Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)最新文献

筛选
英文 中文
A proximity measure for link prediction in social user-item networks 社交用户-物品网络中链接预测的接近度量
Chun-Hao Fu, Cheng-Shang Chang, D. Lee
{"title":"A proximity measure for link prediction in social user-item networks","authors":"Chun-Hao Fu, Cheng-Shang Chang, D. Lee","doi":"10.1109/IRI.2014.7051959","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051959","url":null,"abstract":"Recommendation systems based on historical action logs between users and items are usually formulated as link prediction problems for user-item bipartite networks, and such problems have been studied extensively in the literature. With the advent of on-line social networks, social interactions can also be recorded and used for predicting user's future actions. As such, the link prediction problem based on the union of a social network and a user-item bipartite network, called a social user-item network in this paper, has been a hot research topic recently. One of the key challenges for such a problem is to identify and compute an appropriate proximity (similarity) measure between two nodes in a social user-item network. To compute such a proximity measure, in this paper we propose using a random walk with two different jumping probabilities toward different neighboring nodes. Unlike the simple random walk, our method is able to assign different weights to different paths and thus can lead to a better proximity measure by optimizing the two jumping probabilities. To test our method, we conduct various experiments on the DBLP dataset [21]. With a 3-5 year training period, our method performs significantly better than random guess in terms of minimizing the root mean squared error.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123461914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Argumentation schemes for the reuse of argumentation information in collaborative risk management 协同风险管理中论证信息重用的论证方案
Ruan C. B. Pozzebon, L. A. L. Silva, L. Fontoura, J. Campbell
{"title":"Argumentation schemes for the reuse of argumentation information in collaborative risk management","authors":"Ruan C. B. Pozzebon, L. A. L. Silva, L. Fontoura, J. Campbell","doi":"10.1109/IRI.2014.7051888","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051888","url":null,"abstract":"Risk management is a continuous process which is central to the success of a software project. To be effective, a risk management approach should consider perspectives and experiences from different project stakeholders. As described in this paper, these issues lead us to the proposal of an argumentation-based approach for collaborative risk management. Our approach is founded on the integrated exploitation of a well-defined communication protocol and a set of argumentation schemes, both designed for the development of typical risk management tasks. While this dialogue protocol is concerned with the organized interaction of multiple project stakeholders, argumentation schemes for risk management are directed to the capture and reuse of experience-based users' arguments in risk management debates. To illustrate the usability of these resources, a web-based Risk Discussion System for the collaborative development of risk management activities is described. Results from an evaluation experiment confirm the applicability of this enhanced approach for risk management.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125786086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using document space for relational search 使用文档空间进行关系搜索
Richard Drake, K. Pu
{"title":"Using document space for relational search","authors":"Richard Drake, K. Pu","doi":"10.1109/IRI.2014.7051977","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051977","url":null,"abstract":"In this paper, we present a family of methods and algorithms to efficiently integrate text indexing and keyword search from information retrieval to support search in relational databases. We propose a bi-directional transformation that maps relational database instances to document collections. The transformation is shown to be a homomorphism of keyword search. Thus, any search of tuple networks by a keyword query can be efficiently executed as a search for documents, and vice versa. By this construction, we demonstrate that indexing and search technologies developed for documents can naturally be reduced and integrated into relational database systems.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125389289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting top-k most influential nodes by activity analysis 通过活动分析提取top-k最具影响力的节点
Myungcheol Doo, Ling Liu
{"title":"Extracting top-k most influential nodes by activity analysis","authors":"Myungcheol Doo, Ling Liu","doi":"10.1109/IRI.2014.7051894","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051894","url":null,"abstract":"Can we statistically compute social influence and understand quantitatively to what extent people are likely to be influenced by the opinion or the decision of their friends, friends of friends, or acquaintances? An in-depth understanding of such social influence and the diffusion process of such social influence will help us better address the question of to what extent the `word of mouth' effects will take hold on social networks. Most of the existing social influence models to define the influence diffusion are solely based on topological connectivity of social network nodes. In this paper, we presented an activity-base social influence model. Our experimental results show that activity-based social influence is more effective in understanding the viral marketing effects on social networks.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114186740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Mining the user clusters on Facebook fan pages based on topic and sentiment analysis 基于主题和情感分析挖掘Facebook粉丝页面上的用户群
Kuan-Cheng Lin, Shih-Hung Wu, Liang-Pu Chen, Tsun Ku, Gwo-Dong Chen
{"title":"Mining the user clusters on Facebook fan pages based on topic and sentiment analysis","authors":"Kuan-Cheng Lin, Shih-Hung Wu, Liang-Pu Chen, Tsun Ku, Gwo-Dong Chen","doi":"10.1109/IRI.2014.7051948","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051948","url":null,"abstract":"Social network websites such as Facebook, Tweeter, and Plurk have become a useful marketing toolkit. Many companies find that it can provide new opportunities on mining customers' opinions and get better understanding of the customers. The aim of the paper is to analyze the sentiment of users' opinions from corporation-run social networks, the Facebook Fan Pages. The goal is to find the topics and the associated sentiment of the topics in a given Fan Page run by a single corporation. Sentiment analysis in previous works was often based on a sentiment dictionary; we follow the traditional approach with the help of some additional rules to improve the performance. Combining the result of topic extraction and sentiment analysis, we try to find the most interested events in the given Fan Page. The results can be used in advanced marketing for the corporation and to satisfy more users.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114304543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CyPhyMASC: Evolutionary monitoring, analysis, sharing and control platform for SmartGrid defense CyPhyMASC:智能电网防御的进化监测、分析、共享和控制平台
M. Azab, M. Eltoweissy
{"title":"CyPhyMASC: Evolutionary monitoring, analysis, sharing and control platform for SmartGrid defense","authors":"M. Azab, M. Eltoweissy","doi":"10.1109/IRI.2014.7051950","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051950","url":null,"abstract":"Cyber Physical Systems (CPS) promise advances towards smarter infrastructure systems and services, significantly enhancing their reliability, performance and safety. SmartGrids are a typical example of CPS. Current SmartGrids Monitoring, Analysis, Sharing, and Control (MASC) technologies offer disparate and largely inadequate services for the realization of effective, pervasive, and efficient smart grid defense. Most current technologies did not consider that cyber and physical convergence needs a new paradigm to treat cyber and physical components seamlessly. Further, information sharing was severely curtailed by enforcing parameter defense to preserve the privacy of the Target-of-Defense system (ToD). These limitations negatively impact the quality, reliability, survivability, and promptness of defense services. In this paper, we propose an evolutionary sensory and effecting tool, CyPhyMASC, towards realizing pervasive MASC for enhanced SmartGrid defense. CyPhyMASC is unique in that it acts as a generic middle layer between the Defense Service Provider(s) (DSPs) and the ToD(s) creating a uniform defense interface that hides ToD's scale and heterogeneity aspects from Control and Management. Such isolation and uniform representation facilitated interoperable defense services. CyPhyMASC intelligently mixes and matches heterogeneous tools and control logic from various sources towards continually evolving defense missions. CyPhyMASC is also elastic where situation-driven MASC solutions can be dispatched through a dynamic set of sensor and effector software capsules to the ToD rather than using pre-deployed MASC components. DSPs use CyPhyMASC to circulate these capsules into the ToD \"body\" to provide pervasive and scalable MASC services. Using analysis and simulation, our results demonstrate that CyPhyMASC can enhance detection and resolution promptness and sensitivity to multi-threaded widespread attacks while conserving considerable amount of ToD resources.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117174211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The effect of noise level and distribution on classification of easy gene microarray data 噪声水平和分布对简易基因芯片数据分类的影响
Randall Wald, T. Khoshgoftaar, A. A. Shanab
{"title":"The effect of noise level and distribution on classification of easy gene microarray data","authors":"Randall Wald, T. Khoshgoftaar, A. A. Shanab","doi":"10.1109/IRI.2014.7051903","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051903","url":null,"abstract":"Many bioinformatics datasets suffer from noise, making it difficult to build reliable models. These datasets can also exhibit class imbalance (many more examples of the negative class than the positive class), which will also affect classification performance. It is not known how these two problems intersect: no previous study has considered to what extent the noise level (total quantity of noise) and noise distribution (amount of noise in each class) affect performance when considered at the same time. To explore this question, we injected artificial class noise into twelve clean bioinformatics datasets of varying levels of class imbalance (all of which were relatively easy to learn from), varying both the level and distribution of the noise. We discovered that when the number of noisy instances is less than or equal to 40% the total number of minority-class instances, the resulting noisy datasets (regardless of which classes suffered from noise injection) are nearly as easy to build models from as the original, clean data. However, with greater levels of noise injection, the distribution does matter, and in particular it matters in proportion to the imbalance of the original (clean) dataset. If the original dataset was mostly balanced, injecting noise into the minority class will not have much more effect than injecting into the majority class, but for highly imbalanced datasets, injecting into the minority class will give results much worse than those from injecting into the majority class.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127942838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Policy-driven security management for fog computing: Preliminary framework and a case study 雾计算的策略驱动安全管理:初步框架和案例研究
Clinton D'Souza, Gail-Joon Ahn, M. Taguinod
{"title":"Policy-driven security management for fog computing: Preliminary framework and a case study","authors":"Clinton D'Souza, Gail-Joon Ahn, M. Taguinod","doi":"10.1109/IRI.2014.7051866","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051866","url":null,"abstract":"With the increasing user demand for elastic provisioning of resources coupled with ubiquitous and on-demand access to data, cloud computing has been recognized as an emerging technology to meet such dynamic user demands. In addition, with the introduction and rising use of mobile devices, the Internet of Things (IoT) has recently received considerable attention since the IoT has brought physical devices and connected them to the Internet, enabling each device to share data with surrounding devices and virtualized technologies in real-time. Consequently, the exploding data usage requires a new, innovative computing platform that can provide robust real-time data analytics and resource provisioning to clients. As a result, fog computing has recently been introduced to provide computation, storage and networking services between the end-users and traditional cloud computing data centers. This paper proposes a policy-based management of resources in fog computing, expanding the current fog computing platform to support secure collaboration and interoperability between different user-requested resources in fog computing.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114010547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 194
The power of fear: Facial emotion analysis of CEOs to forecast firm performance 恐惧的力量:ceo面部情绪分析预测公司业绩
Yanjia Sun, A. Akansu, James E. Cicon
{"title":"The power of fear: Facial emotion analysis of CEOs to forecast firm performance","authors":"Yanjia Sun, A. Akansu, James E. Cicon","doi":"10.1109/IRI.2014.7051957","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051957","url":null,"abstract":"We present a framework to predict the firm performance based on CEO's facial emotion dynamics during video interviews. This is a challenging pattern recognition problem that involves robust detection of various emotional expressions in the uncontrolled environment and classification of spontaneous spatio-temporal data with different personal and biological signature traits. We assess the reliability of outcomes that result from the classification through noise suppression and information maximization with correlation analysis. The experimental results show the strong and positive reaction of firm performance merely to CEO's Fear emotion. We analyze the determinants that affect Fear emotion and find that Fear is more in newer CEO, and is more when CEO has less control over the board of the firm. These findings may contribute to prediction of the market value of firms and actions taken on effective investment.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"81 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114123240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Particle swarm optimization protocol for clustering in wireless sensor networks: A realistic approach 无线传感器网络聚类的粒子群优化协议:一种现实的方法
Riham S. Elhabyan, M. Yagoub
{"title":"Particle swarm optimization protocol for clustering in wireless sensor networks: A realistic approach","authors":"Riham S. Elhabyan, M. Yagoub","doi":"10.1109/IRI.2014.7051910","DOIUrl":"https://doi.org/10.1109/IRI.2014.7051910","url":null,"abstract":"In Wireless Sensor Network (WSN), Clustering sensor nodes is an efficient topology control method to reduce energy consumption of the sensor nodes. Many link quality-based clustering techniques have been proposed in the literature. However, they assumed that each sensor node is equipped with a self-locating hardware such as GPS. Though this is a simple solution, the resulting cost renders that solution inefficient and unrealistic. Furthermore, several studies has shown that link quality in WSN is not correlated with distance. In addition to that, they used an energy model that is fundamentally flawed for modelling radio power consumption in sensor networks. They ignore the listening energy consumption, which is known to be the largest contributor to expended energy in WSN. Clustering is a Non-deterministic Polynomial (NP)-hard problem for a WSN. Particle Swarm Optimization (PSO) is a swarm intelligent approach that can be applied for finding fast and efficient solutions of such problem. In this paper, a PSO-based protocol is used to find the optimal set of cluster heads that maximize the network coverage, energy efficiency and link quality. The effect of using a realistic network and energy consumption model in cluster-based communication for WSN was investigated. Numerical simulations demonstrate the effectiveness of the proposed protocol.","PeriodicalId":360013,"journal":{"name":"Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信