The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Community clouds provide efficient and secure environments for organizations with similar organization structures or business models to host their systems. Since threat analysis and incident response infrastructure and resources can be rapidly shared on a community cloud, the participating organizations save time and cost in handling cyber incidents. Unfortunately, contemporary cloud platforms are...
Faceted browsing has become ubiquitous with modern digital libraries and online search engines, yet the process is still difficult to abstractly model in a manner that supports the development of interoperable and reusable interfaces. We propose category theory as a theoretical foundation for faceted browsing and demonstrate how the interactive process can be mathematically abstracted. Existing efforts...
Ensemble learning is a powerful tool that has shown promise when applied towards bioinformatics datasets. In particular, the Random Forest classifier has been an effective and popular algorithm due to its relatively good classification performance and its ease of use. However, Random Forest does not account for class imbalance which is known for decreasing classification performance and increasing...
Outsourcing data and computation to the cloud is increasingly common. However, the data to be outsourced is often privacy-sensitive (e.g., geospatial data, social network data, and Internet network traffic data) and thus it is typically outsourced after being properly encrypted. Graph is one of the most common ways to model and represent the data in many applications, including geospatial data in...
This paper provides a summary of the design and implementation of a prototype inference controller that operates over a provenance graph and protects important provenance information from unauthorized users. We use as our data model the Resource Description Framework (RDF), which supports the interoperability of multiple databases having disparate data schemas. In addition, we express policies and...
UML is a semi-formal modeling language for object oriented systems. It is successfully used to assist all phases of software development process. With growing support by CASE tools, its applications become more and more widespread in real word projects. In fact, these tools allow code-generation from UML diagrams and reverse-engineering. In other hand, picalculus is a flexible formal theory with several...
Undetected failures in critical control systems can be catastrophic, including the loss of human lives or huge amounts of money. The safety assessment process aims to minimize such problems. In a previous work, we showed a strategy based on the process algebra CSP to obtain failure logic (a kind of Boolean structure expression or function representing part of a static fault tree) from a set of sequences...
The Integrated Modular Avionics (IMA) architecture and the Time-Triggered Ethernet (TTEthernet) network have emerged as the key components of a typical architecture model for recent civil aircrafts. It has recently been proposed to model both the (IMA) architecture and the TTEthernet network in the constraint-based TTCC calculus. In this paper, we show how the declarative aspects of this calculus...
Dashboard cameras are increasingly used these days worldwide to record driving videos. These devices generate a vast amount of geo-referenced videos. However, most of this valuable data is lost due to loop recording. We present the City Recorder, a platform to provide street level video tours based on user-uploaded driving videos. We demonstrate here how to get a smooth route previewing experience...
In this work, we present results produced from a nonlinear QSAR model developed and implemented using evolutionary computation and Random Forest Regression to study the effectiveness of dimeric Aryl ß-Diketo Acids on HIV-1 Integrase enzyme inhibition. Dimeric Aryl ß-Diketo Acids have been proven to be effective inhibitors of the biological mechanism of protein transfer known as HIV-integrase. This...
With rapid advances in technology and connectivity, the capability to capture data from multiple sources has given rise to multiview learning wherein each object has multiple representations and a learned model, whether supervised or unsupervised, needs to integrate these different representations. Multiview learning has shown to yield better predictive and clustering models, it also is able to provide...
Cyber defenders cannot clearly identify attackers from other legitimate users on a computer network. The network administration can protect the network using an active or a passive defense. Attackers can mount attacks like denial of service attacks or try to gain entry into secure systems. We model cyber defense as a signaling game. We find Bayesian Nash equilibria for both the attacker and the defender...
The Service of Facebook Fan Pages is one of the most popular social network platform for various organizations. Companies can interact with their own fans through the Fan Pages. The interactions include sending direct advertisement, gathering user meetings, and promoting electronic word of mouth (eWoM). For companies that use social network to gather customers' information, to identify the opinion...
In this paper, we propose a novel approach for reader-emotion categorization using word embedding learned from neural networks and an SVM classifier. The primary objective of such word embedding methods involves learning continuous distributed vector representations of words through neural networks. It can capture semantic context and syntactic cues, and subsequently be used to infer similarity measures...
The paper describes our initial effort on an experimental capability for the collection and analysis of big data of forensics value from the industrial control systems that operate the electrical power grid. The collection over the network of extensive logs of forensics value is performed through a distributed file system, which is designed to safeguard the real-time requirements of industrial control...
Cyber Physical Systems (CPS) are increasingly required to address sophisticated and complex set of stakeholder, security, regulatory policy and physical requirements. CPS employ numerous and interacting software, hardware, control and communication sub-systems that collectively address the system requirements. This paper describes a methodology that applies Satisfiability (SAT) or Satisfiability Modulo...
On the online E-Commerce platform, customer reviews provides valuable opinions and relevant content, which will affect the perches behavior of other customers. Since the amount of online review grow fast, it is hard to read them all, therefore, a system that can find the reviews with better quality is necessary. In order to better understand the quality of reviews. In this paper, we proposed a system...
To enjoy more social network services, users nowadays are usually involved in multiple online social networks simultaneously. The shared users between different networks are called anchor users, while the remaining unshared users are named as non-anchor users. Connections between accounts of anchor users in different networks are defined as anchor links and networks partially aligned by anchor links...
Intelligent Transportation System (ITS) is an important application domain for information reuse and integration. Efficient integration and deployment of information and communication technologies (ICT) can potentially reduce travel time and emission, improve usage of parking and public spaces, offer personalized travel related services, and more importantly, improve safety for drivers and pedestrians...
Social media is becoming a critical avenue for businesses today to target new customers and create brand loyalty. In order to target users effectively, companies need to know basic information about their users. However, in many cases, user profiles are either incomplete or completely wrong, and one of the most critical pieces of private information is gender. In this paper we examine the case of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.