Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)最新文献

筛选
英文 中文
Extending automated intelligence systems via graph database: A case study of the "Meth Hunter" 通过图形数据库扩展自动化智能系统:以“冰毒猎人”为例
M. Blair, Yunkai Liu, Theresa M. Vitolo
{"title":"Extending automated intelligence systems via graph database: A case study of the \"Meth Hunter\"","authors":"M. Blair, Yunkai Liu, Theresa M. Vitolo","doi":"10.1109/IRI.2014.7051898","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051898","url":null,"abstract":"Automated intelligence analysis was born into a skeptical community dealing with high stakes dilemmas, where often outcomes are measured in loss of human life. The massive amount of data require analysts to be masters of identifying \"indicators\" intuitively foreshadowing intelligence targets and masters of modeling the indicators in analysis systems. The paper explores the application of graph theory through graph databases to determine how the index-free adjacency of graph databases can be exploited to improve processing time. The study utilized the Meth Hunter, an analytic machine designed to identify methamphetamine conspirators by analyzing pseudoephedrine purchase records as a case study. The graph database (Neo4j) was compared to a SQL relational database (WAMP). Neo4j demonstrated superior performance in identifying and retrieving relationships between data points. Neo4j successfully demonstrated the ability to implement such a strategy and extend the horizons of traditional data mining systems.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121971021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a refactoring catalogue for knowledge discovery metamodel 面向知识发现元模型的重构目录
R. Durelli, Daniel S. M. Santibáñez, M. Delamaro, V. V. D. Camargo
{"title":"Towards a refactoring catalogue for knowledge discovery metamodel","authors":"R. Durelli, Daniel S. M. Santibáñez, M. Delamaro, V. V. D. Camargo","doi":"10.1109/IRI.2014.7051940","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051940","url":null,"abstract":"Refactorings are a well known technique that assist developers in reformulating the overall structure of applications aiming to improve internal quality attributes while preserving their original behavior. One of the most conventional uses of refactorings are in reengineering processes, whose goal is to change the structure of legacy systems aiming to solve previously identified structural problems. Architecture-Driven Modernization (ADM) is the new generation of reengineering processes; relying just on models, rather than source code, as the main artifacts along the process. However, although ADM provides the general concepts for conducting model-driven modernizations, it does not provide instructions on how to create or apply refactorings in the Knowledge Discovery Metamodel (KDM) metamodel. This leads developers to create their own refactoring solutions, which are very hard to be reused in other contexts. One of the most well known and useful refactoring catalogue is the Fowler's one, but it was primarily proposed for source-code level. In order to fill this gap, in this paper we present a model-oriented version of the Fowler's Catalogue, so that it can be applied to KDM metamodel. In this paper we have focused on four categories of refactorings: (j') renaming, (w) moving features between objects, (iii) organizing data, and (iv) dealing with generalization. We have also developed an environment to support the application of our catalogue. To evaluate our solution we conducted an experiment using eight open source Java application. The results showed that our catalogue can be used to improve the cohesion and coupling of the legacy system.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121572756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Time properties verification of UML/MARTE real-time systems UML/MARTE实时系统的时间属性验证
Aymen Louati, Kamel Barkaoui, Chadlia Jerad
{"title":"Time properties verification of UML/MARTE real-time systems","authors":"Aymen Louati, Kamel Barkaoui, Chadlia Jerad","doi":"10.1109/IRI.2014.7051915","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051915","url":null,"abstract":"UML and MARTE are standardized modeling languages widely used in industry for the design of realtime systems. However, formal verification at early phases of the system lifecycle for UML/MARTE models remains an open issue mainly for dependability features. In this paper, we show how we can provide a formal verification of time properties from a UML/MARTE description. For this, we translate this latter description expressed in Interaction Overview Diagrams (IOD) and Timing Diagrams (TD) into Timed Petri Nets (TPN). This resulting formal execution semantics allows using the Romeo model-checker to check the behavior of TPN and some time properties formulated in TCTL (Timed Computation Tree Logic). We illustrate the proposed approach on a case study derived from a real-time asynchronous system (Integrated Modular Avionics (IMA)-based airborne system).","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121618578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Paradigm integration in a specification course 规范课程中的范式集成
M. Martins, A. Madeira, L. Barbosa, Renato Neves
{"title":"Paradigm integration in a specification course","authors":"M. Martins, A. Madeira, L. Barbosa, Renato Neves","doi":"10.1109/IRI.2014.7051929","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051929","url":null,"abstract":"As a complex artefact, software has to meet requirements formulated and verified at different levels of abstraction. A basic distinction is drawn between behavioural (dynamic) and data (static) aspects. From an educational point of view, although disguised under a number of different designations, both issues are usually present, but kept separated, in typical Computer Science undergraduate curricula. It is often argued that they tackle orthogonal problems through essentially different methods. This paper explores an alternative path in which students progress from equational to hybrid specifications in a uniform setting, integrating paradigms, combining data and behaviour, and dealing appropriately with systems evolution and reconfiguration.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114746825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a technology roadmap for big data applications in the healthcare domain 为医疗保健领域的大数据应用制定技术路线图
S. Zillner, Heiner Oberkampf, C. Bretschneider, A. Zaveri, W. Faix, S. Neururer
{"title":"Towards a technology roadmap for big data applications in the healthcare domain","authors":"S. Zillner, Heiner Oberkampf, C. Bretschneider, A. Zaveri, W. Faix, S. Neururer","doi":"10.1109/IRI.2014.7051902","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051902","url":null,"abstract":"Big Data technologies can be used to improve the quality and efficiency of healthcare delivery. The highest impact of Big Data applications is expected when data from various healthcare areas, such as clinical, administrative, financial, or outcome data, can be integrated. However, as of today, the seamless access to the various healthcare data pools is only possible in a very constrained and limited manner. For enabling the seamless access several technical requirements, such as data digitalization, semantic annotation, data sharing, data privacy and security as well as data quality need to be addressed. In this paper, we introduce a detailed analysis of these technical requirements and show how the results of our analysis lead towards a technical roadmap for Big Data in the healthcare domain.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132486233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Deploying malware detection software for smart phones 为智能手机部署恶意软件检测软件
Nathan McDaniel, B. Thuraisingham, L. Khan
{"title":"Deploying malware detection software for smart phones","authors":"Nathan McDaniel, B. Thuraisingham, L. Khan","doi":"10.1109/IRI.2014.7051867","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051867","url":null,"abstract":"As mobile computing devices become more widely used and integrated with more crucial systems like infrastructure and military or law enforcement, it becomes more apparent that these mobile systems should be the target of malware and other forms of cyber-attack. Limited system resources make classic signature detection difficult. As new methods for detection develop, it is important that we maintain the ability to confidently block harmful applications from running. We look at using default system resources to maintain control of application installation and execution. The confirmation and proper detection of malicious activity still requires offrite connectivity; however, without this connectivity, the default mobile resources can still be used to maintain control of a clean system environment until verification is made. Though the entire malware detection system is not demonstrated here, the proof of a gateway protocol for system modification and the layout of a supposed system are presented.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"428 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120879139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Kalman-filter algorithm and PMUs for state estimation of distribution networks 配电网状态估计的卡尔曼滤波算法与pmu
F. Shabaninia, M. Vaziri, M. Amini, M. Zarghami, S. Vadhava
{"title":"Kalman-filter algorithm and PMUs for state estimation of distribution networks","authors":"F. Shabaninia, M. Vaziri, M. Amini, M. Zarghami, S. Vadhava","doi":"10.1109/IRI.2014.7051983","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051983","url":null,"abstract":"Availability of data from Phasor Measurement Units (PMUs), characterized by their high accuracy to measure node voltage phasors, allows a simplification of the State Estimation (SE) problems. In this paper Iterated Kaiman Filter (IKF) algorithm, as a new method, has been used for SE of a test Active Distributed Network (ADN) integrating PMU measurements. In order to validate the results, Weighted Least Squares (WLS) method, as a common way for SE problems, is simulated. In this case study, IEEE 13-bus test system is used with considering one Distributed Generation (DG). Simulation results show the proper performance of the IKF method.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125955016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semantics management for big networks 大型网络的语义管理
B. Mokhtar, M. Eltoweissy
{"title":"Semantics management for big networks","authors":"B. Mokhtar, M. Eltoweissy","doi":"10.1109/IRI.2014.7051885","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051885","url":null,"abstract":"We define \"Big Networks\" as those that generate big data and can benefit from big data management in their operations. Examples of big networks include the emerging Internet of things and social networks. A major challenge in big networks is storing, processing and accessing massive multidimensional data to extract useful information for more efficient and smarter networking operations. Dimension reduction, learning patterns and extracting semantics from big data would help in mitigating such challenge. We have proposes a network \"memory\" system, termed NetMem, with storage and recollection mechanisms to access and manage data semantics in the Internet. NetMem is inspired by functionalities of human memory for learning patterns from huge amounts of data. In this paper we refine NetMem design and explore hidden Markov models, latent dirichlet allocation, and simple statistical analysis-based techniques for semantic reasoning in NetMem. In addition, we utilize locality sensitive hashing for reducing dimensionality. Our simulation study demonstrates the benefits of NetMem and highlights the advantages and limitations of the aforementioned techniques both with and without dimensionality reduction.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"33 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126113891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward inferring the age of Twitter users with their use of nonstandard abbreviations and lexicon 通过使用非标准缩写词和词汇来推断Twitter用户的年龄
N. Moseley, Cecilia Ovesdotter Alm, M. Rege
{"title":"Toward inferring the age of Twitter users with their use of nonstandard abbreviations and lexicon","authors":"N. Moseley, Cecilia Ovesdotter Alm, M. Rege","doi":"10.1109/IRI.2014.7051893","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051893","url":null,"abstract":"Automatically determining demographic profile attributes of writers with high accuracy, based on their texts, can be useful for a range of application domains, including smart ad placement, security, the discovery of predator behaviors, enabling automatic enhancement of participants profiles for extended analysis, and various other applications. Attributes such as author gender can be determined with some amount of success from many sources, using various methods, such as analysis of shallow linguistic patterns or topic. Author age is more difficult to determine, but previous research has been somewhat successful at classifying age as a binary (e.g. over or under 30), ternary, or even as a continuous variable using various techniques. In this work, we show that word and phrase abbreviation patterns can be used toward determining user age using novel binning. Notable results include classification accuracy of up to 82.8%, which was 67.0% above relative majority class baseline when classifying user ages into 10 equally sized age bins using a support vector machine classifier and PCA extracted features (including n-grams) and 50.8% (33.7% above baseline) when using only abbreviation features. Also presented is an analysis of the evident change in abbreviation use over time on Twitter.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124813097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Formalization and analysis of timed BPEL 定时BPEL的形式化和分析
Imed Eddine Chama, Nabil Belala, Djamel-Eddine Saïdouni
{"title":"Formalization and analysis of timed BPEL","authors":"Imed Eddine Chama, Nabil Belala, Djamel-Eddine Saïdouni","doi":"10.1109/IRI.2014.7051928","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051928","url":null,"abstract":"In this paper, we are interested in formalization, analysis and checking of the BPEL language at the semantic level. We propose translating rules from BPEL language to a low-level real-time model (DATA). This model is based on true-concurrency semantics and supports at the same time timing constraints and actions durations. This transformation approach gives a formal semantics to the BPEL language and allows the formalization and the analysis of both qualitative and quantitative requirements. The resulting DATA structures are then analyzed by model checking value-based temporal logic properties (TCTL) using UPPAAL.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130048404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信