{"title":"Integrating contexts in healthcare: guidelines to help the designers at design process","authors":"Janaina Cintra Abib, J. C. A. Silva","doi":"10.1145/2695664.2696018","DOIUrl":"https://doi.org/10.1145/2695664.2696018","url":null,"abstract":"In this work we present a set of guidelines to help designers during the activities of interaction design process to support user-centered approaches. The aim is to guide designers in integrating professional, personal and social contexts of the user during the construction phase of applications that are embedded in the user's workflow. These guidelines were formulated from studies conducted in a Hospital for treatment of chronic mental illness in Brazil. During these studies we observed healthcare professionals in their daily activities and with these information we developed information and communication (technology?) solutions to bring new technologies in their day-to-day while not disrupting their work routines. In the Hospital environments, where our study took place, the healthcare professionals are not familiar with technology and they do not use technologies for their work. We observed, collected and analyzed several data related to the activities of the design process and the designer's work. These analyses helped us in understanding some weak points in the design process that do not simplify the integration of the different contexts in which users are naturally inserted. With the integration of contexts, we promote the extension of user's abilities and the appropriation of technologies and applications, favoring an expanding of the user's abilities involved.","PeriodicalId":206481,"journal":{"name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126911233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pawel Matuszyk, João Vinagre, M. Spiliopoulou, A. Jorge, João Gama
{"title":"Forgetting methods for incremental matrix factorization in recommender systems","authors":"Pawel Matuszyk, João Vinagre, M. Spiliopoulou, A. Jorge, João Gama","doi":"10.1145/2695664.2695820","DOIUrl":"https://doi.org/10.1145/2695664.2695820","url":null,"abstract":"Numerous stream mining algorithms are equipped with forgetting mechanisms, such as sliding windows or fading factors, to make them adaptive to changes. In recommender systems those techniques have not been investigated thoroughly despite the very volatile nature of users' preferences that they deal with. We developed five new forgetting techniques for incremental matrix factorization in recommender systems. We show on eight datasets that our techniques improve the predictive power of recommender systems. Experiments with both explicit rating feedback and positive-only feedback confirm our findings showing that forgetting information is beneficial despite the extreme data sparsity that recommender systems struggle with. Improvement through forgetting also proves that users' preferences are subject to concept drift.","PeriodicalId":206481,"journal":{"name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127011383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cost-efficient and attack-resilient approaches for state estimation in power grids","authors":"Kaiqi Xiong, P. Ning","doi":"10.1145/2695664.2695937","DOIUrl":"https://doi.org/10.1145/2695664.2695937","url":null,"abstract":"State estimation is a fundamental question in a power grid and it is used to understand the state of power grids based on readings of sensors placed at important power grid components. Current state estimation approaches are highly vulnerable to malicious attacks; an attacker can compromise one or a few sensors to mislead state estimation and thus the power grid control algorithms, leading to catastrophic consequences (e.g., a large-scale blackout). This paper presents a series of attack-resilient state estimation algorithms for power grids. These algorithms use the intrinsic relationship among the state variables and the sensor measurements to effectively tolerate malicious sensor readings. This paper also investigates the properties of these algorithms through theoretical analysis and simulation, which both demonstrate the effectiveness of the proposed approaches.","PeriodicalId":206481,"journal":{"name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130656657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"C and OpenCL generation from MATLAB","authors":"João Bispo, Luís Reis, João MP Cardoso","doi":"10.1145/2695664.2695911","DOIUrl":"https://doi.org/10.1145/2695664.2695911","url":null,"abstract":"In many engineering and science areas, models are developed and validated using high-level programing languages and environments as is the case with MATLAB. In order to target the multicore heterogeneous architectures being used on embedded systems to provide high performance computing with acceptable energy/power envelops, developers manually migrate critical code sections to lower-level languages such as C and OpenCL, a time consuming and error prone process. Thus, automatic source-to-source approaches are highly desirable. We present an approach to compile MATLAB and output equivalent C/OpenCL code to target architectures, such as GPU based hardware accelerators. We evaluate our approach on an existing MATLAB compiler framework named MATISSE. The OpenCL generation relies on the manual insertion of directives to guide the compilation and is also capable of generating C wrapper code to interface and synchronize with the OpenCL code. We evaluated the compiler with a number of benchmarks from different domains and the results are very encouraging.","PeriodicalId":206481,"journal":{"name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124243696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolving regression trees robust to missing data","authors":"L. C. Blomberg, Rodrigo C. Barros, D. Ruiz","doi":"10.1145/2695664.2695976","DOIUrl":"https://doi.org/10.1145/2695664.2695976","url":null,"abstract":"Data quality is a major concern in several fields of knowledge that rely on data analysis. Missing data, in particular, have a strong negative impact in machine learning, potentially harming the knowledge extraction process by skewing results and affecting the predictive performance of the induced models. For dealing with the problem of missing data, the literature in machine learning offers a variety of strategies which can be either in the form of a preprocessing step or of an embedded solution within a predictive method. In this paper, we propose a novel evolutionary algorithm for regression tree induction, which has embedded in its evolutionary cycle a robust framework for dealing with missing data. For comparison purposes, we evaluate six traditional regression algorithms over 10 public regression datasets that were artificially modified to present different levels of missing data. Results from the experimental analysis show that the proposed approach is the one that is less affected by the increasing levels of missing data, presenting an interesting trade-off between model interpretability and predictive performance especially for datasets with more than 40% of missing data.","PeriodicalId":206481,"journal":{"name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120966057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bastian Braun, Korbinian Pauli, J. Posegga, Martin Johns
{"title":"LogSec: adaptive protection for the wild wild web","authors":"Bastian Braun, Korbinian Pauli, J. Posegga, Martin Johns","doi":"10.1145/2695664.2695709","DOIUrl":"https://doi.org/10.1145/2695664.2695709","url":null,"abstract":"Today, a Web browser is a user's gateway to a multitude of Web applications, each with its own balance between confidentiality and integrity versus cross-application content sharing. Modern Web browsers apply the same permissive security policy to all content regardless of its demand for security -- a behavior that enables attacks such as cross-site request forgery (CSRF) or sidejacking. To defend against such attacks, existing countermeasures enforce overly strict policies, which expose incompatibilities with real-world Web applications. As a consequence, users get annoyed by malfunctions. In this paper, we show how browser behavior can be adapted based on the user's authentication status. The browser can enforce enhanced security policies, if necessary, and permit modern communication features, if possible. Our approach mitigates CSRF, session hijacking, sidejacking, and session fixation attacks. We present the implementation as a browser extension, named LogSec, that passively detects the user's authentication status without server-side support and is transparent for the user.","PeriodicalId":206481,"journal":{"name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121429854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jonathas Leontino Medina, Maria Istela Cagnin, D. M. B. Paiva
{"title":"Evaluation of web accessibility on the maps domain","authors":"Jonathas Leontino Medina, Maria Istela Cagnin, D. M. B. Paiva","doi":"10.1145/2695664.2695771","DOIUrl":"https://doi.org/10.1145/2695664.2695771","url":null,"abstract":"This paper describes the execution of three accessibility evaluations on web-based map applications. Assessments based on expert reviews, tools and end users were performed, using the WCAG 2.0 (Web Content Accessibility Guidelines) and analyzing its Level A success criteria. To define and set measurable goals, the GQM Approach (Goal-Question-Metric) was utilized. It was found that none of the evaluated applications reaches this level, since they do not entirely meet the analyzed criteria, according to the evaluations performed.","PeriodicalId":206481,"journal":{"name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","volume":"312 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116281463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AutoQA: quality attributes as a service in cloud","authors":"A. Agrawal, T. Prabhakar","doi":"10.1145/2695664.2695985","DOIUrl":"https://doi.org/10.1145/2695664.2695985","url":null,"abstract":"Availability of scriptable resources in cloud empowers applications to be cost-efficient and meet their execution-time quality requirements. However, the application needs to be designed and built to exploit this feature of the cloud infrastructure. This paper proposes an idea to add quality attributes in the cloud-based applications at run-time. Here, a methodological framework, AutoQA, is conceptualized for building services that can facilitate on-demand provision of quality attributes to applications. The AutoQA framework is based on software architecture body of knowledge, especially tactics. Methodology of the AutoQA framework is to integrate architectural tactics with the application architecture at run-time. By using an AutoQA-based service, applications can meet some unpredicted quality requirements in a cost-efficient manner. Our prototype implementation of an AutoQA-based service provides support for four quality attributes (performance, availability, security, and testability) to web applications deployed on Linux containers. Experiments conducted by provisioning quality attributes to a web-based application demonstrate feasibility and benefits of the framework.","PeriodicalId":206481,"journal":{"name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maurizio Leotta, Andrea Stocco, F. Ricca, P. Tonella
{"title":"Automated generation of visual web tests from DOM-based web tests","authors":"Maurizio Leotta, Andrea Stocco, F. Ricca, P. Tonella","doi":"10.1145/2695664.2695847","DOIUrl":"https://doi.org/10.1145/2695664.2695847","url":null,"abstract":"Functional test automation is increasingly adopted by web applications developers. In particular, 2nd generation tools overcome the limitations of 1st generation tools, based on screen coordinates, by providing APIs for easy selection and interaction with Document Object Model (DOM) elements. On the other hand, a new, 3rd generation of web testing tools, based on visual image recognition, brings the promise of wider applicability and simplicity. In this paper, we consider the problem of the automated creation of 3rd generation visual web tests from 2nd generation test suites. This transformation affects mostly the way in which test cases locate web page elements to interact with or to assert the expected test case outcome. Our tool PESTO determines automatically the screen position of a web element located in the DOM by a DOM-based test case. It then determines a rectangle image centred around the web element so as to ensure unique visual matching. Based on such automatically extracted images, the original, 2nd generation test suite is rewritten into a 3rd generation, visual test suite. Experimental results show that our approach is accurate, hence potentially saving substantial human effort in the creation of visual web tests from DOM-based ones.","PeriodicalId":206481,"journal":{"name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130016160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gregorio Díaz, María-Emilia Cambronero, H. Macià, V. V. Ruiz
{"title":"Model-checking verification of publish-subscribe architectures in web service contexts","authors":"Gregorio Díaz, María-Emilia Cambronero, H. Macià, V. V. Ruiz","doi":"10.1145/2695664.2695744","DOIUrl":"https://doi.org/10.1145/2695664.2695744","url":null,"abstract":"In this paper we consider a Timed Automata model for the Publish/Subscribe paradigm, where special attention is given to its temporal aspects. Despite this special interest, we present a generic model for publishing and managing WS-resourses in the context of Web services with distributed resources. The model includes operations for clients to discover and subscribe to resources, with the intention of being notified when the resource property values fulfill certain conditions. Furthermore, error handling is provided in case discovery fails or a resource life has expired. Model-checking is used to verify the model soundness, by means of the UPPAAL tool, and a specific case study is presented to illustrate how the model deals with the scalability problem.","PeriodicalId":206481,"journal":{"name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130134009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}