2021 IEEE 14th International Conference on Cloud Computing (CLOUD) / / Claudio Agostino Ardagna, editor |
Pubbl/distr/stampa | Piscataway : , : IEEE, , 2021 |
Descrizione fisica | 1 online resource (xxxiii, 759 pages) : illustrations (some color) |
Disciplina | 004.6782 |
Soggetto topico | Cloud computing |
ISBN | 1-66540-060-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 2021 IEEE 14th International Conference on Cloud Computing |
Record Nr. | UNINA-9910554094203321 |
Piscataway : , : IEEE, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
2021 IEEE 14th International Conference on Cloud Computing (CLOUD) / / Claudio Agostino Ardagna, editor |
Pubbl/distr/stampa | Piscataway : , : IEEE, , 2021 |
Descrizione fisica | 1 online resource (xxxiii, 759 pages) : illustrations (some color) |
Disciplina | 004.6782 |
Soggetto topico | Cloud computing |
ISBN | 1-66540-060-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 2021 IEEE 14th International Conference on Cloud Computing |
Record Nr. | UNISA-996574791803316 |
Piscataway : , : IEEE, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Business System Management and Engineering [[electronic resource] ] : From Open Issues to Applications / / edited by Claudio Agostino Ardagna, Ernesto Damiani, Leszek A. Maciaszek, Michele Missikoff, Michael Parkin |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (X, 197 p. 60 illus.) |
Disciplina | 658.4/038011 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Application software
Management information systems Computer science E-commerce Software engineering Computer security Computer Appl. in Administrative Data Processing Information Systems Applications (incl. Internet) Management of Computing and Information Systems e-Commerce/e-business Software Engineering Systems and Data Security |
Soggetto genere / forma | Conference proceedings. |
ISBN | 3-642-32439-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465438103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIV, 508 p.) |
Disciplina | 005.822gerDNB |
Collana | Security and Cryptology |
Soggetto topico |
Computer science—Mathematics
Computer programming Cryptography Data encryption (Computer science) Data protection Algorithms Mathematics of Computing Programming Techniques Cryptology Data and Information Security Mathematical Applications in Computer Science |
ISBN | 3-642-04474-3 |
Classificazione |
DAT 050f
DAT 460f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Analysis Techniques -- A New Approach to ? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR – A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature in the Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the “Second” Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. |
Record Nr. | UNISA-996465314903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication [[electronic resource] ] : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings / / edited by Claudio Agostino Ardagna, Jianying Zhou |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XIII, 392 p.) |
Disciplina | 621 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Management information systems Computer science Data encryption (Computer science) Algorithms Computer security Computers and civilization Computer Communication Networks Management of Computing and Information Systems Cryptology Algorithm Analysis and Problem Complexity Systems and Data Security Computers and Society |
ISBN | 3-642-21040-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Title Page -- Preface -- Organization -- Table of Contents -- Keynote Speech -- Can Code Polymorphism Limit Information Leakage? -- Introduction -- Algorithmic Description -- Bucket Types -- Rewriting Algorithms -- Concrete Implementation -- Experimental Evaluation -- Performance -- Attacking a Standard aes Implementation -- Attacking an Unrolled aes Implementation -- Attacking a Polymorphic aes Implementation -- Can Lisp-Like Languages Help? -- Structure -- Step by Step Explanations -- Rewriter -- Results -- Possible Extensions -- Avoiding Code Growth -- Separating H From F_i -- Randomizing Compilers: A Practical Approach -- References -- Mobile Authentication and Access Control -- Mobile Electronic Identity: Securing Payment on Mobile Phones -- Introduction -- Present-Day Payment Solutions -- NFC -- Bluetooth -- SMS -- Other Solutions -- Using a HISP: Mixing Context, Human Trust and Security -- Choosing a HISP -- Tailoring a HISP -- The Human Contribution -- Demonstrating a HISP -- Reverse Authentication -- Implementation -- Implementation of Approach A -- Implementation of Approach B -- Security Analysis -- Phishing/Credential Harvesting -- Malware -- Man in the Middle -- Conclusion -- References -- Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems -- Introduction -- Relevant Work and Motivation -- The Proposed domRBAC Model for Modern Collaborative Systems -- domRBAC Elements -- domRBAC Definitions -- Use Cases -- Use Case 1: Resource Usage Management -- Use Case 2: Security Violation -- Conclusion -- References -- Lightweight Authentication -- SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key -- Introduction -- Background -- Man in the Middle Attacks -- Generic Authentication Architecture -- Related Work -- TLS-SA Using a GAA Bootstrapped Key -- The Basic Scheme.
Variants -- Analysis -- Informal Security Analysis -- Security-Efficiency Trade-Offs -- Conclusions -- References -- An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control -- Introduction -- Security Model -- Tools -- Protocol Description -- Properties -- Security Reductions -- Conclusions -- References -- Affiliation-Hiding Authentication with Minimal Bandwidth Consumption -- Introduction -- Linkable vs. Unlinkable AHA -- The Challenge of Group Discovery -- Related Work -- Contributions and Organization -- Non-Interactive Key Distribution -- Definition and Security Model of NIKDS -- A Construction of NIKDS Based on Bilinear Maps (Pairings) -- Our Affiliation-Hiding Authentication Protocol -- Syntax of AHA -- Protocol Definition -- Correctness, Efficiency, and Parameter Selection -- Security Model for AHA -- Adversary Model -- Linkable Affiliation-Hiding Security -- Security Analysis of Our Protocol -- Conclusion -- References -- Algorithms -- Formal Framework for the Evaluation of Waveform Resynchronization Algorithms -- Introduction -- Resynchronization Algorithms -- Problem Statement -- AOC: Amplitude-Only Correlation -- POC: Phase-Only Correlation -- POC Flaw and Threshold-POC -- Complexity of AOC, POC and T-POC -- Evaluation of Resynchronization Algorithms -- Formal Framework -- Benchmarking of Representative Waveforms -- Conclusions and Perspectives -- References -- Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library -- Introduction -- Preliminaries -- Discrete Logarithm Problem with Auxiliary Input (DLPwAI) -- Cheon's Algorithm -- DLPwAI in Cryptographic Schemes -- Implementation -- BSGS Algorithm -- KKM Improvement -- Experimental Results -- Parameters -- Results -- Estimations -- Concluding Remarks -- References. Information Leakage Discovery Techniques to Enhance Secure Chip Design -- Introduction -- EMA Analysis as a Design Phase -- Electromagnetic Emission Analysis -- Information Finding Algorithm -- Complexity Analysis -- Experimental Validation -- Workbench -- Experimental Results -- Conclusion -- References -- Hardware Implementation -- A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines -- Introduction -- Related Work -- System Overview -- Hardware Architecture -- Arithmetic-Level Implementation -- Algorithm-Level Implementation -- The SHA-1 Algorithm -- The AES Algorithm -- ECC Scalar Multiplication -- ECDSA Implementation -- Results -- Conclusions -- References -- An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture -- Introduction -- Background -- Side-Channel Attacks on Hash Functions -- The Power-Trust Platform -- Our Variant of the Power-Trust Platform -- Implementation of Hash Functions on the Power-Trust Platform -- Results -- Instruction Set Agility -- Performance -- Conclusions -- References -- A Comparison of Post-Processing Techniques for Biased Random Number Generators -- Introduction -- Known Techniques for De-Biasing -- Compression with Cryptographic Hash -- Compression Using the Von Neumann Corrector -- Compression Based on Good Linear Codes -- Comparison of Random Bias of Different Post-Processing Functions -- Comparison of Adversary Bias of Different Post-Processing Functions -- Adversary Bias after Linear Compression -- Adversary Bias after Von Neumann Compression -- Linear Compression Outperforming the Von-Neumann Compression -- The Use of Linear Codes with Large d -- Implementation -- Construction of Linear Corrector Functions Based on Cyclic Codes -- Resource Utilization -- Conclusion -- References -- Security and Cryptography. AES Variants Secure against Related-Key Differential and Boomerang Attacks -- Introduction -- Our Contribution -- Framework for Protection against Related Key Differential and Boomerang Attacks -- Some Definitions and Notation -- Protection against Related-Key Differential Attack of [4] -- Protection against Related-Key Boomerang Attack of [3] -- Security of Improved May et al.'s AES Key Schedule against Related-key Attack -- Equivalent Keys in May et al.'s Key Schedule -- An Improved May et al.'s Key Schedule -- Improved May et al.'s Key Schedule is Secure against Related-Key Differential Attack -- Improved May et al.'s Key Schedule is Secure against Related-Key Boomerang Attack -- A New On-the-fly Key Schedule for AES Secure against Related-Key Differential and Boomerang Attacks -- Hardware Implementation -- References -- Leakage Squeezing Countermeasure against High-Order Attacks -- Introduction -- State of the Art -- First Order Masking Overview -- Vulnerability of the Masking against 1O-Attacks -- Vulnerability of the Masking against 2O-Attacks -- Proposed Masking Method for ``Leakage Squeezing'' -- Masking Principle -- Formal Security Assessment and Motivation for Some Bijections -- Experiments on Masked DES Implementations -- ROM Implementation -- USM Implementation -- Complexity and Throughput Results -- Information-Theoretic Evaluation of the Proposed Solutions -- Evaluation of the Implementations against 2O-Attacks -- Conclusion and Perspectives -- References -- Security Attacks and Measures (Short Papers) -- Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault -- Introduction -- Background -- The Advanced Encryption Standard -- The Fault Model -- The Fault Analysis -- The First Step of the Fault Attack -- Analysis of the First Step of the Fault Attack -- The Second Step of the Fault Attack. Analysis of the Second Step of the Fault Attack -- Attacking other Bytes -- Comparison with Previous Work -- Conclusion -- References -- Entropy of Selectively Encrypted Strings -- Introduction -- Terminology and Definitions -- Languages -- Entropy -- Selective Encryption -- Confidentiality of Selective Encryption -- Zero- and First-Order Languages -- Second-Order Languages -- Third-Order Languages -- n-Order Languages -- Concluding Remarks -- References -- Practical Attacks on HB and HB+ Protocols -- Introduction -- Description of the HB and HB+ Protocols -- Passive Attacks on HB Protocol -- Simple Walker Algorithm -- k-Basis Walker Algorithm -- Algorithm Analysis -- Experimental Results -- Conclusions -- References -- Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard -- Introduction -- Review SRP -- Initialization Phase -- The (i+1)th Authentication Round -- Vulnerabilities of SRP -- Reveal EPC_s -- Privacy Analysis -- Revised Protocol -- Security Analysis -- Conclusion -- References -- Security Attacks -- A SMS-Based Mobile Botnet Using Flooding Algorithm -- Introduction -- Background and Motivation -- Related Works -- Challenging Issues -- Our Works and Contributions -- The Overview of the Proposed SMS-Based Botnet -- Stealthiness Study -- Topology Study Based on Simulation -- Simulation Setup -- Simulation Results -- Botnet Construction -- Botnet Maintaining -- Defense Strategies -- Conclusion -- References -- FIRE: Fault Injection for Reverse Engineering -- Introduction -- State of the Art -- Physical Attacks on Cryptographic Systems -- Solving Linear Boolean Systems -- The Case of DES -- The Case of AES -- Fault Injection -- Translation of the FI into Equations -- Random and unknown Faults -- SCARE Conclusion of a FIRE Attack -- Results with Various Fault Models and Contexts -- Conclusion -- References. Hardware Trojan Side-Channels Based on Physical Unclonable Functions. |
Record Nr. | UNISA-996465656903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
On the Move to Meaningful Internet Systems. OTM 2017 Conferences [[electronic resource] ] : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part I / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXVII, 767 p. 280 illus.) |
Disciplina | 004.678 |
Collana | Programming and Software Engineering |
Soggetto topico |
Artificial intelligence
Application software Software engineering Computer security Data mining Computer communication systems Artificial Intelligence Information Systems Applications (incl. Internet) Software Engineering Systems and Data Security Data Mining and Knowledge Discovery Computer Communication Networks |
ISBN | 3-319-69462-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- General Co-chairs and Editors' Message for OnTheMove 2017 -- Organization -- OnTheMove 2017 Keynotes -- Pragmatic Semantics at Web Scale -- Evolution of the Industrial Internet of Things: Preparing for Change -- Contents - Part I -- Contents - Part II -- International Conference on Cooperative Information Systems (CoopIS) 2017 -- En -- Characterizing Regulatory Documents and Guidelines Based on Text Mining -- 1 Introduction -- 2 Methodology -- 3 Description of Documents -- 3.1 Description of ISO/IEC Documents -- 3.2 Description of Medical Document -- 4 Evaluation -- 4.1 Case Study 1: ISO Documents -- 4.2 Case Study 2: Medical Document -- 5 Limitations and Application Scenarios -- 6 Related Work -- 7 Conclusion and Future Work -- References -- A Scalable Smart Meter Data Generator Using Spark -- 1 Introduction -- 2 Methodology -- 2.1 Overview -- 2.2 Algorithm Description -- 2.3 Optimization -- 3 Implementation on Spark -- 4 Evaluation -- 4.1 Effectiveness -- 4.2 Scalability -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Network-Aware Stochastic Virtual Machine Placement in Geo-Distributed Data Centers -- 1 Introduction -- 2 Problem Formulation -- 2.1 Stochastic Optimization Model -- 2.2 Equivalent Optimization Formulation -- 2.3 Network-Aware Stochastic VM Placement Algorithm -- 3 Performance Evaluation -- 4 Conclusion -- References -- Finding Process Variants in Event Logs -- 1 Introduction -- 2 Preliminaries -- 3 Finding Process Variants in Event Logs -- 4 Implementation and Case Study -- 5 Related Work -- 6 Conclusions -- References -- Interactive and Incremental Business Process Model Repair -- 1 Introduction -- 2 Related Work -- 3 Behavioral Alignment -- 4 Extending Conformance Checking to Process Model Repair -- 4.1 Extension, Order and Impact of Differences -- 4.2 Visualization of Differences -- 5 Evaluation.
5.1 Experiment with Synthetic Datasets -- 5.2 Experiment with Real-Life Dataset -- 6 Conclusion -- References -- Control Flow Structure Preservation During Process Fragment Anonymization -- 1 Introduction -- 2 Control Flow Anonymization -- 3 Evaluation -- 4 Related Work -- 5 Conclusion and Discussion -- References -- Diversity-Aware Continuous Top-k Queries in Social Networks -- 1 Introduction and Related Work -- 2 Data and Processing Models -- 3 The DA-SANTA Algorithm -- 4 Experimental Evaluation -- References -- Modeling and Discovering Cancelation Behavior -- 1 Introduction -- 2 Related Work -- 2.1 Criteria for Comparison -- 2.2 Discussion of the Related Work -- 3 Event Logs and Process Trees -- 3.1 Preliminaries -- 3.2 Event Logs -- 3.3 Process Trees -- 3.4 Cancelation Process Trees -- 4 Heuristics for Error Oracle -- 5 Model Discovery -- 5.1 Directly Follows Graph and Cuts -- 5.2 Discovery Framework -- 5.3 Cancelation Discovery -- 6 Evaluation -- 6.1 Input and Methodology for Comparative Evaluation -- 6.2 Comparative Evaluation Results and Discussion -- 7 Conclusion -- References -- Introducing Collaboration for Locating Features in Models: Approach and Industrial Evaluation -- 1 Introduction -- 2 Background -- 3 Our Approach for Introducing Collaboration in FL -- 3.1 Automatic Query Reformulation -- 3.2 IR FL CORE -- 3.3 Linguistic Rules FL CORE -- 4 Evaluation -- 4.1 Definition -- 4.2 Data Set -- 4.3 Implementation Details -- 4.4 Planning and Execution -- 4.5 Results -- 4.6 Statistical Analysis -- 5 Threats to Validity -- 6 Related Work -- 7 Concluding Remarks -- References -- Context-Aware Access Control with Imprecise Context Characterization Through a Combined Fuzzy Logic and Ontology-Based Approach -- 1 Introduction -- 2 Significance of Our Research and General Requirements -- 2.1 Application Scenario -- 2.2 General Requirements. 3 Our Formal FCAAC Approach -- 3.1 Context Model -- 3.2 Policy Model -- 4 Ontology-Based FCAAC Approach -- 4.1 Modelling Contextual Conditions -- 4.2 Reasoning About Contextual Conditions -- 4.3 FCAAC Policy -- 5 Prototype and Evaluation -- 5.1 Practicality -- 5.2 Performance -- 6 Related Work and Discussion -- 7 Conclusion and Future Research -- References -- Semi-supervised Log Pattern Detection and Exploration Using Event Concurrence and Contextual Information -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Patterns and Pattern Instances -- 4.1 Core-Activity, Pattern and Pattern Instance -- 4.2 Pattern Support, Confidence and Coverage -- 5 Pattern Detection and Pattern Instance Matching -- 5.1 Pattern Detection Approaches - Partially Ordered Traces to Patterns -- 5.2 Computing a Maximal Set of Pattern Instances -- 6 Evaluation and Discussion -- 7 Conclusion and Future Work -- References -- Cloud of Things Modeling for Efficient and Coordinated Resources Provisioning -- 1 Introduction -- 2 Existing Models and Standards -- 2.1 Internet of Things Environment -- 2.2 Cloud Infrastructure Management Initiatives -- 2.3 Synthesis of Existing Works on Cloud and IoT Models and Standards -- 3 Related Works -- 4 Cloud of Things Infrastructure Model -- 4.1 Network Graph Model -- 4.2 Sensor and Actuator Resources -- 4.3 Things Virtualization -- 4.4 Things Integration Patterns -- 5 Cloud of Things Platform Model -- 5.1 Cloud of Things Deployment Options -- 5.2 Data Components Sharing -- 6 Example Scenarios -- 6.1 Resources Description -- 6.2 Mapping Process -- 7 Cloud of Things Placement Problem Formulation -- 8 Simulation and Results -- 9 Conclusion and Perspectives -- References -- A Framework for Integrating Real-World Events and Business Processes in an IoT Environment -- 1 Introduction -- 2 Foundations -- 2.1 Business Process Management. 2.2 Complex Event Processing -- 3 Requirements Analysis -- 4 Related Work -- 5 Conceptual Framework -- 5.1 Event Generation and Aggregation -- 5.2 Event Binding Points -- 5.3 Event Subscription and Correlation -- 5.4 Reaction on Events -- 6 Implementation -- 6.1 Unicorn Event Processing Platform -- 6.2 Gryphon Case Modeler -- 6.3 Chimera Case Engine -- 7 Conclusion and Future Work -- References -- Methodological Support for Coordinating Tasks in Global Product Software Engineering -- 1 Introduction -- 2 Research Method: The Design Cycle -- 2.1 The Method Association Approach -- 2.2 Method Evaluation Approach -- 3 Problem Investigation -- 3.1 Literature Study -- 3.2 The Global Task Coordination Framework -- 3.3 Identifying Activity Groups -- 3.4 Identifying Method Fragments -- 4 Solution Design: Construction of a Global Task Coordination Method -- 4.1 Method Association -- 4.2 Method Assembly -- 4.3 Method Validation -- 5 Discussion -- 6 Conclusions and Future Research -- Appendix A The Global Task Coordination Method -- References -- Enhancing Process Models to Improve Business Performance: A Methodology and Case Studies -- 1 Introduction -- 2 Preliminaries -- 2.1 Petri Nets and Event Logs -- 2.2 Aligning Petri Nets and Event Logs and Repairing Event Logs -- 3 The Methodology -- 3.1 Deviation Analysis -- 3.2 Repair and Merge Log Clusters -- 3.3 Repair Model -- 4 Implementation and Evaluation -- 4.1 UWV Case Study -- 4.2 SAP Procurement Case Study -- 5 Related Work -- 6 Conclusion -- References -- TraDE - A Transparent Data Exchange Middleware for Service Choreographies -- 1 Introduction -- 2 Transparent Data Exchange Approach -- 2.1 Cross-Partner Data Objects and Cross-Partner Data Flows -- 2.2 Towards a TraDE Middleware -- 3 The TraDE Middleware -- 3.1 Metamodel -- 3.2 Architecture -- 3.3 Integration with Process Engines -- 4 Validation. 5 Evaluation -- 5.1 Evaluation Methodology and Experimental Setup -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions and Outlook -- References -- Building the Most Creative and Innovative Collaborative Groups Using Bayes Classifiers -- Abstract -- 1 Introduction -- 2 Related Work on Collaborative Creativity -- 3 A Bayes Classifier-Based Model and Method for Building Optimally Creative and Innovative Groups -- 3.1 Bayesian Network Classifiers -- 3.2 General Model for Building "the Best" Collaborative Groups -- 3.3 Model Instantiation for Building the Most Creative Learning Groups -- 4 Case Study - A Real-World Scenario -- 5 Discussion -- 6 Conclusions and Future Work -- References -- A New Collaborative Paradigm of Computer Science Student Contests: An Experience -- Abstract -- 1 Introduction -- 2 Computer Science Contests -- 2.1 Computer Programming Contests -- 2.2 New Paradigms -- 3 Our Experience with Computer Science Contests -- 3.1 Evolution of Our Contest -- 3.2 A New Paradigm: Three-Words-from-a-Hat -- 3.3 Experiencing the New Paradigm -- 4 Is the New Paradigm Beneficial for Computer Science Education? -- 4.1 Is Competition Beneficial to Education? -- 4.2 Reflecting on the New Paradigm -- 5 Conclusions -- References -- Ranking-Based Evaluation of Process Model Matching -- 1 Introduction -- 2 Problem Statement -- 3 Probabilistic Evaluation of Process Model Matching -- 4 Evaluation Experiments -- 4.1 Setup -- 4.2 Results -- 5 Related Work -- 6 Conclusion -- References -- Analysis and Re-configuration of Decision Logic in Adaptive and Data-Intensive Processes (Short Paper) -- 1 Introduction -- 2 Challenges for Decision Logic Re-configuration: A Loan Approval Motivation Scenario -- 3 Supporting Decision Propagation in Business Processes -- 3.1 Feature-Oriented Representation of Decision Logic. 3.2 Constraint-Based Analysis of Decision Logic. |
Record Nr. | UNISA-996465634603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
On the Move to Meaningful Internet Systems. OTM 2017 Conferences [[electronic resource] ] : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part II / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXVII, 515 p. 152 illus.) |
Disciplina | 004.678 |
Collana | Programming and Software Engineering |
Soggetto topico |
Artificial intelligence
Software engineering Application software Database management Data mining Mathematical logic Artificial Intelligence Software Engineering Information Systems Applications (incl. Internet) Database Management Data Mining and Knowledge Discovery Mathematical Logic and Formal Languages |
ISBN | 3-319-69459-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- General Co-chairs and Editors' Message for OnTheMove 2017 -- Organization -- OnTheMove 2017 Keynotes -- Pragmatic Semantics at Web Scale -- Evolution of the Industrial Internet of Things: Preparing for Change -- Contents - Part II -- Contents - Part I -- Cloud and Trusted Computing (C&TC) 2017 -- En -- Property Preserving Encryption in NoSQL Wide Column Stores -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 The Data Model of Wide Column Stores -- 3.2 Property-Preserving Encryption -- 4 Selecting Practical PPE Schemes -- 4.1 Deterministic Encryption -- 4.2 Order-Preserving Encryption -- 4.3 Searchable Encryption -- 5 Data Management on Server Side -- 5.1 An Onion Layer Model for WCSs -- 5.2 Querying the Encrypted Data -- 6 Evaluation -- 6.1 Implementation -- 6.2 Performance -- 7 Security -- 8 Extensions and Future Work -- 9 Conclusion -- References -- Towards a JSON-Based Fast Policy Evaluation Framework -- 1 Introduction -- 2 Fundamentals of JACPoL -- 3 Performance Evaluation -- 4 Conclusion -- References -- Gibbon: An Availability Evaluation Framework for Distributed Databases -- 1 Introduction -- 2 Background -- 2.1 Distributed Database Systems -- 2.2 Availability for DDBMSs -- 2.3 Cloud Infrastructure -- 3 Failure Impact Analysis -- 3.1 Replication for Availability -- 3.2 Failures and Recovery -- 4 Availability Metrics -- 4.1 Input Parameters -- 4.2 Output Metrics -- 5 Availability Evaluation -- 5.1 Evaluation Process -- 5.2 DB Gibbon Algorithm -- 6 Architecture -- 7 Discussion -- 7.1 Evaluation Scenario: MongoDB -- 7.2 Evaluation Results -- 8 Related Work -- 9 Conclusion and Future Work -- References -- Locality-Aware GC Optimisations for Big Data Workloads -- 1 Introduction -- 2 Background -- 2.1 NoSQL Databases and Object Locality -- 2.2 Garbage Collection Algorithms and Heap Layouts.
3 Gang Promotion in Heap Management -- 3.1 Identifying Relevant Object-Graphs -- 3.2 Gang GC on a Large Heap -- 4 Deployment of Gang Promotion on Hotspot JVM -- 4.1 Java Runtime Instrumentation -- 4.2 LAG1 --- Locality-Aware Extension of G1 -- 5 Evaluation -- 5.1 Evaluation Setup -- 5.2 Program Locality in System -- 5.3 Application Behaviour -- 6 Related Work -- 7 Conclusion -- References -- FairCloud: Truthful Cloud Scheduling with Continuous and Combinatorial Auctions -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Architecture Design Requirements -- 3.2 Bid Representation Language -- 3.3 Entities and Events -- 3.4 Auctioneer Algorithms -- 4 Implementation -- 5 Evaluation -- 6 Conclusion -- References -- A Novel WebGIS-Based Situational Awareness Platform for Trustworthy Big Data Integration and Analytics in Mobility Context -- 1 Introduction -- 2 The MAGNIFIER WebGIS-Based Situational Awareness Platform -- 3 The MAGNIFIER Technological Architecture -- 4 PRACTIONIST DSS -- 5 Conclusion and Future Works -- References -- On the Verification of Software Vulnerabilities During Static Code Analysis Using Data Mining Techniques -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Approach -- 4 Conclusion, Discussion, and Future Work -- References -- International Conference on Ontologies, DataBases, and Applications of Semantics (ODBASE) 2017 -- En -- Linked Data and Ontology Reference Model for Infectious Disease Reporting Systems -- 1 Introduction -- 2 Goal of Semantics Usage -- 3 Semantic Reference Model -- 3.1 Semantifying Relational Data -- 3.2 Consistent Model -- 4 Geo Political Ontology -- 5 Relevant Work -- 6 Evaluation Through Competency Questions -- 6.1 Use Case -- 6.2 Competency Questions -- References -- PFSgeo: Preference-Enriched Faceted Search for Geographical Data -- 1 Introduction -- 2 Related Work and Novelty. 3 The PFSgeo Approach -- 3.1 Extensions of the Language of PFS -- 3.2 Extensions of the System Hippalus -- 3.3 Algorithmic Perspective -- 4 Performance Evaluation -- 4.1 Testing Scalability -- 4.2 Analysis of the Performance -- 4.3 Comparative Experimental Results -- 5 Evaluation with Users -- 5.1 Preparation -- 6 Concluding Remarks -- References -- Speeding up Publication of Linked Data Using Data Chunking in LinkedPipes ETL -- 1 Introduction -- 2 Data Chunking -- 3 Data Chunking in LinkedPipes ETL -- 3.1 SPARQL Endpoint Extractor -- 3.2 Tabular Extractor and Files to RDF -- 3.3 SPARQL Transformers -- 3.4 Merger Component and Loaders -- 4 Datasets and Pipelines for Experiments -- 4.1 LISTID - List of Czech Business Entity IDs -- 4.2 ARES - Czech Business Registry -- 4.3 MONITOR - Budget Information of All Levels of Czech State Administration -- 4.4 RÚIAN - Registry of Territorial Identification, Addresses and Real Estate -- 5 Experiments -- 5.1 LISTID -- 5.2 ARES -- 5.3 MONITOR -- 5.4 RÚIAN -- 6 Related Work -- 7 Conclusions and Future Work -- References -- A Particle Swarm-Based Approach for Semantic Similarity Computation -- 1 Introduction -- 2 Background -- 2.1 Ontology-Based Similarity Measures -- 2.2 Ontology-Based Similarity Computation Scenarios -- 3 The Proposed Approach -- 3.1 Finding LCS as a Particle Swarm Optimization Problem -- 3.2 Fitness Scores of the LCS Evaluation -- 4 Experimental Evaluation -- 4.1 Benchmarks and Ontologies -- 4.2 Implementation -- 4.3 Experimental Results -- 5 Conclusion -- References -- Agent-Based Assistance in Ambient Assisted Living Through Reinforcement Learning and Semantic Technologies -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 Reinforcement Learning -- 3.2 Agent Semantics -- 3.3 Automated ``Semantification'' and Retrieval of Agent Policies -- 4 First Results and Conclusion -- References. On the Need for Applications Aware Adaptive Middleware in Real-Time RDF Data Analysis (Short Paper) -- 1 Introduction -- 2 Formalization of RSP Features -- 3 Evaluation of RSP Engines Based on Formalized RSP Features -- 3.1 Latency and Breaking Points -- 3.2 Memory Consumption -- 4 Adaptive Middleware for RSP -- 4.1 Adaptive Layer -- 5 Conclusion -- References -- Learning Probabilistic Relational Models Using an Ontology of Transformation Processes -- 1 Introduction -- 2 Backgrounds -- 2.1 The Ontology of Transformation Processes -- 2.2 Probabilistic Relational Models -- 2.3 Learning PRMs -- 3 Learning a PRM Using an Ontology -- 3.1 Relational Schema Mapping -- 3.2 Our ON2PRM Algorithm -- 4 Experiments -- 4.1 Databases Generation -- 4.2 Results -- 5 Conclusion -- References -- ORDAIN: An Ontology for Trust Management in the Internet of Things -- Abstract -- 1 Introduction -- 2 Defining Trust and Reputation -- 3 ORDAIN Ontology -- 3.1 Ontology Contents -- 3.2 Ontology Implementation -- 4 Related Work -- 5 Conclusions -- Acknowledgments -- References -- APOPSIS: A Web-Based Platform for the Analysis of Structured Dialogues -- 1 Introduction -- 2 Background and Related Work -- 2.1 Computational Argumentation -- 2.2 Machine Learning -- 2.3 Existing Tools for Online Debates -- 3 A Methodology and Platform for Opinion Analysis -- 3.1 A Platform Methodology -- 3.2 Knowledge Map Representation -- 3.3 The MACE - Ontology Domain -- 3.4 Evaluating Opinions -- 4 Methodology: Analysing User-Generated Opinions -- 4.1 Clustering Analysis -- 5 Apopsis Implementation and Architecture Details -- 5.1 Debating Functionality -- 5.2 Debating on Different Levels of Discussions -- 5.3 Voting Mechanism -- 5.4 Searching Mechanism -- 5.5 General Features -- 5.6 Technical Information and Architecture -- 6 Conclusion and Future Work -- References. Identifying Opinion Drivers on Social Media -- 1 Introduction -- 2 Related Literature -- 3 Driver Identification: Formal Model -- 4 Results and Evaluation -- 5 Conclusions -- References -- Representing Fashion Product Data with Schema.org: Approach and Use Cases -- Abstract -- 1 Introduction -- 2 Overview of Clothing-Related Information -- 2.1 Garment Sizes -- 2.2 Colors -- 2.3 Product Variants -- 2.4 Materials Information -- 2.5 Textile Care Recommendations -- 2.6 Certifications -- 3 Clothing Product Information with Schema.org -- 3.1 Method -- 3.2 Representation of Basic Product Information -- 3.3 Representation of Clothing-Related Information -- 3.4 Representation of Textile Care Recommendations -- 3.5 Representation of Certifications -- 3.6 Other Information -- 3.7 Formalization and Results -- 4 Evaluation -- 5 Discussion and Conclusion -- 5.1 Related Work -- 5.2 Our Approach -- 5.3 Future Work -- References -- Semantic Modeling and Inference with Episodic Organization for Managing Personal Digital Traces -- 1 Introduction -- 2 Related Work -- 3 A Conceptual Model for Entities and Atomic Actions -- 4 Conceptual Model for scripts -- 5 Recognizing Script Instances from Documents -- 6 Summary -- References -- Linked Open Data for Linguists: Publishing the Hartmann von Aue-Portal in RDF -- Abstract -- 1 Introduction -- 1.1 Context -- 1.2 Problem Statement -- 1.3 Relevance -- 1.4 Organization of the Paper -- 2 Linked Open Data -- 3 The Hartmann von Aue-Portal -- 3.1 Purpose and Current Status -- 3.2 Data Model -- 3.3 Text Corpus Statistics -- 4 Approach -- 4.1 Challenges -- 4.2 Method -- 4.3 Implementation -- 4.4 Results -- 5 Evaluation -- 5.1 Formal Validation -- 5.2 Usage for Data-Driven Research -- 5.3 Interlinking of Hartmann von Aue Datasets with DBPedia -- 5.4 Reverse-Engineering -- 6 Discussion and Conclusion -- 6.1 Related Work. 6.2 Our Contribution. |
Record Nr. | UNISA-996465636403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
On the Move to Meaningful Internet Systems. OTM 2017 Conferences : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part II / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXVII, 515 p. 152 illus.) |
Disciplina | 004.678 |
Collana | Programming and Software Engineering |
Soggetto topico |
Artificial intelligence
Software engineering Application software Database management Data mining Mathematical logic Artificial Intelligence Software Engineering Information Systems Applications (incl. Internet) Database Management Data Mining and Knowledge Discovery Mathematical Logic and Formal Languages |
ISBN | 3-319-69459-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- General Co-chairs and Editors' Message for OnTheMove 2017 -- Organization -- OnTheMove 2017 Keynotes -- Pragmatic Semantics at Web Scale -- Evolution of the Industrial Internet of Things: Preparing for Change -- Contents - Part II -- Contents - Part I -- Cloud and Trusted Computing (C&TC) 2017 -- En -- Property Preserving Encryption in NoSQL Wide Column Stores -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 The Data Model of Wide Column Stores -- 3.2 Property-Preserving Encryption -- 4 Selecting Practical PPE Schemes -- 4.1 Deterministic Encryption -- 4.2 Order-Preserving Encryption -- 4.3 Searchable Encryption -- 5 Data Management on Server Side -- 5.1 An Onion Layer Model for WCSs -- 5.2 Querying the Encrypted Data -- 6 Evaluation -- 6.1 Implementation -- 6.2 Performance -- 7 Security -- 8 Extensions and Future Work -- 9 Conclusion -- References -- Towards a JSON-Based Fast Policy Evaluation Framework -- 1 Introduction -- 2 Fundamentals of JACPoL -- 3 Performance Evaluation -- 4 Conclusion -- References -- Gibbon: An Availability Evaluation Framework for Distributed Databases -- 1 Introduction -- 2 Background -- 2.1 Distributed Database Systems -- 2.2 Availability for DDBMSs -- 2.3 Cloud Infrastructure -- 3 Failure Impact Analysis -- 3.1 Replication for Availability -- 3.2 Failures and Recovery -- 4 Availability Metrics -- 4.1 Input Parameters -- 4.2 Output Metrics -- 5 Availability Evaluation -- 5.1 Evaluation Process -- 5.2 DB Gibbon Algorithm -- 6 Architecture -- 7 Discussion -- 7.1 Evaluation Scenario: MongoDB -- 7.2 Evaluation Results -- 8 Related Work -- 9 Conclusion and Future Work -- References -- Locality-Aware GC Optimisations for Big Data Workloads -- 1 Introduction -- 2 Background -- 2.1 NoSQL Databases and Object Locality -- 2.2 Garbage Collection Algorithms and Heap Layouts.
3 Gang Promotion in Heap Management -- 3.1 Identifying Relevant Object-Graphs -- 3.2 Gang GC on a Large Heap -- 4 Deployment of Gang Promotion on Hotspot JVM -- 4.1 Java Runtime Instrumentation -- 4.2 LAG1 --- Locality-Aware Extension of G1 -- 5 Evaluation -- 5.1 Evaluation Setup -- 5.2 Program Locality in System -- 5.3 Application Behaviour -- 6 Related Work -- 7 Conclusion -- References -- FairCloud: Truthful Cloud Scheduling with Continuous and Combinatorial Auctions -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Architecture Design Requirements -- 3.2 Bid Representation Language -- 3.3 Entities and Events -- 3.4 Auctioneer Algorithms -- 4 Implementation -- 5 Evaluation -- 6 Conclusion -- References -- A Novel WebGIS-Based Situational Awareness Platform for Trustworthy Big Data Integration and Analytics in Mobility Context -- 1 Introduction -- 2 The MAGNIFIER WebGIS-Based Situational Awareness Platform -- 3 The MAGNIFIER Technological Architecture -- 4 PRACTIONIST DSS -- 5 Conclusion and Future Works -- References -- On the Verification of Software Vulnerabilities During Static Code Analysis Using Data Mining Techniques -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Approach -- 4 Conclusion, Discussion, and Future Work -- References -- International Conference on Ontologies, DataBases, and Applications of Semantics (ODBASE) 2017 -- En -- Linked Data and Ontology Reference Model for Infectious Disease Reporting Systems -- 1 Introduction -- 2 Goal of Semantics Usage -- 3 Semantic Reference Model -- 3.1 Semantifying Relational Data -- 3.2 Consistent Model -- 4 Geo Political Ontology -- 5 Relevant Work -- 6 Evaluation Through Competency Questions -- 6.1 Use Case -- 6.2 Competency Questions -- References -- PFSgeo: Preference-Enriched Faceted Search for Geographical Data -- 1 Introduction -- 2 Related Work and Novelty. 3 The PFSgeo Approach -- 3.1 Extensions of the Language of PFS -- 3.2 Extensions of the System Hippalus -- 3.3 Algorithmic Perspective -- 4 Performance Evaluation -- 4.1 Testing Scalability -- 4.2 Analysis of the Performance -- 4.3 Comparative Experimental Results -- 5 Evaluation with Users -- 5.1 Preparation -- 6 Concluding Remarks -- References -- Speeding up Publication of Linked Data Using Data Chunking in LinkedPipes ETL -- 1 Introduction -- 2 Data Chunking -- 3 Data Chunking in LinkedPipes ETL -- 3.1 SPARQL Endpoint Extractor -- 3.2 Tabular Extractor and Files to RDF -- 3.3 SPARQL Transformers -- 3.4 Merger Component and Loaders -- 4 Datasets and Pipelines for Experiments -- 4.1 LISTID - List of Czech Business Entity IDs -- 4.2 ARES - Czech Business Registry -- 4.3 MONITOR - Budget Information of All Levels of Czech State Administration -- 4.4 RÚIAN - Registry of Territorial Identification, Addresses and Real Estate -- 5 Experiments -- 5.1 LISTID -- 5.2 ARES -- 5.3 MONITOR -- 5.4 RÚIAN -- 6 Related Work -- 7 Conclusions and Future Work -- References -- A Particle Swarm-Based Approach for Semantic Similarity Computation -- 1 Introduction -- 2 Background -- 2.1 Ontology-Based Similarity Measures -- 2.2 Ontology-Based Similarity Computation Scenarios -- 3 The Proposed Approach -- 3.1 Finding LCS as a Particle Swarm Optimization Problem -- 3.2 Fitness Scores of the LCS Evaluation -- 4 Experimental Evaluation -- 4.1 Benchmarks and Ontologies -- 4.2 Implementation -- 4.3 Experimental Results -- 5 Conclusion -- References -- Agent-Based Assistance in Ambient Assisted Living Through Reinforcement Learning and Semantic Technologies -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 Reinforcement Learning -- 3.2 Agent Semantics -- 3.3 Automated ``Semantification'' and Retrieval of Agent Policies -- 4 First Results and Conclusion -- References. On the Need for Applications Aware Adaptive Middleware in Real-Time RDF Data Analysis (Short Paper) -- 1 Introduction -- 2 Formalization of RSP Features -- 3 Evaluation of RSP Engines Based on Formalized RSP Features -- 3.1 Latency and Breaking Points -- 3.2 Memory Consumption -- 4 Adaptive Middleware for RSP -- 4.1 Adaptive Layer -- 5 Conclusion -- References -- Learning Probabilistic Relational Models Using an Ontology of Transformation Processes -- 1 Introduction -- 2 Backgrounds -- 2.1 The Ontology of Transformation Processes -- 2.2 Probabilistic Relational Models -- 2.3 Learning PRMs -- 3 Learning a PRM Using an Ontology -- 3.1 Relational Schema Mapping -- 3.2 Our ON2PRM Algorithm -- 4 Experiments -- 4.1 Databases Generation -- 4.2 Results -- 5 Conclusion -- References -- ORDAIN: An Ontology for Trust Management in the Internet of Things -- Abstract -- 1 Introduction -- 2 Defining Trust and Reputation -- 3 ORDAIN Ontology -- 3.1 Ontology Contents -- 3.2 Ontology Implementation -- 4 Related Work -- 5 Conclusions -- Acknowledgments -- References -- APOPSIS: A Web-Based Platform for the Analysis of Structured Dialogues -- 1 Introduction -- 2 Background and Related Work -- 2.1 Computational Argumentation -- 2.2 Machine Learning -- 2.3 Existing Tools for Online Debates -- 3 A Methodology and Platform for Opinion Analysis -- 3.1 A Platform Methodology -- 3.2 Knowledge Map Representation -- 3.3 The MACE - Ontology Domain -- 3.4 Evaluating Opinions -- 4 Methodology: Analysing User-Generated Opinions -- 4.1 Clustering Analysis -- 5 Apopsis Implementation and Architecture Details -- 5.1 Debating Functionality -- 5.2 Debating on Different Levels of Discussions -- 5.3 Voting Mechanism -- 5.4 Searching Mechanism -- 5.5 General Features -- 5.6 Technical Information and Architecture -- 6 Conclusion and Future Work -- References. Identifying Opinion Drivers on Social Media -- 1 Introduction -- 2 Related Literature -- 3 Driver Identification: Formal Model -- 4 Results and Evaluation -- 5 Conclusions -- References -- Representing Fashion Product Data with Schema.org: Approach and Use Cases -- Abstract -- 1 Introduction -- 2 Overview of Clothing-Related Information -- 2.1 Garment Sizes -- 2.2 Colors -- 2.3 Product Variants -- 2.4 Materials Information -- 2.5 Textile Care Recommendations -- 2.6 Certifications -- 3 Clothing Product Information with Schema.org -- 3.1 Method -- 3.2 Representation of Basic Product Information -- 3.3 Representation of Clothing-Related Information -- 3.4 Representation of Textile Care Recommendations -- 3.5 Representation of Certifications -- 3.6 Other Information -- 3.7 Formalization and Results -- 4 Evaluation -- 5 Discussion and Conclusion -- 5.1 Related Work -- 5.2 Our Approach -- 5.3 Future Work -- References -- Semantic Modeling and Inference with Episodic Organization for Managing Personal Digital Traces -- 1 Introduction -- 2 Related Work -- 3 A Conceptual Model for Entities and Atomic Actions -- 4 Conceptual Model for scripts -- 5 Recognizing Script Instances from Documents -- 6 Summary -- References -- Linked Open Data for Linguists: Publishing the Hartmann von Aue-Portal in RDF -- Abstract -- 1 Introduction -- 1.1 Context -- 1.2 Problem Statement -- 1.3 Relevance -- 1.4 Organization of the Paper -- 2 Linked Open Data -- 3 The Hartmann von Aue-Portal -- 3.1 Purpose and Current Status -- 3.2 Data Model -- 3.3 Text Corpus Statistics -- 4 Approach -- 4.1 Challenges -- 4.2 Method -- 4.3 Implementation -- 4.4 Results -- 5 Evaluation -- 5.1 Formal Validation -- 5.2 Usage for Data-Driven Research -- 5.3 Interlinking of Hartmann von Aue Datasets with DBPedia -- 5.4 Reverse-Engineering -- 6 Discussion and Conclusion -- 6.1 Related Work. 6.2 Our Contribution. |
Record Nr. | UNINA-9910484246603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
On the Move to Meaningful Internet Systems. OTM 2017 Conferences : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part I / / edited by Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXVII, 767 p. 280 illus.) |
Disciplina | 004.678 |
Collana | Programming and Software Engineering |
Soggetto topico |
Artificial intelligence
Application software Software engineering Computer security Data mining Computer communication systems Artificial Intelligence Information Systems Applications (incl. Internet) Software Engineering Systems and Data Security Data Mining and Knowledge Discovery Computer Communication Networks |
ISBN | 3-319-69462-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- General Co-chairs and Editors' Message for OnTheMove 2017 -- Organization -- OnTheMove 2017 Keynotes -- Pragmatic Semantics at Web Scale -- Evolution of the Industrial Internet of Things: Preparing for Change -- Contents - Part I -- Contents - Part II -- International Conference on Cooperative Information Systems (CoopIS) 2017 -- En -- Characterizing Regulatory Documents and Guidelines Based on Text Mining -- 1 Introduction -- 2 Methodology -- 3 Description of Documents -- 3.1 Description of ISO/IEC Documents -- 3.2 Description of Medical Document -- 4 Evaluation -- 4.1 Case Study 1: ISO Documents -- 4.2 Case Study 2: Medical Document -- 5 Limitations and Application Scenarios -- 6 Related Work -- 7 Conclusion and Future Work -- References -- A Scalable Smart Meter Data Generator Using Spark -- 1 Introduction -- 2 Methodology -- 2.1 Overview -- 2.2 Algorithm Description -- 2.3 Optimization -- 3 Implementation on Spark -- 4 Evaluation -- 4.1 Effectiveness -- 4.2 Scalability -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Network-Aware Stochastic Virtual Machine Placement in Geo-Distributed Data Centers -- 1 Introduction -- 2 Problem Formulation -- 2.1 Stochastic Optimization Model -- 2.2 Equivalent Optimization Formulation -- 2.3 Network-Aware Stochastic VM Placement Algorithm -- 3 Performance Evaluation -- 4 Conclusion -- References -- Finding Process Variants in Event Logs -- 1 Introduction -- 2 Preliminaries -- 3 Finding Process Variants in Event Logs -- 4 Implementation and Case Study -- 5 Related Work -- 6 Conclusions -- References -- Interactive and Incremental Business Process Model Repair -- 1 Introduction -- 2 Related Work -- 3 Behavioral Alignment -- 4 Extending Conformance Checking to Process Model Repair -- 4.1 Extension, Order and Impact of Differences -- 4.2 Visualization of Differences -- 5 Evaluation.
5.1 Experiment with Synthetic Datasets -- 5.2 Experiment with Real-Life Dataset -- 6 Conclusion -- References -- Control Flow Structure Preservation During Process Fragment Anonymization -- 1 Introduction -- 2 Control Flow Anonymization -- 3 Evaluation -- 4 Related Work -- 5 Conclusion and Discussion -- References -- Diversity-Aware Continuous Top-k Queries in Social Networks -- 1 Introduction and Related Work -- 2 Data and Processing Models -- 3 The DA-SANTA Algorithm -- 4 Experimental Evaluation -- References -- Modeling and Discovering Cancelation Behavior -- 1 Introduction -- 2 Related Work -- 2.1 Criteria for Comparison -- 2.2 Discussion of the Related Work -- 3 Event Logs and Process Trees -- 3.1 Preliminaries -- 3.2 Event Logs -- 3.3 Process Trees -- 3.4 Cancelation Process Trees -- 4 Heuristics for Error Oracle -- 5 Model Discovery -- 5.1 Directly Follows Graph and Cuts -- 5.2 Discovery Framework -- 5.3 Cancelation Discovery -- 6 Evaluation -- 6.1 Input and Methodology for Comparative Evaluation -- 6.2 Comparative Evaluation Results and Discussion -- 7 Conclusion -- References -- Introducing Collaboration for Locating Features in Models: Approach and Industrial Evaluation -- 1 Introduction -- 2 Background -- 3 Our Approach for Introducing Collaboration in FL -- 3.1 Automatic Query Reformulation -- 3.2 IR FL CORE -- 3.3 Linguistic Rules FL CORE -- 4 Evaluation -- 4.1 Definition -- 4.2 Data Set -- 4.3 Implementation Details -- 4.4 Planning and Execution -- 4.5 Results -- 4.6 Statistical Analysis -- 5 Threats to Validity -- 6 Related Work -- 7 Concluding Remarks -- References -- Context-Aware Access Control with Imprecise Context Characterization Through a Combined Fuzzy Logic and Ontology-Based Approach -- 1 Introduction -- 2 Significance of Our Research and General Requirements -- 2.1 Application Scenario -- 2.2 General Requirements. 3 Our Formal FCAAC Approach -- 3.1 Context Model -- 3.2 Policy Model -- 4 Ontology-Based FCAAC Approach -- 4.1 Modelling Contextual Conditions -- 4.2 Reasoning About Contextual Conditions -- 4.3 FCAAC Policy -- 5 Prototype and Evaluation -- 5.1 Practicality -- 5.2 Performance -- 6 Related Work and Discussion -- 7 Conclusion and Future Research -- References -- Semi-supervised Log Pattern Detection and Exploration Using Event Concurrence and Contextual Information -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Patterns and Pattern Instances -- 4.1 Core-Activity, Pattern and Pattern Instance -- 4.2 Pattern Support, Confidence and Coverage -- 5 Pattern Detection and Pattern Instance Matching -- 5.1 Pattern Detection Approaches - Partially Ordered Traces to Patterns -- 5.2 Computing a Maximal Set of Pattern Instances -- 6 Evaluation and Discussion -- 7 Conclusion and Future Work -- References -- Cloud of Things Modeling for Efficient and Coordinated Resources Provisioning -- 1 Introduction -- 2 Existing Models and Standards -- 2.1 Internet of Things Environment -- 2.2 Cloud Infrastructure Management Initiatives -- 2.3 Synthesis of Existing Works on Cloud and IoT Models and Standards -- 3 Related Works -- 4 Cloud of Things Infrastructure Model -- 4.1 Network Graph Model -- 4.2 Sensor and Actuator Resources -- 4.3 Things Virtualization -- 4.4 Things Integration Patterns -- 5 Cloud of Things Platform Model -- 5.1 Cloud of Things Deployment Options -- 5.2 Data Components Sharing -- 6 Example Scenarios -- 6.1 Resources Description -- 6.2 Mapping Process -- 7 Cloud of Things Placement Problem Formulation -- 8 Simulation and Results -- 9 Conclusion and Perspectives -- References -- A Framework for Integrating Real-World Events and Business Processes in an IoT Environment -- 1 Introduction -- 2 Foundations -- 2.1 Business Process Management. 2.2 Complex Event Processing -- 3 Requirements Analysis -- 4 Related Work -- 5 Conceptual Framework -- 5.1 Event Generation and Aggregation -- 5.2 Event Binding Points -- 5.3 Event Subscription and Correlation -- 5.4 Reaction on Events -- 6 Implementation -- 6.1 Unicorn Event Processing Platform -- 6.2 Gryphon Case Modeler -- 6.3 Chimera Case Engine -- 7 Conclusion and Future Work -- References -- Methodological Support for Coordinating Tasks in Global Product Software Engineering -- 1 Introduction -- 2 Research Method: The Design Cycle -- 2.1 The Method Association Approach -- 2.2 Method Evaluation Approach -- 3 Problem Investigation -- 3.1 Literature Study -- 3.2 The Global Task Coordination Framework -- 3.3 Identifying Activity Groups -- 3.4 Identifying Method Fragments -- 4 Solution Design: Construction of a Global Task Coordination Method -- 4.1 Method Association -- 4.2 Method Assembly -- 4.3 Method Validation -- 5 Discussion -- 6 Conclusions and Future Research -- Appendix A The Global Task Coordination Method -- References -- Enhancing Process Models to Improve Business Performance: A Methodology and Case Studies -- 1 Introduction -- 2 Preliminaries -- 2.1 Petri Nets and Event Logs -- 2.2 Aligning Petri Nets and Event Logs and Repairing Event Logs -- 3 The Methodology -- 3.1 Deviation Analysis -- 3.2 Repair and Merge Log Clusters -- 3.3 Repair Model -- 4 Implementation and Evaluation -- 4.1 UWV Case Study -- 4.2 SAP Procurement Case Study -- 5 Related Work -- 6 Conclusion -- References -- TraDE - A Transparent Data Exchange Middleware for Service Choreographies -- 1 Introduction -- 2 Transparent Data Exchange Approach -- 2.1 Cross-Partner Data Objects and Cross-Partner Data Flows -- 2.2 Towards a TraDE Middleware -- 3 The TraDE Middleware -- 3.1 Metamodel -- 3.2 Architecture -- 3.3 Integration with Process Engines -- 4 Validation. 5 Evaluation -- 5.1 Evaluation Methodology and Experimental Setup -- 5.2 Experimental Results -- 6 Related Work -- 7 Conclusions and Outlook -- References -- Building the Most Creative and Innovative Collaborative Groups Using Bayes Classifiers -- Abstract -- 1 Introduction -- 2 Related Work on Collaborative Creativity -- 3 A Bayes Classifier-Based Model and Method for Building Optimally Creative and Innovative Groups -- 3.1 Bayesian Network Classifiers -- 3.2 General Model for Building "the Best" Collaborative Groups -- 3.3 Model Instantiation for Building the Most Creative Learning Groups -- 4 Case Study - A Real-World Scenario -- 5 Discussion -- 6 Conclusions and Future Work -- References -- A New Collaborative Paradigm of Computer Science Student Contests: An Experience -- Abstract -- 1 Introduction -- 2 Computer Science Contests -- 2.1 Computer Programming Contests -- 2.2 New Paradigms -- 3 Our Experience with Computer Science Contests -- 3.1 Evolution of Our Contest -- 3.2 A New Paradigm: Three-Words-from-a-Hat -- 3.3 Experiencing the New Paradigm -- 4 Is the New Paradigm Beneficial for Computer Science Education? -- 4.1 Is Competition Beneficial to Education? -- 4.2 Reflecting on the New Paradigm -- 5 Conclusions -- References -- Ranking-Based Evaluation of Process Model Matching -- 1 Introduction -- 2 Problem Statement -- 3 Probabilistic Evaluation of Process Model Matching -- 4 Evaluation Experiments -- 4.1 Setup -- 4.2 Results -- 5 Related Work -- 6 Conclusion -- References -- Analysis and Re-configuration of Decision Logic in Adaptive and Data-Intensive Processes (Short Paper) -- 1 Introduction -- 2 Challenges for Decision Logic Re-configuration: A Loan Approval Motivation Scenario -- 3 Supporting Decision Propagation in Business Processes -- 3.1 Feature-Oriented Representation of Decision Logic. 3.2 Constraint-Based Analysis of Decision Logic. |
Record Nr. | UNINA-9910484365003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
On the Move to Meaningful Internet Systems. OTM 2018 Conferences [[electronic resource] ] : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part I / / edited by Hervé Panetto, Christophe Debruyne, Henderik A. Proper, Claudio Agostino Ardagna, Dumitru Roman, Robert Meersman |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XXX, 683 p. 204 illus.) |
Disciplina | 004.678 |
Collana | Programming and Software Engineering |
Soggetto topico |
Application software
Data mining Artificial intelligence Computer security Computer system failures Computer communication systems Information Systems Applications (incl. Internet) Data Mining and Knowledge Discovery Artificial Intelligence Systems and Data Security System Performance and Evaluation Computer Communication Networks |
ISBN | 3-030-02610-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Systems Applications (incl. Internet) -- Information Storage and Retrieval -- Software Engineering Artificial Intelligence (incl. Robotics) -- Systems and Data Security -- Computer Appl. in Administrative Data Processing Ontologies -- Databases -- Semantics.-Cooperative Information Systems -- Cloud Computing -- Trust, Security, Privacy And Risk Management. |
Record Nr. | UNISA-996466457503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|