Jordi Castellà-Roca, Vanesa Daza, J. Domingo-Ferrer, F. Sebé
{"title":"Privacy homomorphisms for e-gambling and mental poker","authors":"Jordi Castellà-Roca, Vanesa Daza, J. Domingo-Ferrer, F. Sebé","doi":"10.1109/GRC.2006.1635918","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635918","url":null,"abstract":"Abstract —With the development of computer networks, situ-ations where a set of players remotely play a game ( e-gaming )have become usual. Often players play for money ( e-gambling ),which requires standards of security similar to those in physicalgambling. Cryptographic tools have been commonly used so farto provide security to e-gambling. Homomorphic encryption isan example of such tools.In this paper we review the mental poker protocols, whereplayers are assumed to remotely play poker. We focus on the keyadvantage of using cryptosystems with homomorphic properties( privacy homomorphisms ) because they offer the possibility ofmanipulating cards in encrypted form. Index Terms —Cryptography, privacy homomorphism, mentalpoker I. I NTRODUCTION The growth of computer networks has allowed many activ-ities that used to require physical presence to become doableover the network. One example is e-gambling. In this paper wefocus on mental poker, i.e. a poker game played among playersthat are not physically together but communicate throughcomputer networks.A mental poker system needs to provide protocols togenerate a deck of cards, shuffle it and confidentially dealthe cards to players. Naive approaches assume the existenceof a trusted third party (TTP), who performs some or all ofthe aforementioned operations [1].Since the assumption on all players trusting this central nodeis not always realistic, research on solutions not requiringa trusted party has become a hot topic [2]–[5]. To ensurethe players a fair play, standards of security similar to thosein physical gambling must be guaranteed. For instance, it isgood for trust generation that all players participate in thecomputation of the shuffled deck of cards. Current proposalsin the literature are based on a paradigm consisting of thefollowing steps:1) The players generate the deck of 52 face-up cards","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128470104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Claudia A. S. Mello, R. Mello, M. T. P. Santos, Luciano José Senger, L. Yang
{"title":"A new method for classifying and searching software components by using a self-organizing neural network architecture","authors":"Claudia A. S. Mello, R. Mello, M. T. P. Santos, Luciano José Senger, L. Yang","doi":"10.1109/GRC.2006.1635772","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635772","url":null,"abstract":"The method presented in this paper aims to simplify the construction of software component repositories. The repository makes possible the reuse of components, reducing the software implementation costs. The proposed method extracts informations from component documentation, or either, terms which compound the metadata to represent components. The components are automatically grouped, using the terms, in the repository by means of the ART-2A self- organizing artificial neural network architecture. The vectorial search strategy is used to retrieve software components which are grouped by the neural network. Experiments showed that this strategy improved the ordinary vectorial search by an average of 9.55% in precision, maintaining a similar quality in recall. This method also presented an relevant increase in the search performance.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126757562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stochastic processes and temporal rules","authors":"Paul Cotofrei, K. Stoffel","doi":"10.1109/GRC.2006.1635834","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635834","url":null,"abstract":"This article tries to give an answer to a fundamental question in temporal data mining: \"Under what conditions a temporal rule extracted from an up-to-date temporal data keeps its cofidence/support on future data\". A possible solution is given by using, on the one hand, a temporal logic formalism which allows the definition of the main notions (event, temporal rule, confidence) in a formal way and, on the other hand, the stochastic limit theory. Under this probabilistic temporal framework, the equivalence between the existence of the support of a temporal rule and the law of large numbers is systematically analyzed.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124329406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ying Xie, T. Johnsten, Vijay V. Raghavan, Karthik Ramachandran
{"title":"On discovering \"potentially useful\" patterns from databases","authors":"Ying Xie, T. Johnsten, Vijay V. Raghavan, Karthik Ramachandran","doi":"10.1109/GRC.2006.1635848","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635848","url":null,"abstract":"As is generally accepted, the most important feature that a KDD system must possess is the ability to discover patterns that are \"potentially useful\". In order to allow KDD systems to make potentially useful judgments, we give formal definitions of \"potential usefulness\" by completely staying within the realms of the expressiveness provided by Bacchus' Probabilistic Logic Language. Furthermore, a tractable algorithm is proposed that is capable of discovering all potentially useful patterns from databases, given limited accessible information.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127621814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling hierarchical and modular complex networks based on FCM","authors":"Jianyu Li, Rui Lv, Shuzhong Yang, Xianglin Huang, Zhanxin Yang, Yingjian Qi","doi":"10.1109/GRC.2006.1635776","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635776","url":null,"abstract":"In this paper, we investigate the construction of complex networks based on clustering idea. Firstly, the resulting networks are woven by the clustering paths which follow their cluster's \"centroids\". Secondly, when the number of the data is huge, the data will be divided into subsets at different levels according to their similarity. The presented algorithm will be carried out in, between, and among these subsets at different levels. The resulting networks display small world feature and community structure, characterized by the hierarchical clustering function of a vertex with degree k, c(k) like some real-world networks. We also study the evolution behaviors and formation mechanism of the resulting networks. Index Terms—complex networks, scale-free, small world, fuzzy c-means .","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126480862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new aggregation operator of linguistic information and its properties","authors":"Zheng Pei, Liangzhong Yi","doi":"10.1109/GRC.2006.1635846","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635846","url":null,"abstract":"Much information is expressed by natural lan- guages. The management of linguistic information implies the use of operators of comparison and aggregation. In this paper, based on the Ordered Weighted Averaging (OWA) operator which is proposed by Yager and modifying indexes of linguistic terms (their indexes are fuzzy numbers on (0,T) ⊆ R + ), a new linguistic weighted averaging operator (Flwa) is presented, and the conclusion directly used in computing with words.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115771565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using 2-additive measures in nonlinear multiregressions","authors":"L. Bock, Zhenyuan Wang","doi":"10.1109/GRC.2006.1635883","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635883","url":null,"abstract":"When a nonlinear integral with respect to a signed fuzzy measure is used in multiregression, people face a serious problem that, comparing to the number of variables (attributes), there are exponentially many unknown parameters in the model. However, in many real-world problems, the higher-order interactions among the variables can be omitted, and then only consider the second-order one with an acceptable small error in the result. Thus, a 2-additive measure based on the Mőbius transformation and its inverse can be used to replace the signed fuzzy measure. In such a way, the complexity of the computation will be significantly reduced.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"23 42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130249007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weizhong Zhu, X. Xu, Xiaohua Hu, I. Song, R. Allen
{"title":"Using UMLS-based Re-Weighting Terms as a Query Expansion Strategy","authors":"Weizhong Zhu, X. Xu, Xiaohua Hu, I. Song, R. Allen","doi":"10.1109/GRC.2006.1635786","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635786","url":null,"abstract":"Search engines have significantly improved the efficiency of bio-medical literature searching. These search engines, however, still return many results that are irrelevant to the intention of a user's query. To improve precision and recall, various query expansion strategies are widely used. In this paper, we explore the three widely used query expansion strategies - local analysis, global analysis, and ontology-based term re- weighting across various search engines. Through experiments, we show that ontology-based term re-weighting works best. Term re-weighting reformulates queries with selection of key original query terms and re-weights these key terms and their associated synonyms from UMLS. The results of experiments show that with LUCENE and LEMUR, the average precision is enhanced by up to 20.3% and 12.1%, respectively, compared to baseline runs. We believe the principles of this term re-weighting strategy may be extended and utilized in other bio-medical domains. users and suggest the user to refine the original query. In this research, three query expansion strategies - local analysis, global analysis, and ontology-based term re-weighting - integrated with the UMLS (Unified Medical Language System) are compared. These methods are applied to the Ad Hoc Retrieval task of the TREC 2004 Genomics task.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134160120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inducing decision rules: a granular computing approach","authors":"Xiaosheng Wang","doi":"10.1109/GRC.2006.1635843","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635843","url":null,"abstract":"Inducing rules is one of the key methods of discovering information hidden in data. In this paper, a method is proposed for inducing decision rules and decision algorithms by a granular computing approach, based on a decision logic language in information tables. And we prove that in consistent information tables, the induced decision algorithms are consistent and complete, and the decision algorithms induced by different partitions are equivalent. Secondly, this paper studies two specific kinds of partitions: partitions inducing atomic decision algorithms and partitions inducing the most general decision algorithms. An algorithm is given for finding the partitions inducing atomic decision algorithms which are also very close to the partitions inducing the most general decision algorithms. The partitions obtained using this algorithm can induce the decision rules which are all atomic, and whose number will be close to the lowest possible. This is then a solution to the problem of finding the simplest decision rules and algorithms.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131600993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transductive Support Vector Classification for RNA Related Biological Abstracts","authors":"B. Adams, Muhammad Asadur Rahman","doi":"10.1109/GRC.2006.1635836","DOIUrl":"https://doi.org/10.1109/GRC.2006.1635836","url":null,"abstract":"Support Vector Machines use a set of related supervised learning methods for classification and regression. When used for classification, the SVM algorithm creates a hyper plane that separates the data into two classes with the maximum- margin. Given positive and negative training examples a maximum-margin hyper plane is identified where it splits the positive from the negative examples, while maximizing the margin. Transductive Inference enhances the learning process by attempting to achieve the lowest error rate possible given a small sample of training examples. In this research we developed a set of software tools to convert scientific abstracts into support vectors that could be used with an implementation of Support Vector Machine called SVM-Light to classify the abstracts. Three distinct classification experiments were conducted: First, to classify abstracts about RNA research out of a set of randomly selected Abstracts. Second, to classify abstracts about specific types of RNA research out of a set of abstracts that all contain the expression \"RNA.\" Third, to classify tRNA, mRNA, snRNA, and rRNA abstracts individually out of a set of abstracts pertaining to the four categories of RNA.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}