By Topic

Information Reuse and Integration (IRI), 2013 IEEE 14th International Conference on

Date 14-16 Aug. 2013

Filter Results

Displaying Results 1 - 25 of 116
  • [Copyright notice]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (192 KB)  
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2013 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (229 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): i - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (326 KB)  
    Freely Available from IEEE
  • The 2013 IEEE International conference on information reuse and integration: Forward

    Publication Year: 2013 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from Program Co-Chairs

    Publication Year: 2013 , Page(s): xiii - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (100 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2013 , Page(s): xv - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • International technical program committee

    Publication Year: 2013 , Page(s): xvii - xix
    Save to Project icon | Request Permissions | PDF file iconPDF (227 KB)  
    Freely Available from IEEE
  • Toward a restriction-centered theory of truth and meaning (RCT)

    Publication Year: 2013 , Page(s): xx - xxii
    Save to Project icon | Request Permissions | PDF file iconPDF (156 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • The future of access control: Attributes, automation and adaptation

    Publication Year: 2013 , Page(s): xxiii - xxiv
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | PDF file iconPDF (155 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Big data analytics as a service: Exploring reuse opportunities

    Publication Year: 2013 , Page(s): xxv - xxvi
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | PDF file iconPDF (129 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Panel discussion: Re-use of information and data in energy management

    Publication Year: 2013 , Page(s): xxvii
    Save to Project icon | Request Permissions | PDF file iconPDF (132 KB)  
    Freely Available from IEEE
  • Program committee

    Publication Year: 2013 , Page(s): xxviii
    Save to Project icon | Request Permissions | PDF file iconPDF (116 KB)  
    Freely Available from IEEE
  • Program committee

    Publication Year: 2013 , Page(s): xxix
    Save to Project icon | Request Permissions | PDF file iconPDF (102 KB)  
    Freely Available from IEEE
  • Program committee

    Publication Year: 2013 , Page(s): xxx - xxxi
    Save to Project icon | Request Permissions | PDF file iconPDF (123 KB)  
    Freely Available from IEEE
  • Program committee

    Publication Year: 2013 , Page(s): xxxii
    Save to Project icon | Request Permissions | PDF file iconPDF (107 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2013 , Page(s): 737 - 740
    Save to Project icon | Request Permissions | PDF file iconPDF (154 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • FIEP: An initial design of a firewall information exchange protocol

    Publication Year: 2013 , Page(s): 1 - 5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (157 KB) |  | HTML iconHTML  

    FIEP, which stands for Firewall Information Exchange Protocol, is a mechanism that enables firewalls to communicate with each other and to form firewall groups in a network. Currently, there is no protocol that allows firewalls to communicate with each other and to exchange information. Until recently, not much thought was given to the need for firewalls to talk to each other. A firewalled network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting susceptibility to social bots on Twitter

    Publication Year: 2013 , Page(s): 6 - 13
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (108 KB) |  | HTML iconHTML  

    The popularity of the Twitter social networking site has made it a target for social bots, which use increasingly-complex algorithms to engage users and pretend to be humans. While much research has studied how to identify such bots in the process of spam detection, little research has looked at the other side of the question - detecting users likely to be fooled by bots. In this paper, we examine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation-based validation for smart grid environments

    Publication Year: 2013 , Page(s): 14 - 21
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (134 KB) |  | HTML iconHTML  

    Large and complex systems, such as the Smart Grid, are often best understood through the use of modeling and simulation. In particular, the task of assessing a complex system's risks and testing its tolerance and recovery under various attacks has received considerable attention. However, such tedious tasks still demand a systematic approach to model and evaluate each component in complex systems.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A moving target defense approach for protecting resource-constrained distributed devices

    Publication Year: 2013 , Page(s): 22 - 29
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (142 KB) |  | HTML iconHTML  

    Techniques aimed at continuously changing a system's attack surface, usually referred to as Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks. Such mechanisms increase the uncertainty, complexity, and cost for attackers, limit the exposure of vulnerabilities, and ultimately increase overall resiliency. In this paper, we propose an MTD approach for protecting r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tag-based top-N recommendation using a pairwise topic model

    Publication Year: 2013 , Page(s): 30 - 37
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (270 KB) |  | HTML iconHTML  

    Tagging systems enable users to organise their online entities with distinct tags. Exploiting these user generated content and underlying bilingual information have become more and more important in recommendation system. Probabilistic topic model has been widely used in document management and social network mining. In this paper, we propose a new method to do tag-based recommendation with topic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian model for a multicriteria recommender system with support vector regression

    Publication Year: 2013 , Page(s): 38 - 45
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (331 KB) |  | HTML iconHTML  

    Recommender systems are becoming very useful for competitive businesses. It is very important for recommender systems to extract user preferences accurately by utilizing logs that record user behavior. Furthermore, user behavior should be analyzed from multiple aspects, storing the results as multicriteria rating scores. If the rating information is sparse, then systems are forced to compensate. O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WS-Rec: Web services recommendations using heterogeneous criteria

    Publication Year: 2013 , Page(s): 46 - 53
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (281 KB) |  | HTML iconHTML  

    Web service selection involves finding services from a possibly large database of similar services. The challenges involved in finding a suitable service include large time consumption, and difficulty of finding a perfect match according to the user specified search keywords. For instance, users may have privacy and security concerns, as the information involved with service selection and provisio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constrained by limited information and recommendation opportunities: An exploration and exploitation problem for recommender systems

    Publication Year: 2013 , Page(s): 54 - 61
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (156 KB) |  | HTML iconHTML  

    In this paper, we investigate a resource allocation problem in recommendation systems where unknown new items keep coming to the system at different time. The task is to recommend (allocate) each user a limited number of new items. The objective is to maximize the overall positive response rate. This problem is non-trivial because, on one hand, we need to allocate these news items to users who are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.