Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)最新文献

筛选
英文 中文
Flexible semantic query expansion for process exploration 灵活的语义查询扩展,用于流程探索
Sven Mielke, Martin Pelke, Sebastian Pospiech, R. Mertens
{"title":"Flexible semantic query expansion for process exploration","authors":"Sven Mielke, Martin Pelke, Sebastian Pospiech, R. Mertens","doi":"10.1109/ICOSC.2015.7050847","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050847","url":null,"abstract":"Process exploration tools help to identify business processes that are not executed according to their documentation or lack such documentation at all. These process steps are executed by human beings, therefore process traces can often be found in unstructured documents. In order to reconstruct a process execution, these documents have to be retrieved. Natural language properties such as hyponyms, hypernyms, homonyms and synonyms make searching for a specific element a hard task. Integrating word relations in the search index is the standard solution for tackling this problem. In our process exploration scenario, however, this approach comes to its limits as ontologies defining word relations may vary from process step to process step. The problem is that the approach is rather inflexible. In order to change the relation of the words, the index needs to be rebuilt. This in turn would require running an analysis of the whole document base. Query Expansion, on the other hand, works by adding related words to a query, making it very flexible. In a classic search scenario, it still comes with a number of disadvantages such as retrieving unrelated documents. In our scenario, these disadvantages do not apply, since information from previous steps in the explored process can be used to constrain the result set.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129664706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Audio-based event detection in office live environments using optimized MFCC-SVM approach 使用优化的MFCC-SVM方法的基于音频的办公实时环境事件检测
Selver Ezgi Küçükbay, M. Sert
{"title":"Audio-based event detection in office live environments using optimized MFCC-SVM approach","authors":"Selver Ezgi Küçükbay, M. Sert","doi":"10.1109/ICOSC.2015.7050855","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050855","url":null,"abstract":"Audio data contains several sounds and is an important source for multimedia applications. One of them is unstructured Environmental Sounds (also referred to as audio events) that have noise-like characteristics with flat spectrums. Therefore, in general, recognition methods applied for music and speech data are not appropriate for the Environmental Sounds. In this paper, we propose an MFCC-SVM based approach that exploits the effect of feature representation and learner optimization tasks for efficient recognition of audio events from audio signals. The proposed approach considers efficient representation of MFCC features using different window and hop sizes by changing the number of Mel coefficients in the analyses as well as optimizing the SVM parameters. Moreover, 16 different audio events from the IEEE Audio and Acoustic Signal Processing (AASP) Challenge Dataset, namely alert, clear throat, cough, door slam, drawer, keyboard, keys, knock, laughter, mouse, page turn, pen drop, phone, printer, speech, and switch that are collected from office live environments are utilized in the evaluations. Our empirical evaluations show that, when the results of the proposed methods are chosen for MFFC feature and SVM classifier, the tests conducted through using 5-fold cross validation gives the results of 62%, 58% and 55% for Precision, Recall and F-measure scores, respectively. Extensive experiments on audio-based event detection using the IEEE AASP Challenge dataset show the effectiveness of the proposed approach.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Intelligent malware detection based on file relation graphs 基于文件关系图的恶意软件智能检测
Lingwei Chen, Tao Li, Melih Abdulhayoglu, Yanfang Ye
{"title":"Intelligent malware detection based on file relation graphs","authors":"Lingwei Chen, Tao Li, Melih Abdulhayoglu, Yanfang Ye","doi":"10.1109/ICOSC.2015.7050784","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050784","url":null,"abstract":"Due to its damage to Internet security, malware and its detection has caught the attention of both anti-malware industry and researchers for decades. Many research efforts have been conducted on developing intelligent malware detection systems. In these systems, resting on the analysis of file contents extracted from the file samples, like Application Programming Interface (API) calls, instruction sequences, and binary strings, data mining methods such as Naive Bayes and Support Vector Machines have been used for malware detection. However, driven by the economic benefits, both diversity and sophistication of malware have significantly increased in recent years. Therefore, anti-malware industry calls for much more novel methods which are capable to protect the users against new threats, and more difficult to evade. In this paper, other than based on file contents extracted from the file samples, we study how file relation graphs can be used for malware detection and propose a novel Belief Propagation algorithm based on the constructed graphs to detect newly unknown malware. A comprehensive experimental study on a real and large data collection from Comodo Cloud Security Center is performed to compare various malware detection approaches. Promising experimental results demonstrate that the accuracy and efficiency of our proposed method outperform other alternate data mining based detection techniques.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125711818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Urban network parcellation using graph theoretic approach 基于图论方法的城市网络划分
Goni Dubnov, S. Dubnov, Y. Kiyoki
{"title":"Urban network parcellation using graph theoretic approach","authors":"Goni Dubnov, S. Dubnov, Y. Kiyoki","doi":"10.1109/ICOSC.2015.7050841","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050841","url":null,"abstract":"This paper investigates the street-based network topology of urban spaces as represented in Geographic Information Systems (GIS) databases. We apply graph theoretical spectral methods to analysis of ways in maps. Our findings show that such methods can find natural parcellations of spaces, thus capturing the significance and semantics of a location from analysis of topological structure of the underlying map connectivity structure. Such analysis might be important for semantic search in the “5D World Map” project.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128811308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic modeling of analytic-based relationships with Direct Qualification 使用直接限定的基于分析的关系语义建模
Norman Ahmed, Jason Bryant, G. Hasseler, M. Paulini
{"title":"Semantic modeling of analytic-based relationships with Direct Qualification","authors":"Norman Ahmed, Jason Bryant, G. Hasseler, M. Paulini","doi":"10.1109/ICOSC.2015.7050845","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050845","url":null,"abstract":"Successfully modeling state and analytics-based semantic relationships of documents enhances thoroughness of representation, contextualization of importance and relevancy, posterity of provenance, and a delineation of priority for a document. These attributes are the core elements that form the machine-based knowledge representation for documents. However, modeling document relationships that can change over time can be inelegant, limited, complex or overly burdensome for semantic technologies. In this paper, we present Direct Qualification (DQ), an approach for modeling any semantically referenced document, concept, or named graph with results from associated applied analytics. The proposed approach supplements the traditional subject-object relationships by providing a third leg to the relationship; the qualification of how and why the relationship exists. To illustrate, we show a prototype of an event-based system with a realistic use case for applying DQ to relevancy analytics of PageRank and Hyperlink-Induced Topic Search (HITS).","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121395337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The cost of reasoning with RDF updates 使用RDF更新进行推理的成本
Sana Al Azwari, John N. Wilson
{"title":"The cost of reasoning with RDF updates","authors":"Sana Al Azwari, John N. Wilson","doi":"10.1109/ICOSC.2015.7050829","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050829","url":null,"abstract":"Many real world RDF collections are large compared with other real world data structures. Such large RDF collections evolve in a distributed environment. Therefore, these changes between RDF versions need to be detected and computed in order to synchronize these changes to the other users. To cope with the evolving nature of the semantic web, it is important to understand the costs and benefits of the different change detection techniques. In this paper, we experimentally provide a detailed analysis of the overall process of RDF change detection techniques namely: explicit change detection, forward-inference change detection, backward-inference change detection and backward-inference and pruning change detection. The results show that pruning is relatively expensive by comparison with inferencing.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114530682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semantic search using a similarity graph 使用相似图的语义搜索
L. Stanchev
{"title":"Semantic search using a similarity graph","authors":"L. Stanchev","doi":"10.1109/ICOSC.2015.7050785","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050785","url":null,"abstract":"Given a set of documents and an input query that is expressed in a natural language, the problem of document search is retrieving the most relevant documents. Unlike most existing systems that perform document search based on keywords matching, we propose a search method that considers the meaning of the words in the query and the document. As a result, our algorithm can return documents that have no words in common with the input query as long as the documents are relevant. For example, a document that contains the words “Ford”, “Chrysler” and “General Motors” multiple times is surely relevant for the query “car” even if the word “car” does not appear in the document. Our semantic search algorithm is based on a similarity graph that contains the degree of semantic similarity between terms, where a term can be a word or a phrase. We experimentally validate our algorithm on the Cranfield benchmark that contains 1400 documents and 225 natural language queries. The benchmark also contains the relevant documents for every query as determined by human judgment. We show that our semantic search algorithm produces a higher value for the mean average precision (MAP) score than a keywords matching algorithm. This shows that our approach can improve the quality of the result because the meaning of the words and phrases in the documents and the queries is taken into account.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Finding trendy products from pins 从别针中寻找时尚产品
Dingding Wang, M. Ogihara
{"title":"Finding trendy products from pins","authors":"Dingding Wang, M. Ogihara","doi":"10.1109/ICOSC.2015.7050844","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050844","url":null,"abstract":"Fashion is a key defining factor of popular culture, and it changes over time. Each season tons of new products emerge to the market. People who follow fashion wish to discover new and trendy products and quickly catch the most fashionable styles. Traditionally, product trends can be found in fashion magazines and product catalogs, but now the proliferation of the Internet and social networks may have made trend e-discovery possible. This paper explores a novel problem of finding product trends through the posts on Pinterest, a rising social media for sharing interests using uploaded photographs and text comments. A weighted feature subset selection (WFSS) framework is applied to simultaneously group popular products into different types and select the most representative and discriminative terms to describe each product type. We compare WFSS with co-clustering algorithms, non-negative matrix factorization, and unsupervised feature selection methods. Experimental results on a data set collected from Pinterest show the effectiveness of WFSS in both product clustering and keyword selection.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"742 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131954513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolving the User Graph: From unsupervised topic models to knowledge assisted networks 演进用户图:从无监督主题模型到知识辅助网络
S. Sathish, A. Patankar, N. Neema, Swetha Jagadeesha, Nimesh Priyodit
{"title":"Evolving the User Graph: From unsupervised topic models to knowledge assisted networks","authors":"S. Sathish, A. Patankar, N. Neema, Swetha Jagadeesha, Nimesh Priyodit","doi":"10.1109/ICOSC.2015.7050792","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050792","url":null,"abstract":"The next generation intelligent devices need to understand and evolve with the user. Towards this goal, we present a User Graph generation framework that models user's level of interest and knowledge across a set of categories. The user graph is built through an unsupervised and semi-supervised topic modeling process, using latent semantic analysis technology. The self-evolving framework utilizes in-device user data, is built and managed within a local mobile device, thereby ensuring user privacy without the need for additional network based infrastructure. We present and analyze our trial results, aimed at optimizing model accuracy and execution efficiency. In addition to native application adaptation use cases, we also present three new services: Graph Clusters, Graph Shares and Graph Nets that utilize the framework.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134370076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SemTree ontology for enriching Arabic text with lexical semantic annotations SemTree本体,用于用词法语义注释丰富阿拉伯文本
M. Al-Yahya, Mona Al-Shaman, Nehal Al-Otaiby, Wafa Al-Sultan, A. Al-Zahrani, Mesheal Al-Dalbahie
{"title":"SemTree ontology for enriching Arabic text with lexical semantic annotations","authors":"M. Al-Yahya, Mona Al-Shaman, Nehal Al-Otaiby, Wafa Al-Sultan, A. Al-Zahrani, Mesheal Al-Dalbahie","doi":"10.1109/ICOSC.2015.7050800","DOIUrl":"https://doi.org/10.1109/ICOSC.2015.7050800","url":null,"abstract":"Although the process of semantic annotation of Arabic Web content is essential for the realization of the Semantic Web, the process of semantic annotation cannot be performed without an ontology suitable for the task. In this paper, we describe the design, implementation and evaluation of the SemTree ontology for lexical semantic relations. The ontology was evaluated for usefulness using a prototype system for lexical semantic annotation of Arabic text. Results of the evaluation indicate that the ontology was fit for the purpose of semantic annotations with lexical relations. The evaluation also reveled important recommendations for designing Arabic semantic annotation tools.","PeriodicalId":126701,"journal":{"name":"Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125076714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信