{"title":"Guidelines for cybersecurity visualization design","authors":"Younho Seong, J. Nuamah, Sun Yi","doi":"10.1145/3410566.3410606","DOIUrl":"https://doi.org/10.1145/3410566.3410606","url":null,"abstract":"Cyber security visualization designers can benefit from human factors engineering concepts and principles to resolve key human factors challenges in visual interface design. We survey human factors concepts and principles that have been applied in the past decade of human factors research. We highlight these concepts and relate them to cybersecurity visualization design. We provide guidelines to help cybersecurity visualization designers address some human factors challenges in the context of interface design. We use ecological interface design approach to present human factors-based principles of interface design for visualization. Cyber security visualization designers will benefit from human factors engineering concepts and principles to resolve key human factors challenges in visual interface design.","PeriodicalId":137708,"journal":{"name":"Proceedings of the 24th Symposium on International Database Engineering & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129401496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Maamar, E. Kajan, Ikbel Guidara, Leyla Moctar-M'Baba, M. Sellami
{"title":"Bridging the gap between business processes and IoT","authors":"Z. Maamar, E. Kajan, Ikbel Guidara, Leyla Moctar-M'Baba, M. Sellami","doi":"10.1145/3410566.3410605","DOIUrl":"https://doi.org/10.1145/3410566.3410605","url":null,"abstract":"This paper discusses a novel way of making business processes and Internet of Things (IoT) work together. Indeed each \"suffers\" from many limitations that the other could help address them and vice versa. On the one hand, business processes are known for capturing organizations' best practices when satisfying users' demands but do not have the capabilities of controlling the physical surrounding that comprises millions of devices/things. On the other hand, IoT is known for provisioning contextualized services to users thanks to millions of devices/things but does not have the capabilities of making these devices/things collaborate. The paper presents a framework to support the collaboration of business processes and IoT. This collaboration is exemplified with 2 types of processes referred as thing-aware processes (TaP) and process-of-things (PoT). A system illustrating the development of PoT is presented in the paper as well.","PeriodicalId":137708,"journal":{"name":"Proceedings of the 24th Symposium on International Database Engineering & Applications","volume":"52 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131324586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HYRAQ","authors":"M. Mouna, Ladjel Bellatreche, Narhimène Boustia","doi":"10.1145/3410566.3410582","DOIUrl":"https://doi.org/10.1145/3410566.3410582","url":null,"abstract":"In critical situations, making quick and precise decisions requires a rapid execution of a large amount of concurrent navigational and exploratory queries over collected data stored in repositories such as data warehouses. To satisfy the decision-maker's requirement, a deep understanding of the properties of these queries is necessary. In addition to their large-scale, they are ad-hoc, dynamic and highly interacted. By a quick analysis of these properties, we figure out that the first three are factual whereas the last one is behavioral. The literature has widely reported that the interaction of analytical queries has a crucial impact on selecting optimization structures (e.g., materialized views) in data storage systems. By keeping these four properties in mind, it becomes a necessity to find scalable and efficient data structures to simultaneously model them for better optimization of large-scale queries. In this paper, we first show the crucial role of the interaction phenomenon in optimizing concurrent data and mining queries by identifying its limited capacity in considering all factual properties. Secondly, we propose a dynamic hypergraph as a data structure to manage the four above properties and we show its great contribution in selecting materialized views. Finally, intensive experiments are conducted to evaluate the efficiency of our proposal and its connectivity with a commercial DBMS.","PeriodicalId":137708,"journal":{"name":"Proceedings of the 24th Symposium on International Database Engineering & Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116502162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hela Zorgati, Raoudha Ben Djemaa, Ikram Amous, F. Sèdes
{"title":"QoC enhanced semantic IoT model","authors":"Hela Zorgati, Raoudha Ben Djemaa, Ikram Amous, F. Sèdes","doi":"10.1145/3410566.3410610","DOIUrl":"https://doi.org/10.1145/3410566.3410610","url":null,"abstract":"The miniaturization of computers, coupled with a constant increase in computing power, led to the emergence of new sources of context information. We are facing a new paradigm, the Internet of Things (IoT). Today, this latter improves the quality of life in multiple areas. However, the heterogeneity of objects used in such environments makes their interoperability difficult. In addition, the observations produced by context providers (connected objects) are generated with different vocabularies and data formats. This heterogeneity of technologies in the IoT world makes it necessary to adopt generic solutions. Therefore, it is important to transform the raw data from these context producers into knowledge and information based on ontologies. The use of ontologies solves the challenges of heterogeneity and interoperability of IoT systems. In this paper, we propose a semantic IoT model that aims to overcome the semantic interoperability challenges introduced by the variety of objects potentially used in IoT systems. Furthermore, we enhanced this ontology with quality of context meta-data. These meta-data helps in dealing with imperfection and inconsistency of the collected IoT data.","PeriodicalId":137708,"journal":{"name":"Proceedings of the 24th Symposium on International Database Engineering & Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121636098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Calautti, Luciano Caroprese, S. Greco, Cristian Molinaro, I. Trubitsyna, E. Zumpano
{"title":"Consistent query answering with prioritized active integrity constraints","authors":"M. Calautti, Luciano Caroprese, S. Greco, Cristian Molinaro, I. Trubitsyna, E. Zumpano","doi":"10.1145/3410566.3410592","DOIUrl":"https://doi.org/10.1145/3410566.3410592","url":null,"abstract":"Consistent query answering is a principled approach for querying inconsistent databases. It relies on two basic notions: the notion of a repair, that is, a consistent database that \"minimally\" differs from the original one, and the notion of a consistent query answer, that is, a query answer that can be derived from every repair. In general, an inconsistent database can admit multiple repairs, each corresponding to a different way of restoring consistency, and the consistent query answering framework does not make any discrimination among them. However, in many applications it is natural and desired to express preferences among the different choices that can be made to resolve inconsistency. In this paper, we consider the framework of Prioritized Active Integrity Constraints (PAICs), a declarative and powerful form of active rules which enable users to express a wide range of integrity constraints along with preferences on how consistency should be restored. PAICs induce preferences among repairs, so that a set of \"preferred\" ones can be identified. Then, \"preferred\" query answers are naturally defined as query answers derived from preferred repairs only. We show how preferred repairs can be obtained from the preferred stable models of a prioritized logic program derived from a given a set of PAICs. Furthermore, we study the restricted class of Prioritized Active Functional Dependencies (PAFDs), which admits a unique preferred repair and for which query answering can be accomplished in polynomial time.","PeriodicalId":137708,"journal":{"name":"Proceedings of the 24th Symposium on International Database Engineering & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126272950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Vocaturo, E. Zumpano, G. Giallombardo, G. Miglionico
{"title":"DC-SMIL: a multiple instance learning solution via spherical separation for automated detection of displastyc nevi","authors":"E. Vocaturo, E. Zumpano, G. Giallombardo, G. Miglionico","doi":"10.1145/3410566.3410611","DOIUrl":"https://doi.org/10.1145/3410566.3410611","url":null,"abstract":"Among skin cancers, melanoma is the most aggressive and most lethal form. Despite these terrible premises, an excision treatment carried out thanks to an early diagnosis is almost always decisive, guaranteeing the patient's survival. The early detection of melanoma is hampered by the extreme similarity of melanoma with other skin lesions such as dysplastic nevi. The current research is aimed at defining software solutions that support the computerized diagnosis of lesions for the detection of melanoma. To date, the proposals, both in terms of algorithms and frameworks, have focused on the dichotomous distinction of melanoma from benign lesions. However, the current debate on Dysplastic Nevi Syndrome (DNS), makes issues relating to the nature of the lesions, central to subjects who present a large number of moles throughout the body. In fact, individuals with DNS have a greater chance of being attacked by melanoma. The classification task relating to the distinction of dysplastic nevi from common ones is totally unexplored. In this document, we consider the difficult task of applying multiple-instance learning (MIL) approaches to discriminate melanoma from dysplastic nevi and outline an even more complex challenge related to the classification of dysplastic nevi from common ones. In particular, we introduce the application of a MIL approach that uses spherical separation surfaces. Since the results seem promising, we conclude that a MIL technique could be the basis of more sophisticated tools useful for detecting skin lesions.","PeriodicalId":137708,"journal":{"name":"Proceedings of the 24th Symposium on International Database Engineering & Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127072132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local connectivity in centroid clustering","authors":"D. P.","doi":"10.1145/3410566.3410601","DOIUrl":"https://doi.org/10.1145/3410566.3410601","url":null,"abstract":"Clustering is a fundamental task in unsupervised learning, one that targets to group a dataset into clusters of similar objects. There has been recent interest in embedding normative considerations around fairness within clustering formulations. In this paper, we propose 'local connectivity' as a crucial factor in assessing membership desert in centroid clustering. We use local connectivity to refer to the support offered by the local neighborhood of an object towards supporting its membership to the cluster in question. We motivate the need to consider local connectivity of objects in cluster assignment, and provide ways to quantify local connectivity in a given clustering. We then exploit concepts from density-based clustering and devise LOFKM, a clustering method that seeks to deepen local connectivity in clustering outputs, while staying within the framework of centroid clustering. Through an empirical evaluation over real-world datasets, we illustrate that LOFKM achieves notable improvements in local connectivity at reasonable costs to clustering quality, illustrating the effectiveness of the method.","PeriodicalId":137708,"journal":{"name":"Proceedings of the 24th Symposium on International Database Engineering & Applications","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131770364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emotion cognizance improves health fake news identification","authors":"Anoop Kadan, Deepak P, L. LajishV.","doi":"10.1145/3410566.3410595","DOIUrl":"https://doi.org/10.1145/3410566.3410595","url":null,"abstract":"Identifying fake news is increasingly being recognized as an important computational task with high potential social impact. Misinformation is routinely injected into almost every domain of news including politics, health, science, business, etc., among which, the fake news in the health domain poses serious risk and harm to health and well-being in modern societies. In this paper, we consider the utility of the affective character of news articles for fake news identification in the health domain and present evidence that emotion cognizant representations are significantly more suited for the task. We outline a simple technique that works by leveraging emotion intensity lexicons to develop emotion-amplified text representations and evaluate the utility of such a representation for identifying fake news relating to health in various supervised and unsupervised scenarios. The consistent and notable empirical gains that we observe over a range of technique types and parameter settings establish the utility of the emotional information in news articles, an often overlooked aspect, for the task of misinformation identification in the health domain.","PeriodicalId":137708,"journal":{"name":"Proceedings of the 24th Symposium on International Database Engineering & Applications","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125695104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}