Jacky Legrand, E. Soulier, F. Bugeaud, F. Rousseaux, P. Saurel, Houda Neffati
{"title":"A New Methodology for Collecting and Exploiting Vast Amounts of Dynamic Data","authors":"Jacky Legrand, E. Soulier, F. Bugeaud, F. Rousseaux, P. Saurel, Houda Neffati","doi":"10.1109/EIDWT.2012.37","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.37","url":null,"abstract":"The current approaches aiming at collective intelligence modelling often rely on traditional methods (ontologies, graphs). Even if those traditional methods may have reached their limitations in front of demanding emerging practices, the major conceptual tools enrolled for current and future Web are deeply rooted in the information storage and retrieval practices. The focus is on developing more original technologies for capturing, analyzing, exploiting and visualizing data. The age cements/arrangements provide the appropriate epistemological context of our contribution. The simplicial complexes are the mathematical support of the methodology. The result is a shift from networks studied towards graph theory to higher dimensional networks structures. The representation is more than graphs, or even hyper graphs. A geometric perspective shows the arrangement as assembling polyhedra of all sizes. Their contacts can form chains of adjacencies. It does not only generalize the notion of path graphs but it also makes available a range of quantitative and qualitative tools on the structure. Thus, separate parts, which can be more or less strongly linked, length of paths to traverse, and even loops or \"missing parts\", are meaningful metadata representations.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129100923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting Group Cognition, Individual Learning and Community Practices in Dynamic Geometry","authors":"G. Stahl","doi":"10.1109/EIDWT.2012.13","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.13","url":null,"abstract":"Group cognition is analyzed at the small-group unit of analysis. It involves the semantics, syntactics and pragmatics of natural language, gestures, inscriptions, etc. The meaning-making processes involve inputs from individuals, based on their interpretation of the on-going context. They are also responses to the on-going social/historical/cultural/linguistic context, which they can reproduce and modify. Technologies play a central role in mediating the multi-level, intertwined processes. Emergent technologies should be designed to support this mediation. Collaboration environments should be designed to prepare groups, individuals and communities to take advantage of the technical functionality and to promote learning at all levels. This paper reports on the design of a curriculum in dynamic geometry to support group cognition, individual learning and community practices in a coordinated way.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132143051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensically Classifying Files Using HSOM Algorithms","authors":"G. Pierris, S. Vidalis","doi":"10.1109/EIDWT.2012.46","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.46","url":null,"abstract":"It has been accepted by Cloud Computing vendors that retrieving data from a cloud environment once they have been deleted is next to impossible. This constitutes a major hurdle for the digital forensics examiner as it greatly limits the pool of potential evidence that could be collected during an investigation. In this concept paper we will discuss a different approach to the above problem that spans across two different worlds: the world of digital forensics and the world of artificial intelligence. Block-based hash analysis works by calculating a hash value for each block of the target file that would be allocated a sector or cluster to store its data. The block hashes are then stored in a \"map\" file. The examiner then searches secondary memory areas to see if they contain blocks matching those contained in the \"map\" files. The examiner then has the ability to rebuild any file whose blocks have been located. The processes of hash-map calculation and analysis in the case of graphic images is accomplished using a single, dual-purpose EnScript in EnCase. Where a suspect file has been partially but not completely located the script will produce a PNG graphic showing exactly which blocks of the graphic have been located. This technique is extremely time and processor intensive, and does not work for unknown broken files. We hypothesize that we can use Hierarchical Self-Organizing Map algorithms in order to classify broken chains of previously unknown files, and in the future reconstruct them in order to be examined by the digital forensic examiner using the block-based hash analysis technique.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125415598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring Watershed Parameters through Software Services","authors":"M. Mocanu, Alexandru Craciun","doi":"10.1109/EIDWT.2012.31","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.31","url":null,"abstract":"The paper presents the necessity of using modern information technology in water resource management. The advantages of using composite applications, related to the importance of the water resource management systems are outlined. The architecture of the system, designed by the team, and the migration of local sensor applications to Web services are further presented.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121055415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Management of Cloud Infrastructures through Agents","authors":"Rocco Aversa, Luca Tasquier, S. Venticinque","doi":"10.1109/EIDWT.2012.57","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.57","url":null,"abstract":"In the Cloud context, the monitoring of service levels becomes critical because of the conflicts of interest that might occur between provider and customer in case of outage. Here we focus on Cloud monitoring at infrastructure level (IaaS), but with the perspective of a Cloud customer. Cloud customers cannot check the compliance of the Service Level Agreement (SLA) trusting the monitoring service of their own Cloud provider. In fact the Cloud provider has a conflicting interest ensuring the guarantees on service levels it provides. Besides Cloud customers need to detect under-utilization and overload conditions to take decisions about load balancing and resource reconfiguration. In this paper we present an agency that is deployed in the Cloud together with the customer's applications and can be used to configure a monitoring infrastructure. Mobile software agents take measures inside the Cloud resources, which are completely under the customer's administration, collect performance information and compute metrics according to the user's requirements. They implement a provider independent monitoring of the Cloud infrastructure during the execution of applications.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122539113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Tool for Discourse Analysis and Visualization","authors":"Costin-Gabriel Chiru, Stefan Trausan-Matu","doi":"10.4018/jvcsn.2013040104","DOIUrl":"https://doi.org/10.4018/jvcsn.2013040104","url":null,"abstract":"In this paper we present a system that combines the cognitive and socio-cultural paradigms existent in the field of discourse analysis in order to analyze both narrations and conversations. The novelty of our approach is that existing applications are oriented on analyzing only one of these two types, an adaptation being necessary for the analysis of the other type.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116513793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of a Framework for Measuring Efficency in Opportunistic Ad-hoc Networks","authors":"Anthony Smith, Stuart Berry","doi":"10.1109/EIDWT.2012.45","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.45","url":null,"abstract":"Opportunistic networks are the manifestation of wireless ad-hoc networks where there is no continuous end-to-end path. The forwarding of messages takes place via any nodes that are encountered, and therefore the measurement of message passing efficiency between nodes becomes challenging if a number of different protocols are to be compared and evaluated. Prior work has identified an evaluation framework that addresses this challenge. This article describes the construction of a simulation tool to assist the assessment of efficiency in opportunistic networks, and by way of an exemplar case study, a set of experimental results are discussed and evaluated. From this we conclude that Spray and Focus may be the way forward in this case.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132630990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Predictability in Mobile Interaction","authors":"Radu-Corneliu Marin, C. Dobre, F. Xhafa","doi":"10.1109/EIDWT.2012.29","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.29","url":null,"abstract":"Recent endeavors in mobile computing concentration analyzing the predictability of human behavior by means of mobility models synthesized from real mobile user traces. Currently, the main focus of such studies is physic allocation: discovering travel patterns, estimating real user movements and anticipating the whereabouts and dynamics of individuals. In this paper, we propose to widen the analyzed context as to take into account a more natural activity inhuman behavior, namely interaction. As such, we explore the predictability of user synergy based on tracing data collected from mobile phone users in academic and office environments. We take into account interactions over Bluetooth and over wireless networks and, by measuring the entropy of interacting both with peers and wireless access points, we discover a remarkable invariability in synergic patterns.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133557593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vlad Ciobanu, D. Popescu, C. Dobre, Florin Pop, V. Cristea
{"title":"The EU-Services Directive: An E-framework to Optimize Public Administration","authors":"Vlad Ciobanu, D. Popescu, C. Dobre, Florin Pop, V. Cristea","doi":"10.4018/jdst.2013070101","DOIUrl":"https://doi.org/10.4018/jdst.2013070101","url":null,"abstract":"The Point of Single Contact, proposed by the EUServices Directive, is a reliable source of electronic processing of information that facilitates the interaction of citizens with the public administration. This paper presents an eFramework designed to improve the communication between the citizens or businesses and the public administration. Using this framework the governments can offer eServices to its citizens, as well as the possibility to interact with various public govern level services, without the need to directly interact with the involved institutions. An example of such an electronic service would be the possibility to open a business using a single browser. We present the architecture as well as technical details for the implementation of such a framework. We also present a pilot application designed to orchestrate the workflow for opening a business. Such a solution is based on state-of-the-art technologies such as Info Path, Share Point, BizTalk, and Web Services.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125152379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Group Cognitive Perspective on the Multimodal Analysis of Learning","authors":"M. Çakır","doi":"10.1109/EIDWT.2012.58","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.58","url":null,"abstract":"This paper provides a brief overview of recent studies that aim to identify saccadic and neural correlates of learning by using eye-tracking and brain imaging technologies. The majority of the studies that employ these techniques focus on learning at the individual level. In reference to the findings of two case studies where dyads and individuals attempt to collaboratively or individually solve tan gram puzzles while their brain waves and eye-gaze were recorded, the paper aims to motivate the need for moving from a single-mind perspective to a group cognitive perspective for the multimodal analysis of learning.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121945754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}