify any improvements in the performance of the students and the teaching staff after the completion of the training. The key performance indicator `Academic outcome / Performance of students and attitude of faculty' on wireless internet in the campus is captured through the study and relevant statistical tools and techniques are applied to the data. The ascent in the academic outcome of students and the performance of the faculty is evident for the benefit of WLAN technology. This paper will cover the literature review and basic model of possible relationship between depend and independent variables of the research in detail.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125871911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
T.R.A.F.F.I.C.: Transit response analysis for facilitating informed commuters T.R.A.F.F.I.C:交通响应分析,以方便知情的通勤者
Donna Thomas, Justin Lawrence, J. Rettig
{"title":"T.R.A.F.F.I.C.: Transit response analysis for facilitating informed commuters","authors":"Donna Thomas, Justin Lawrence, J. Rettig","doi":"10.1109/ICOSC.2015.7050856","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050856","url":null,"abstract":"T.R.A.F.F.I.C is an acronym representing Transit Response Analysis for Facilitating Informed Commuters. T.R.A.F.F.I.C. is a web service hosted in the cloud which uses real-time Big Data from TRANSCOM, a non-profit firm. We are mining for potential congested traffic patterns which may impair one's timely commute during rush hour. T.R.A.F.F.I.C is based on the service-oriented architecture (SOA) web service technology. The project description, system design, key technical challenges, lessons learned and related works are discussed in this paper. The content in this paper not only gives a case study for SOA, but also provides a new and effective solution for end-users of Intelligent Transportation Services (ITS) solutions.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122097477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信