2014 ieee 15th international conference on information ...toc.proceedings.com/25543webtoc.pdfredwood...
TRANSCRIPT
IEEE Catalog Number: ISBN:
CFP14IRI-POD 978-1-4799-5881-8
2014 IEEE 15th International Conference on Information Reuse and Integration (IRI 2014)
Redwood City, California, USA 13-15 August 2014
i
Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)
TABLE OF CONTENTS
Forward ................................................................................................................................................ xiv
Message from Program Co-chairs ......................................................................................................... xv
Conference Organizers ........................................................................................................................ xvii
Program Committee ............................................................................................................................. xix
Keynotes .............................................................................................................................................. xxii
Workshop Keynotes ............................................................................................................................ xxx
Industry Talks .................................................................................................................................... xxxii
Tutorials ........................................................................................................................................... xxxvi
Panel .............................................................................................................................................. xxxviii
IRI-HI 2014 Program Committee .................................................................................................... xxxix
FMi 2014 Program Committee .............................................................................................................. xl
DIM 2014 Program Committee .......................................................................................................... xlii
EM-RITE 2014 Program Committee ................................................................................................. xliii
WICSOC 2014 Program Committee .................................................................................................. xliv
SocialSec 2014 Program Committee ................................................................................................... xlv
IICPS 2014 Program Committee ........................................................................................................ xlvi
NatSec'2014 Program Committee ..................................................................................................... xlvii
Industry Committee .......................................................................................................................... xlviii
Sponsors ................................................................................................................................................ xlix
Technical Papers ...................................................................................................................................... l
Session A11: Information Security & Privacy I
Detecting and Resolving Inconsistencies in Firewalls .............................................................................. 1
Du Zhang, Lavanya Jujjavarapu and Meiliu Lu
California State University, Sacramento, USA
Stream Computing for Large-Scale, Multi-Channel Cyber Threat Analytics ........................................... 8
Douglas Schales (1)
, Mihai Christodorescu (2)
, Xin Hu (1)
, Jiyong Jang (1)
, Josyula Rao (1)
, Reiner
Sailer (1)
, Marc Stoecklin (1)
, Wietse Venema (1)
and Ting Wang (1)
(1)
IBM Research, USA (2)
Qualcomm Research, USA
Policy-Driven Security Management for Fog Computing: Preliminary Framework and A Case Study 16
ii
Clinton Dsouza, Gail-Joon Ahn and Marthony Taguinod
Arizona State University, USA
Deploying Malware Detection Software for Smart Phones .................................................................... 24
Bhavani Thuraisingham, Nathan McDaniel and Latifur Khan
The University of Texas at Dallas, USA
Session A12: Software Design, Testing and Reuse
Test Logic Reuse Through Unit Test Patterns: A Test Automation Framework for Software Product
Lines ................................................................................................................................................. 28
Glauco Silva Neves and Patrícia Vilain
Universidade Federal de Santa Catarina, Florianópolis, SC, Brazil
From Requirements to Software Design: An Automated Solution for Packaging Software Classes ..... 36
Yasaman Amannejad, Mohammad Moshirpour, Behrouz H. Far and Reda Alhajj
University of Calgary, Canada
Ontology-based User Requirements Decomposition for Component Selection for Highly Available
Systems ............................................................................................................................................ 44
Mahin Abbasipour (1)
, Margarete Sackmann (1)
, Ferhat Khendek (1)
and Maria Toeroe (2)
(1)
Concordia University, Montreal, Canada (2)
Ericsson Inc., Montreal, Canada
Specification-Based Testing with Buchi Automata: Transition Coverage Criteria and Property
Refinement ....................................................................................................................................... 52
Li Tan and Bolong Zeng
Washington State University, USA
Session A13W: First Workshop on Social Network Security (SocialSec 2014)
Consumer-Centric Protection for Online Social Networks ..................................................................... 62
Raja Naeem Akram, Ryan K. L. Ko, and Tsz Fung Law
University of Waikato, Hamilton, New Zealand
A Study of ClickJacking Worm Propagation in Online Social Networks ............................................... 68
Mohammad Reza Faghani and Uyen Trang Nguyen
York University, Toronto, Canada
Detecting Unintentional Information Leakage in Social Media News Comments ................................. 74
Inbal Yahav, David Schwartz and Gahl Silverman
Bar-Ilan University, Israel
Session A14W: WICSOC 2014: Social Media, Crowdsourcing, and Public Health
A Framework for Comparing Early Warning Systems across Domains: A Step Toward a
Data-Integrated Public Health EWS ................................................................................................ 80
Henry Kim (1)
, Marek Laskowski (1)
, Seyed Moghadas (1)
, Amirehsan Sajad (1)
and Maaz Asif (2)
(1)
York University, Toronto, Canada (2)
Queen’s University, Toronto, Canada
Much more to it: The relation between Facebook usage and self-esteem .............................................. 87
Montathar Faraon and Mauri Kaipainen
iii
Södertörn University, Sweden
Text Classification for Automatic Detection of Alcohol Use-Related Tweets: A Feasibility Study ....... 93
Yin Aphinyanaphongs, Bisakha Ray, Alexander Statnikov and Paul Krebs
NYU Langone Medical Center, USA
Towards Chronic Emergency Response Communities for Anaphylaxis ................................................ 98
David Schwartz (1)
, Abdelouahab Bellou (2)
, Luis Garcia-Castrillo (3)
, Antonella Muraro (4)
and
Nikolaos Papadopoulos (5)
(1)
Bar-Ilan University, Israel (2)
University Rennes 1, Rennes, France (3)
Hospital Universitario Marques de Valdecilla, Cantabria, Spain (4)
Padua General University Hospital, Padua, Italy (5)
The University of Manchester, United Kingdom
Leveraging Online Social Media for Capturing Observations of Daily Living and Ecological
Momentary Assessment ................................................................................................................. 104
Mohd Anwar
North Carolina A&T State University, USA
Session A21: Information Security & Privacy II
Detect Phishing by Checking Content Consistency .............................................................................. 109
Yi-Shin Chen (1)
, Huei-Xin Liu (1)
, Yi-Hsuan Yu (1)
and Pang-Chieh Wang (2)
(1)
National Tsing Hua University, Taiwan (2)
Industrial Technology Research Institute, Taiwan
DiCoTraM: A Distributed and Coordinated DDoS flooding attack tailored Traffic Monitoring.......... 120
Saman Taghavi Zargar, James Joshi and David Tipper
University of Pittsburgh, USA
Access Control Reinforcement over Searchable Encryption ................................................................ 130
Abdellah Kaci and Thouraya Bouabana-Tebibel
Ecole nationale Supérieure d'Informatique, Alger, Algeria
LEAF:A Social Network-based Intervention Tool for IPV Survivors .................................................. 138
Balaji Palanisamy, Sheldon Sensenig, James Joshi and Rose Constantino
University of Pittsburgh, USA
Session A22: Big Data/Networks & Cloud Computing
Uncertainty reasoning for the "Big Data" Semantic Web ..................................................................... 147
Loukia Karanikola (1)
, Isambo Karali (1)
and Sally Mcclean (2)
(1)
University of Athens, Greece (2)
University of Ulster, UK
Semantics Management for Big Networks ........................................................................................... 155
Bassem Mokhtar (1)
and Mohamed Eltoweissy (2)
(1)
Alexandria University, Egypt (2)
Virginia Military Institute, USA
Cloud-based monitoring and analysis of yield efficiency in precision farming ................................... 163
Li Tan and Riley Wortman
Washington State University, USA
iv
SMOPD-C: An Autonomous Vertical Partitioning Technique for Distributed Databases on Cluster
Computers ...................................................................................................................................... 171
Liangzhe Li and Le Gruenwald
University of Oklahoma, USA
Session A23: Information Reuse & Extraction
Argumentation Schemes for the Reuse of Argumentation Information in Collaborative Risk
Management ................................................................................................................................... 179
Ruan C. B. Pozzebon (1)
, Luís A. L. Silva (1)
, Lisandra M. Fontoura (1)
and John A. Campbell (2)
(1)
Universidade Federal de Santa Maria, Brazil (2)
University College London, UK
SOA-GovMM: A Meta Model for a Comprehensive SOA Governance Repository ............................ 187
Jan Königsberger, Stefan Silcher and Bernhard Mitschang
University of Stuttgart, Germany
Towards Facilities to Introduce Solutions for MDE in Development Environments with Reusable
Assets ............................................................................................................................................. 195
Fabio P. Basso and Claudia M. L. Werner and Toacy C. Oliveira
Federal University of Rio de Janeiro, Brazil
Extracting control-flow from text ......................................................................................................... 203
Pol Schumacher and Mirjam Minor
D-60325 Frankfurt am Main, Germany
Session A32: Social Networks, Crowdsourcing & Multiagent Systems
Towards Model Driven Crowdsourcing: First Experiments, Methodology and Transformation ......... 211
Samyr Vale
Federal University of Maranhão, Brazil
Toward Inferring the Age of Twitter Users with their Use of Nonstandard Abbreviations and
Lexicon .......................................................................................................................................... 219
Nathaniel Moseley (1)
, Cecilia Ovesdotter Alm (1)
and Manjeet Rege (2)
(1)
Rochester Institute of Technology, USA (2)
University of St. Thomas, USA
Extracting Top-k Most Influential Nodes by Activity Analysis ............................................................ 227
Myungcheol Doo (1)
and Ling Liu (2)
(1)
Applied Research Center, Arris, USA (2)
Georgia Institute of Technology, USA
Detection of Implied Scenarios in Multiagent Systems with Clustering Agents’ Communications .... 237
Fatemeh Hendijani Fard and Behrouz H. Far
University of Calgary, Canada
Session A33: Data Analysis, Management & Integration
A value-oriented specification for weak sequencing validation ........................................................... 245
Thouraya Bouabana-Tebibel (1)
and Stuart H. Rubin (2)
(1)
Ecole nationale Supérieure d’Informatique, Algiers, Algeria (2)
SPAWAR Systems Center Pacific, San Diego, USA
v
Optimizing Online Spatial Data Analysis with Sequential Query Patterns .......................................... 253
Chunqiu Zeng, Hongtai Li, Huibo Wang, Yudong Guang, Chang Liu, Tao Li, Shu-Ching Chen
and Naphtali Rishe
Florida International University, USA
Extending Automated Intelligence Systems via Graph Database : A Case Study of the
“Meth Hunter” ............................................................................................................................... 261
Mark Blair (1)
, Yunkai Liu (1)
and Theresa Vitolo (2)
(1)
DAGIR Co., USA (2)
Gannon University, USA
Mapping Specifications for Ranked Hierarchical Trees in Data Integration Systems .......................... 269
Sarfaraz Soomro, Andréa Matsunaga and José Fortes
University of Florida, USA
Session A34W: Information Reuse and Integration in Health Informatics (IRI-HI)
How Ranker and Learner Choice Affects Classification Performance on Noisy Bioinformatics
Data ................................................................................................................................................ 277
Ahmad Abu Shanab, Taghi Khoshgoftaar, Randall Wald and Amri Napolitano
Florida Atlantic University, USA
On the analysis of Alzheimer’s disease Gene Expression Dataset using Clustering and Association
Rule Mining ................................................................................................................................... 283
Benoit Le Quéau, Omair Shafiq and Reda Alhajj
University of Calgary, Canada
Towards a Technology Roadmap for Big Data Applications in the Healthcare Domain ...................... 291
Sonja Zillner (1,4)
, Heiner Oberkampf (1)
, Claudia Bretschneider (1)
, Amrapali Zaveri (3)
,
Werner Faix (4)
, Sabrina Neururer (2,5)
(1)
Siemens AG, Munich, Germany (2)
Innsbruck Medical University, Austria (3)
University Leipzig, Germany (4)
Steinbeis University, Berlin, Germany (5)
University of Innsbruck, Austria
The Effect of Noise Level and Distribution on Classification of Easy Gene Microarray Data ............ 297
Randall Wald, Taghi Khoshgoftaar and Ahmad Abu Shanab
Florida Atlantic University, USA
Session B11: Data Mining and Knowledge Discovery I
Improving the Random Forest Algorithm by Randomly Varying the Size of the Bootstrap Samples . 303
Md Nasim Adnan
Charles Sturt University, Australia
Stability of Filter- and Wrapper-based Software Metric Selection Techniques .................................... 309
Huanjing Wang (1)
, Taghi M. Khoshgoftaar (2)
and Amri Napolitano (2)
(1)
Western Kentucky University, USA (2)
Florida Atlantic University, USA
Classification Performance of Three Approaches for Combining Data Sampling and Gene
Selection on Bioinformatics Data .................................................................................................. 315
vi
Taghi Khoshgoftaar, Ali Fazelpour, David Dittman and Amri Napolitano
Florida Atlantic University, USA
Data-Oriented Intelligent Transportation Systems ................................................................................ 322
Hamdy Ibrahim (1,2)
and Behrouz Far (1)
(1)
University of Calgary, Canada (2)
University of Calgary, Canada
Session B12: AI & Decision Support Systems
Any-Time Knowledge Revision ........................................................................................................... 330
Eric Gregoire
Universit´e d’Artois, France
A method for text-line segmentation for unconstrained Arabic and Persian handwritten text image .. 338
Reza Shakoori
University of Mumbai, India
Particle Swarm Optimization Protocol for Clustering in Wireless Sensor Networks: A Realistic
Approach ........................................................................................................................................ 345
Riham Elhabyan and Mustapha Yagoub
University of Ottawa, Canada
SEM² Suite - towards a Tool Suite for Supporting Knowledge Management in Situation
Awareness Systems ........................................................................................................................ 351
Andrea Salfinger (1)
, Daniel Neidhart (1)
, Werner Retschitzegger (1)
, Wieland Schwinger (1)
and Stefan Mitsch (2)
(1)
Johannes Kepler University Linz, Austria (2)
Carnegie Mellon University, USA
Session B13W: Workshop on Formal Methods Integration (FMi)
Age semantics based State Space Computation of Time Petri Nets ..................................................... 361
Abdelkrim Abdelli
USTHB University, Algeria
Proving that your Dart will Hit the Mark: An Introduction to Dart Contracts ...................................... 369
Patrice Chalin
Kansas State University, USA
Towards Ray Optics Formalization of Optical Imaging Systems ......................................................... 378
Umair Siddique and Sofiene Tahar
Concordia University, Montreal, Canada
Time properties Verification of UML/MARTE Real-Time Systems .................................................... 386
Aymen Louati (1,2)
, Kamel Barkaoui (2)
and Chadlia Jerad (1)
(1)
Tunis El Manar, Tunisie (2)
Saint-Martin, Paris, France
Session B14W: First International Workshop on Information Integration in Cyber Physical Systems (IICPS 2014)
Advancing WSN Physical Security Adopting TPM-based Architectures ............................................. 394
vii
Ermanno Battista (1)
, Mario Barbareschi (1)
, Antonino Mazzeo (1)
and Sridhar Venkatesan (2)
(1)
University of Naples Federico II, Italy (2)
George Mason University, USA
A Hardware Accelerator for Data Classification within the Sensing Infrastructure ............................. 400
Mario Barbareschi (1)
, Ermanno Battista (1)
, Nicola Mazzocca (1)
and Sridhar Venkatesan (2)
(1)
University of Naples Federico II, Italy (2)
George Mason University, USA
Investigating the Feasibility of LEAP+ in ZigBee Specification ......................................................... 406
Mohammad Rezaeirad (1)
, Sahar Mazloom (1)
, Muhammad Aamir Iqbal (2)
, Dmitri Perkins (2)
and Magdy Bayoumi (2)
(1)
George Mason University, USA (2)
University of Louisiana at Lafayette, USA
A Cluster-based Key Management Framework for Resource Constraint Networks ............................ 413
Mohammad Rezaeirad (1)
, Sahar Mazloom (1)
, Mahdi Orooji (2)
, Dmitri Perkins (3)
and Magdy Bayoumi (3)
(1)
George Mason University, USA (2)
Case Western Reserve University, USA (3)
University of Louisiana at Lafayette, USA
Session B21: Data Mining and Knowledge Discovery II
Using Incremental Clustering Technique in Collaborative Filtering Data Update ............................... 420
Xiwei Wang and Jun Zhang
University of Kentucky, USA
Improving Software Quality Estimation by Combining Feature Selection Strategies with Sampled
Ensemble Learning ........................................................................................................................ 428
Taghi Khoshgoftaar (1)
, Kehan Gao (2)
and Amri Napolitano (1)
(1)
Florida Atlantic University, USA (2)
Eastern Connecticut State University, USA
Evaluating Distance Measures and Times Series Clustering for Temporal Patterns Retrieval. ............ 434
Sidahmed Benabderrahmane (1)
, René Quiniou (1)
and Thomas Guyet (2)
(1)
INRIA, Rennes, France (2)
IRISA, Rennes, France
Analyzing Immediate Correlations between Baby Names and Pop Culture in North America in
the 21st Century ............................................................................................................................. 442
Abra Gurnett, Robin Besson, Omair Shafiq, Reda Alhajj
University of Calgary, Canada
Session B22: Information Security & Privacy III
A Unification of Access Control and Data Services ............................................................................. 450
David Ferraiolo (1)
, Serban Gavrila (1)
and Wayne Jansen (2)
(1)
National Institute of Standards and Technology, USA (2)
Bayview Behavioral Consulting, USA
Real-time Anomaly Detection Over VMware Performance Data Using Storm ................................... 458
Mohiuddin Solaimani, Latifur Khan and Bhavani Thuraisingham
viii
The University of Texas at Dallas, USA
A Secure two-party Password-authenticated Key Exchange protocol .................................................. 466
Maryam Saeed (1)
, Hadi Shahriar Shahhoseini (1)
, Ali Mackvandi (2)
, Mohammad Reza
Rezaeinezhad (2)
, Mansour Naddafiun (2)
and Mohammad Zare Bidoki (2)
(1)
Iran University of Science and Technology, Iran (2)
R&D Department of Pishgaman Kavir Yazd Cooperative, Iran
Session B23W: Workshop on Formal Methods Integration (FMi)
Reachability in Hierarchical Machines ................................................................................................. 475
Omer Nguena Timo (1)
, Alexandre Petrenko (1)
, Arnaud Dury (1)
and S Ramesh (2)
(1)
Computer Research Institute of Montreal, Canada (2)
GM Global R&D, USA
Formalization and analysis of Timed BPEL ......................................................................................... 483
Imed Eddine Chama, Nabil Belala and Djamel Eddine Saϊdouni
University Constantine II, Algeria
A Paradigm integration in a specification course .................................................................................. 492
Manuel A. Martins (1)
, Alexandre Madeira (2)
, Luis Barbosa (2)
and Renato Neves (2)
(1)
Univ. Aveiro, Portugal (2)
Univ. Minho, Portugal
A CEGAR Approach for the Reachability Analysis of Hybrid Sequential Function Charts ................ 500
Johanna Nellen and Erika Abraham
RWTH Aachen University, Germany
Session B24W: First International Workshop on Information Integration in Cyber Physical Systems (IICPS 2014)
Next-Generation Technologies for Preventing Accidental Death of Children Trapped in Parked
Vehicles .......................................................................................................................................... 508
Vittoria Aiello (1)
, Parnian Najafi Borazjani (2)
, Ermanno Battista (3)
and
Massimiliano Albanese (2)
(1)
R2M Innovations, USA (2)
George Mason University, USA (3)
University of Naples Federico II, Italy
Automatic Evaluation of Medical Doctors' Performances while Using a Cricothyrotomy Simulator . 514
Daniela D'Auria and Fabio Persia
University of Naples ”Federico II”, Italy
A Peer-to-Peer Network Architecture for Emerging Applications ........................................................ 520
Khondkar Islam
George Mason University, USA
Caruso: Interactive Headphones for a Dynamic 3D Audio Application in the Cultural Heritage
Context ........................................................................................................................................... 525
Daniela D'Auria, Dario Di Mauro, Davide Maria Calandra and Francesco Cutugno
University of Naples ”Federico II”, Italy
Session C11: Data Mining and Knowledge Discovery III
ix
Finding the Most Evident Co-Clusters on Weblog Dataset Using Frequent Super-Sequence Mining . 529
Xinran Yu and Turgay Korkmaz
The University of Texas at San Antonio, USA
Data Integration and Clustering for Real Time Crash Prediction ......................................................... 537
Elahe Paikari, Mohammad Moshirpour, Reda Alhajj and Behrouz Far
University of Calgary, Canada
Leveraging the Web for Automating Tag Expansion for Low-Content Items ...................................... 545
Ayush Singhal and Jaideep Srivastava
University of Minnesota, USA
iSRD: Spam Review Detection with Imbalanced Data Distributions................................................... 553
Hamzah Al Najada and Xingquan Zhu
Florida Atlantic University, USA
Utilizing Concept Correlations for Effective Imbalanced Data Classification ..................................... 561
Yilin Yan (1)
, Yang Liu (1)
, Mei-Ling Shyu (1)
and Min Chen (2)
(1)
University of Miami, USA (2)
University of Washington Bothell, USA
Session C12: Knowledge Discovery & Disaster Management
Towards a Refactoring Catalogue for Knowledge Discovery Metamodel ........................................... 569
Rafael S. Durelli (1)
, Daniel San Martín (2)
, Marcio Eduardo Delamaro (1)
and Valter Camargo (2)
(1)
Universidade de S˜ao Paulo, Brazil (2)
Universidade Federal de S˜ao Carlos, Brazil
A Mapping Study on Architecture-Driven Modernization ................................................................... 577
Rafael S. Durelli (2,3)
, Daniel San Martín (1)
, Bruno Marinho (1)
, Raphael Honda (1)
,
Marcio Eduardo Delamaro (3)
, Nicolas Anquetil (2)
and Valter Camargo (1)
(1)
Universidade Federal de S˜ao Carlos, Brazil (2)
INRIA, France (3)
Universidade de S˜ao Paulo, Brazil
Generating Textual Storyline to Improve Situation Awareness in Disaster Management .................... 585
Wubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen and Ning Xie
Florida International University, USA
A Bipartite-Graph Based Approach for Disaster Susceptibility Comparisons among Cities ............... 593
Wubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen, Ning Xie and Jinpeng Wei
Florida International University, USA
Session C13W: The 3rd IEEE International Workshop on Empirical Methods for Recognizing Inference in Text (EM-RITE 2014)
Word Segmentation Refinement by Wikipedia for Textual Entailment ................................................ 600
Chuan-Jie Lin and Yu-Cheng Tu
National Taiwan Ocean University, Taiwan
Analysis of Identifying Linguistic Phenomena for Recognizing Inference in Text .............................. 607
Min-Yuh Day and Ya-Jung Wang
Tamkang University, Taiwan
x
Sense Decomposition from E-HowNet for Word Similarity Measurement .......................................... 613
Cheng-Wei Shih, Yu-Lun Hsieh and Wen-Lian Hsu
Academia Sinica, Taiwan
Peer Review in Online Forums: Classifying Feedback-Sentiment ....................................................... 619
Greg Harris, Anand Panangadan and Viktor Prasanna
University of Southern California, USA
Mining the User Clusters on Facebook Fan Pages Based on Topic and Sentiment Analysis ............... 627
Kuan-Cheng Lin (1)
, Shih-Hung Wu (1)
, Liang-Pu Chen (2)
, Tsun Ku (3)
, and Gwo-Dong Chen (3)
(1)
Chaoyang University of Technology, Taiwan (2)
Institute for Information Industry, Taiwan (3)
National Central University, Taiwan
Session C14W: Workshop on Advances in Nature-Inspired Cyber Security: Science, Engineering and Economics (NatSec'2014)
Sniper: A Framework for Detecting Attack Attempts to Open Source Web Applications at the
Run Time ........................................................................................................................................ 633
Abdullah Almurayh
University of Colorado at Colorado Springs, USA
CyPhyMASC: Evolutionary Monitoring, Analysis, Sharing and Control Platform for SmartGrid
Defense .......................................................................................................................................... 639
Mohamed Azab (2,3)
and Mohamed Eltoweissy (1,3)
(1)
Virginia Military Institute, USA (2)
Alexandria, Egypt (3)
Virginia Tech, USA
THE EVOLUTION OF NETWORK BASED CYBERSECURITY NORMS: An Analytical
Narrative ........................................................................................................................................ 646
Atin Basuchoudhary (1)
and Nazli Choucri (2)
(1)
Virginia Military Institute, USA (2)
Massachusetts Institute of Technology, USA
Session C21: Data Mining and Knowledge Discovery IV
Language Independent Analysis and Classification of Discussion Threads in Coursera MOOC
Forums ........................................................................................................................................... 654
Lorenzo A. Rossi (1)
and OmprakashGnawali (2)
(1)
University of Southern California, USA (2)
University of Houston, USA
Automatically Predicting the Helpfulness of Online Reviews ............................................................. 662
Yadong Zhang and Du Zhang
California State University, Sacramento, USA
A Hidden Treasure? Evaluating and Extending Latent Methods for Link-based Classification .......... 669
Aaron Fleming, Luke McDowell and Zane Markel
U.S. Naval Academy, USA
Session C22: Geo/Medical Informatics and Multimedia Systems
xi
Interpreting Medical Tables as Linked Data to Generate Meta-Analysis Reports ................................ 677
Varish Mulwad, Tim Finin and Anupam Joshi
University of Maryland, Baltimore County, USA
Understanding Implicit and Explicit Interface Tools to Perform Visual Analytics Tasks ..................... 687
Dong Hyun Jeong (1)
, Soo-Yeon Ji (2)
, Tera Greensmith (3)
, Byunggu Yu (1)
and Remco Chan (4)
(1)
University of the District of Columbia, USA (2)
Bowie State University, USA (3)
Simon Fraser University, Canada (4)
Tufts University, USA
The Power of Fear: Facial Emotion Analysis of CEOs to Forecast Firm Performance ....................... 695
Yanjia Sun, Ali Akansu and James Cicon
New Jersey Institute of Technology, USA
Designing a Two-Level Monitoring Method to Detect Network Abnormal Behaviors ........................ 703
Soo-Yeon Ji (1)
, Seonho Choi (1)
and Dong Hyun Jeong (2)
(1)
Bowie State University, USA (2)
University of the District of Columbia, USA
Session C23W: The 3rd IEEE International Workshop on Data Integration and Mining (DIM 2014)
A Proximity Measure for Link Prediction in Social User-Item Networks ............................................ 710
Chun-Hao Fu, Cheng-Shang Chang and Duan-Shin Lee
National Tsing Hua University, Taiwan
Outlier Detection based on k-Neighborhood MST ............................................................................... 718
Qingsheng Zhu, Xiaogang Fan and Ji Feng
Chongqing University, China
An Ensemble Classification Approach for Handling Spatio-Temporal Drifts in Partially Labeled
Data Streams .................................................................................................................................. 725
Tegjyot Singh Sethi, Mehmed Kantardzic, Elaheh Arabmakki and Hanquing Hu
University of Louisville, USA
Understanding Co-evolution in Large Multi-relational Social Networks ............................................. 733
Ayush Singhal, Atanu Roy and Jaideep Srivastava
University of Minnesota - Twin Cities, USA
A Sketch-based Conceptual Level Data Integration Methodology ....................................................... 741
Loredana Caruccio, Vincenzo Deufemia and Giuseppe Polese
University of Salerno, Italy
DataGopher: A context based search engine for research datasets ....................................................... 749
Ayush Singhal, Ravindra Kasturi and Jaideep Srivastava
University of Minnesota, USA
Session C31: Data Mining and Knowledge Discovery V
Rolling Window Time Series Prediction using MapReduce ................................................................. 757
Lei Li, Farzad Noorian, Duncan J.M. Moss, Philip H.W. Leong
The University of Sydney, Australia
xii
Correlation-based Re-ranking for Semantic Concept Detection ........................................................... 765
Hsin-Yu Ha (1)
, Fausto C. Fleites (1)
, Shu-Ching Chen (1)
and Min Chen (2)
(1)
Florida International University, USA (2)
University of Washington Bothell, USA
Timed Sequential Pattern Mining Based on Confidence in Accumulated Intervals ............................. 771
Chichang Jou, Huan-Jyh Shyur and Chih-Yu Yen
Tamkang University, Taiwan
RLS-A Reduced Labeled Samples Approach for Streaming Imbalanced Data with Concept Drift ..... 779
Elaheh Arabmakki, Mehmed Kantardzic and Tegjyot Singh Sethi
University of Louisville, USA
Session C32: Fuzzy Systems & Heuristic Optimization
UFOM: Unified Fuzzy Ontology Matching.......................................................................................... 787
Yinuo Zhang, Anand Panangadan and Viktor Prasanna
University of Southern California, USA
Applying Pareto ant colony optimization to solve bi-objective forest transportation planning
problems ......................................................................................................................................... 795
Pengpeng Lin, Jun Zhang and Marco A Contreras
University of Kentucky, USA
Extending Modern SAT Solvers for Models Enumeration ................................................................... 803
Said Jabbour, Jerry Lonlac, Lakhdar Sais and Yakoub Salhi
University of Artois, Lens, France
Detecting Geo-spatial Weather Clusters using Dynamic Heuristic Subspaces ..................................... 811
Suman Deb Roy and Gilad Lotan
Betaworks Studio, USA
Session SP: Poster Session
Bayesian Updating for Time Series Missing Data Discovery and Uncertainty Estimation
(TSMDDUE) .................................................................................................................................. 819
Sara Aghakhani, Reda Alhajj and Philip Chang
University of Calgary, Canada
UML Activity Diagram To Event-B: A Model Transformation Approach Based on the Institution
Theory ............................................................................................................................................ 823
Amine Achouri and Jemni Ben Ayed Leila
University of Tunis, Tunisia
A Semantic Multi-Modal Information Retrieval Approach based on Linked Data to Multimedia
Convergent Environments.............................................................................................................. 830
Natasha Correia Queiroz Lino, Clauirton Siebra and Manoel De Albuquerque Lira Amaro
Federal University of Paraiba, Joao Pessoa, Brazil
Rotation Invariant Face Recognition Survey ........................................................................................ 835
Gabriel Castañeda, Taghi Khoshgoftaar and Randall Wald
Florida Atlantic University, USA
Using Document Space For Relational Search ..................................................................................... 841
xiii
Richard Drake and Ken Pu
University of Ontario Inst of Technology, Canada
An Extension to the Data-driven Ontology Evaluation ........................................................................ 845
Hlomani Hlomani and Deborah Stacey
University of Guelph, Canada
Using Feature Selection and Classification to Build Effective and Efficient Firewalls ....................... 850
Randall Wald (1)
, Flavio Villanustre (2)
, Taghi Khoshgoftaar (1)
, Richard Zuech (1)
,
Jarvis Robinson (2)
and Edin Muharemagic (2)
(1)
Florida Atlantic University, USA (2)
LexisNexis Business Information Solutions, USA
Tire-Road Friction Estimation Utilizing Smartphones ......................................................................... 855
Michael Jaynes and Ram Dantu
University of North Texas, USA
Who Wrote This Paper? Learning for Authorship De-identification Using Stylometric Featuress ...... 859
Jose Hurtado, Napat Taweewitchakreeya and Xingquan Zhu
Florida Atlantic University, USA
Automatically Classifying and Interpreting Polar Datasets with Apache Tika ..................................... 863
Ann Burgess (1)
and Chris Mattmann (2)
(1)
University of Southern California, USA (2)
California Institute of Technology, USA
Kalman-Filter Algorithm and PMUs for State Estimation of Distribution Networks .......................... 868
Faridoon Shabani, Mohanmad Vaziri, Mahdi Amini, Mahyar Zarghami and Suresh Vadhva
California State University, Sacramento, USA
Reuse and Integration of Healthcare Information for Subjects in a Clinical Trial for Treatment of
Recurrent Respiratory Papillomatosis ............................................................................................ 874
Anatoly Goldstein
Massachusetts General Hospital Center for Laryngeal Surgery and Voice Rehabilitation, USA
Author Index ...................................................................................................................................... 881