Proceedings of the Symposium on Applied Computing最新文献

筛选
英文 中文
Decaying inverted quadtree: index structure for supporting spatio-temporal-keyword query processing of microblog data 衰落倒四叉树:支持微博数据时空关键字查询处理的索引结构
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019697
Sehwa Park, Seog Park
{"title":"Decaying inverted quadtree: index structure for supporting spatio-temporal-keyword query processing of microblog data","authors":"Sehwa Park, Seog Park","doi":"10.1145/3019612.3019697","DOIUrl":"https://doi.org/10.1145/3019612.3019697","url":null,"abstract":"Microblogging services such as Twitter and Facebook have become the most popular online social media services in the past decade. Collecting microblog data containing location, timestamp and textual information in real time has been made possible by the widespread use of mobile devices and the steady incline in the number of users. For this reason, researchers have explored the supporting of real time search system for microblog. In particular, studies have applied various methods to investigate index construction strategies for spatio-temporal queries, focusing on partial in memory indexing or exploit segmentation based hierarchical structure. However, these approaches cannot adequately support real time search of the spatio-temporal-keyword query for the entire microblog dataset because of the limited assumption and the segmentation alignment problem. In this paper, we proposed a decaying inverted quadtree structure to support real time search system for spatio-temporal-keyword query.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"98 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81273100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic identification of client-side JavaScript libraries in web applications 在web应用程序中自动识别客户端JavaScript库
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019845
Hanyang Cao, Y. Peng, Jing Jiang, Jean-Rémy Falleri, Xavier Blanc
{"title":"Automatic identification of client-side JavaScript libraries in web applications","authors":"Hanyang Cao, Y. Peng, Jing Jiang, Jean-Rémy Falleri, Xavier Blanc","doi":"10.1145/3019612.3019845","DOIUrl":"https://doi.org/10.1145/3019612.3019845","url":null,"abstract":"Modern web applications often use JavaScript libraries, such as JQuey or Google Analytics for example, that make the development easier, cheaper and with a better quality. Choosing the right library to use is however very difficult as there are many competing libraries with many different versions. To help developers in this difficult choice, popularity indicators that pinpoint which applications use which libraries are very useful. Building such indicators is however challenging as popular web applications usually don't make their source code available. In this paper, we address this challenge with an approach that automatically browses web applications to retrieve the client-side JavaScript libraries they use. By applying this approach on the most famous websites, we then present the trends we observed, and the recommendations that can be provided.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"102 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86653691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Offline performance vs. subjective quality experience: a case study in video game recommendation 离线表现vs.主观质量体验:电子游戏推荐的案例研究
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019758
D. Jannach, Lukas Lerche
{"title":"Offline performance vs. subjective quality experience: a case study in video game recommendation","authors":"D. Jannach, Lukas Lerche","doi":"10.1145/3019612.3019758","DOIUrl":"https://doi.org/10.1145/3019612.3019758","url":null,"abstract":"Research in the field of recommender systems is largely based on offline experimentation on historical datasets. Several recent works however suggest that models optimized for accuracy measures are not necessarily those that lead to the best user experience or perceived system utility. In this work we first determine the offline performance of different algorithms in the domain of video game recommendation and then investigate the perceived recommendation quality through a user study. The offline results show that learning-to-rank methods optimized for implicit feedback situations as expected perform best in terms of accuracy, where higher accuracy often comes with a stronger tendency of the algorithms to recommend mostly popular items. In the user study, however, methods that also consider the similarity between items in their algorithms perform at least equally well in terms of accuracy, which could not be expected from the offline experiment. Such content-enhanced methods were also slightly favored by users in terms of perceived transparency.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"219 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86838827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fraud detection in water meters using pattern recognition techniques 模式识别技术在水表欺诈检测中的应用
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019634
Juliana Patrícia Detroz, André Tavares da Silva
{"title":"Fraud detection in water meters using pattern recognition techniques","authors":"Juliana Patrícia Detroz, André Tavares da Silva","doi":"10.1145/3019612.3019634","DOIUrl":"https://doi.org/10.1145/3019612.3019634","url":null,"abstract":"Water supply utilities have been increasingly looking for solutions to reduce water wastage. Many efforts have been made aiming to promote a better management of this resource. Fraud detection is one of these actions, as the irregular violations are usually held precariously, thus, causing leaks. In this context, the use of technology in order to automate the identification of potential frauds can be an important support tool to avoid water waste. Thus, this research aims to apply pattern recognition techniques in the implementation of an automated detection of suspected irregularities cases in water meters, through image analysis. The proposed computer vision system is composed of three steps: the detection of the water meter location, obtained by OPF classifier and HOG descriptor, detecting the seals through morphological image processing and segmentation methods; and the classification of frauds, in which the condition of the water meter seals is assessed. We validated the proposed framework using a dataset containing images of water meter inspections. At the last step, the proposed framework reached an average accuracy up to 81.29%. We concluded that a computer vision system is a promising strategy and has potential to benefit the analysis of fraud detection.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84222801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fully anisotropic morlet transform for the study of the trabecular bone texture variations 全各向异性morlet变换用于研究骨小梁的骨纹理变化
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019647
Hind Oulhaj, M. Hassouni, A. Amine, M. Rziza, R. Jennane
{"title":"Fully anisotropic morlet transform for the study of the trabecular bone texture variations","authors":"Hind Oulhaj, M. Hassouni, A. Amine, M. Rziza, R. Jennane","doi":"10.1145/3019612.3019647","DOIUrl":"https://doi.org/10.1145/3019612.3019647","url":null,"abstract":"This paper presents a new method for the characterization of trabecular bone texture variations for early detection of osteoporosis. It relies on the study of texture variations in the complex-anisotropic domain associated with the Fully Anisotropic Morlet transform (FAM). Unlike conventional oriented wavelet-based schemes, this not only allows analyzing the texture over a wider range of scales and directions but also enables to consider the texture anisotropy. More specifically, we propose a new directional-signature which is a function of the orientation and relative magnitudes to characterize the radiographic bone anisotropy. The investigation of the inter-scale dependencies within an complex- anisotropic neighboring of FAM coefficients allows to capture separately the local-statistical properties of each directional sub-band, which is of great interest for the analysis of the trabecular bone texture exhibiting complex-irregular behavior. Results show that the proposed feature vector enables to discriminate two populations composed of Osteoporotic Patients (OP) and Control Cases (CC) with an Area Under Curve (AUC) rate of 91.28%.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84242593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Session details: DADS - dependable, adaptive, and trustworthy distributed systems track 会话细节:DADS -可靠的,自适应的,可信的分布式系统跟踪
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3243950
{"title":"Session details: DADS - dependable, adaptive, and trustworthy distributed systems track","authors":"","doi":"10.1145/3243950","DOIUrl":"https://doi.org/10.1145/3243950","url":null,"abstract":"As computing is provided by the cloud and services increasingly pervade our daily lives, dependability and security are no longer restricted to mission or safety critical applications, but rather become a cornerstone of the information society. Unfortunately, the most innovative systems and applications are the ones that also suffer most from a significant decrease in dependability and security when compared to traditional critical systems, where dependability and security are fairly well understood as complementary concepts and a variety of proven methods and techniques are available today. In accordance with Laprie we call this effect the dependability gap, which is widened in front of us between demand and supply of dependability, and we can see this trend further fueled by volume, velocity, and variety, as well as the demand for resource awareness, green computing, and increasing cost pressure. Among technical factors, software development methods, tools, and techniques contribute to dependability and security, as defects in software products and services may lead to failure and also provide avenues for malicious attacks. In addition, there is a wide variety of fault and intrusion tolerance techniques available, including persistence provided by databases, redundancy and replication, group communication, transaction monitors, reliable middleware, cloud infrastructures, fragmentation-redundancy-scattering, and trustworthy service-oriented architectures with explicit control of quality of service properties and service level agreements. Furthermore, adaptiveness is envisaged in order to react to observed, or act upon expected changes of the system itself, the context/environment (e.g., resource variability or failure/threat scenarios) or users' needs and expectations. Without explicit user intervention, this is also termed autonomous behavior or self-properties, and often involves monitoring, diagnosis (analysis, interpretation), and reconfiguration (repair). In particular, adaptation is also a means to achieve dependability and security in a computing infrastructure with dynamically varying structure and properties.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84250449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast mutual information computation for dependency-monitoring on data streams 用于数据流依赖性监测的快速互信息计算
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019669
Jonathan Boidol, Andreas Hapfelmeier
{"title":"Fast mutual information computation for dependency-monitoring on data streams","authors":"Jonathan Boidol, Andreas Hapfelmeier","doi":"10.1145/3019612.3019669","DOIUrl":"https://doi.org/10.1145/3019612.3019669","url":null,"abstract":"Given the increasing size and dimension of streaming data made available by for example in industrial sensors or wireless sensor networks (WSNs), it is an important and worthwhile task to monitor not only the data itself but also the relationships between data sources. To solve this task, we present DIMID, an online algorithm to monitor dependencies in high dimensional streaming data. DIMID uses an entropy-based measure that generalizes to non-linear as well as complex functional types of relationships, is non-parametric and can be computed incrementally. To deal with the streaming, possibly infinite data, DIMID contains a dimensionality reducing projection method and an estimator for entropy that uses the local density of data points. This also allows the algorithm to update the current relationships with new data as it becomes available, instead of recomputing on the complete batch after every update. Comparisons to three state-of-the-art other algorithms for dependency-monitoring on a variety of time series data sets with linear and non-linear dependencies showed significant (p < 0.01) improvements in the AUC- and F1-measure. We also achieve a reduction in run-time from linear to logarithmic in the number of observed samples.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88079858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A language modeling approach for the recommendation of tourism-related services 旅游相关服务推荐的语言建模方法
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019900
S. Missaoui, Marco Viviani, R. Faiz, G. Pasi
{"title":"A language modeling approach for the recommendation of tourism-related services","authors":"S. Missaoui, Marco Viviani, R. Faiz, G. Pasi","doi":"10.1145/3019612.3019900","DOIUrl":"https://doi.org/10.1145/3019612.3019900","url":null,"abstract":"In a ubiquitous scenario, people are typically confronted with context evolution and changing influences. This may create new needs and may condition the user perception of what is relevant information. Over the years, different approaches have been proposed to design personalized Recommender Systems (RS), but state-of-the-art approaches mostly assume a fixed representation of a user profile; the dynamicity of the user's interests (and the way of expressing them) while interacting with the environment is not considered. Aim of this work is to predict a user's preferences in the tourism domain, to provide personalized and context-aware recommendations. Therefore, we define a user profile model which expresses in a formal way the user's opinions with respect to a particular entity. In particular, the proposed approach formally models the user generated content (UGC) connected to a group of reviews (written by expert users) for each entity, and compares it with a (positive and negative) statistical language model representing the target user profile associated with that entity. The effectiveness of the approach is illustrated on a real-case scenario.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90965403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Formal verification of storm topologies through D-VerT 通过D-VerT对风暴拓扑进行正式验证
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019769
F. Marconi, M. Bersani, M. Rossi
{"title":"Formal verification of storm topologies through D-VerT","authors":"F. Marconi, M. Bersani, M. Rossi","doi":"10.1145/3019612.3019769","DOIUrl":"https://doi.org/10.1145/3019612.3019769","url":null,"abstract":"Data-intensive applications (DIAs) based on so-called Big Data technologies are nowadays a common solution adopted by IT companies to face their growing computational needs. The need for highly reliable applications able to handle huge amounts of data and the availability of infrastructures for distributed computing rapidly led industries to develop frameworks for streaming and big-data processing, like Apache Storm and Spark. The definition of methodologies and principles for good software design is, therefore, fundamental to support the development of DIAs. This paper presents an approach for non-functional analysis of DIAs through D-VerT, a tool for the architectural assessment of Storm applications. The verification is based on a translation of Storm topologies into the CLTLoc metric temporal logic. It allows the designer of a Storm application to check for the existence of components that cannot process their workload in a timely manner, typically due to an incorrect design of the topology.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80986869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a hypothetical framework of humans related success factors for process improvement in global software development: systematic review 对于全球软件开发过程改进中与人类相关的成功因素的假设框架:系统审查
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019685
A. Khan, J. Keung, M. Niazi, Shahid Hussain
{"title":"Towards a hypothetical framework of humans related success factors for process improvement in global software development: systematic review","authors":"A. Khan, J. Keung, M. Niazi, Shahid Hussain","doi":"10.1145/3019612.3019685","DOIUrl":"https://doi.org/10.1145/3019612.3019685","url":null,"abstract":"Presently, the majority of the software development organizations are adopting the phenomena of Global Software Development (GSD), mainly because of the significant return on investment it produces. However, GSD is a complex phenomenon and there are many challenges associated with it, especially that related to Software Process Improvement (SPI). The aim of this work is to identify humans' related factors that can positively impact the SPI process in GSD organizations and proposed a hypothetical framework of the identified success factors in relation to SPI implementation. We have adopted the Systematic Literature Review (SLR) method in order to identify the success factors. Using the SLR approach, total ten success factors were identified. The paper also reported the Critical Success Factors (CSFs) for SPI implementation following the criteria of the factors having a frequency ≥ 50% as critical. Our results reveal that five out of ten factors are critical for SPI program. Based on the analysis of the identified success factors, we have presented a hypothetical framework that has highlighted an association between the identified success factors and the implementation of the SPI program in GSD environment.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81166252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信