Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services最新文献

筛选
英文 中文
Detection of Behavioral Facilitation information in Disaster Situation 灾难情境中行为促进信息的检测
Yoshiki Yoneda, Yumiko Suzuki, Akiyo Nadamoto
{"title":"Detection of Behavioral Facilitation information in Disaster Situation","authors":"Yoshiki Yoneda, Yumiko Suzuki, Akiyo Nadamoto","doi":"10.1145/3366030.3366129","DOIUrl":"https://doi.org/10.1145/3366030.3366129","url":null,"abstract":"Disasters of many types have occurred in recent years, such as strong earthquakes, heavy rain, and typhoons. In such disaster situations, people often use social network services (SNS) and exchange information of all types to help each other. Especially, people exchange information using Twitter during disasters. Such tweet messages include much information that promotes people's behaviors. We designate such tweets as behavioral facilitation tweets. When psychologically unstable in the aftermath of a disaster, behavioral facilitation tweets can strongly affect people, irrespective of a message's authenticity. We regard the extraction of the behavioral facilitation tweets automatically as important. In this paper, we propose a method that extracts behavioral facilitation tweets in disaster situations. Specifically, we propose and compare three methods to extract behavioral facilitation tweets in disaster situations: rule-based, support vector machine (SVM) and long short-term memory (LSTM). Furthermore, we conducted experiments to assess the benefits of our proposed method.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129217902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Film Genre Prediction Based on Film Content and Screenplay Structure 基于电影内容和剧本结构的电影类型预测
Yusuke Nakano, Hiroaki Ohshima, Yusuke Yamamoto
{"title":"Film Genre Prediction Based on Film Content and Screenplay Structure","authors":"Yusuke Nakano, Hiroaki Ohshima, Yusuke Yamamoto","doi":"10.1145/3366030.3366100","DOIUrl":"https://doi.org/10.1145/3366030.3366100","url":null,"abstract":"In this study, we propose a method to classify genre-based films using film screenplays. The proposed method vectorizes films into two aspects, i.e., film content (i.e., what films tell viewers) and screenplay structure (i.e., how the films narrate stories), and classifies film genres using the support vector machine method. We applied the Doc2Vec algorithm to screenplay structure and to handle film content. In film production, for vectorizing films, we used the statistics of the four screenplay elements: scene, action, dialogue, and transition. Compared with baseline methods, the evaluation showed that the proposed method is better for classifying films of specific genres.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129265565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling Social Information Exchange via Dynamically Robust Annotations 通过动态健壮注释实现社会信息交换
Vishwajeet Pattanaik, Shweta Suran, D. Draheim
{"title":"Enabling Social Information Exchange via Dynamically Robust Annotations","authors":"Vishwajeet Pattanaik, Shweta Suran, D. Draheim","doi":"10.1145/3366030.3366060","DOIUrl":"https://doi.org/10.1145/3366030.3366060","url":null,"abstract":"With the emergence of new web paradigms, we currently see a tremendous increase in interest in different applications of the social web. However, this rising interest in social platforms has also led to the rise of numerous new challenges, especially issues like fake-news, filter-bubble, and web-page-decay. Motivated by these issues, we propose a novel DOM-oriented edit distance anchoring approach that enables stable tracking of ephemeral web content. We argue that such a stable anchoring approach could indeed foster the creation of a browser-based crowdsourcing information system that could help us tackle rising issues on the web. Building on this hypothesis, we present a new web annotation tool called Tippanee, that is designed around the proposed anchoring approach; and provides its users with a collaborative environment where web users could help in improving the quality of textual content on the web by annotating, archiving, linking, sharing and semantically describing content on-the-fly.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126399516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Museum Information System for Sustaining and Analyzing National Cultural Expressions 一个支持和分析民族文化表现形式的博物馆信息系统
Bea Therese Santos, Jacob Tolentino, Danielle Nicole Aquino, Riel Malibiran, Christine Diane Lim-Ramos, C. Cheng, C. Ngo
{"title":"A Museum Information System for Sustaining and Analyzing National Cultural Expressions","authors":"Bea Therese Santos, Jacob Tolentino, Danielle Nicole Aquino, Riel Malibiran, Christine Diane Lim-Ramos, C. Cheng, C. Ngo","doi":"10.1145/3366030.3366132","DOIUrl":"https://doi.org/10.1145/3366030.3366132","url":null,"abstract":"Culture is an integral part of the social and economic development of a nation. In the Philippines, the National Commission for Culture and the Arts (NCCA) is the overall policy-making body for culture and arts development. NCCA has been experiencing difficulty in collecting and organizing large cultural data sets, which are vital in their decisions concerning culture and arts reforms. We propose a sustainable data collection and analysis method for NCCA, using the museum cultural domain as case study. With the museum-centric information system, valuable information across the museum cultural domain can be obtained, and later translated to information visualization with resulting correlation statistics and reports, showing variables that give context to the performance of a museum, museums in an area, and museums in the country. The museum information system may serve as the information system framework for other cultural domains.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124312964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Structural Transition Analysis of Dynamic Network Based on Roles of Adding Edges 基于添加边作用的动态网络结构转移分析
Kazufumi Inafuku, Takayasu Fushimi, T. Satoh
{"title":"Structural Transition Analysis of Dynamic Network Based on Roles of Adding Edges","authors":"Kazufumi Inafuku, Takayasu Fushimi, T. Satoh","doi":"10.1145/3366030.3366084","DOIUrl":"https://doi.org/10.1145/3366030.3366084","url":null,"abstract":"Many of the actual complex networks are dynamic networks that constantly change their structure by adding edges (and nodes). We hypothesized that the addition of edges (changes in the network) has two roles: \"densification of at the center of network\" and \"expansion of at the periphery of network.\" We proposed a method to analyze the role of the edge based on the location of adding edge and the amount of change of the network feature. We applied the proposed method to artificially changed generated networks and actual data, and compared the roles of edges. As a result, we clarified that the two roles are shown in the hypothesis also exist in the actual data.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121255972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Extraction from Google Earth Images 从谷歌地球图像中提取建筑物
Jifang Xing, Ruixi Zhang, Remmy A. M. Zen, D. M. S. Arsa, Ismail Khalil, S. Bressan
{"title":"Building Extraction from Google Earth Images","authors":"Jifang Xing, Ruixi Zhang, Remmy A. M. Zen, D. M. S. Arsa, Ismail Khalil, S. Bressan","doi":"10.1145/3366030.3368456","DOIUrl":"https://doi.org/10.1145/3366030.3368456","url":null,"abstract":"Building extraction is a component of many environmental modelling and data analysis applications. It is however data and knowledge intensive. We investigate the use of publicly available data from Google Earth and OpenStreetMap and of neural networks for this task. We evaluate different candidate algorithms for the case of building extraction on the island of Bali.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Computing Ranges for Temporal Parameters of Composed Web Services 组合Web服务时间参数的计算范围
M. Franceschetti, Johann Eder
{"title":"Computing Ranges for Temporal Parameters of Composed Web Services","authors":"M. Franceschetti, Johann Eder","doi":"10.1145/3366030.3366068","DOIUrl":"https://doi.org/10.1145/3366030.3366068","url":null,"abstract":"Temporal Service Level Agreements (SLAs) are a distinguishing characteristics for offered (composed) services: the weaker the restrictions, the broader the ranges of input parameters, the wider the applicability of an offered service. We propose a technique for the providers of composed services with temporal parameters to compute the broadest ranges for the temporal input parameters such that all service invocations where the parameters are within these ranges are dynamically controllable, i.e. that the adherence to temporal constraints can be guaranteed.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114606333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Privacy-Preserving Similarity Search Scheme over Encrypted Word Embeddings 一种保护隐私的加密词嵌入相似度搜索方案
Daisuke Aritomo, Chiemi Watanabe, Masaki Matsubara, Atsuyuki Morishima
{"title":"A Privacy-Preserving Similarity Search Scheme over Encrypted Word Embeddings","authors":"Daisuke Aritomo, Chiemi Watanabe, Masaki Matsubara, Atsuyuki Morishima","doi":"10.1145/3366030.3366081","DOIUrl":"https://doi.org/10.1145/3366030.3366081","url":null,"abstract":"Recent evolution in cloud computing platforms have attracted the largest amount of data than ever before. Today, even the most sensitive data are being outsourced, thus, protection is essential to ensure that privacy is not traded for the convenience provided by cloud platforms. Traditional symmetric encryption schemes provide good protection; however, they ruin the merits of cloud computing. Attempts have been made to obtain a scheme where both functionality and protection can be achieved. However, features provided in existing searchable encryption schemes tend to be left behind the latest findings in the information retrieval (IR) area. In this study, we propose a privacy-preserving similar document search system based on Simhash. Our scheme is open to the latest machine-learning based IR schemes, and performance has been tuned utilizing a VP-tree based index, which is optimized for security. Analysis and various tests on real-world datasets demonstrate the scheme's security and efficiency on real-world datasets.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"381 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116059998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Simulation Model Demonstrating the Impact of Social Aspects on Social Internet of Things 展示社交方面对社交物联网影响的仿真模型
K. Zia, S. A. Maskari, Dinesh Kumar Saini, Arshad Muhammad, U. Farooq
{"title":"A Simulation Model Demonstrating the Impact of Social Aspects on Social Internet of Things","authors":"K. Zia, S. A. Maskari, Dinesh Kumar Saini, Arshad Muhammad, U. Farooq","doi":"10.1145/3366030.3366076","DOIUrl":"https://doi.org/10.1145/3366030.3366076","url":null,"abstract":"In addition to seamless connectivity and smartness, the objects in the Internet of Things (IoT) are expected to have the social capabilities - these objects are termed as \"social objects\". In this paper, an intuitive paradigm of social interactions between these objects are argued and modeled. The impact of social behavior on the interaction pattern of social objects is studied taking Peer-to-Peer (P2P) resource sharing as an example application. The model proposed in this paper studies the implications of competitive vs. cooperative social paradigm, while peers attempt to attain the shared resources / services. The simulation results divulge that the social capabilities of the peers impart a significant increase in the quality of interactions between social objects. Through an agent-based simulation study, it is proved that cooperative strategy is more efficient than competitive strategy. Moreover, cooperation with an underpinning on real-life networking structure and mobility does not negatively impact the efficiency of the system at all; rather it helps.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117170687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Secure Used Car Trading System based on Blockchain Technology 基于区块链技术的安全二手车交易系统
Cho Cho Htet, May Htet
{"title":"A Secure Used Car Trading System based on Blockchain Technology","authors":"Cho Cho Htet, May Htet","doi":"10.1145/3366030.3366112","DOIUrl":"https://doi.org/10.1145/3366030.3366112","url":null,"abstract":"Although Myanmar's car import policy led shocks in the automotive market due to the Policy changes to import left-hand drive (new car), many consumers in Myanmar still more desire using second-hand cars. Car history is essential in the used car market which is a popular business in Myanmar. Online car trading requires a reliable supplier which may grantee the integrity of car grading. This problem can be solved by using a pure decentralized mechanism called blockchain which has become a hot research area to achieve an open and safe environment. In this paper, the system is aimed to develop a blockchain-based car trading system that can speed up the verification of car information and currency transfers. Besides the proposed car trading system is not only reliable but also protects from the 51% attacks even if 51% of car owners, insurance companies and repair services in this cooperation are simultaneously compromised.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122930058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信