International Conference on Complex Information Systems最新文献

筛选
英文 中文
Minimization of Attack Risk with Bayesian Detection Criteria 基于贝叶斯检测准则的攻击风险最小化
International Conference on Complex Information Systems Pub Date : 1900-01-01 DOI: 10.5220/0007656100170026
V. H. Standley, Frank G. Nuño, Jacob W. Sharpe
{"title":"Minimization of Attack Risk with Bayesian Detection Criteria","authors":"V. H. Standley, Frank G. Nuño, Jacob W. Sharpe","doi":"10.5220/0007656100170026","DOIUrl":"https://doi.org/10.5220/0007656100170026","url":null,"abstract":"Strategic deterrence operates in and on a vast interstate network of rational actors seeking to minimize risk. Risk can be minimized by employing a likelihood ratio test (LRT) derived from Bayes’ Theorem. The LRT is comprised of prior, detection, and false-alarm probabilities. The power-law, known for its applicability to complex systems, has been used to model the distribution of combat fatalities. However, it cannot be used as a Bayesian prior for war when its area is unbounded. Analytics applied to Correlates of War data reveals that combat fatalities follow a log-gamma or log-normal probability distribution depending on a state’s escalation strategy. Results are used to show that nuclear war level fatalities pose increasing risk despite decreasing probability, that LRT-based decisions can minimize attack risk if an upper limit of impending fatalities is indicated by the detection system and commensurate with nominal false-alarm maximum, and that only successful defensive strategies are stable.","PeriodicalId":414016,"journal":{"name":"International Conference on Complex Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128630556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Altered Functional Complexity Associated with Structural Features in Schizophrenic Brain: A Resting-state fMRI Study 与精神分裂症脑结构特征相关的功能复杂性改变:静息状态fMRI研究
International Conference on Complex Information Systems Pub Date : 1900-01-01 DOI: 10.5220/0009572301200128
Yi-Ju Lee, Su‐Yun Huang, S. Tsai, A. Yang
{"title":"Altered Functional Complexity Associated with Structural Features in Schizophrenic Brain: A Resting-state fMRI Study","authors":"Yi-Ju Lee, Su‐Yun Huang, S. Tsai, A. Yang","doi":"10.5220/0009572301200128","DOIUrl":"https://doi.org/10.5220/0009572301200128","url":null,"abstract":": Power law scaling is a well-defined physical concept in complexity science that has been used to quantified the dynamic signals across temporal scales. In this research, we aim to investigate the power law scaling of resting-state fMRI signal in schizophrenic and healthy brain and to examine the potential structural properties that may correlate to the altered functional complexity. Brain imaging data of 200 schizophrenia patients and 200 age and sex-matched healthy Han Chinese was retrieved from Taiwan Aging and Mental Illness cohort. Power law scaling was extracted by Pwelch function. In schizophrenia, six brain regions with abnormal complexity were correlated to the regional structural network of grey matter volume (hub at right superior frontal gyrus) and white matter volume at right superior cerebellar peduncle and splenium of the corpus callosum. Moreover, the identified power law scaling was correlated with clinical symptom severity. Our findings suggest that a loss of scale-free brain signal dynamics affecting by brain morphometries proposed the reduced complex brain activity as one of the neurobiological mechanisms in schizophrenia. This research supports “the loss of brain complexity hypothesis” and “the dysconnectivity hypothesis of schizophrenia.”, laying potential impact in psychiatry.","PeriodicalId":414016,"journal":{"name":"International Conference on Complex Information Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128399377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Review on Cybersecurity Risks and Behaviours: Methodological Approaches 网络安全风险与行为的系统回顾:方法论方法
International Conference on Complex Information Systems Pub Date : 1900-01-01 DOI: 10.5220/0010762600003197
E. Oliveira, Vania Baldi
{"title":"Systematic Review on Cybersecurity Risks and Behaviours: Methodological Approaches","authors":"E. Oliveira, Vania Baldi","doi":"10.5220/0010762600003197","DOIUrl":"https://doi.org/10.5220/0010762600003197","url":null,"abstract":"This paper presents a systematic literature review regarding risk perception and precautionary behaviour related to cybersecurity. Objectives encompassed identifying issues related to methodological approaches, the studies’ operationalisation and other essential topics, highlighting significant gaps to be fulfilled in future investigations. The study included a search in the multidisciplinary databases of Science Direct, Web of Science, and the Scientific Repositories of Open Access in Portugal, focusing on publications after 2016. A total of nine articles were analysed. The review was developed using the Preferred Reporting Items for Systematic Review and Meta-analysis Protocols’ research method. Also, publications were coded using the NVivo 12 software for synthesising the results. The small number of studies considered for analysis revealed that risk perception and precautionary behaviour concerning cybersecurity is still an under-explored study area. Furthermore, methodological gaps are highlighted for future works. Studies in the cybersecurity field provide a dataset for policymakers, directing efforts and predicting responses to digital technologies, making this subject matter highly substantial.","PeriodicalId":414016,"journal":{"name":"International Conference on Complex Information Systems","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131721648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Probing Complexity with Epidemics: A New Reactive Immunization Strategy 探究流行病的复杂性:一种新的反应性免疫策略
International Conference on Complex Information Systems Pub Date : 1900-01-01 DOI: 10.5220/0006361301160123
E. Alfinito, M. Beccaria, A. Fachechi, G. Macorini
{"title":"Probing Complexity with Epidemics: A New Reactive Immunization Strategy","authors":"E. Alfinito, M. Beccaria, A. Fachechi, G. Macorini","doi":"10.5220/0006361301160123","DOIUrl":"https://doi.org/10.5220/0006361301160123","url":null,"abstract":"Epidemic evolution on complex networks strongly depends on their topology and the infection dynamical properties, as highly connected nodes and individuals exposed to the contagion have competing roles in the disease spreading. In this spirit, we propose a new immunization strategy exploiting the knowledge of network geometry and dynamical information about the spreading infection. The flexibility and effectiveness of the proposed scheme are successfully tested with numerical simulations on a wide set of complex networks.","PeriodicalId":414016,"journal":{"name":"International Conference on Complex Information Systems","volume":"25 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134121491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CBR-Mining Approach to Improve Learning System Engineering in a Collaborative E-Learning Platform 基于cbr的协同电子学习平台学习系统工程改进方法
International Conference on Complex Information Systems Pub Date : 1900-01-01 DOI: 10.5220/0006693200940101
Fatima-Zahra Berriche, B. Zeddini, H. Kadima, A. Rivière
{"title":"CBR-Mining Approach to Improve Learning System Engineering in a Collaborative E-Learning Platform","authors":"Fatima-Zahra Berriche, B. Zeddini, H. Kadima, A. Rivière","doi":"10.5220/0006693200940101","DOIUrl":"https://doi.org/10.5220/0006693200940101","url":null,"abstract":"System engineering (SE) is an approach that involves customers and users in the development process and more particularly during the definition of requirements and system functionalities. In order to meet the challenges and increasing complexity of system engineering, the training of engineering students in this field is necessary. It enables learners to acquire sound theoretical and practical knowledge, and to adapt to the majority of profiles of the position related to system engineering field proposed by industrial companies. In this paper, we present a continuity of our research work (Berriche et al., 2015), we study the feasibility of the CBR-mining (case based reasoning and process mining) approach in the context of our platform dedicated to the learning of system engineering. First, we apply the CBR-mining approach to monitor student interactions from log files. Secondly, we propose clusters that bring together all the educational processes most performed by students. We have experimented this approach using the ProM Framework.","PeriodicalId":414016,"journal":{"name":"International Conference on Complex Information Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115902629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bio-backfill: A Scheduling Policy Enhancing the Performance of Bioinformatics Workflows in Shared Clusters 生物回填:一种提高共享集群生物信息学工作流性能的调度策略
International Conference on Complex Information Systems Pub Date : 1900-01-01 DOI: 10.5220/0006812901480156
Ferran Badosa, Antonio Espinosa, Gonzalo Vera, A. Ripoll
{"title":"Bio-backfill: A Scheduling Policy Enhancing the Performance of Bioinformatics Workflows in Shared Clusters","authors":"Ferran Badosa, Antonio Espinosa, Gonzalo Vera, A. Ripoll","doi":"10.5220/0006812901480156","DOIUrl":"https://doi.org/10.5220/0006812901480156","url":null,"abstract":"In this work we present the bio-backfill scheduler, a backfill scheduler for bioinformatics workflows applications running on shared, heterogeneous clusters. Backfill techniques advance low-priority jobs in cluster queues, if doing so doesn’t delay higher-priority jobs. They improve the resource utilization and turnaround achieved with classical policies such as First Come First Served, Longest Job First.. When attempting to implement backfill techniques such as Firstfit or Bestfit on bioinformatics workflows, we have found several issues. Backfill requires runtime predictions, which is particularly difficult for bioinformatics applications. Their performance varies substantially depending on input datasets and the values of its many configuration parameters. Furthermore, backfill approaches are mainly intended to schedule independent, rather than dependent tasks as those forming workflows. Backfilled jobs are chosen upon its number of processors and length runtime, but not by considering the amount of slowdown when the Degree of Multiprogramming of the nodes is greater than 1. To tackle these issues, we developed the bio-backfill scheduler. Based on a predictor generating performance predictions of each job with multiple resources, and a resource-sharing model that minimizes slowdown, we designed a scheduling algorithm capable of backfilling bioinformatics workflows applications. Our experiments show that our proposal can improve average workflow turnaround by roughly 9% by and resource utilization by almost 4%, compared to popular backfill strategies such as Firstfit or BestFit.","PeriodicalId":414016,"journal":{"name":"International Conference on Complex Information Systems","volume":"337 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modal Mu-calculus Extension with Description of Autonomy and Its Algebraic Structure 具有自治描述的模态mu微积分扩展及其代数结构
International Conference on Complex Information Systems Pub Date : 1900-01-01 DOI: 10.5220/0009322300630071
S. Yamasaki, Mariko Sasakura
{"title":"Modal Mu-calculus Extension with Description of Autonomy and Its Algebraic Structure","authors":"S. Yamasaki, Mariko Sasakura","doi":"10.5220/0009322300630071","DOIUrl":"https://doi.org/10.5220/0009322300630071","url":null,"abstract":": This paper deals with complex abstract state machinery, clearly represented by modal logic with fixed point operator. The logic is well known as modal mu-calculus, which is extended to the version involving human computer interaction as well as involving awareness, communication and behavioral predicates of propositional variables as in autonomy systems. The extended version contains complexity for human machine interaction, whose meaning is represented by Heyting algebra but not by Boolean algebra. In the sense of Heyting algebra, human computer interaction of complexity can be described such that related predicates of communication and behavior may be simplified. Then the extended version can be applied to some process by means of awareness to an expertise, communication and behavior processes, and repetitions represented with fixed point operator (that is, mu-operator). This version is also concerned with model theory caused by postfix modal operator, where composition and alternation of modal operators may be organized into an algebraic structure.","PeriodicalId":414016,"journal":{"name":"International Conference on Complex Information Systems","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123438563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attention! Transformer with Sentiment on Cryptocurrencies Price Prediction 注意!变压器对加密货币价格预测的看法
International Conference on Complex Information Systems Pub Date : 1900-01-01 DOI: 10.5220/0011103400003197
Huali Zhao, M. Crane, Marija Bezbradica
{"title":"Attention! Transformer with Sentiment on Cryptocurrencies Price Prediction","authors":"Huali Zhao, M. Crane, Marija Bezbradica","doi":"10.5220/0011103400003197","DOIUrl":"https://doi.org/10.5220/0011103400003197","url":null,"abstract":": Cryptocurrencies have won a lot of attention as an investment tool in recent years. Specific research has been done on cryptocurrencies’ price prediction while the prices surge up. Classic models and recurrent neural networks are applied for the time series forecast. However, there remains limited research on how the Transformer works on forecasting cryptocurrencies price data. This paper investigated the forecasting capability of the Transformer model on Bitcoin (BTC) price data and Ethereum (ETH) price data which are time series with high fluctuation. Long short term memory model (LSTM) is employed for performance comparison. The result shows that LSTM performs better than Transformer both on BTC and ETH price prediction. Furthermore, in this paper, we also investigated if sentiment analysis can help improve the model’s performance in forecasting future prices. Twitter data and Valence Aware Dictionary and sEntiment Reasoner (VADER) is used for getting sentiment scores. The result shows that the sentiment analysis improves the Transformer model’s performance on BTC price but not ETH price. For the LSTM model, the sentiment analysis does not help with prediction results. Finally, this paper also shows that transfer learning can help on improving the Transformer’s prediction ability on ETH price data.","PeriodicalId":414016,"journal":{"name":"International Conference on Complex Information Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge as a Complex Phenomenon 知识是一种复杂的现象
International Conference on Complex Information Systems Pub Date : 1900-01-01 DOI: 10.5220/0009513201130119
R. Maciąg
{"title":"Knowledge as a Complex Phenomenon","authors":"R. Maciąg","doi":"10.5220/0009513201130119","DOIUrl":"https://doi.org/10.5220/0009513201130119","url":null,"abstract":"The paper presents the construction of the discursive space, which is a representation of knowledge. It is a multidimensional dynamic space crossed by discourses running along their specific trajectories. These discourses remain in the relationship of supervenience with reality, which is interpreted as a world of facts (state of affairs). Discourses inherit the complexity of the world, and because they are the articulation/retention of knowledge, this knowledge also inherits this property. Discursive space is, therefore, a model of knowledge of a complex nature.","PeriodicalId":414016,"journal":{"name":"International Conference on Complex Information Systems","volume":"451 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123096286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Correlation Between Media Consumption and Loneliness: The Case of Young People in Portugal 媒体消费与孤独感的关系:以葡萄牙年轻人为例
International Conference on Complex Information Systems Pub Date : 1900-01-01 DOI: 10.5220/0011970000003485
Catarina Feio, Lídia Oliveira, J. Martins
{"title":"The Correlation Between Media Consumption and Loneliness: The Case of Young People in Portugal","authors":"Catarina Feio, Lídia Oliveira, J. Martins","doi":"10.5220/0011970000003485","DOIUrl":"https://doi.org/10.5220/0011970000003485","url":null,"abstract":"","PeriodicalId":414016,"journal":{"name":"International Conference on Complex Information Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信