{"title":"Decaying inverted quadtree: index structure for supporting spatio-temporal-keyword query processing of microblog data","authors":"Sehwa Park, Seog Park","doi":"10.1145/3019612.3019697","DOIUrl":"https://doi.org/10.1145/3019612.3019697","url":null,"abstract":"Microblogging services such as Twitter and Facebook have become the most popular online social media services in the past decade. Collecting microblog data containing location, timestamp and textual information in real time has been made possible by the widespread use of mobile devices and the steady incline in the number of users. For this reason, researchers have explored the supporting of real time search system for microblog. In particular, studies have applied various methods to investigate index construction strategies for spatio-temporal queries, focusing on partial in memory indexing or exploit segmentation based hierarchical structure. However, these approaches cannot adequately support real time search of the spatio-temporal-keyword query for the entire microblog dataset because of the limited assumption and the segmentation alignment problem. In this paper, we proposed a decaying inverted quadtree structure to support real time search system for spatio-temporal-keyword query.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"98 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81273100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hanyang Cao, Y. Peng, Jing Jiang, Jean-Rémy Falleri, Xavier Blanc
{"title":"Automatic identification of client-side JavaScript libraries in web applications","authors":"Hanyang Cao, Y. Peng, Jing Jiang, Jean-Rémy Falleri, Xavier Blanc","doi":"10.1145/3019612.3019845","DOIUrl":"https://doi.org/10.1145/3019612.3019845","url":null,"abstract":"Modern web applications often use JavaScript libraries, such as JQuey or Google Analytics for example, that make the development easier, cheaper and with a better quality. Choosing the right library to use is however very difficult as there are many competing libraries with many different versions. To help developers in this difficult choice, popularity indicators that pinpoint which applications use which libraries are very useful. Building such indicators is however challenging as popular web applications usually don't make their source code available. In this paper, we address this challenge with an approach that automatically browses web applications to retrieve the client-side JavaScript libraries they use. By applying this approach on the most famous websites, we then present the trends we observed, and the recommendations that can be provided.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"102 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86653691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Offline performance vs. subjective quality experience: a case study in video game recommendation","authors":"D. Jannach, Lukas Lerche","doi":"10.1145/3019612.3019758","DOIUrl":"https://doi.org/10.1145/3019612.3019758","url":null,"abstract":"Research in the field of recommender systems is largely based on offline experimentation on historical datasets. Several recent works however suggest that models optimized for accuracy measures are not necessarily those that lead to the best user experience or perceived system utility. In this work we first determine the offline performance of different algorithms in the domain of video game recommendation and then investigate the perceived recommendation quality through a user study. The offline results show that learning-to-rank methods optimized for implicit feedback situations as expected perform best in terms of accuracy, where higher accuracy often comes with a stronger tendency of the algorithms to recommend mostly popular items. In the user study, however, methods that also consider the similarity between items in their algorithms perform at least equally well in terms of accuracy, which could not be expected from the offline experiment. Such content-enhanced methods were also slightly favored by users in terms of perceived transparency.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"219 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86838827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fraud detection in water meters using pattern recognition techniques","authors":"Juliana Patrícia Detroz, André Tavares da Silva","doi":"10.1145/3019612.3019634","DOIUrl":"https://doi.org/10.1145/3019612.3019634","url":null,"abstract":"Water supply utilities have been increasingly looking for solutions to reduce water wastage. Many efforts have been made aiming to promote a better management of this resource. Fraud detection is one of these actions, as the irregular violations are usually held precariously, thus, causing leaks. In this context, the use of technology in order to automate the identification of potential frauds can be an important support tool to avoid water waste. Thus, this research aims to apply pattern recognition techniques in the implementation of an automated detection of suspected irregularities cases in water meters, through image analysis. The proposed computer vision system is composed of three steps: the detection of the water meter location, obtained by OPF classifier and HOG descriptor, detecting the seals through morphological image processing and segmentation methods; and the classification of frauds, in which the condition of the water meter seals is assessed. We validated the proposed framework using a dataset containing images of water meter inspections. At the last step, the proposed framework reached an average accuracy up to 81.29%. We concluded that a computer vision system is a promising strategy and has potential to benefit the analysis of fraud detection.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84222801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hind Oulhaj, M. Hassouni, A. Amine, M. Rziza, R. Jennane
{"title":"Fully anisotropic morlet transform for the study of the trabecular bone texture variations","authors":"Hind Oulhaj, M. Hassouni, A. Amine, M. Rziza, R. Jennane","doi":"10.1145/3019612.3019647","DOIUrl":"https://doi.org/10.1145/3019612.3019647","url":null,"abstract":"This paper presents a new method for the characterization of trabecular bone texture variations for early detection of osteoporosis. It relies on the study of texture variations in the complex-anisotropic domain associated with the Fully Anisotropic Morlet transform (FAM). Unlike conventional oriented wavelet-based schemes, this not only allows analyzing the texture over a wider range of scales and directions but also enables to consider the texture anisotropy. More specifically, we propose a new directional-signature which is a function of the orientation and relative magnitudes to characterize the radiographic bone anisotropy. The investigation of the inter-scale dependencies within an complex- anisotropic neighboring of FAM coefficients allows to capture separately the local-statistical properties of each directional sub-band, which is of great interest for the analysis of the trabecular bone texture exhibiting complex-irregular behavior. Results show that the proposed feature vector enables to discriminate two populations composed of Osteoporotic Patients (OP) and Control Cases (CC) with an Area Under Curve (AUC) rate of 91.28%.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84242593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: DADS - dependable, adaptive, and trustworthy distributed systems track","authors":"","doi":"10.1145/3243950","DOIUrl":"https://doi.org/10.1145/3243950","url":null,"abstract":"As computing is provided by the cloud and services increasingly pervade our daily lives, dependability and security are no longer restricted to mission or safety critical applications, but rather become a cornerstone of the information society. Unfortunately, the most innovative systems and applications are the ones that also suffer most from a significant decrease in dependability and security when compared to traditional critical systems, where dependability and security are fairly well understood as complementary concepts and a variety of proven methods and techniques are available today. In accordance with Laprie we call this effect the dependability gap, which is widened in front of us between demand and supply of dependability, and we can see this trend further fueled by volume, velocity, and variety, as well as the demand for resource awareness, green computing, and increasing cost pressure. Among technical factors, software development methods, tools, and techniques contribute to dependability and security, as defects in software products and services may lead to failure and also provide avenues for malicious attacks. In addition, there is a wide variety of fault and intrusion tolerance techniques available, including persistence provided by databases, redundancy and replication, group communication, transaction monitors, reliable middleware, cloud infrastructures, fragmentation-redundancy-scattering, and trustworthy service-oriented architectures with explicit control of quality of service properties and service level agreements. Furthermore, adaptiveness is envisaged in order to react to observed, or act upon expected changes of the system itself, the context/environment (e.g., resource variability or failure/threat scenarios) or users' needs and expectations. Without explicit user intervention, this is also termed autonomous behavior or self-properties, and often involves monitoring, diagnosis (analysis, interpretation), and reconfiguration (repair). In particular, adaptation is also a means to achieve dependability and security in a computing infrastructure with dynamically varying structure and properties.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84250449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast mutual information computation for dependency-monitoring on data streams","authors":"Jonathan Boidol, Andreas Hapfelmeier","doi":"10.1145/3019612.3019669","DOIUrl":"https://doi.org/10.1145/3019612.3019669","url":null,"abstract":"Given the increasing size and dimension of streaming data made available by for example in industrial sensors or wireless sensor networks (WSNs), it is an important and worthwhile task to monitor not only the data itself but also the relationships between data sources. To solve this task, we present DIMID, an online algorithm to monitor dependencies in high dimensional streaming data. DIMID uses an entropy-based measure that generalizes to non-linear as well as complex functional types of relationships, is non-parametric and can be computed incrementally. To deal with the streaming, possibly infinite data, DIMID contains a dimensionality reducing projection method and an estimator for entropy that uses the local density of data points. This also allows the algorithm to update the current relationships with new data as it becomes available, instead of recomputing on the complete batch after every update. Comparisons to three state-of-the-art other algorithms for dependency-monitoring on a variety of time series data sets with linear and non-linear dependencies showed significant (p < 0.01) improvements in the AUC- and F1-measure. We also achieve a reduction in run-time from linear to logarithmic in the number of observed samples.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88079858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A language modeling approach for the recommendation of tourism-related services","authors":"S. Missaoui, Marco Viviani, R. Faiz, G. Pasi","doi":"10.1145/3019612.3019900","DOIUrl":"https://doi.org/10.1145/3019612.3019900","url":null,"abstract":"In a ubiquitous scenario, people are typically confronted with context evolution and changing influences. This may create new needs and may condition the user perception of what is relevant information. Over the years, different approaches have been proposed to design personalized Recommender Systems (RS), but state-of-the-art approaches mostly assume a fixed representation of a user profile; the dynamicity of the user's interests (and the way of expressing them) while interacting with the environment is not considered. Aim of this work is to predict a user's preferences in the tourism domain, to provide personalized and context-aware recommendations. Therefore, we define a user profile model which expresses in a formal way the user's opinions with respect to a particular entity. In particular, the proposed approach formally models the user generated content (UGC) connected to a group of reviews (written by expert users) for each entity, and compares it with a (positive and negative) statistical language model representing the target user profile associated with that entity. The effectiveness of the approach is illustrated on a real-case scenario.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90965403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal verification of storm topologies through D-VerT","authors":"F. Marconi, M. Bersani, M. Rossi","doi":"10.1145/3019612.3019769","DOIUrl":"https://doi.org/10.1145/3019612.3019769","url":null,"abstract":"Data-intensive applications (DIAs) based on so-called Big Data technologies are nowadays a common solution adopted by IT companies to face their growing computational needs. The need for highly reliable applications able to handle huge amounts of data and the availability of infrastructures for distributed computing rapidly led industries to develop frameworks for streaming and big-data processing, like Apache Storm and Spark. The definition of methodologies and principles for good software design is, therefore, fundamental to support the development of DIAs. This paper presents an approach for non-functional analysis of DIAs through D-VerT, a tool for the architectural assessment of Storm applications. The verification is based on a translation of Storm topologies into the CLTLoc metric temporal logic. It allows the designer of a Storm application to check for the existence of components that cannot process their workload in a timely manner, typically due to an incorrect design of the topology.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80986869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a hypothetical framework of humans related success factors for process improvement in global software development: systematic review","authors":"A. Khan, J. Keung, M. Niazi, Shahid Hussain","doi":"10.1145/3019612.3019685","DOIUrl":"https://doi.org/10.1145/3019612.3019685","url":null,"abstract":"Presently, the majority of the software development organizations are adopting the phenomena of Global Software Development (GSD), mainly because of the significant return on investment it produces. However, GSD is a complex phenomenon and there are many challenges associated with it, especially that related to Software Process Improvement (SPI). The aim of this work is to identify humans' related factors that can positively impact the SPI process in GSD organizations and proposed a hypothetical framework of the identified success factors in relation to SPI implementation. We have adopted the Systematic Literature Review (SLR) method in order to identify the success factors. Using the SLR approach, total ten success factors were identified. The paper also reported the Critical Success Factors (CSFs) for SPI implementation following the criteria of the factors having a frequency ≥ 50% as critical. Our results reveal that five out of ten factors are critical for SPI program. Based on the analysis of the identified success factors, we have presented a hypothetical framework that has highlighted an association between the identified success factors and the implementation of the SPI program in GSD environment.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81166252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}