2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)最新文献

筛选
英文 中文
A model-based repository of security and dependability patterns for trusted RCES 可信rce的基于模型的安全性和可靠性模式存储库
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642505
A. Ziani, B. Hamid, Jacob Geisel, J. Bruel
{"title":"A model-based repository of security and dependability patterns for trusted RCES","authors":"A. Ziani, B. Hamid, Jacob Geisel, J. Bruel","doi":"10.1109/IRI.2013.6642505","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642505","url":null,"abstract":"The requirement for higher Security and Dependability (S&D) of systems is continuously increasing, even in domains traditionally not deeply involved in such issues. Nowadays, many practitioners express their worries about current S&D software engineering practices. New recommendations should be considered to ground this discipline on two pillars: solid theory and proven principles. We took the second pillar towards software engineering for embedded system applications, focusing on the problem of integrating S&D by design to foster reuse. Model driven approaches combined with patterns can be extremely helpful to deal with these strong requirements. In this work, we present a framework for trusted Resource Constrained Embedded Systems (RCES) development by design, by defining both a model to represent S&D pattern language and an architecture for development tools. The implementation of a repository of S&D patterns and their complementary property models is discussed in detail.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123041271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
About logic-based A.I. systems that must handle incoming symbolic knowledge 关于基于逻辑的人工智能系统必须处理传入的符号知识
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642483
É. Grégoire
{"title":"About logic-based A.I. systems that must handle incoming symbolic knowledge","authors":"É. Grégoire","doi":"10.1109/IRI.2013.6642483","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642483","url":null,"abstract":"The focus in this paper is on logic-based Artificial Intelligence (A.I.) systems that must accommodate some incoming symbolic knowledge that is not inconsistent with the initial beliefs but that however requires a form of belief change. First, we investigate situations where the incoming knowledge is both more informative and deductively follows from the preexisting beliefs: the system must get rid of the existing logically subsuming information. Likewise, we consider situations where the new knowledge must replace or amend some previous beliefs. When the A.I. system is equipped with standard-logic inference capabilities, merely adding this incoming knowledge into the system is not appropriate. In the paper, this issue is addressed within a Boolean standard-logic representation of knowledge and reasoning. Especially, we show that a prime implicates representation of beliefs is an appealing specific setting in this respect.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123598335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rank correlation analysis of NTCIR-10 RITE-2 Chinese datasets and evaluation metrics ntcirr -10 RITE-2中文数据集的秩相关分析及评价指标
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642454
Chuan-Jie Lin, Cheng-Wei Lee, Cheng-Wei Shih, W. Hsu
{"title":"Rank correlation analysis of NTCIR-10 RITE-2 Chinese datasets and evaluation metrics","authors":"Chuan-Jie Lin, Cheng-Wei Lee, Cheng-Wei Shih, W. Hsu","doi":"10.1109/IRI.2013.6642454","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642454","url":null,"abstract":"Textual Entailment (TE) is the task of recognizing entailment, paraphrase, and contradiction relations between a given text pair. The goal of textual entailment research is to develop a core inference component that can be applied to various domains such as QA. We observed several rank correlations on the data and system results in the NTCIR-10 RITE-2 task, trying to find out correlations between datasets and evaluation metrics. We also constructed RITE4QA datasets in the RITE-2 task under the scenario of QA in order to see the applicability of RITE systems in QA. We find that datasets created from different sources and different ways can hardly predict each other. However, the system ranking on the dataset consisting of expert-made artificial pairs has moderate correlation with the ranking on QA metrics. Both RITE metrics and QA metrics are stable in terms of their own subtasks.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130911432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Brechó-EcoSys extension to support negotiation in the software ecosystems context 一个Brechó-EcoSys扩展,支持在软件生态系统上下文中进行协商
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642521
R. Santos, L. Tostes, C. Werner
{"title":"A Brechó-EcoSys extension to support negotiation in the software ecosystems context","authors":"R. Santos, L. Tostes, C. Werner","doi":"10.1109/IRI.2013.6642521","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642521","url":null,"abstract":"The treatment of economic and social issues in Software Engineering was pointed out as a challenge in the coming years. Organizations have opened up their platforms and assets to others, including partners and third-party developers around the world, generating software ecosystems (SECOs). SECOs research can contribute to minimize nontechnical barriers of software reuse in industry because it explores potential relations among companies and stakeholders. However, an inhibitor is the complexity in defining value for reusable assets. This paper presents an extension of the Brechó-EcoSys environment to support components negotiations in reuse repositories. The focus is on complementing the stakeholders' value proposition and realization, as well as incorporating a nontechnical mechanism in components repositories.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129627953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An effective method for optimistic message logging based on group communication links 一种有效的基于群通信链路的乐观消息记录方法
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642497
Jinho Ahn
{"title":"An effective method for optimistic message logging based on group communication links","authors":"Jinho Ahn","doi":"10.1109/IRI.2013.6642497","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642497","url":null,"abstract":"This paper presents a new method to considerably reduce rollback propagation effect of the conventional optimistic message logging by utilizing positive features of reliable FIFO group communication links. To satisfy this goal, the proposed method forces group members to keep different receive sequence numbers (RSNs) of each same message to their group they assigned the message respectively in their volatile memories. As the degree of redundancy of RSNs increases, the possibility of local recovery of each crashed process may significantly be higher while raising failure-free overhead coming from log information synchronization.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123163783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constrained by limited information and recommendation opportunities: An exploration and exploitation problem for recommender systems 有限的信息和推荐机会约束:推荐系统的探索和开发问题
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642453
Simon Chan
{"title":"Constrained by limited information and recommendation opportunities: An exploration and exploitation problem for recommender systems","authors":"Simon Chan","doi":"10.1109/IRI.2013.6642453","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642453","url":null,"abstract":"In this paper, we investigate a resource allocation problem in recommendation systems where unknown new items keep coming to the system at different time. The task is to recommend (allocate) each user a limited number of new items. The objective is to maximize the overall positive response rate. This problem is non-trivial because, on one hand, we need to allocate these news items to users who are helpful for learning new item feature profiles using the limited recommendation opportunities (resources) in order to improve prediction accuracy; on the other hand, allocate these items to users who would most likely purchase them on the basis of the new item information gathered so far in order to maximize positive response rate. In this paper, we propose a two-stage batch solution to approximately optimize the objective, using group buying as a working example. During the first stage, we estimate the user purchase decisions towards new items by allocating some resources for exploration. During the second stage, we optimally allocate the remaining resources for exploitation according to the prediction and the operational constraints using the binary integer programming technique. Our experiments indicate that the proposed approach significantly improves the positive response rate.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123026698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated cloud-based platform for labor monitoring and data analysis in precision agriculture 精准农业劳动力监测与数据分析集成云平台
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642492
Li Tan, Ronald Haley, Riley Wortman, Y. Ampatzidis, M. Whiting
{"title":"An integrated cloud-based platform for labor monitoring and data analysis in precision agriculture","authors":"Li Tan, Ronald Haley, Riley Wortman, Y. Ampatzidis, M. Whiting","doi":"10.1109/IRI.2013.6642492","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642492","url":null,"abstract":"Harvest labor has became a prevailing cost in cherry and other Specialty Crops industry. We developed an integrated solution that provided real-time labor monitoring, payroll accrual, and labor-data-based analysis. At the core of our solution is a cloud-based information system that collects labor data from purposely designed labor monitoring devices, and visualizes real-time labor productivity data through a mobile-friendly user interface. Our solution used a proprietary process [1] to accurately associate labor data with its related worker and position under a many-to-many employment relation. We also describe our communication API and protocol, which are specifically designed to improve the reliability of data communication within an orchard. Besides its immediate benefits in improving the efficiency and accuracy of labor monitoring, our solution also enables data analysis and visualization based on harvest labor data. As an example, we discuss our approach of yield mapping based on harvest labor data. We implemented the platform and deployed the system on a cloud-based computing platform for better scalability. An early version of the system has been tested during the 2012 harvest season in cherry orchards in the U.S. Pacific Northwest Region.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"46 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
PEP-side caching: An insider threat port pep端缓存:内部威胁端口
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642464
Qussai M. Yaseen, Q. Althebyan, Y. Jararweh
{"title":"PEP-side caching: An insider threat port","authors":"Qussai M. Yaseen, Q. Althebyan, Y. Jararweh","doi":"10.1109/IRI.2013.6642464","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642464","url":null,"abstract":"PEP-side caching is used in request-response access control mechanisms to increase the availability and reduce the processing overhead on PDP. Nonetheless, this paper shows that using this approach may open an insider threat port that can be used to bypass access control models in cloud and distributed relational databases. Moreover, the paper proposes a light model that detects and prevents the threat without affecting the performance of PEP and PDP, and it keeps the advantages of PEP-side caching model.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131633613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Efficient live wide area VM migration with IP address change using type II hypervisor 使用II型管理程序进行IP地址更改的高效广域虚拟机迁移
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642495
S. Ajila, Omhenimhen Iyamu
{"title":"Efficient live wide area VM migration with IP address change using type II hypervisor","authors":"S. Ajila, Omhenimhen Iyamu","doi":"10.1109/IRI.2013.6642495","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642495","url":null,"abstract":"Live wide area virtual machine migration is the transfer of a virtual machine currently running and connected to clients from one host server to another host server over a Wide Area Network. In this thesis we have designed and implemented an approach for live migration while allowing the IP address of the VM to change. Our approach is efficient and with little disruption in services. The solution is divided into three key parts, runtime state migration, persistent state migration, and network connection handling. The solution uses the type 2 hypervisor Virtual Box. The runtime state migration is executed using Virtual Box's teleportation function. The persistent state migration is split into stages executed at different point of the migration. The network connections are done using packet redirection and Dynamic DNS. Testing revealed a 358 times better in total disruption time compared to freeze and copy migration.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124694620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Simulation-based validation for smart grid environments 基于仿真的智能电网环境验证
2013 IEEE 14th International Conference on Information Reuse & Integration (IRI) Pub Date : 2013-10-24 DOI: 10.1109/IRI.2013.6642448
Wonkyu Han, Mike Mabey, Gail-Joon Ahn
{"title":"Simulation-based validation for smart grid environments","authors":"Wonkyu Han, Mike Mabey, Gail-Joon Ahn","doi":"10.1109/IRI.2013.6642448","DOIUrl":"https://doi.org/10.1109/IRI.2013.6642448","url":null,"abstract":"Large and complex systems, such as the Smart Grid, are often best understood through the use of modeling and simulation. In particular, the task of assessing a complex system's risks and testing its tolerance and recovery under various attacks has received considerable attention. However, such tedious tasks still demand a systematic approach to model and evaluate each component in complex systems. In other words, supporting a formal validation and verification without needing to implement the entire system or accessing the existing physical infrastructure is critical since many elements of the Smart Grid are still in the process of becoming standardized for widespread use. In this paper, we describe our simulation-based approach to understanding and examining the behavior of various components of the Smart Grid in the context of verification and validation. To achieve this goal, we adopt the discrete event system specification (DEVS) modeling methodology, which allows generalization and specialization of the entities in the model for a customized simulation with specific scenarios. In addition, we articulate metrics for supporting our simulation-based verification and validation and demonstrate the feasibility and effectiveness of our approach with a real-world use case.","PeriodicalId":418492,"journal":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129046584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信