th international conference on information reuse and … · proceedings of the 2014 ieee 15th...
TRANSCRIPT
Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)
TABLE OF CONTENTS
Forward xiv
Message from Program Co-chairs xv Conference Organizers xvii
Program Committee xix Keynotes xxii
Workshop Keynotes xxx Industry Talks xxxii
Tutorials xxxvi Panel xxxviii
IRI-HI 2014 Program Committee xxxix FMi 2014 Program Committee xl
DIM 2014 Program Committee xlii EM-RITE 2014 Program Committee xliii
WICSOC 2014 Program Committee xliv Social Sec 2014 Program Committee xlv
IICPS 2014 Program Committee xlvi NatSec'2014 Program Committee xlvii
Industry Committee xlviii Sponsors xlix
Technical Papers 1
Session A11: Information Security & Privacy I
Detecting and Resolving Inconsistencies in Firewalls 1 Du Zhang, Lavanya Jujjavarapu and Meiliu Lu California State University, Sacramento, USA
Stream Computing for Large-Scale, Multi-Channel Cyber Threat Analytics 8 Douglas Schales (1), Mihai Christodorescu (2\ Xin Hu(1), Jiyong Jang(1), Josyula Rao (1), Reiner Sailer(1), Marc Stoecklin(1), Wietse Venema(1) and Ting Wang(1)
(1) IBM Research, USA (2) Qualcomm Research, USA
Policy-Driven Security Management for Fog Computing: Preliminary Framework and A Case Study 16
i
Clinton Dsouza, Gail-Joon Ahn and Marthony Taguinod Arizona State University, USA
Deploying Malware Detection Software for Smart Phones 24 Bhavani Thuraisingham, Nathan McDaniel and Latifur Khan The University of Texas at Dallas, USA
Session A12: Software Design, Testing and Reuse
Test Logic Reuse Through Unit Test Patterns: A Test Automation Framework for Software Product Lines 28 Glauco Silva Neves and Patricia Vilain Universidade Federal de Santa Catarina, Florianópolis, SC, Brazil
From Requirements to Software Design: An Automated Solution for Packaging Software Classes 36 Yasaman Amannejad, Mohammad Moshirpour, Behrouz H. Far and Reda Alhajj University of Calgary, Canada
Ontology-based User Requirements Decomposition for Component Selection for Highly Available Systems 44 Mahin Abbasipour(1), Margarete Sackmann(1), Ferhat Khendek(1) and Maria Toeroe (2)
(1) Concordia University, Montreal, Canada (2) Ericsson Inc., Montreal, Canada
Specification-Based Testing with Buchi Automata: Transition Coverage Criteria and Property Refinement 52 Li Tan and Bolong Zeng Washington State University, USA
Session A13W: First Workshop on Social Network Security (SocialSec 2014)
Consumer-Centric Protection for Online Social Networks 62 Raja Naeem Akram, Ryan K. L. Ko, and Tsz Fung Law University ofWaikato, Hamilton, New Zealand
A Study of ClickJacking Worm Propagation in Online Social Networks 68 Mohammad Reza Faghani and Uyen Trang Nguyen York University, Toronto, Canada
Detecting Unintentional Information Leakage in Social Media News Comments 74 Inbal Yahav, David Schwartz and Gahl Silverman Bar-Ilan University, Israel
Session A14W: WICSOC 2014: Social Media, Crowdsourcing, and Public Health
A Framework for Comparing Early Warning Systems across Domains: A Step Toward a Data-Integrated Public Health EWS 80 Henry Kim (1), Marek Laskowski(1), Seyed Moghadas (1), Amirehsan Sajad (1) and Maaz Asif(2)
(1) York University, Toronto, Canada (2) Queen 's University, Toronto, Canada
Much more to it: The relation between Facebook usage and self-esteem 87 Montathar Faraon and Mauri Kaipainen
u
Södertörn University, Sweden Text Classification for Automatic Detection of Alcohol Use-Related Tweets: A Feasibility Study 93
Yin Aphinyanaphongs, Bisakha Ray, Alexander Statnikov and Paul Krebs NYU Longone Medical Center, USA
Towards Chronic Emergency Response Communities for Anaphylaxis 98 David Schwartz (1), Abdelouahab Bellou (2\ Luis Garcia-Castrillo(3), Antonella Muraro(4) and Nikolaos Papadopoulos (5)
(1) Bar-Ilan University, Israel (2) University Rennes 1, Rennes, France (3) Hospital Universitario Marques de Valdecilla, Cantabria, Spain (4) Padua General University Hospital, Padua, Italy (5) The University of Manchester, United Kingdom
Leveraging Online Social Media for Capturing Observations of Daily Living and Ecological Momentary Assessment 104 Mohd Anwar North Carolina A&TState University, USA
Session A21: Information Security & Privacy II
Detect Phishing by Checking Content Consistency 109 Yi-Shin Chen (1), Huei-Xin Liu (1), Yi-Hsuan Yu (1) and Pang-Chieh Wang (2)
(1) National Tsing Hua University, Taiwan (2) Industrial Technology Research Institute, Taiwan
DiCoTraM: A Distributed and Coordinated DDoS flooding attack tailored Traffic Monitoring 120 Saman Taghavi Zargar, James Joshi and David Tipper University of Pittsburgh, USA
Access Control Reinforcement over Searchable Encryption 130 Abdellah Kaci and Thouraya Bouabana-Tebibel Ecole nationale Supérieure d'Informatique, Alger, Algeria
LEAF:A Social Network-based Intervention Tool for IPV Survivors 138 Balaji Palanisamy, Sheldon Sensenig, James Joshi and Rose Constantino University of Pittsburgh, USA
Session A22: Big Data/Networks & Cloud Computing
Uncertainty reasoning for the "Big Data" Semantic Web 147 Loukia Karanikola(1), Isambo Karali(1) and Sally Mcclean (2)
(1) University of Athens, Greece (2) University of Ulster, UK
Semantics Management for Big Networks 155 Bassem Mokhtar(1) and Mohamed Eltoweissy (2)
(1) Alexandria University, Egypt (2) Virginia Military Institute, USA
Cloud-based monitoring and analysis of yield efficiency in precision farming 163 Li Tan and Riley Wortman Washington State University, USA
Hi
SMOPD-C: An Autonomous Vertical Partitioning Technique for Distributed Databases on Cluster Computers 171 Liangzhe Li and Le Gruenwald University of Oklahoma, USA
Session A23: Information Reuse & Extraction
Argumentation Schemes for the Reuse of Argumentation Information in Collaborative Risk Management 179 Ruan C. B. Pozzebon (1), Luis A. L. Silva (1), Lisandra M. Fontoura (1) and John A. Campbell(2)
(1) Universidade Federal de Santa Maria, Brazil (2) University College London, UK
SOA-GovMM: A Meta Model for a Comprehensive SOA Governance Repository 187 Jan Königsberger, Stefan Silcher and Bernhard Mitschang University of Stuttgart, Germany
Towards Facilities to Introduce Solutions for MDE in Development Environments with Reusable Assets 195 Fabio P. Basso and Claudia M. L. Werner and Toacy C. Oliveira Federal University of Rio de Janeiro, Brazil
Extracting control-flow from text 203 Pol Schumacher and Mirjam Minor D-60325 Frankfurt am Main, Germany
Session A32: Social Networks, Crowdsourcing & Multiagent Systems
Towards Model Driven Crowdsourcing: First Experiments, Methodology and Transformation 211 Samyr Vale Federal University ofMaranhao, Brazil
Toward Inferring the Age of Twitter Users with their Use of Nonstandard Abbreviations and Lexicon 219 Nathaniel Moseley (1), Cecilia Ovesdotter Aim (1) and Manjeet Rege(2)
(1) Rochester Institute of Technology, USA (2) University of St. Thomas, USA
Extracting Top-k Most Influential Nodes by Activity Analysis 227 Myungcheol Doo (1) and Ling Liu (2)
(1) Applied Research Center, Arris, USA (2) Georgia Institute of Technology, USA
Detection of Implied Scenarios in Multiagent Systems with Clustering Agents' Communications ....237 Fatemeh Hendijani Fard and Behrouz H. Far University of Calgary, Canada
Session A33: Data Analysis, Management & Integration
A value-oriented specification for weak sequencing validation 245 Thouraya Bouabana-Tebibel(1) and Stuart H. Rubin(2)
(1) Ecole nationale Supérieure d'Informatique, Algiers, Algeria (2) SPAWAR Systems Center Pacific, San Diego, USA
iv
Optimizing Online Spatial Data Analysis with Sequential Query Patterns 253 Chunqiu Zeng, Hongtai Li, Huibo Wang, Yudong Guang, Chang Liu, Tao Li, Shu-Ching Chen and Naphtali Ri she Florida International University, USA
Extending Automated Intelligence Systems via Graph Database : A Case Study of the "Meth Hunter" 261 Mark Blair(1), Yunkai Liu(1) and Theresa Vitolo (2)
(1) DAGIR Co., USA (2) Gannon University, USA
Mapping Specifications for Ranked Hierarchical Trees in Data Integration Systems 269 Sarfaraz Soomro, Andrea Matsunaga and José Fortes University of Florida, USA
Session A34W: Information Reuse and Integration in Health Informatics (IRI-HI)
How Ranker and Learner Choice Affects Classification Performance on Noisy Bioinformatics Data 277 Ahmad Abu Shanab, Taghi Khoshgoftaar, Randall Wald and Armi Napolitano Florida Atlantic University, USA
On the analysis of Alzheimer's disease Gene Expression Dataset using Clustering and Association Rule Mining 283 Benoit Le Quéau, Omair Shafiq and Reda Alhajj University of Calgary, Canada
Towards a Technology Roadmap for Big Data Applications in the Healthcare Domain 291 Sonja Zillner (1'4), Heiner Oberkampf(1), Claudia Bretschneider (1), Amrapali Zaveri(3), Werner Faix (4), Sabrina Neururer (2'5)
(1) Siemens AG, Munich, Germany (2) Innsbruck Medical University, Austria (3) University Leipzig, Germany (4) Steinbeis University, Berlin, Germany (5) University of Innsbruck, Austria
The Effect of Noise Level and Distribution on Classification of Easy Gene Microarray Data 297 Randall Wald, Taghi Khoshgoftaar and Ahmad Abu Shanab Florida Atlantic University, USA
Session B11: Data Mining and Knowledge Discovery I
Improving the Random Forest Algorithm by Randomly Varying the Size of the Bootstrap Samples .303 Md Nasim Adnan Charles Sturt University, Australia
Stability of Filter- and Wrapper-based Software Metric Selection Techniques 309 Huanjing Wang (1), Taghi M. Khoshgoftaar(2) and Amri Napolitano (2)
(1) Western Kentucky University, USA (2) Florida Atlantic University, USA
Classification Performance of Three Approaches for Combining Data Sampling and Gene Selection on Bioinformatics Data 315
v
Taghi Khoshgoftaar, Ali Fazelpour, David Dittman and Armi Napolitano Florida Atlantic University, USA
Data-Oriented Intelligent Transportation Systems 322 Hamdy Ibrahim (1'2) and Behrouz Far(1)
(1) University of Calgary, Canada (2) University of Calgary, Canada
Session B12: Al & Decision Support Systems
Any-Time Knowledge Revision 330 Eric Gregoire Università dArtois, France
A method for text-line segmentation for unconstrained Arabic and Persian handwritten text image ..338 Reza Shakoori University of Mumbai, India
Particle Swarm Optimization Protocol for Clustering in Wireless Sensor Networks: A Realistic Approach 345 Riham Elhabyan and Mustapha Yagoub University of Ottawa, Canada
SEM2 Suite - towards a Tool Suite for Supporting Knowledge Management in Situation Awareness Systems 351 Andrea Salfinger(1), Daniel Neidhart(1), Werner Retschitzegger(1), Wieland Schwinger (1)
and Stefan Mitsch (2)
(1) Johannes Kepler University Linz, Austria (2) Carnegie Mellon University, USA
Session B13W: Workshop on Formal Methods Integration (FMi)
Age semantics based State Space Computation of Time Petri Nets 361 Abdelkrim Abdelli USTHB University, Algeria
Proving that your Dart will Hit the Mark: An Introduction to Dart Contracts 369 Patrice Chalin Kansas State University, USA
Towards Ray Optics Formalization of Optical Imaging Systems 378 Umair Siddique and Sofiene Tahar Concordia University, Montreal, Canada
Time properties Verification of UML/MARTE Real-Time Systems 386 Aymen Louati (1'2), Kamel Barkaoui(2) and Chadlia Jerad (1)
(1) Tunis El Manar, Tunisie (2) Saint-Martin, Paris, France
Session B14W: First International Workshop on Information Integration in Cyber Physical Systems (IICPS 2014)
Advancing WSN Physical Security Adopting TPM-based Architectures 394
vi
Ermanno Battista(1), Mario Barbareschi(1), Antonino Mazzeo (1) and Sridhar Venkatesan (2)
(1) University of Naples Federico II, Italy (2) George Mason University, USA
A Hardware Accelerator for Data Classification within the Sensing Infrastructure 400 Mario Barbareschi(1), Ermanno Battista(1), Nicola Mazzocca(1) and Sridhar Venkatesan (2)
(1) University of Naples Federico II, Italy (2) George Mason University, USA
Investigating the Feasibility of LEAP+ in ZigBee Specification 406 Mohammad Rezaeirad (1), Sahar Mazloom (1), Muhammad Aamir Iqbal(2), Dmitri Perkins (2)
and Magdy Bayoumi(2)
(1) George Mason University, USA (2) University of Louisiana at Lafayette, USA
A Cluster-based Key Management Framework for Resource Constraint Networks 413 Mohammad Rezaeirad (1), Sahar Mazloom (1), Mahdi Orooji(2), Dmitri Perkins (3)
and Magdy Bayoumi(3)
(1) George Mason University, USA (2) Case Western Reserve University, USA (3) University of Louisiana at Lafayette, USA
Session B21: Data Mining and Knowledge Discovery II
Using Incremental Clustering Technique in Collaborative Filtering Data Update 420 Xiwei Wang and Jun Zhang University of Kentucky, USA
Improving Software Quality Estimation by Combining Feature Selection Strategies with Sampled Ensemble Learning 428 Taghi Khoshgoftaar(1), Kehan Gao (2) and Amri Napolitano(1)
(1) Florida Atlantic University, USA (2) Eastern Connecticut State University, USA
Evaluating Distance Measures and Times Series Clustering for Temporal Patterns Retrieval 434 Sidahmed Benabderrahmane (1), René Quiniou (1) and Thomas Guyet(2)
(1) INRIA, Rennes, France (2) IRISA, Rennes, France
Analyzing Immediate Correlations between Baby Names and Pop Culture in North America in the 21st Century 442 Abra Gurnett, Robin Besson, Omair Shafiq, Reda Alhajj University of Calgary, Canada
Session B22: Information Security & Privacy III
A Unification of Access Control and Data Services 450 David Ferraiolo(1), Serban Gavrila(1) and Wayne Jansen (2)
(1) National Institute of Standards and Technology, USA (2) Bayview Behavioral Consulting, USA
Real-time Anomaly Detection Over VMware Performance Data Using Storm 458 Mohiuddin Solaimani, Latifur Khan and Bhavani Thuraisingham
vn
The University of Texas at Dallas, USA A Secure two-party Password-authenticated Key Exchange protocol 466
Maryam Saeed (1), Hadi Shahriar Shahhoseini(1), Ali Mackvandi (2), Mohammad Reza Rezaeinezhad (2), Mansour Naddafiun (2) and Mohammad Zare Bidoki(2)
(1) Iran University of Science and Technology, Iran (2) R&D Department of Pishgaman Kavir Yazd Cooperative, Iran
Session B23W: Workshop on Formal Methods Integration (FMi)
Reachability in Hierarchical Machines 475 Omer Nguena Timo (1), Alexandre Petrenko (1), Arnaud Dury (1) and S Ramesh (2)
(1) Computer Research Institute of Montreal, Canada (2) GM Global R&D, USA
Formalization and analysis of Timed BPEL 483 Imed Eddine Chama, Nabił Belala and Djamel Eddine Saidouni University Constantine II, Algeria
A Paradigm integration in a specification course 492 Manuel A. Martins (1), Alexandre Madeira (2), Luis Barbosa(2) and Renato Neves (2)
(1) Univ. Aveiro, Portugal (2) Univ. Minho, Portugal
A CEGAR Approach for the Reachability Analysis of Hybrid Sequential Function Charts 500 Johanna Nellen and Erika Abraham RWTHAachen University, Germany
Session B24W: First International Workshop on Information Integration in Cyber Physical Systems (IICPS 2014)
Next-Generation Technologies for Preventing Accidental Death of Children Trapped in Parked Vehicles 508 Vittoria Ai elio (1), Parnian Najafi Borazjani(2), Ermanno Battista(3) and Massimiliano Albanese (2)
(1) R2M Innovations, USA (2) George Mason University, USA (3) University of Naples Federico II, Italy
Automatic Evaluation of Medical Doctors' Performances while Using a Cricothyrotomy Simulator .514 Daniela D'Auria and Fabio Persia University of Naples "Federico II", Italy
A Peer-to-Peer Network Architecture for Emerging Applications 520 Khondkar Islam George Mason University, USA
Caruso: Interactive Headphones for a Dynamic 3D Audio Application in the Cultural Heritage Context 525 Daniela D'Auria, Dario Di Mauro, Davide Maria Calandra and Francesco Cutugno University of Naples "Federico II", Italy
Session C11: Data Mining and Knowledge Discovery III
viii
Finding the Most Evident Co-Clusters on Weblog Dataset Using Frequent Super-Sequence Mining. 529 Xinran Yu and Turgay Korkmaz The University of Texas at San Antonio, USA
Data Integration and Clustering for Real Time Crash Prediction 537 Elahe Paikari, Mohammad Moshirpour, Reda Alhajj and Behrouz Far University of Calgary, Canada
Leveraging the Web for Automating Tag Expansion for Low-Content Items 545 Ayush Singhal and Jaideep Srivastava University of Minnesota, USA
iSRD: Spam Review Detection with unbalanced Data Distributions 553 Hamzah Al Najada and Xingquan Zhu Florida Atlantic University, USA
Utilizing Concept Correlations for Effective Imbalanced Data Classification 561 Yilin Yan (1), Yang Liu (1), Mei-Ling Shyu (1) and Min Chen (2)
(1) University of Miami, USA (2) University of Washington Bothell, USA
Session C12: Knowledge Discovery & Disaster Management
Towards a Refactoring Catalogue for Knowledge Discovery Metamodel 569 Rafael S. Durelli(1), Daniel San Martin (2), Marcio Eduardo Delamaro (1) and Valter Camargo (2)
(1) Universidade de S~ao Paulo, Brazil (2) Universidade Federal de S~ao Carlos, Brazil
A Mapping Study on Architecture-Driven Modernization 577 Rafael S. Durelli (2'3), Daniel San Martin (1), Bruno Marinho (1), Raphael Honda (1), Marcio Eduardo Delamaro(3), Nicolas Anquetil(2) and Valter Camargo (1)
(1) Universidade Federal de S~ao Carlos, Brazil (2) INRIA, France (3) Universidade de S~ao Paulo, Brazil
Generating Textual Storyline to Improve Situation Awareness in Disaster Management 585 Wubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen and Ning Xie Florida International University, USA
A Bipartite-Graph Based Approach for Disaster Susceptibility Comparisons among Cities 593 Wubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen, Ning Xie and Jinpeng Wei Florida International University, USA
Session C13W: The 3rd IEEE International Workshop on Empirical Methods for Recognizing Inference in Text (EM-RITE 2014)
Word Segmentation Refinement by Wikipedia for Textual Entailment 600 Chuan-Jie Lin and Yu-Cheng Tu National Taiwan Ocean University, Taiwan
Analysis of Identifying Linguistic Phenomena for Recognizing Inference in Text 607 Min-Yuh Day and Ya-Jung Wang Tamkang University, Taiwan
ix
Sense Decomposition from E-HowNet for Word Similarity Measurement 613 Cheng-Wei Shih, Yu-Lun Hsieh and Wen-Lian Hsu Academia Sinica, Taiwan
Peer Review in Online Forums: Classifying Feedback-Sentiment 619 Greg Harris, Anand Panangadan and Viktor Prasanna University of Southern California, USA
Mining the User Clusters on Facebook Fan Pages Based on Topic and Sentiment Analysis 627 Kuan-Cheng Lin (1), Shih-Hung Wu (1), Liang-Pu Chen (2), Tsun Ku (3), and Gwo-Dong Chen (3)
(1) Chaoyang University of Technology, Taiwan (2) Institute for Information Industry, Taiwan (3) National Central University, Taiwan
Session C14W: Workshop on Advances in Nature-Inspired Cyber Security: Science, Engineering and Economics (NatSec'2014)
Sniper: A Framework for Detecting Attack Attempts to Open Source Web Applications at the Run Time 633 Abdullah Almurayh University of Colorado at Colorado Springs, USA
CyPhyMASC: Evolutionary Monitoring, Analysis, Sharing and Control Platform for SmartGrid Defense 639 Mohamed Azab (2'3) and Mohamed Eltoweissy (1'3)
(1) Virginia Military Institute, USA (2) Alexandria, Egypt (3) Virginia Tech, USA
THE EVOLUTION OF NETWORK BASED CYBERSECURITY NORMS: An Analytical Narrative 646 Atin Basuchoudhary (1) and Nazli Choucri(2)
(1) Virginia Military Institute, USA (2) Massachusetts Institute of Technology, USA
Session C21: Data Mining and Knowledge Discovery IV
Language Independent Analysis and Classification of Discussion Threads in CourseraMOOC Forums 654 Lorenzo A. Rossi(1) and OmprakashGnawali(2)
(1) University of Southern California, USA (2) University of Houston, USA
Automatically Predicting the Helpfulness of Online Reviews 662 Yadong Zhang and Du Zhang California State University, Sacramento, USA
A Hidden Treasure? Evaluating and Extending Latent Methods for Link-based Classification 669 Aaron Fleming, Luke McDowell and Zane Markel U.S. Naval Academy, USA
Session C22: Geo/Medical Informatics and Multimedia Systems
x
Interpreting Medical Tables as Linked Data to Generate Meta-Analysis Reports 677 Varish Mulwad, Tim Finin and Anupam Joshi University of Maryland, Baltimore County, USA
Understanding Implicit and Explicit Interface Tools to Perform Visual Analytics Tasks 687 Dong Hyun Jeong (1), Soo-Yeon Ji (2), Tera Greensmith (3), Byunggu Yu (1) and Remco Chan (4)
(1) University of the District of Columbia, USA (2) Bowie State University, USA (3) Simon Fräser University, Canada (4) Tufts University, USA
The Power of Fear: Facial Emotion Analysis of CEOs to Forecast Firm Performance 695 Yanjia Sun, Ali Akansu and James Cicon New Jersey Institute of Technology, USA
Designing a Two-Level Monitoring Method to Detect Network Abnormal Behaviors 703 Soo-Yeon Ji(1), Seonho Choi(1) and Dong Hyun Jeong (2)
(1) Bowie State University, USA (2) University of the District of Columbia, USA
Session C23W: The 3rd IEEE International Workshop on Data Integration and Mining (DIM 2014)
A Proximity Measure for Link Prediction in Social User-Item Networks 710 Chun-Hao Fu, Cheng- Shang Chang and Duan-Shin Lee National Tsing Hua University, Taiwan
Outlier Detection based on k-Neighborhood MST 718 Qingsheng Zhu, Xiaogang Fan and Ji Feng Chongqing University, China
An Ensemble Classification Approach for Handling Spatio-Temporal Drifts in Partially Labeled Data Streams 725 Tegjyot Singh Sethi, Mehmed Kantardzic, Elaheh Arabmakki and Hanquing Hu University of Louisville, USA
Understanding Co-evolution in Large Multi-relational Social Networks 733 Ayush Singhal, Atanu Roy and Jaideep Srivastava University of Minnesota - Twin Cities, USA
A Sketch-based Conceptual Level Data Integration Methodology 741 Loredana Caniccio, Vincenzo Deufemia and Giuseppe Polese University of Salerno, Italy
DataGopher: A context based search engine for research datasets 749 Ayush Singhal, Ravindra Kasturi and Jaideep Srivastava University of Minnesota, USA
Session C31: Data Mining and Knowledge Discovery V
Rolling Window Time Series Prediction using MapReduce 757 Lei Li, Farzad Noorian, Duncan J.M. Moss, Philip H.W. Leong The University of Sydney, Australia
xi
Correlation-based Re-ranking for Semantic Concept Detection 765 Hsin-Yu Ha(1), Fausto C. Fleites (1), Shu-Ching Chen (1) and Min Chen (2)
(1) Florida International University, USA (2) University of Washington Bothell, USA
Timed Sequential Pattern Mining Based on Confidence in Accumulated Intervals 771 Chichang Jou, Huan-Jyh Shyur and Chih-Yu Yen Tamkang University, Taiwan
RLS-A Reduced Labeled Samples Approach for Streaming Imbalanced Data with Concept Drift 779 Elaheh Arabmakki, Mehmed Kantardzic and Tegjyot Singh Sethi University of Louisville, USA
Session C32: Fuzzy Systems & Heuristic Optimization
UFOM: Unified Fuzzy Ontology Matching 787 Yinuo Zhang, Anand Panangadan and Viktor Prasanna University of Southern California, USA
Applying Pareto ant colony optimization to solve bi-objective forest transportation planning problems 795 Pengpeng Lin, Jun Zhang and Marco A Contreras University of Kentucky, USA
Extending Modern SAT Solvers for Models Enumeration 803 Said Jabbour, Jerry Lonlac, Lakhdar Sais and Yakoub Salhi University ofArtois, Lens, France
Detecting Geo-spatial Weather Clusters using Dynamic Heuristic Subspaces 811 Suman Deb Roy and Gilad Lotan Betaworks Studio, USA
Session SP: Poster Session
Bayesian Updating for Time Series Missing Data Discovery and Uncertainty Estimation (TSMDDUE) 819 Sara Aghakhani, Reda Alhajj and Philip Chang University of Calgary, Canada
UML Activity Diagram To Event-B: A Model Transformation Approach Based on the Institution Theory 823 Amine Achouri and Jemni Ben Ay ed Leila University of Tunis, Tunisia
A Semantic Multi-Modal Information Retrieval Approach based on Linked Data to Multimedia Convergent Environments 830 Natasha Correia Queiroz Lino, Clauirton Siebra and Manoel De Albuquerque Lira Amaro Federal University ofParaiba, Joao Pessoa, Brazil
Rotation Invariant Face Recognition Survey 835 Gabriel Castaneda, Taghi Khoshgoftaar and Randall Wald Florida Atlantic University, USA
Using Document Space For Relational Search 841
xu
Richard Drake and Ken Pu University of Ontario Inst of Technology, Canada
An Extension to the Data-driven Ontology Evaluation 845 Hlomani Hlomani and Deborah Stacey University ofGuelph, Canada
Using Feature Selection and Classification to Build Effective and Efficient Firewalls 850 Randall Wald (1), Flavio Villanustre (2\ Taghi Khoshgoftaar(1), Richard Zuech(1), Jarvis Robinson (2) and Edin Muharemagic (2)
(1) Florida Atlantic University, USA (2) LexisNexis Business Information Solutions, USA
Tire-Road Friction Estimation Utilizing Smartphones 855 Michael Jaynes and Ram Dantu University of North Texas, USA
Who Wrote This Paper? Learning for Authorship De-identification Using Stylometric Featuress 859 Jose Hurtado, Napat Taweewitchakreeya and Xingquan Zhu Florida Atlantic University, USA
Automatically Classifying and Interpreting Polar Datasets with Apache Tika 863 Ann Burgess (1) and Chris Mattmann (2)
(1) University of Southern California, USA (2) California Institute of Technology, USA
Kalman-Filter Algorithm and PMUs for State Estimation of Distribution Networks 868 Faridoon Shabani, Mohanmad Vaziri, Mahdi Amini, Mahyar Zarghami and Suresh Vadhva California State University, Sacramento, USA
Reuse and Integration of Healthcare Information for Subjects in a Clinical Trial for Treatment of Recurrent Respiratory Papillomatosis 874 Anatoly Goldstein Massachusetts General Hospital Center for Laryngeal Surgery and Voice Rehabilitation, USA
Author Index 881
xiii