{"title":"Construction of discriminant model of web documents suitability as search results","authors":"Hikari Suganuma, Takamitsu Shioi, K. Hatano","doi":"10.1145/3011141.3011204","DOIUrl":"https://doi.org/10.1145/3011141.3011204","url":null,"abstract":"In the research field of Web search engine development, the most important challenge is to extract more information from queries issued to Web search engines. However, the number of words in these queries tends to be small, so that it is difficult to extract information from them. Therefore, some researchers have focused on developing techniques, such as Web spam detection methods, that discriminate Web documents that do not constitute satisfactory search results. In this paper, we propose a method for constructing a discriminant model for determining whether Web documents constitute suitable or unsuitable search results of Web search engines. In contrast to current Web spam detection techniques, our method analyzes the characteristics of the Web documents quantitatively and eliminates the documents that are estimated to be unsuitable search results. Our experimental results show that our discriminant model can help to improve the effectiveness of Web search engines and the efficiency of Web document discriminators as compared to current Web spam detection techniques.","PeriodicalId":247823,"journal":{"name":"Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fadwa Yahya, Khouloud Boukadi, Z. Maamar, H. Ben-Abdallah
{"title":"Towards a meta-modeling approach for social business process requirements capture","authors":"Fadwa Yahya, Khouloud Boukadi, Z. Maamar, H. Ben-Abdallah","doi":"10.1145/3011141.3011170","DOIUrl":"https://doi.org/10.1145/3011141.3011170","url":null,"abstract":"A Social Business Process (SBP) is the result of blending social computing (a.k.a. Web 2.0) with business process (BP). Despite the benefits of SBP to enterprises, several limitations continue to undermine them. In this paper, we address two specific limitations, namely the difficulty of capturing SBP's requirements and the lack of a definition for SBP. Thus, meta-modeling is used to capture requirements from organizational, technological, and management perspectives. In addition, we introduce a definition for SBP by enriching an existing BP meta-model with social concepts. To annotate the SBP model with its requirements, a BPMN extension is proposed. The proposed meta-models are evaluated in terms of completeness and clarity using the Bunge-Wand-Weber ontology.","PeriodicalId":247823,"journal":{"name":"Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130696895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
André de Camargo, I. Salvadori, R. Mello, Frank Siqueira
{"title":"An architecture to automate performance tests on microservices","authors":"André de Camargo, I. Salvadori, R. Mello, Frank Siqueira","doi":"10.1145/3011141.3011179","DOIUrl":"https://doi.org/10.1145/3011141.3011179","url":null,"abstract":"The microservices architecture provides a new approach to develop applications. As opposed to monolithic applications, in which the application comprises a single software artifact, an application based on the microservices architecture is composed by a set of services, each one designed to perform a single and well-defined task. These services allow the development team to decouple several parts of the application using different frameworks, languages and hardware for each part of the system. One of the drawbacks for adopting the microservices architecture to develop applications is testability. In a single application test boundaries can be more easily established and tend to be more stable as the application evolves, while with microservices we can have a set of hundreds of services that operate together and are prone to change more rapidly. Each one of these services needs to be tested and updated as the service changes. In addition, the different characteristics of these services such as languages, frameworks or the used infrastructure have to be considered in the testing phase. Performance tests are applied to assure that a particular software complies with a set of non-functional requirements such as throughput and response time. These metrics are important to ensure that business constraints are respected and to help finding performance bottlenecks. In this paper, we present a new approach to allow the performance tests to be executed in an automated way, with each microservice providing a test specification that is used to perform tests. Along with the architecture, we also provide a framework that implements some key concepts of this architecture. This framework is available as an open source project1.","PeriodicalId":247823,"journal":{"name":"Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131800756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A lightweight e-learning system for algorithms and data structures","authors":"Volodimir Begy, E. Schikuta","doi":"10.1145/3011141.3011181","DOIUrl":"https://doi.org/10.1145/3011141.3011181","url":null,"abstract":"We present webAD, a web-based e-learning platform for the visualization of algorithms and data structures. It follows a light-weight server-less implementation paradigm and pursues a minimalistic vision: no installation or configuration effort, multi device support, clear structure of didactic content and simple extensibility for developers. Compared to other visualization tools for algorithms and data structures webAD puts a high value on an innovative flexible tape-recorder mechanism. Based purely on HTML5 and JavaScript with the smallest usage of external libraries it is designed according to the Model-View-Controller architectural pattern and works as a fat client. A thorough analysis of the system in respect to usability and extensibility is performed and findings and recommendations are critically discussed.","PeriodicalId":247823,"journal":{"name":"Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134310984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time captioning of sign language by groups of deaf and hard-of-hearing people","authors":"Jianwei Zhang, Yuhki Shiraishi, Katsumi Kumai, Atsuyuki Morishima","doi":"10.1145/3011141.3011143","DOIUrl":"https://doi.org/10.1145/3011141.3011143","url":null,"abstract":"In order to realize smooth communication between people with or without difficulty in hearing, we aim to implement an information support system based on crowdsourcing, a problem-solving model, in which numerous people cooperate to accomplish a job. More specifically, we implement a crowdsourced captioning system that enables groups of deaf and hard-of-hearing people to collaboratively interpret a speech or lecture given by sign language to text in real-time. Deaf and hard-of-hearing people are generally considered as the ones who receive support from others, but our proposal helps them become the ones who offer support to others. In this paper, we explore the issues that need be resolved for the practical use of the proposed system through several experiments and succeed in verifying its feasibility.","PeriodicalId":247823,"journal":{"name":"Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122433667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A passive means based privacy protection method for the perceptual layer of IoTs","authors":"Xiaoyu Li, O. Yoshie, Daoping Huang","doi":"10.1145/3011141.3011153","DOIUrl":"https://doi.org/10.1145/3011141.3011153","url":null,"abstract":"Privacy protection in Internet of Things (IoTs) has long been the topic of extensive research in the last decade. The perceptual layer of IoTs suffers the most significant privacy disclosing because of the limitation of hardware resources. Data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. Therefore, in this paper we derive an innovative and passive method called Horizontal Hierarchy Slicing (HHS) method to detect the existence of unknown wireless devices which could result negative means to the privacy. PAM algorithm is used to cluster the HHS curves and analyze whether unknown wireless devices exist in the communicating environment. Link Quality Indicator data are utilized as the network parameters in this paper. The simulation results show their effectiveness in privacy protection.","PeriodicalId":247823,"journal":{"name":"Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129173694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Salvadori, Alexis Huf, R. Mello, Frank Siqueira
{"title":"Publishing linked data through semantic microservices composition","authors":"I. Salvadori, Alexis Huf, R. Mello, Frank Siqueira","doi":"10.1145/3011141.3011155","DOIUrl":"https://doi.org/10.1145/3011141.3011155","url":null,"abstract":"Microservices are replacing monolithic applications by splitting them out into small and independent artifacts that collaborate with one another. Focused on managing highly cohesive information, microservices may be composed to provide richer and linked information. This paper presents a composition method, aimed at composing semantic microservices for achieving data integration based on Linked Data principles. Moreover, the proposed method leverages the independence of development and composability of microservices. This paper also presents a framework and a case study for the proposed method.","PeriodicalId":247823,"journal":{"name":"Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125916521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending the integrated intelligent computer-assisted language learning (iiCALL) environment","authors":"H. Wahl, R. Galler, W. Winiwarter","doi":"10.1145/3011141.3011209","DOIUrl":"https://doi.org/10.1145/3011141.3011209","url":null,"abstract":"The Integrated Intelligent Computer-Assisted Language Learning (iiCALL) environment offers options to learn natural languages with the use of common working environments like Web browsers or e-mail clients. Therefore, we designed a generic data model and developed a software framework handling language learning processes and information exchanges. A corresponding prototype, implemented as Firefox plug-in, shows the applicability of the generic data model to a specific learning scenario within an iiCALL environment. For developers, the paper proves extensibility by describing the framework and the way of extending iiCALL to add new learning scenarios and functionalities.","PeriodicalId":247823,"journal":{"name":"Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121754485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Putra, K. Hulliyah, Nashrul Hakiem, R. Iswara, A. Firmansyah
{"title":"Generating weighted vector for concepts in indonesian translation of Quran","authors":"S. Putra, K. Hulliyah, Nashrul Hakiem, R. Iswara, A. Firmansyah","doi":"10.1145/3011141.3011218","DOIUrl":"https://doi.org/10.1145/3011141.3011218","url":null,"abstract":"This paper presents a work in generating Weighted Vector for each Concept in Indonesian Translation of Quran (ITQ). This task is done in aiming to provide a resource needed in implementing a semantic-based question answering system (QAS) for Indonesian ITQ, particularly in retrieving semantically related verses. Semantic approach on QAS employs Ontology concepts of the domain. Since there is no Ontology for ITQ remains, we built one by utilizing the existing Ontology from Quranic Arabic corpus (http://corpus.quran.com/). Furthermore, each leaf concept that enriched by related Quran verse (as its instance) had a representation vector of terms that occur in the corresponding Quran verse to express how strength the concept in relates with verse terms. This vector is assigned with a weight resulted from applying TFIDF method. From 222 leaf concepts in the Ontology, we applied the process only to those that categorized as a member group of Person, Location, and Time named entity. They are 107 in a total. The result shows that the most strength concept in association with verse terms is syaitan which is scored at 0.895 of 1. In overall, 16.82 % concepts had score that more than 0.4, following by 14.95%, 23.36% and 11.21% concepts scored at more than 0.3 ,0.2 and less than 0.1 respectively, and finally the rest ones were the biggest in volume where 33.64% concepts obtained score more than 0.1 and less than 0.2.","PeriodicalId":247823,"journal":{"name":"Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131835490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximate graph distance with imagisation","authors":"Bo Hu","doi":"10.1145/3011141.3011163","DOIUrl":"https://doi.org/10.1145/3011141.3011163","url":null,"abstract":"Graph similarity can contribute to the solutions of a wide variety of real-life problems. Effective graph similarity measures, therefore, are in high demand in areas such as communication network, biology, medicine, finance, etc. Existing similarity methods present key shortcomings including high run-time computational cost and/or strong dependence on feature selection and feature engineering. Many of existing methods also suffer from ambiguity in the interpretation of resultant measurement. In this paper, we propose a fast approximation of graph similarity grounded on convolutional neural network based image embedding. Graph similarity (distance) is, therefore, translated into the quantitative comparison of the corresponding images faithfully encoding structural information of the graphs. The proposed method is validated with purposely built test data. In addition, we have also carried out a preliminary evaluation, that has demonstrated highly promising results: confirming the viability of proposed \"imagisation\" based graph distance measure.","PeriodicalId":247823,"journal":{"name":"Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130781012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}