th international conference on information reuse and … · proceedings of the 2014 ieee 15th...

13
Proceedings of the 2014 IEEE 15 th International Conference on Information Reuse and Integration (IEEE IRI 2014) TABLE OF CONTENTS Forward xiv Message from Program Co-chairs xv Conference Organizers xvii Program Committee xix Keynotes xxii Workshop Keynotes xxx Industry Talks xxxii Tutorials xxxvi Panel xxxviii IRI-HI 2014 Program Committee xxxix FMi 2014 Program Committee xl DIM 2014 Program Committee xlii EM-RITE 2014 Program Committee xliii WICSOC 2014 Program Committee xliv Social Sec 2014 Program Committee xlv IICPS 2014 Program Committee xlvi NatSec'2014 Program Committee xlvii Industry Committee xlviii Sponsors xlix Technical Papers 1 Session A11: Information Security & Privacy I Detecting and Resolving Inconsistencies in Firewalls 1 Du Zhang, Lavanya Jujjavarapu and Meiliu Lu California State University, Sacramento, USA Stream Computing for Large-Scale, Multi-Channel Cyber Threat Analytics 8 Douglas Schales (1) , Mihai Christodorescu (2 \ Xin Hu (1) , Jiyong Jang (1) , Josyula Rao (1) , Reiner Sailer (1) , Marc Stoecklin (1) , Wietse Venema (1) and Ting Wang (1) (1) IBM Research, USA (2) Qualcomm Research, USA Policy-Driven Security Management for Fog Computing: Preliminary Framework and A Case Study 16 i

Upload: doankhanh

Post on 21-Jun-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)

TABLE OF CONTENTS

Forward xiv

Message from Program Co-chairs xv Conference Organizers xvii

Program Committee xix Keynotes xxii

Workshop Keynotes xxx Industry Talks xxxii

Tutorials xxxvi Panel xxxviii

IRI-HI 2014 Program Committee xxxix FMi 2014 Program Committee xl

DIM 2014 Program Committee xlii EM-RITE 2014 Program Committee xliii

WICSOC 2014 Program Committee xliv Social Sec 2014 Program Committee xlv

IICPS 2014 Program Committee xlvi NatSec'2014 Program Committee xlvii

Industry Committee xlviii Sponsors xlix

Technical Papers 1

Session A11: Information Security & Privacy I

Detecting and Resolving Inconsistencies in Firewalls 1 Du Zhang, Lavanya Jujjavarapu and Meiliu Lu California State University, Sacramento, USA

Stream Computing for Large-Scale, Multi-Channel Cyber Threat Analytics 8 Douglas Schales (1), Mihai Christodorescu (2\ Xin Hu(1), Jiyong Jang(1), Josyula Rao (1), Reiner Sailer(1), Marc Stoecklin(1), Wietse Venema(1) and Ting Wang(1)

(1) IBM Research, USA (2) Qualcomm Research, USA

Policy-Driven Security Management for Fog Computing: Preliminary Framework and A Case Study 16

i

Clinton Dsouza, Gail-Joon Ahn and Marthony Taguinod Arizona State University, USA

Deploying Malware Detection Software for Smart Phones 24 Bhavani Thuraisingham, Nathan McDaniel and Latifur Khan The University of Texas at Dallas, USA

Session A12: Software Design, Testing and Reuse

Test Logic Reuse Through Unit Test Patterns: A Test Automation Framework for Software Product Lines 28 Glauco Silva Neves and Patricia Vilain Universidade Federal de Santa Catarina, Florianópolis, SC, Brazil

From Requirements to Software Design: An Automated Solution for Packaging Software Classes 36 Yasaman Amannejad, Mohammad Moshirpour, Behrouz H. Far and Reda Alhajj University of Calgary, Canada

Ontology-based User Requirements Decomposition for Component Selection for Highly Available Systems 44 Mahin Abbasipour(1), Margarete Sackmann(1), Ferhat Khendek(1) and Maria Toeroe (2)

(1) Concordia University, Montreal, Canada (2) Ericsson Inc., Montreal, Canada

Specification-Based Testing with Buchi Automata: Transition Coverage Criteria and Property Refinement 52 Li Tan and Bolong Zeng Washington State University, USA

Session A13W: First Workshop on Social Network Security (SocialSec 2014)

Consumer-Centric Protection for Online Social Networks 62 Raja Naeem Akram, Ryan K. L. Ko, and Tsz Fung Law University ofWaikato, Hamilton, New Zealand

A Study of ClickJacking Worm Propagation in Online Social Networks 68 Mohammad Reza Faghani and Uyen Trang Nguyen York University, Toronto, Canada

Detecting Unintentional Information Leakage in Social Media News Comments 74 Inbal Yahav, David Schwartz and Gahl Silverman Bar-Ilan University, Israel

Session A14W: WICSOC 2014: Social Media, Crowdsourcing, and Public Health

A Framework for Comparing Early Warning Systems across Domains: A Step Toward a Data-Integrated Public Health EWS 80 Henry Kim (1), Marek Laskowski(1), Seyed Moghadas (1), Amirehsan Sajad (1) and Maaz Asif(2)

(1) York University, Toronto, Canada (2) Queen 's University, Toronto, Canada

Much more to it: The relation between Facebook usage and self-esteem 87 Montathar Faraon and Mauri Kaipainen

u

Södertörn University, Sweden Text Classification for Automatic Detection of Alcohol Use-Related Tweets: A Feasibility Study 93

Yin Aphinyanaphongs, Bisakha Ray, Alexander Statnikov and Paul Krebs NYU Longone Medical Center, USA

Towards Chronic Emergency Response Communities for Anaphylaxis 98 David Schwartz (1), Abdelouahab Bellou (2\ Luis Garcia-Castrillo(3), Antonella Muraro(4) and Nikolaos Papadopoulos (5)

(1) Bar-Ilan University, Israel (2) University Rennes 1, Rennes, France (3) Hospital Universitario Marques de Valdecilla, Cantabria, Spain (4) Padua General University Hospital, Padua, Italy (5) The University of Manchester, United Kingdom

Leveraging Online Social Media for Capturing Observations of Daily Living and Ecological Momentary Assessment 104 Mohd Anwar North Carolina A&TState University, USA

Session A21: Information Security & Privacy II

Detect Phishing by Checking Content Consistency 109 Yi-Shin Chen (1), Huei-Xin Liu (1), Yi-Hsuan Yu (1) and Pang-Chieh Wang (2)

(1) National Tsing Hua University, Taiwan (2) Industrial Technology Research Institute, Taiwan

DiCoTraM: A Distributed and Coordinated DDoS flooding attack tailored Traffic Monitoring 120 Saman Taghavi Zargar, James Joshi and David Tipper University of Pittsburgh, USA

Access Control Reinforcement over Searchable Encryption 130 Abdellah Kaci and Thouraya Bouabana-Tebibel Ecole nationale Supérieure d'Informatique, Alger, Algeria

LEAF:A Social Network-based Intervention Tool for IPV Survivors 138 Balaji Palanisamy, Sheldon Sensenig, James Joshi and Rose Constantino University of Pittsburgh, USA

Session A22: Big Data/Networks & Cloud Computing

Uncertainty reasoning for the "Big Data" Semantic Web 147 Loukia Karanikola(1), Isambo Karali(1) and Sally Mcclean (2)

(1) University of Athens, Greece (2) University of Ulster, UK

Semantics Management for Big Networks 155 Bassem Mokhtar(1) and Mohamed Eltoweissy (2)

(1) Alexandria University, Egypt (2) Virginia Military Institute, USA

Cloud-based monitoring and analysis of yield efficiency in precision farming 163 Li Tan and Riley Wortman Washington State University, USA

Hi

SMOPD-C: An Autonomous Vertical Partitioning Technique for Distributed Databases on Cluster Computers 171 Liangzhe Li and Le Gruenwald University of Oklahoma, USA

Session A23: Information Reuse & Extraction

Argumentation Schemes for the Reuse of Argumentation Information in Collaborative Risk Management 179 Ruan C. B. Pozzebon (1), Luis A. L. Silva (1), Lisandra M. Fontoura (1) and John A. Campbell(2)

(1) Universidade Federal de Santa Maria, Brazil (2) University College London, UK

SOA-GovMM: A Meta Model for a Comprehensive SOA Governance Repository 187 Jan Königsberger, Stefan Silcher and Bernhard Mitschang University of Stuttgart, Germany

Towards Facilities to Introduce Solutions for MDE in Development Environments with Reusable Assets 195 Fabio P. Basso and Claudia M. L. Werner and Toacy C. Oliveira Federal University of Rio de Janeiro, Brazil

Extracting control-flow from text 203 Pol Schumacher and Mirjam Minor D-60325 Frankfurt am Main, Germany

Session A32: Social Networks, Crowdsourcing & Multiagent Systems

Towards Model Driven Crowdsourcing: First Experiments, Methodology and Transformation 211 Samyr Vale Federal University ofMaranhao, Brazil

Toward Inferring the Age of Twitter Users with their Use of Nonstandard Abbreviations and Lexicon 219 Nathaniel Moseley (1), Cecilia Ovesdotter Aim (1) and Manjeet Rege(2)

(1) Rochester Institute of Technology, USA (2) University of St. Thomas, USA

Extracting Top-k Most Influential Nodes by Activity Analysis 227 Myungcheol Doo (1) and Ling Liu (2)

(1) Applied Research Center, Arris, USA (2) Georgia Institute of Technology, USA

Detection of Implied Scenarios in Multiagent Systems with Clustering Agents' Communications ....237 Fatemeh Hendijani Fard and Behrouz H. Far University of Calgary, Canada

Session A33: Data Analysis, Management & Integration

A value-oriented specification for weak sequencing validation 245 Thouraya Bouabana-Tebibel(1) and Stuart H. Rubin(2)

(1) Ecole nationale Supérieure d'Informatique, Algiers, Algeria (2) SPAWAR Systems Center Pacific, San Diego, USA

iv

Optimizing Online Spatial Data Analysis with Sequential Query Patterns 253 Chunqiu Zeng, Hongtai Li, Huibo Wang, Yudong Guang, Chang Liu, Tao Li, Shu-Ching Chen and Naphtali Ri she Florida International University, USA

Extending Automated Intelligence Systems via Graph Database : A Case Study of the "Meth Hunter" 261 Mark Blair(1), Yunkai Liu(1) and Theresa Vitolo (2)

(1) DAGIR Co., USA (2) Gannon University, USA

Mapping Specifications for Ranked Hierarchical Trees in Data Integration Systems 269 Sarfaraz Soomro, Andrea Matsunaga and José Fortes University of Florida, USA

Session A34W: Information Reuse and Integration in Health Informatics (IRI-HI)

How Ranker and Learner Choice Affects Classification Performance on Noisy Bioinformatics Data 277 Ahmad Abu Shanab, Taghi Khoshgoftaar, Randall Wald and Armi Napolitano Florida Atlantic University, USA

On the analysis of Alzheimer's disease Gene Expression Dataset using Clustering and Association Rule Mining 283 Benoit Le Quéau, Omair Shafiq and Reda Alhajj University of Calgary, Canada

Towards a Technology Roadmap for Big Data Applications in the Healthcare Domain 291 Sonja Zillner (1'4), Heiner Oberkampf(1), Claudia Bretschneider (1), Amrapali Zaveri(3), Werner Faix (4), Sabrina Neururer (2'5)

(1) Siemens AG, Munich, Germany (2) Innsbruck Medical University, Austria (3) University Leipzig, Germany (4) Steinbeis University, Berlin, Germany (5) University of Innsbruck, Austria

The Effect of Noise Level and Distribution on Classification of Easy Gene Microarray Data 297 Randall Wald, Taghi Khoshgoftaar and Ahmad Abu Shanab Florida Atlantic University, USA

Session B11: Data Mining and Knowledge Discovery I

Improving the Random Forest Algorithm by Randomly Varying the Size of the Bootstrap Samples .303 Md Nasim Adnan Charles Sturt University, Australia

Stability of Filter- and Wrapper-based Software Metric Selection Techniques 309 Huanjing Wang (1), Taghi M. Khoshgoftaar(2) and Amri Napolitano (2)

(1) Western Kentucky University, USA (2) Florida Atlantic University, USA

Classification Performance of Three Approaches for Combining Data Sampling and Gene Selection on Bioinformatics Data 315

v

Taghi Khoshgoftaar, Ali Fazelpour, David Dittman and Armi Napolitano Florida Atlantic University, USA

Data-Oriented Intelligent Transportation Systems 322 Hamdy Ibrahim (1'2) and Behrouz Far(1)

(1) University of Calgary, Canada (2) University of Calgary, Canada

Session B12: Al & Decision Support Systems

Any-Time Knowledge Revision 330 Eric Gregoire Università dArtois, France

A method for text-line segmentation for unconstrained Arabic and Persian handwritten text image ..338 Reza Shakoori University of Mumbai, India

Particle Swarm Optimization Protocol for Clustering in Wireless Sensor Networks: A Realistic Approach 345 Riham Elhabyan and Mustapha Yagoub University of Ottawa, Canada

SEM2 Suite - towards a Tool Suite for Supporting Knowledge Management in Situation Awareness Systems 351 Andrea Salfinger(1), Daniel Neidhart(1), Werner Retschitzegger(1), Wieland Schwinger (1)

and Stefan Mitsch (2)

(1) Johannes Kepler University Linz, Austria (2) Carnegie Mellon University, USA

Session B13W: Workshop on Formal Methods Integration (FMi)

Age semantics based State Space Computation of Time Petri Nets 361 Abdelkrim Abdelli USTHB University, Algeria

Proving that your Dart will Hit the Mark: An Introduction to Dart Contracts 369 Patrice Chalin Kansas State University, USA

Towards Ray Optics Formalization of Optical Imaging Systems 378 Umair Siddique and Sofiene Tahar Concordia University, Montreal, Canada

Time properties Verification of UML/MARTE Real-Time Systems 386 Aymen Louati (1'2), Kamel Barkaoui(2) and Chadlia Jerad (1)

(1) Tunis El Manar, Tunisie (2) Saint-Martin, Paris, France

Session B14W: First International Workshop on Information Integration in Cyber Physical Systems (IICPS 2014)

Advancing WSN Physical Security Adopting TPM-based Architectures 394

vi

Ermanno Battista(1), Mario Barbareschi(1), Antonino Mazzeo (1) and Sridhar Venkatesan (2)

(1) University of Naples Federico II, Italy (2) George Mason University, USA

A Hardware Accelerator for Data Classification within the Sensing Infrastructure 400 Mario Barbareschi(1), Ermanno Battista(1), Nicola Mazzocca(1) and Sridhar Venkatesan (2)

(1) University of Naples Federico II, Italy (2) George Mason University, USA

Investigating the Feasibility of LEAP+ in ZigBee Specification 406 Mohammad Rezaeirad (1), Sahar Mazloom (1), Muhammad Aamir Iqbal(2), Dmitri Perkins (2)

and Magdy Bayoumi(2)

(1) George Mason University, USA (2) University of Louisiana at Lafayette, USA

A Cluster-based Key Management Framework for Resource Constraint Networks 413 Mohammad Rezaeirad (1), Sahar Mazloom (1), Mahdi Orooji(2), Dmitri Perkins (3)

and Magdy Bayoumi(3)

(1) George Mason University, USA (2) Case Western Reserve University, USA (3) University of Louisiana at Lafayette, USA

Session B21: Data Mining and Knowledge Discovery II

Using Incremental Clustering Technique in Collaborative Filtering Data Update 420 Xiwei Wang and Jun Zhang University of Kentucky, USA

Improving Software Quality Estimation by Combining Feature Selection Strategies with Sampled Ensemble Learning 428 Taghi Khoshgoftaar(1), Kehan Gao (2) and Amri Napolitano(1)

(1) Florida Atlantic University, USA (2) Eastern Connecticut State University, USA

Evaluating Distance Measures and Times Series Clustering for Temporal Patterns Retrieval 434 Sidahmed Benabderrahmane (1), René Quiniou (1) and Thomas Guyet(2)

(1) INRIA, Rennes, France (2) IRISA, Rennes, France

Analyzing Immediate Correlations between Baby Names and Pop Culture in North America in the 21st Century 442 Abra Gurnett, Robin Besson, Omair Shafiq, Reda Alhajj University of Calgary, Canada

Session B22: Information Security & Privacy III

A Unification of Access Control and Data Services 450 David Ferraiolo(1), Serban Gavrila(1) and Wayne Jansen (2)

(1) National Institute of Standards and Technology, USA (2) Bayview Behavioral Consulting, USA

Real-time Anomaly Detection Over VMware Performance Data Using Storm 458 Mohiuddin Solaimani, Latifur Khan and Bhavani Thuraisingham

vn

The University of Texas at Dallas, USA A Secure two-party Password-authenticated Key Exchange protocol 466

Maryam Saeed (1), Hadi Shahriar Shahhoseini(1), Ali Mackvandi (2), Mohammad Reza Rezaeinezhad (2), Mansour Naddafiun (2) and Mohammad Zare Bidoki(2)

(1) Iran University of Science and Technology, Iran (2) R&D Department of Pishgaman Kavir Yazd Cooperative, Iran

Session B23W: Workshop on Formal Methods Integration (FMi)

Reachability in Hierarchical Machines 475 Omer Nguena Timo (1), Alexandre Petrenko (1), Arnaud Dury (1) and S Ramesh (2)

(1) Computer Research Institute of Montreal, Canada (2) GM Global R&D, USA

Formalization and analysis of Timed BPEL 483 Imed Eddine Chama, Nabił Belala and Djamel Eddine Saidouni University Constantine II, Algeria

A Paradigm integration in a specification course 492 Manuel A. Martins (1), Alexandre Madeira (2), Luis Barbosa(2) and Renato Neves (2)

(1) Univ. Aveiro, Portugal (2) Univ. Minho, Portugal

A CEGAR Approach for the Reachability Analysis of Hybrid Sequential Function Charts 500 Johanna Nellen and Erika Abraham RWTHAachen University, Germany

Session B24W: First International Workshop on Information Integration in Cyber Physical Systems (IICPS 2014)

Next-Generation Technologies for Preventing Accidental Death of Children Trapped in Parked Vehicles 508 Vittoria Ai elio (1), Parnian Najafi Borazjani(2), Ermanno Battista(3) and Massimiliano Albanese (2)

(1) R2M Innovations, USA (2) George Mason University, USA (3) University of Naples Federico II, Italy

Automatic Evaluation of Medical Doctors' Performances while Using a Cricothyrotomy Simulator .514 Daniela D'Auria and Fabio Persia University of Naples "Federico II", Italy

A Peer-to-Peer Network Architecture for Emerging Applications 520 Khondkar Islam George Mason University, USA

Caruso: Interactive Headphones for a Dynamic 3D Audio Application in the Cultural Heritage Context 525 Daniela D'Auria, Dario Di Mauro, Davide Maria Calandra and Francesco Cutugno University of Naples "Federico II", Italy

Session C11: Data Mining and Knowledge Discovery III

viii

Finding the Most Evident Co-Clusters on Weblog Dataset Using Frequent Super-Sequence Mining. 529 Xinran Yu and Turgay Korkmaz The University of Texas at San Antonio, USA

Data Integration and Clustering for Real Time Crash Prediction 537 Elahe Paikari, Mohammad Moshirpour, Reda Alhajj and Behrouz Far University of Calgary, Canada

Leveraging the Web for Automating Tag Expansion for Low-Content Items 545 Ayush Singhal and Jaideep Srivastava University of Minnesota, USA

iSRD: Spam Review Detection with unbalanced Data Distributions 553 Hamzah Al Najada and Xingquan Zhu Florida Atlantic University, USA

Utilizing Concept Correlations for Effective Imbalanced Data Classification 561 Yilin Yan (1), Yang Liu (1), Mei-Ling Shyu (1) and Min Chen (2)

(1) University of Miami, USA (2) University of Washington Bothell, USA

Session C12: Knowledge Discovery & Disaster Management

Towards a Refactoring Catalogue for Knowledge Discovery Metamodel 569 Rafael S. Durelli(1), Daniel San Martin (2), Marcio Eduardo Delamaro (1) and Valter Camargo (2)

(1) Universidade de S~ao Paulo, Brazil (2) Universidade Federal de S~ao Carlos, Brazil

A Mapping Study on Architecture-Driven Modernization 577 Rafael S. Durelli (2'3), Daniel San Martin (1), Bruno Marinho (1), Raphael Honda (1), Marcio Eduardo Delamaro(3), Nicolas Anquetil(2) and Valter Camargo (1)

(1) Universidade Federal de S~ao Carlos, Brazil (2) INRIA, France (3) Universidade de S~ao Paulo, Brazil

Generating Textual Storyline to Improve Situation Awareness in Disaster Management 585 Wubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen and Ning Xie Florida International University, USA

A Bipartite-Graph Based Approach for Disaster Susceptibility Comparisons among Cities 593 Wubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen, Ning Xie and Jinpeng Wei Florida International University, USA

Session C13W: The 3rd IEEE International Workshop on Empirical Methods for Recognizing Inference in Text (EM-RITE 2014)

Word Segmentation Refinement by Wikipedia for Textual Entailment 600 Chuan-Jie Lin and Yu-Cheng Tu National Taiwan Ocean University, Taiwan

Analysis of Identifying Linguistic Phenomena for Recognizing Inference in Text 607 Min-Yuh Day and Ya-Jung Wang Tamkang University, Taiwan

ix

Sense Decomposition from E-HowNet for Word Similarity Measurement 613 Cheng-Wei Shih, Yu-Lun Hsieh and Wen-Lian Hsu Academia Sinica, Taiwan

Peer Review in Online Forums: Classifying Feedback-Sentiment 619 Greg Harris, Anand Panangadan and Viktor Prasanna University of Southern California, USA

Mining the User Clusters on Facebook Fan Pages Based on Topic and Sentiment Analysis 627 Kuan-Cheng Lin (1), Shih-Hung Wu (1), Liang-Pu Chen (2), Tsun Ku (3), and Gwo-Dong Chen (3)

(1) Chaoyang University of Technology, Taiwan (2) Institute for Information Industry, Taiwan (3) National Central University, Taiwan

Session C14W: Workshop on Advances in Nature-Inspired Cyber Security: Science, Engineering and Economics (NatSec'2014)

Sniper: A Framework for Detecting Attack Attempts to Open Source Web Applications at the Run Time 633 Abdullah Almurayh University of Colorado at Colorado Springs, USA

CyPhyMASC: Evolutionary Monitoring, Analysis, Sharing and Control Platform for SmartGrid Defense 639 Mohamed Azab (2'3) and Mohamed Eltoweissy (1'3)

(1) Virginia Military Institute, USA (2) Alexandria, Egypt (3) Virginia Tech, USA

THE EVOLUTION OF NETWORK BASED CYBERSECURITY NORMS: An Analytical Narrative 646 Atin Basuchoudhary (1) and Nazli Choucri(2)

(1) Virginia Military Institute, USA (2) Massachusetts Institute of Technology, USA

Session C21: Data Mining and Knowledge Discovery IV

Language Independent Analysis and Classification of Discussion Threads in CourseraMOOC Forums 654 Lorenzo A. Rossi(1) and OmprakashGnawali(2)

(1) University of Southern California, USA (2) University of Houston, USA

Automatically Predicting the Helpfulness of Online Reviews 662 Yadong Zhang and Du Zhang California State University, Sacramento, USA

A Hidden Treasure? Evaluating and Extending Latent Methods for Link-based Classification 669 Aaron Fleming, Luke McDowell and Zane Markel U.S. Naval Academy, USA

Session C22: Geo/Medical Informatics and Multimedia Systems

x

Interpreting Medical Tables as Linked Data to Generate Meta-Analysis Reports 677 Varish Mulwad, Tim Finin and Anupam Joshi University of Maryland, Baltimore County, USA

Understanding Implicit and Explicit Interface Tools to Perform Visual Analytics Tasks 687 Dong Hyun Jeong (1), Soo-Yeon Ji (2), Tera Greensmith (3), Byunggu Yu (1) and Remco Chan (4)

(1) University of the District of Columbia, USA (2) Bowie State University, USA (3) Simon Fräser University, Canada (4) Tufts University, USA

The Power of Fear: Facial Emotion Analysis of CEOs to Forecast Firm Performance 695 Yanjia Sun, Ali Akansu and James Cicon New Jersey Institute of Technology, USA

Designing a Two-Level Monitoring Method to Detect Network Abnormal Behaviors 703 Soo-Yeon Ji(1), Seonho Choi(1) and Dong Hyun Jeong (2)

(1) Bowie State University, USA (2) University of the District of Columbia, USA

Session C23W: The 3rd IEEE International Workshop on Data Integration and Mining (DIM 2014)

A Proximity Measure for Link Prediction in Social User-Item Networks 710 Chun-Hao Fu, Cheng- Shang Chang and Duan-Shin Lee National Tsing Hua University, Taiwan

Outlier Detection based on k-Neighborhood MST 718 Qingsheng Zhu, Xiaogang Fan and Ji Feng Chongqing University, China

An Ensemble Classification Approach for Handling Spatio-Temporal Drifts in Partially Labeled Data Streams 725 Tegjyot Singh Sethi, Mehmed Kantardzic, Elaheh Arabmakki and Hanquing Hu University of Louisville, USA

Understanding Co-evolution in Large Multi-relational Social Networks 733 Ayush Singhal, Atanu Roy and Jaideep Srivastava University of Minnesota - Twin Cities, USA

A Sketch-based Conceptual Level Data Integration Methodology 741 Loredana Caniccio, Vincenzo Deufemia and Giuseppe Polese University of Salerno, Italy

DataGopher: A context based search engine for research datasets 749 Ayush Singhal, Ravindra Kasturi and Jaideep Srivastava University of Minnesota, USA

Session C31: Data Mining and Knowledge Discovery V

Rolling Window Time Series Prediction using MapReduce 757 Lei Li, Farzad Noorian, Duncan J.M. Moss, Philip H.W. Leong The University of Sydney, Australia

xi

Correlation-based Re-ranking for Semantic Concept Detection 765 Hsin-Yu Ha(1), Fausto C. Fleites (1), Shu-Ching Chen (1) and Min Chen (2)

(1) Florida International University, USA (2) University of Washington Bothell, USA

Timed Sequential Pattern Mining Based on Confidence in Accumulated Intervals 771 Chichang Jou, Huan-Jyh Shyur and Chih-Yu Yen Tamkang University, Taiwan

RLS-A Reduced Labeled Samples Approach for Streaming Imbalanced Data with Concept Drift 779 Elaheh Arabmakki, Mehmed Kantardzic and Tegjyot Singh Sethi University of Louisville, USA

Session C32: Fuzzy Systems & Heuristic Optimization

UFOM: Unified Fuzzy Ontology Matching 787 Yinuo Zhang, Anand Panangadan and Viktor Prasanna University of Southern California, USA

Applying Pareto ant colony optimization to solve bi-objective forest transportation planning problems 795 Pengpeng Lin, Jun Zhang and Marco A Contreras University of Kentucky, USA

Extending Modern SAT Solvers for Models Enumeration 803 Said Jabbour, Jerry Lonlac, Lakhdar Sais and Yakoub Salhi University ofArtois, Lens, France

Detecting Geo-spatial Weather Clusters using Dynamic Heuristic Subspaces 811 Suman Deb Roy and Gilad Lotan Betaworks Studio, USA

Session SP: Poster Session

Bayesian Updating for Time Series Missing Data Discovery and Uncertainty Estimation (TSMDDUE) 819 Sara Aghakhani, Reda Alhajj and Philip Chang University of Calgary, Canada

UML Activity Diagram To Event-B: A Model Transformation Approach Based on the Institution Theory 823 Amine Achouri and Jemni Ben Ay ed Leila University of Tunis, Tunisia

A Semantic Multi-Modal Information Retrieval Approach based on Linked Data to Multimedia Convergent Environments 830 Natasha Correia Queiroz Lino, Clauirton Siebra and Manoel De Albuquerque Lira Amaro Federal University ofParaiba, Joao Pessoa, Brazil

Rotation Invariant Face Recognition Survey 835 Gabriel Castaneda, Taghi Khoshgoftaar and Randall Wald Florida Atlantic University, USA

Using Document Space For Relational Search 841

xu

Richard Drake and Ken Pu University of Ontario Inst of Technology, Canada

An Extension to the Data-driven Ontology Evaluation 845 Hlomani Hlomani and Deborah Stacey University ofGuelph, Canada

Using Feature Selection and Classification to Build Effective and Efficient Firewalls 850 Randall Wald (1), Flavio Villanustre (2\ Taghi Khoshgoftaar(1), Richard Zuech(1), Jarvis Robinson (2) and Edin Muharemagic (2)

(1) Florida Atlantic University, USA (2) LexisNexis Business Information Solutions, USA

Tire-Road Friction Estimation Utilizing Smartphones 855 Michael Jaynes and Ram Dantu University of North Texas, USA

Who Wrote This Paper? Learning for Authorship De-identification Using Stylometric Featuress 859 Jose Hurtado, Napat Taweewitchakreeya and Xingquan Zhu Florida Atlantic University, USA

Automatically Classifying and Interpreting Polar Datasets with Apache Tika 863 Ann Burgess (1) and Chris Mattmann (2)

(1) University of Southern California, USA (2) California Institute of Technology, USA

Kalman-Filter Algorithm and PMUs for State Estimation of Distribution Networks 868 Faridoon Shabani, Mohanmad Vaziri, Mahdi Amini, Mahyar Zarghami and Suresh Vadhva California State University, Sacramento, USA

Reuse and Integration of Healthcare Information for Subjects in a Clinical Trial for Treatment of Recurrent Respiratory Papillomatosis 874 Anatoly Goldstein Massachusetts General Hospital Center for Laryngeal Surgery and Voice Rehabilitation, USA

Author Index 881

xiii