Lei Li, Farzad Noorian, Duncan J. M. Moss, P. Leong
{"title":"Rolling window time series prediction using MapReduce","authors":"Lei Li, Farzad Noorian, Duncan J. M. Moss, P. Leong","doi":"10.1109/IRI.2014.7051965","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051965","url":null,"abstract":"Prediction of time series data is an important application in many domains. Despite their advantages, traditional databases and MapReduce methodology are not ideally suited for this type of processing due to dependencies introduced by the sequential nature of time series. We present a novel framework to facilitate retrieval and rolling-window prediction of irregularly sampled large-scale time series data. By introducing a new index pool data structure, processing of time series can be efficiently parallelised. The proposed framework is implemented in R programming environment and utilises Hadoop to support parallelisation and fault tolerance. Experimental results indicate our proposed framework scales linearly up to 32-nodes.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130007653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the unification of access control and data services","authors":"David F. Ferraiolo, S. Gavrila, W. Jansen","doi":"10.1109/IRI.2014.7051924","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051924","url":null,"abstract":"A primary objective of enterprise computing (via a data center, cloud, etc.) is the controlled delivery of data services (DS). Typical DSs include applications such as email, workflow, and records management, as well as system level features, such as file and access control management. Although access control (AC) currently plays an important role in imposing control over the execution of DS capabilities, AC can be more fundamental to computing than one might expect. That is, if properly designed, a single AC mechanism can simultaneously implement, control, and deliver capabilities of multiple DSs. The Policy Machine (PM) is an AC framework that has been designed with this objective in mind. This paper describes the PM features that provide a generic AC mechanism to implement DS capabilities, and comprehensively enforces mission tailored access control policies across DSs.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The evolution of network based cybersecurity norms: An analytical narrative","authors":"A. Basuchoudhary, N. Choucri","doi":"10.1109/IRI.2014.7051951","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051951","url":null,"abstract":"We examine coordination dilemmas in cybersecurity policy by using an already developed evolutionary game theoretical model [2]. We suggest that norms to encourage network based security systems may not evolve independently of international governance systems. In fact, certain kinds of state action may actually further discourage the evolution of such norms. This paper therefore suggests that specific system-wide cybersecurity systems will be more effective than network-specific security. We build on established analytical frameworks to develop a cumulative understanding of the dynamics at hand. This would allow us, in due course, to extend the contributions of evolutionary game theory to cybersecurity problems.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122373841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sidahmed Benabderrahmane, R. Quiniou, Thomas Guyet
{"title":"Evaluating distance measures and times series clustering for temporal patterns retrieval","authors":"Sidahmed Benabderrahmane, R. Quiniou, Thomas Guyet","doi":"10.1109/IRI.2014.7051922","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051922","url":null,"abstract":"This paper presents a new method dealing with similarity search and retrieval of temporal motifs from time series data. The suggested approach firstly creates an index over important time series subsequences, using subdimensional clustering. Then, during the querying process, rather than scanning the whole database for extracting relevant answers for a given query, our method traverses the index represented as centroids of the generated clusters, and search for similar subsequences to the query. Finally, relevant temporal associations can be found between the returned motifs using Formal Concept Analysis and Allen's relations.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123654708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interpreting medical tables as linked data for generating meta-analysis reports","authors":"Varish Mulwad, Timothy W. Finin, A. Joshi","doi":"10.1109/IRI.2014.7051955","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051955","url":null,"abstract":"Evidence-based medicine is the application of current medical evidence to patient care and typically uses quantitative data from research studies. It is increasingly driven by data on the efficacy of drug dosages and the correlations between various medical factors that are assembled and integrated through meta-analyses (i.e., systematic reviews) of data in tables from publications and clinical trial studies. We describe a important component of a system to automatically produce evidence reports that performs two key functions: (i) understanding the meaning of data in medical tables and (ii) identifying and retrieving relevant tables given a input query. We present modifications to our existing framework for inferring the semantics of tables and an ontology developed to model and represent medical tables in RDF. Representing medical tables as RDF makes it easier for the automatic extraction, integration and reuse of data from multiple studies, which is essential for generating meta-analyses reports. We show how relevant tables can be identified by querying over their RDF representations and describe two evaluation experiments: one on mapping medical tables to linked data and another on identifying tables relevant to a retrieval query.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122694467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Much more to it: The relation between facebook usage and self-esteem","authors":"Montathar Faraon, Mauri Kaipainen","doi":"10.1109/IRI.2014.7051876","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051876","url":null,"abstract":"The aim of this study was to examine closer the conflicting results from previous studies concerning the relationship between Facebook use and self-esteem using the Facebook Intensity Scale and Rosenberg's Self-Esteem Scale (N = 107). In line with some previous studies, our data confirmed that there is a relationship between Facebook usage and self-esteem, but the applied scales allowed a more refined assessment of it. The results showed, after controlling for demographic variables, that participants with low Facebook intensity reported on average higher self-esteem than those who did not use Facebook or those with high Facebook intensity, while those with medium Facebook intensity had significantly higher self-esteem compared to the participants with high Facebook intensity. Future studies should address the underlying causal relations using a time-bound observation method.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"66 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121015883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Caruso: Interactive headphones for a dynamic 3D audio application in the cultural heritage context","authors":"D. D’Auria, D. D. Mauro, D. Calandra, F. Cutugno","doi":"10.1109/IRI.2014.7051934","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051934","url":null,"abstract":"One of the most important qualities of the physical environment in which humans live is spatial dimensionality. Talking about 3D, we usually think of 3D video, even if it is not the only existing channel of natural interaction. In this paper, we present an interaction system based on spatialized sounds. We developed an application in the cultural heritage context; a personal guide, in 3D sound, attracting the tourists attention toward monuments or buildings, offering soundscapes of augmented reality. The designed system interacts with smart headphones, remotely takes the orientation of the listener's head and properly generates an audio output, which also takes into account the listener's position and orientation in the environment. Thus, an innovative headphones using an inertial measurement unit for determination of the orientation of a users head have been designed and developed in open-ear mode, in order to locate the user in the real context.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127295651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outlier detection based on k-neighborhood MST","authors":"Qingsheng Zhu, Xiaogang Fan, Ji Feng","doi":"10.1109/IRI.2014.7051960","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051960","url":null,"abstract":"Outlier detection is an important task in data mining. It is mainly used for finding strange mechanism or potential danger. This paper presents an outlier detection algorithm based on k-neighborhood minimum spanning tree(MST). This algorithm is applicable to data sets of any arbitrary shape and density and can effectively detect local outliers and local outlying clusters. Taking density and directional factor into consideration, this algorithm proposes a new dissimilarity measure based on k-neighborhood. Then a minimum spanning tree (MST) is built based on this k-neighborhood dissimilarity measure. Finally, the tree is progressively constrained to cutting so that the outliers can be found. Compared with algorithm LOF, COF, KNN and INFLO, the result proves the effectiveness and excellence of this new algorithm.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"11 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123673349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tire-road friction estimation utilizing smartphones","authors":"Michael Jaynes, R. Dantu","doi":"10.1109/IRI.2014.7051980","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051980","url":null,"abstract":"Tire-road friction is an important parameter for a number of different safety features present in modern-day vehicles, and the knowledge of this friction may also prove useful to the driver of a vehicle while it is in motion. In particular, this information may help inform a driver of dangerous low-traction situations that he or she may need to be aware of. Furthermore, since a growing number of drivers have access to Bluetooth-enabled smartphones, it is worth exploring how these devices may be leveraged in concert with vehicular CAN-bus networks to provide valuable safety information.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring that your dart will hit the mark: An introduction to dart contracts","authors":"Patrice Chalin","doi":"10.1109/IRI.2014.7051913","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051913","url":null,"abstract":"This paper presents Dart Contracts, an embedded contract language for Dart with non-null annotations, whose design was inspired by the Java Modeling Language, Spec# and Microsoft's Code Contracts, among others. Dart is a dynamically typed object-oriented language with first class functions and an optional static type system. Dart is useful for engineering web apps (running in browsers) as well as server-side programs. The Dart programming language is one of Google's responses to the deficiencies of JavaScript when it comes to engineering large-scale Web applications.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114552154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}