{"title":"CCRS: Web Service for Chinese Character Recognition","authors":"Hang Zhuang, Changlong Li, Xuehai Zhou","doi":"10.1109/ICWS.2018.00010","DOIUrl":"https://doi.org/10.1109/ICWS.2018.00010","url":null,"abstract":"Handwritten Chinese character recognition (HCCR) is an important research field of pattern recognition, which has attracted extensive studies during the past decades. Recently convolutional neural network (CNN) based methods have achieved the state-of-the-art performance for handwritten Chinese character recognition. Nevertheless, handwritten Chinese character recognition is still limited to be effectively used in the actual environment due to the large-scale vocabulary and great diversity of handwriting style. In this paper, we constructed a handwritten Chinese character recognition service based on convolutional neural network, which tries to make effective use of handwritten based printed fonts and existing handwritten database. At the same time, the service can effectively collect more handwritten data to expand the training dataset, which makes it easy to adapt to the new handwriting styles. Meanwhile, We propose a multi-level recognition theory applied to online handwritten Chinese character recognition, which may improve the accuracy of handwritten Chinese character recognition and break the limitations of handwritten Chinese character recognition by identifying the structure of Chinese characters and possible stroke orders firstly. Furthermore, we try to apply the method of online character recognition to the offline character recognition based on the basic writing rules.","PeriodicalId":231056,"journal":{"name":"2018 IEEE International Conference on Web Services (ICWS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Himlun Bista, I. Yen, F. Bastani, Martin Mueller, Darnell J. Moore
{"title":"Semantic-Based Information Sharing in Vehicular Networks","authors":"Himlun Bista, I. Yen, F. Bastani, Martin Mueller, Darnell J. Moore","doi":"10.1109/ICWS.2018.00043","DOIUrl":"https://doi.org/10.1109/ICWS.2018.00043","url":null,"abstract":"Vehicular communication can enhance the safety and effectiveness of the autonomous vehicle (AV) control process. However, existing AV communication never considers the issues of when to communicate, who to communicate with, and what information to share. We show that the answer to the when, who, and what questions are situation dependent and attempt to define a semantic model to capture a relatively complete set of situations. Based on the semantic model, we define the communication protocols that are best suited to different situations. We then experimentally show that our protocol is efficient and effective.","PeriodicalId":231056,"journal":{"name":"2018 IEEE International Conference on Web Services (ICWS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114741023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PRNN: Piecewise Recurrent Neural Networks for Predicting the Tendency of Services Invocation","authors":"Haozhe Lin, Yushun Fan, Jia Zhang, Bing Bai","doi":"10.1109/ICWS.2018.00013","DOIUrl":"https://doi.org/10.1109/ICWS.2018.00013","url":null,"abstract":"Driven by the widespread application of Service-Oriented Architecture (SOA), the quantity of web services and their users keeps increasing in the service ecosystem. Since services are hosted by service providers, it will be very helpful to predict the tendency of services invocation for service providers, so that proper actions may be taken to ensure the quality of services. Two major challenges exist in predicting the tendency of services invocation, however. First, different service invocation sequences may bear different and complicated characteristics, which is hard to be modeled generally. Second, the intricate relations between service invocation sequences are valuable but hard to be discriminated and utilized. To address these issues, a deep neural network, named Piecewise Recurrent Neural Network (PRNN), is developed by taking both generality and pertinence into consideration. For generality, PRNN extracts complicated characteristics of all service invocation sequences through Long Short-Term Memory (LSTM) units. For pertinence, PRNN develops a piecewise mechanism, through which service invocation sequences can be clustered automatically and predicted discriminatingly. Extensive experiments in real-world dataset show that PRNN outperforms baseline methods in predicting the tendency of services invocation.","PeriodicalId":231056,"journal":{"name":"2018 IEEE International Conference on Web Services (ICWS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122027227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extinguishing the Backfire Effect: Using Emotions in Online Social Collaborative Argumentation for Fact Checking","authors":"Ricky J. Sethi, R. Rangaraju","doi":"10.1109/ICWS.2018.00062","DOIUrl":"https://doi.org/10.1109/ICWS.2018.00062","url":null,"abstract":"Controversial or complex topics often exhibit the backfire effect, where users' opinions harden in the face of facts to the contrary. We present initial work towards developing an online social collaborative argumentation system to verify alternative facts and misinformation by also including users' emotional associations with those stances. Our goal is to help users more effectively explore and understand their possibly subconscious biases in an effort to overcome the backfire effect and formulate more varied insights into complex and controversial topics. In order to aid this process, we model their emotional profile on such topics and combine it with a proposition profile, based on the semantic and collaborative content of propositions. We develop an algorithm to generate sentiment-based models of claims and propositions which we can filter based on users' inferred beliefs and the strength of those beliefs.","PeriodicalId":231056,"journal":{"name":"2018 IEEE International Conference on Web Services (ICWS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128178676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Publisher's Information","authors":"","doi":"10.1109/icws.2018.00068","DOIUrl":"https://doi.org/10.1109/icws.2018.00068","url":null,"abstract":"","PeriodicalId":231056,"journal":{"name":"2018 IEEE International Conference on Web Services (ICWS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131371212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Kapitsaki, Joseph Ioannou, J. Cardoso, C. Pedrinaci
{"title":"Linked USDL Privacy: Describing Privacy Policies for Services","authors":"G. Kapitsaki, Joseph Ioannou, J. Cardoso, C. Pedrinaci","doi":"10.1109/ICWS.2018.00014","DOIUrl":"https://doi.org/10.1109/ICWS.2018.00014","url":null,"abstract":"As the provision of services and the use of personal data expands, the need for services to explicitly detail what personal data a service handles and in which manner becomes paramount in order to achieve a fully transparent, ethical and personalized user experience. Services usually require access to sensitive information and may distribute this information to third parties. Service consumers need to be informed about the ways their data are used and about the actors involved in this process. Universal service descriptions that can be used to cover any business service are required to provide interoperability. In this paper, we describe our work on the privacy module for the Linked Unified Service Description Language (USDL). We expand the language by introducing a new module that allows the specification of privacy properties for business services. We have considered recent advances in data protection for its creation and provide a method, accompanied by a software tool, to examine the validity of privacy policy descriptions with Linked USDL Privacy module.","PeriodicalId":231056,"journal":{"name":"2018 IEEE International Conference on Web Services (ICWS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129505514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongyue Wu, Shuiguang Deng, Wei Li, Min Fu, Jianwei Yin, Albert Y. Zomaya
{"title":"Service Selection for Composition in Mobile Edge Computing Systems","authors":"Hongyue Wu, Shuiguang Deng, Wei Li, Min Fu, Jianwei Yin, Albert Y. Zomaya","doi":"10.1109/ICWS.2018.00060","DOIUrl":"https://doi.org/10.1109/ICWS.2018.00060","url":null,"abstract":"Due to the limited capabilities and resources, edge servers cannot meet the increasingly complex and diverse service requirements in mobile edge computing environments. In this circumstance, how to dispatch the component tasks of service requests to edge and cloud servers to reduce the time delay has become a crucial problem. Therefore, we focus on this problem and propose a heuristic algorithm called GAMEC (combined Genetic algorithm and simulated Annealing algorithm for service selection in Mobile Edge Computing systems). The simulated experiments have demonstrated the high effectiveness of the method.","PeriodicalId":231056,"journal":{"name":"2018 IEEE International Conference on Web Services (ICWS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131140534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Title Page i","authors":"","doi":"10.1109/icws.2018.00001","DOIUrl":"https://doi.org/10.1109/icws.2018.00001","url":null,"abstract":"","PeriodicalId":231056,"journal":{"name":"2018 IEEE International Conference on Web Services (ICWS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114645686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hitting Three Birds with One System: A Voice-Based CAPTCHA for the Modern User","authors":"Muhammad A Shah, Khaled A. Harras","doi":"10.1109/ICWS.2018.00040","DOIUrl":"https://doi.org/10.1109/ICWS.2018.00040","url":null,"abstract":"CAPTCHA challenges are used all over the Internet to prevent automated scripts from spamming web services. However, recent technological developments have rendered the conventional CAPTCHA insecure and inconvenient to use. In this paper, we propose vCAPTCHA, a voice-based CAPTCHA system that would: (1) enable more secure human authentication, (2) more conveniently integrate with modern devices accessing web services, and (3) help collect vast amounts of annotated speech data for different languages, accents, and dialects that are under-represented in the current speech corpora, thus making speech technologies accessible to more people around the world. vCAPTCHA requires users to speak their responses, in order to unlock or use different web services, instead of typing them. These user responses are analyzed to determine if they were indeed naturally produced, and transcribed to ensure that they contain the challenge sentence. We build a prototype for vCAPTCHA in order to assess its performance and practicality. Our preliminary results show that we are able to achieve an attack success rate as low as 2.3% while maintaining a human success rate comparable to current CAPTCHAs, on ASVspoof datasets.","PeriodicalId":231056,"journal":{"name":"2018 IEEE International Conference on Web Services (ICWS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121902893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Florian Schmidt, Anton Gulenko, Marcel Wallschläger, Alexander Acker, Vincent Hennig, Feng Liu, O. Kao
{"title":"IFTM - Unsupervised Anomaly Detection for Virtualized Network Function Services","authors":"Florian Schmidt, Anton Gulenko, Marcel Wallschläger, Alexander Acker, Vincent Hennig, Feng Liu, O. Kao","doi":"10.1109/ICWS.2018.00031","DOIUrl":"https://doi.org/10.1109/ICWS.2018.00031","url":null,"abstract":"Telecommunication system providers move their IP multimedia subsystems to virtualized services in the cloud. For such systems, dedicated hardware solutions provided a reliability of 99.999% in the past. Although virtualization offers more cost efficient usage of such services, it comes with higher complexity for providing reliable running software components due to the fragile computation stack. In order to hide the impact of such problematic behaviors, automatic mechanisms may help to detect degraded state anomalies in order to execute remediation actions. This work introduces IFTM as a framework for unsupervised anomaly detection in a distributed environment based on real-time monitoring data. The proposed approach consists of two key concepts using an automatic identity function and threshold learning to distinguish between normal and abnormal system behaviors. The evaluation is performed on a testbed running an open source implementation of the IP multimedia subsystem (Clearwater) executed on a replicated Openstack cloud environment. Results show the applicability of IFTM with high detection rates (98%) and low number of false alarms.","PeriodicalId":231056,"journal":{"name":"2018 IEEE International Conference on Web Services (ICWS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115511211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}