2017 11th International Conference on Research Challenges in Information Science (RCIS)最新文献

筛选
英文 中文
Generating data sets as inputs of reference for cyber security issues and industrial control systems 生成数据集,作为网络安全问题和工业控制系统的参考输入
Thomas Becmeur, Xavier Boudvin, David Brosset, Gaël Héno, Benjamin Costé, Y. Kermarrec, Pedro Merino Laso
{"title":"Generating data sets as inputs of reference for cyber security issues and industrial control systems","authors":"Thomas Becmeur, Xavier Boudvin, David Brosset, Gaël Héno, Benjamin Costé, Y. Kermarrec, Pedro Merino Laso","doi":"10.1109/RCIS.2017.7956582","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956582","url":null,"abstract":"In this paper, we present a platform we have designed and built in order to generate data and scenario traces that can serve as inputs and references when evaluating our algorithms for detecting cyber security intrusions. Our context is related to civilian and military ships and our research is performed within a strong partnership with industry and academy. As obtaining actual and accurate data sets are not straightforward, we have chosen do generate realistic datasets with a platform we have designed and built.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134625325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Community detection in dynamic graphs with missing edges 缺边动态图中的社团检测
Oualid Benyahia, C. Largeron, Baptiste Jeudy
{"title":"Community detection in dynamic graphs with missing edges","authors":"Oualid Benyahia, C. Largeron, Baptiste Jeudy","doi":"10.1109/RCIS.2017.7956562","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956562","url":null,"abstract":"Social networks are usually analyzed and mined without taking into account the presence of missing values. In this article, we consider dynamic networks represented by sequences of graphs that change over time and we study the robustness and the accuracy of the community detection algorithms in presence of missing edges. We assume that the network evolution can provide a complementary information allowing to neutralize the missing data. To confirm our hypothesis, we designed an experimental framework to simulate the missing data and compare the communities identified by the methods, with or without missing links. We explore two types of methods. The first ones, based on tensor decomposition, are adapted for dynamic networks. The second ones correspond to conventional community detection algorithms able to handle simple graphs. In our framework, the latter ones are adapted to dynamic graphs, either by merging the data during the preprocessing step or by merging the partitions during a post-processing step. The experimentation was conducted on synthetic and real dynamic networks for which the ground truth is available. The results confirm the best performances of the methods suited for dynamic networks when they present a complex community structure.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128829020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Visual behaviour in searching information: A preliminary eye tracking study 搜索信息中的视觉行为:一项初步的眼动追踪研究
Mohammad Alsaffar, Lyn Pemberton, K. Rodriguez-Echavarria, Mithileysh Sathiyanarayanan
{"title":"Visual behaviour in searching information: A preliminary eye tracking study","authors":"Mohammad Alsaffar, Lyn Pemberton, K. Rodriguez-Echavarria, Mithileysh Sathiyanarayanan","doi":"10.1109/RCIS.2017.7956560","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956560","url":null,"abstract":"Human Computer Interaction (HCI) is a discipline that has progressed to establish a smooth understanding between humans and computers for effective visual searchability, accessibility and usability. With a lot of advances in search engine technology, only a few studies have examined how the results are viewed from the perspective of end users from different regions. The main aim of this research is to investigate and explore whether there are cultural variations in visual search behaviour and eye movements on Search Engine Results Page (SERP) between two different cultures (Arabic and English), using the eye-tracking method in order to provide insights for global implementations of search engines. This research also aims to explore to what extent users with a different language and cultural background differ in their visual search behaviour, performance and satisfaction when they are searching SERP with different layout and tasks. As a preliminary study, a controlled eye-tracking experiment was conducted to explore and evaluate the visual search behaviour of Arabs and English when searching through the Google result Pages. The preliminary results provide new insights into the differences in visual search behaviours and eye movements between participants from the Middle East and the United Kingdom.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131153356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
LogMap+: Relational data enrichment and linked data resources matching LogMap+:关系数据丰富和链接数据资源匹配
Slavko Žitnik, M. Bajec, D. Lavbič
{"title":"LogMap+: Relational data enrichment and linked data resources matching","authors":"Slavko Žitnik, M. Bajec, D. Lavbič","doi":"10.1109/RCIS.2017.7956546","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956546","url":null,"abstract":"Relational database to ontology mapping and ontology matching techniques are mostly addressed separately, even though it is known that the real power of semantic data lies in data interconnection. The latter is especially important when designing a new ontology, which often includes at least some of the concepts that already exist in the linked open data cloud. Thus, in this paper we describe a new end-to-end tool LogMap+ for transformation of relational data into an ontology and matching it against a pre-existent semantic source. Apart from offering the efficient web-based application, the main contributions are the improvements of the domain specific LogMap system. We evaluate our general tool against OAEI 2014 challenge datasets and achieve comparable results to the top performing algorithms and also outperform the domain specific LogMap tool.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"613 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116322651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling Contextualized Flexible Cloud Workflow Services: An MDE based approach 情境化灵活云工作流服务建模:基于MDE的方法
Yosra Lassoued, S. Nurcan
{"title":"Modeling Contextualized Flexible Cloud Workflow Services: An MDE based approach","authors":"Yosra Lassoued, S. Nurcan","doi":"10.1109/RCIS.2017.7956516","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956516","url":null,"abstract":"The evolution of the economy, competition, development of new technologies and globalization explain the blooming of inter-organizations cooperation. The interorganizations cooperation represents a new opportunity to answer to complex challenges that a single organization can't face alone. Cloud Computing is an emerging computation paradigm in information technology and networking. Most recently business applications are leveraging the power of this novel technology. In this work, we are interested in the issue of Inter-organizations Cooperation in Cloud Computing environment. More precisely, this paper deals with Contextualized Flexible Cloud Workflow Services (CWS). By CWS, we mean services automating loosely coupled fragments of inter-organization business processes and whose description and execution are accessible through the Cloud. One possible way to deal with CWS modeling in a comprehensive conceptual framework is to use the Model-Driven Engineering. The basic principle of MDE is the separation of organizational concerns from their technical achievement. Therefore, business models are not corrupted by technical concerns and vice versa. Following this practice, we first propose the Cloud Workflow Service Meta-Model (CWS2M) by extending BPMN 2.0 to support the modeling of CWS. In order to deal with variability, evolution and adaptation of CWS, we also propose the Flexible Cloud Workflow Service Meta-Model (FCWS2M) as an extension of the CWS2M meta-model using the versioning technique. Finally, we propose the Contextualized Flexible Cloud Workflow Service Meta-Model (CFCWS2M) to characterize the situations in which CWS versions are executed. We illustrate our solution through the “Drug Development Process” case study.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123921553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The PDA-LPA design space for user interface adaptation 用于用户界面适配的PDA-LPA设计空间
Sara Bouzit, Gaëlle Calvary, J. Coutaz, D. Chêne, E. Petit, J. Vanderdonckt
{"title":"The PDA-LPA design space for user interface adaptation","authors":"Sara Bouzit, Gaëlle Calvary, J. Coutaz, D. Chêne, E. Petit, J. Vanderdonckt","doi":"10.1109/RCIS.2017.7956559","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956559","url":null,"abstract":"This paper presents a design space for engineering adaptive user interfaces throughout the user interface development life cycle in order to describe any adaptation technique, adaptable or adaptive, to compare two or more techniques, and to generate new, perhaps unprecedented, techniques. Grounded in the theory of psychological perception, this design space structures the adaptation life cycle into two regulation loops between the user and the system: a perception-decision-action (PDA) loop for both the system and the user, and a learning-prediction-adaptation (LPA) for supporting the adaptation, this last being particularly expressive for adaptivity. This PDA-LPA design space enables defining properties for assessing the quality of these loops between the system and the end-user. This design space of is instantiated on two advanced adaptive user interfaces: adaptive user interfaces based on machine learning and adaptive layouts. This design space provides new insights for considering adaptivity design options.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122514352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Data fidelity: Security's soft underbelly 数据保真度:安全的软肋
C. Sample, T. Watson, Steve E. Hutchinson, B. Hallaq, Jennifer Cowley, C. Maple
{"title":"Data fidelity: Security's soft underbelly","authors":"C. Sample, T. Watson, Steve E. Hutchinson, B. Hallaq, Jennifer Cowley, C. Maple","doi":"10.1109/RCIS.2017.7956552","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956552","url":null,"abstract":"The events of 2016 created a growing concern over the weaponization of information. Weaponized information is actually a symptom of a larger problem, namely, data fidelity. This group of researchers began considering the impact and issues that associate with data fidelity in cyber security. Presently, a fundamental universal assumption existing in cyber security solutions is that the entered data being secured is an accurate, faithful representation of the actual events that are occurring in the real world. This assumption of data fidelity is present in every major cyber security product. This work-in-progress paper acknowledges the data fidelity problem, by providing a model that couples the data object with the environment in an attempt to reduce the potential for weaponized information, thereby improving data fidelity.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信