Proceedings of the Symposium on Applied Computing最新文献

筛选
英文 中文
Forecasting battery state of charge for robot missions 预测机器人任务的电池状态
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019705
Ameer Hamza, Nora Ayanian
{"title":"Forecasting battery state of charge for robot missions","authors":"Ameer Hamza, Nora Ayanian","doi":"10.1145/3019612.3019705","DOIUrl":"https://doi.org/10.1145/3019612.3019705","url":null,"abstract":"Due to limited power onboard, a significant factor for success of distributed teams of robots is energy-awareness. The ability to predict when power will be depleted beyond a certain point is necessary for recharging or returning to a base station. This paper presents a framework for forecasting state of charge (SOC) of a robot's battery for a given mission. A generalized and customizable mission description is formulated as a sequence of parametrized tasks defined for the robot; the missions are then mapped to expected change in SOC by training neural networks on experimental data. We present results from experiments on the Turtlebot 2 to establish the efficacy of this framework. The performance of the proposed framework is demonstrated for three distinct mission representations and compared to an existing method in the literature. Finally, we discuss the strengths and weaknesses of feedforward and recurrent neural network models in the context of this work.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86271973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Convolutions through time for multi-label movie genre classification 多标签电影类型分类的时间卷积
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019641
Jonatas Wehrmann, Rodrigo C. Barros
{"title":"Convolutions through time for multi-label movie genre classification","authors":"Jonatas Wehrmann, Rodrigo C. Barros","doi":"10.1145/3019612.3019641","DOIUrl":"https://doi.org/10.1145/3019612.3019641","url":null,"abstract":"In this paper, we explore the suitability of employing Convolutional Neural Networks (ConvNets) for multi-label movie trailer genre classification. Assigning genres to movies is a particularly challenging task because genre is an immaterial feature that is not physically present in a movie frame, so off-the-shelf image detection models cannot be easily adapted to this context. Moreover, multi-label classification is more challenging than single-label classification considering that one instance can be assigned to multiple classes at once. We propose a novel classification method that encapsulates an ultra-deep ConvNet with residual connections. Our approach extracts temporal information from image-based features prior to performing the mapping of trailers to genres. We compare our novel approach with the current state-of-the-art techniques for movie classification, which make use of well-known image descriptors and low-level handcrafted features. Results show that our method significantly outperforms the state-of-the-art in this task, improving the classification accuracy for all genres.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88515772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Moving away from the crowd: channel selection in uncoordinated unplanned dense wireless LANs 远离人群:非协调非规划密集无线局域网中的信道选择
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019771
P. Kulkarni, Zhenzhe Zhong, Fengming Cao
{"title":"Moving away from the crowd: channel selection in uncoordinated unplanned dense wireless LANs","authors":"P. Kulkarni, Zhenzhe Zhong, Fengming Cao","doi":"10.1145/3019612.3019771","DOIUrl":"https://doi.org/10.1145/3019612.3019771","url":null,"abstract":"Networks using WiFi continue to proliferate which has contributed to increased levels of crowding in the unlicensed bands in which these networks operate. Given the limited number of channels available in these bands, a key problem that arises is how to avoid / minimise conflicting channel assignment among neighbouring networks. This is particularly challenging in uncoordinated, unplanned deployments wherein Access Points (APs) belonging to different administrative entities may be operating in isolation in the vicinity of each other. Given the difficulty of planning conflict free channel allocation in such deployments, it is highly desirable to devise mechanisms such that the APs themselves become radio neighbourhood aware and adapt their operation (channel switching on the fly) so as to mitigate interference issues. In this paper, we propose two distributed channel selection algorithms for accomplishing the above mentioned objective. In particular, we show that these algorithms are practical from an implementation perspective, accomplish their objective without requiring any changes to the hardware, the existing infrastructure and the WLAN standard, and highlight findings from a simulation based study. Findings indicate that the proposed algorithms significantly outperform the typical random selection approach commonly employed by low cost commercial off-the-shelf hardware.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88738283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Numerical similarity-aware data partitioning for recommendations as a service 将数字相似度感知数据分区作为服务进行推荐
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019676
Ting-Ting Yang, Hsueh-Wen Tseng
{"title":"Numerical similarity-aware data partitioning for recommendations as a service","authors":"Ting-Ting Yang, Hsueh-Wen Tseng","doi":"10.1145/3019612.3019676","DOIUrl":"https://doi.org/10.1145/3019612.3019676","url":null,"abstract":"At present, recommendations become an acceptable choice to replace annoying and widespread advertisements. Recommender systems (RS) are mainly used by large scale e-businesses, such as Amazon [1] and Netflix [4], because implementing and deploying RS can involve substantial investments. Many e-commerce businesses prefer to outsource the recommendation services. Therefore, Recommendation as a Service (RaaS) becomes a newly emerging trend for providing a feasible RS alternative. The providers of these services, the RS providers, need to pay the fee of cloud computing services, which is proportional to the amount of time, memory requirement, and computation resources. In addition, the RS providers must support rapidly recommendation services to meet the requests of clients. In this paper, we propose a numerical similarity-aware data partitioning (NSDP) scheme that effectively uses the numeric and similarity of datasets to exactly estimate the memory and the computation requirements for distributing the workloads. The simulation results demonstrate that NSDP significantly improves the speedup performance and achieves high scalability in the RaaS distributed-memory environment.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77119840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feedback on how MDE tools are used prior to academic collaboration 关于在学术合作之前如何使用MDE工具的反馈
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019775
V. Sousa, Eugene Syriani, Martin Paquin
{"title":"Feedback on how MDE tools are used prior to academic collaboration","authors":"V. Sousa, Eugene Syriani, Martin Paquin","doi":"10.1145/3019612.3019775","DOIUrl":"https://doi.org/10.1145/3019612.3019775","url":null,"abstract":"Several studies in the model-driven engineering (MDE) literature report on companies adopting MDE technologies as a result of long collaborations with academics. However, there are more companies than reported that are already using MDE, even without active MDE researchers partners. Therefore we do not have a clear view of how these industries are using MDE and how it is benefiting them. Presche Legacy is a company that already started using MDE even before collaborating with us. To better understand how MDE is used in such industries and to what extent MDE can solve challenges in this business, we conducted a series of interviews with the employees working with MDE. The findings presented in this paper report a successful integration of MDE tools with their in-house software used in production, challenges encountered, and how they surmounted them. We also discuss how this success story can help other companies benefit from MDE.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86971688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identifying authoritative researchers in digital libraries using external a priori knowledge 利用外部先验知识识别数字图书馆的权威研究人员
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019809
Baptiste de La Robertie, Y. Pitarch, A. Takasu, O. Teste
{"title":"Identifying authoritative researchers in digital libraries using external a priori knowledge","authors":"Baptiste de La Robertie, Y. Pitarch, A. Takasu, O. Teste","doi":"10.1145/3019612.3019809","DOIUrl":"https://doi.org/10.1145/3019612.3019809","url":null,"abstract":"Numereous digital library projects mine heterogeneous data from different sources to provide expert finding services. However, a variety of models seek experts as simple sources of information and neglect authority signals. In this paper we address the issue of modelling the authority of researchers in academic networks. A model, RAC, is proposed that merges several graph representations and incorporate external knowledge about the authority of some major scientific conferences to improve the identification of authoritative researchers. Based on the provided structural model a biased label propagation algorithm aimed to strenghten the scores calculation of the labelled entities and their neighbors is developped. Both quantitative and qualitative analyses validate the effectiveness of the proposal. Indeed, RAC outperforms state-of-the-art models on a real-world graph containing more than 5 million nodes constructed using Microsoft Academic Search, AMiner and Core.edu databases.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88925525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measuring login webpage security 测量登入网页的安全性
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019798
S. Acker, Daniel Hausknecht, A. Sabelfeld
{"title":"Measuring login webpage security","authors":"S. Acker, Daniel Hausknecht, A. Sabelfeld","doi":"10.1145/3019612.3019798","DOIUrl":"https://doi.org/10.1145/3019612.3019798","url":null,"abstract":"Login webpages are the entry points into sensitive parts of web applications, dividing between public access to a website and private, user-specific, access to the website resources. As such, these entry points must be guarded with great care. A vast majority of today's websites relies on text-based user-name/password pairs for user authentication. While much prior research has focused on the strengths and weaknesses of textual passwords, this paper puts a spotlight on the security of the login webpages themselves. We conduct an empirical study of the Alexa top 100,000 pages to identify login pages and scrutinize their security. Our findings show several widely spread vulnerabilities, such as possibilities for password leaks to third parties and password eavesdropping on the network. They also show that only a scarce number of login pages deploy advanced security measures. Our findings on open-source web frameworks and content management systems confirm the lack of support against the login attacker. To ameliorate the problematic state of the art, we discuss measures to improve the security of login pages.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88709118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Defining an architecture for evolving environments 为不断发展的环境定义体系结构
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019902
Jarkko Hyysalo, Gavin Harper, J. Sauvola, A. Keskinarkaus, I. Juuso, Miikka Salminen, Juha Partala
{"title":"Defining an architecture for evolving environments","authors":"Jarkko Hyysalo, Gavin Harper, J. Sauvola, A. Keskinarkaus, I. Juuso, Miikka Salminen, Juha Partala","doi":"10.1145/3019612.3019902","DOIUrl":"https://doi.org/10.1145/3019612.3019902","url":null,"abstract":"The architecture of a system specifies how the system should be designed and built. However, shortcomings are identified in current architecture process frameworks concerning evolving domains like healthcare. We claim that an iterative architecture process is required, where the technical concerns are separated from the non-technical ones. Furthermore, a strong guiding vision is required. Based on our experiences from a biobank IT infrastructure process, we present an architecture process that is modular, interoperable, controlled and abstracted, thus being capable of handling complex systems with large uncertainties.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85864027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Iterative multi-scale modeling of software-intensive systems of systems architectures 系统架构中软件密集型系统的迭代多尺度建模
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019801
Ilhem Khlif, M. Kacem, A. Kacem
{"title":"Iterative multi-scale modeling of software-intensive systems of systems architectures","authors":"Ilhem Khlif, M. Kacem, A. Kacem","doi":"10.1145/3019612.3019801","DOIUrl":"https://doi.org/10.1145/3019612.3019801","url":null,"abstract":"Modeling correct software-intensive Systems of Systems architectures is a challenging research direction that can be mastered by providing modeling abstractions. For this purpose, we provide an iterative modeling solution for a multi-scale description of software architectures. We provide a visual notation extending the graphical UML notations to represent structural as well as behavioral features of software architectures. We define a step-wise iterative process from a coarse-grain to a fine-grain description. The intermediate iterations provide a description with a given abstraction that allow the validation to be conducted significantly while remaining tractable w.r.t. complexity. The iterative process involves both system-independent structural features ensuring the model correctness, and system-specific features related to the expected behavior of the modeled domain. We apply our approach for a methodological design of an Emergency Response and Crisis Management System (ERCMS).","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85920226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DyNetVis: a system for visualization of dynamic networks 动态网络可视化系统
Proceedings of the Symposium on Applied Computing Pub Date : 2017-04-03 DOI: 10.1145/3019612.3019686
Claudio D. G. Linhares, B. Travençolo, J. G. Paiva, Luis E C Rocha
{"title":"DyNetVis: a system for visualization of dynamic networks","authors":"Claudio D. G. Linhares, B. Travençolo, J. G. Paiva, Luis E C Rocha","doi":"10.1145/3019612.3019686","DOIUrl":"https://doi.org/10.1145/3019612.3019686","url":null,"abstract":"The concept of networks has been important in the study of complex systems. In networks, links connect pairs of nodes forming complex structures. Studies have shown that networks not only contain structure but may also evolve in time. The addition of the temporal dimension adds complexity on the analysis and requests the development of innovative methods for the visualization of real-life networks. In this paper we introduce the Dynamic Network Visualization System (DyNetVis), a software tool for visualization of dynamic networks. The system provides several tools for user interaction and offers two coordinated visual layouts, named structural and temporal. Structural refers to standard network drawing techniques, in which a single snapshot of nodes and links are placed in a plane, whereas the temporal layout allows for simultaneously visualization of several temporal snapshots of the dynamic network. In addition, we also investigate two approaches for temporal layout visualization: (i) Recurrent Neighbors, a node ordering strategy that highlights frequent connections in time, and (ii) Temporal Activity Map (TAM), a layout technique with focus on nodes activity. We illustrate the applicability of the layouts and interaction functionalities provided by the system in two visual analysis case studies, demonstrating their advantages to improve the overall user experience on visualization and exploratory data analysis on dynamic networks.","PeriodicalId":20728,"journal":{"name":"Proceedings of the Symposium on Applied Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84703502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信