{"title":"A model-based repository of security and dependability patterns for trusted RCES","authors":"A. Ziani, B. Hamid, Jacob Geisel, J. Bruel","doi":"10.1109/IRI.2013.6642505","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642505","url":null,"abstract":"The requirement for higher Security and Dependability (S&D) of systems is continuously increasing, even in domains traditionally not deeply involved in such issues. Nowadays, many practitioners express their worries about current S&D software engineering practices. New recommendations should be considered to ground this discipline on two pillars: solid theory and proven principles. We took the second pillar towards software engineering for embedded system applications, focusing on the problem of integrating S&D by design to foster reuse. Model driven approaches combined with patterns can be extremely helpful to deal with these strong requirements. In this work, we present a framework for trusted Resource Constrained Embedded Systems (RCES) development by design, by defining both a model to represent S&D pattern language and an architecture for development tools. The implementation of a repository of S&D patterns and their complementary property models is discussed in detail.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123041271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"About logic-based A.I. systems that must handle incoming symbolic knowledge","authors":"É. Grégoire","doi":"10.1109/IRI.2013.6642483","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642483","url":null,"abstract":"The focus in this paper is on logic-based Artificial Intelligence (A.I.) systems that must accommodate some incoming symbolic knowledge that is not inconsistent with the initial beliefs but that however requires a form of belief change. First, we investigate situations where the incoming knowledge is both more informative and deductively follows from the preexisting beliefs: the system must get rid of the existing logically subsuming information. Likewise, we consider situations where the new knowledge must replace or amend some previous beliefs. When the A.I. system is equipped with standard-logic inference capabilities, merely adding this incoming knowledge into the system is not appropriate. In the paper, this issue is addressed within a Boolean standard-logic representation of knowledge and reasoning. Especially, we show that a prime implicates representation of beliefs is an appealing specific setting in this respect.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123598335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chuan-Jie Lin, Cheng-Wei Lee, Cheng-Wei Shih, W. Hsu
{"title":"Rank correlation analysis of NTCIR-10 RITE-2 Chinese datasets and evaluation metrics","authors":"Chuan-Jie Lin, Cheng-Wei Lee, Cheng-Wei Shih, W. Hsu","doi":"10.1109/IRI.2013.6642454","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642454","url":null,"abstract":"Textual Entailment (TE) is the task of recognizing entailment, paraphrase, and contradiction relations between a given text pair. The goal of textual entailment research is to develop a core inference component that can be applied to various domains such as QA. We observed several rank correlations on the data and system results in the NTCIR-10 RITE-2 task, trying to find out correlations between datasets and evaluation metrics. We also constructed RITE4QA datasets in the RITE-2 task under the scenario of QA in order to see the applicability of RITE systems in QA. We find that datasets created from different sources and different ways can hardly predict each other. However, the system ranking on the dataset consisting of expert-made artificial pairs has moderate correlation with the ranking on QA metrics. Both RITE metrics and QA metrics are stable in terms of their own subtasks.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130911432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Brechó-EcoSys extension to support negotiation in the software ecosystems context","authors":"R. Santos, L. Tostes, C. Werner","doi":"10.1109/IRI.2013.6642521","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642521","url":null,"abstract":"The treatment of economic and social issues in Software Engineering was pointed out as a challenge in the coming years. Organizations have opened up their platforms and assets to others, including partners and third-party developers around the world, generating software ecosystems (SECOs). SECOs research can contribute to minimize nontechnical barriers of software reuse in industry because it explores potential relations among companies and stakeholders. However, an inhibitor is the complexity in defining value for reusable assets. This paper presents an extension of the Brechó-EcoSys environment to support components negotiations in reuse repositories. The focus is on complementing the stakeholders' value proposition and realization, as well as incorporating a nontechnical mechanism in components repositories.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129627953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective method for optimistic message logging based on group communication links","authors":"Jinho Ahn","doi":"10.1109/IRI.2013.6642497","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642497","url":null,"abstract":"This paper presents a new method to considerably reduce rollback propagation effect of the conventional optimistic message logging by utilizing positive features of reliable FIFO group communication links. To satisfy this goal, the proposed method forces group members to keep different receive sequence numbers (RSNs) of each same message to their group they assigned the message respectively in their volatile memories. As the degree of redundancy of RSNs increases, the possibility of local recovery of each crashed process may significantly be higher while raising failure-free overhead coming from log information synchronization.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123163783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constrained by limited information and recommendation opportunities: An exploration and exploitation problem for recommender systems","authors":"Simon Chan","doi":"10.1109/IRI.2013.6642453","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642453","url":null,"abstract":"In this paper, we investigate a resource allocation problem in recommendation systems where unknown new items keep coming to the system at different time. The task is to recommend (allocate) each user a limited number of new items. The objective is to maximize the overall positive response rate. This problem is non-trivial because, on one hand, we need to allocate these news items to users who are helpful for learning new item feature profiles using the limited recommendation opportunities (resources) in order to improve prediction accuracy; on the other hand, allocate these items to users who would most likely purchase them on the basis of the new item information gathered so far in order to maximize positive response rate. In this paper, we propose a two-stage batch solution to approximately optimize the objective, using group buying as a working example. During the first stage, we estimate the user purchase decisions towards new items by allocating some resources for exploration. During the second stage, we optimally allocate the remaining resources for exploitation according to the prediction and the operational constraints using the binary integer programming technique. Our experiments indicate that the proposed approach significantly improves the positive response rate.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123026698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li Tan, Ronald Haley, Riley Wortman, Y. Ampatzidis, M. Whiting
{"title":"An integrated cloud-based platform for labor monitoring and data analysis in precision agriculture","authors":"Li Tan, Ronald Haley, Riley Wortman, Y. Ampatzidis, M. Whiting","doi":"10.1109/IRI.2013.6642492","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642492","url":null,"abstract":"Harvest labor has became a prevailing cost in cherry and other Specialty Crops industry. We developed an integrated solution that provided real-time labor monitoring, payroll accrual, and labor-data-based analysis. At the core of our solution is a cloud-based information system that collects labor data from purposely designed labor monitoring devices, and visualizes real-time labor productivity data through a mobile-friendly user interface. Our solution used a proprietary process [1] to accurately associate labor data with its related worker and position under a many-to-many employment relation. We also describe our communication API and protocol, which are specifically designed to improve the reliability of data communication within an orchard. Besides its immediate benefits in improving the efficiency and accuracy of labor monitoring, our solution also enables data analysis and visualization based on harvest labor data. As an example, we discuss our approach of yield mapping based on harvest labor data. We implemented the platform and deployed the system on a cloud-based computing platform for better scalability. An early version of the system has been tested during the 2012 harvest season in cherry orchards in the U.S. Pacific Northwest Region.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"46 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PEP-side caching: An insider threat port","authors":"Qussai M. Yaseen, Q. Althebyan, Y. Jararweh","doi":"10.1109/IRI.2013.6642464","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642464","url":null,"abstract":"PEP-side caching is used in request-response access control mechanisms to increase the availability and reduce the processing overhead on PDP. Nonetheless, this paper shows that using this approach may open an insider threat port that can be used to bypass access control models in cloud and distributed relational databases. Moreover, the paper proposes a light model that detects and prevents the threat without affecting the performance of PEP and PDP, and it keeps the advantages of PEP-side caching model.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131633613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient live wide area VM migration with IP address change using type II hypervisor","authors":"S. Ajila, Omhenimhen Iyamu","doi":"10.1109/IRI.2013.6642495","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642495","url":null,"abstract":"Live wide area virtual machine migration is the transfer of a virtual machine currently running and connected to clients from one host server to another host server over a Wide Area Network. In this thesis we have designed and implemented an approach for live migration while allowing the IP address of the VM to change. Our approach is efficient and with little disruption in services. The solution is divided into three key parts, runtime state migration, persistent state migration, and network connection handling. The solution uses the type 2 hypervisor Virtual Box. The runtime state migration is executed using Virtual Box's teleportation function. The persistent state migration is split into stages executed at different point of the migration. The network connections are done using packet redirection and Dynamic DNS. Testing revealed a 358 times better in total disruption time compared to freeze and copy migration.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124694620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation-based validation for smart grid environments","authors":"Wonkyu Han, Mike Mabey, Gail-Joon Ahn","doi":"10.1109/IRI.2013.6642448","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642448","url":null,"abstract":"Large and complex systems, such as the Smart Grid, are often best understood through the use of modeling and simulation. In particular, the task of assessing a complex system's risks and testing its tolerance and recovery under various attacks has received considerable attention. However, such tedious tasks still demand a systematic approach to model and evaluate each component in complex systems. In other words, supporting a formal validation and verification without needing to implement the entire system or accessing the existing physical infrastructure is critical since many elements of the Smart Grid are still in the process of becoming standardized for widespread use. In this paper, we describe our simulation-based approach to understanding and examining the behavior of various components of the Smart Grid in the context of verification and validation. To achieve this goal, we adopt the discrete event system specification (DEVS) modeling methodology, which allows generalization and specialization of the entities in the model for a customized simulation with specific scenarios. In addition, we articulate metrics for supporting our simulation-based verification and validation and demonstrate the feasibility and effectiveness of our approach with a real-world use case.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129046584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}