By Topic

2015 IEEE International Conference on Information Reuse and Integration

13-15 Aug. 2015

Filter Results

Displaying Results 1 - 25 of 100
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (860 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2015, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (246 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Co-Chairs

    Publication Year: 2015, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (154 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organizers

    Publication Year: 2015, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (250 KB)
    Freely Available from IEEE
  • International Technical Program Committee

    Publication Year: 2015, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (234 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2015, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (221 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2015, Page(s):xxii - xxviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorials

    Publication Year: 2015, Page(s):xxix - xxxii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (110 KB) | HTML iconHTML

    These tutorials discuss the following: Integrating and analyzing heterogeneous information: The case of urban informatics; The Internet of Things: design, applications and security; Data security and data privacy methods in mobile cloud computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [IEEE IRI 2015 Invited Industry Speakers - 3 abstracts]

    Publication Year: 2015, Page(s):xxxiii - xxxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (99 KB)

    Provides an abstract for each of the three keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. The titles of the presentations are: "Data science enabled resiliency analytics and beyond;" "Multi-Layered Access Control with Oracle Database Vault;" and "Cloud solution bro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sponsors

    Publication Year: 2015, Page(s): xxxvi
    Request permission for commercial reuse | PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • A Multi-dimensional Comparison of Toolkits for Machine Learning with Big Data

    Publication Year: 2015, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (855 KB) | HTML iconHTML

    Big data is a big business, and effective modeling of this data is key. This paper provides a comprehensive multidimensional analysis of various open source tools for machine learning with big data. An evaluation standard is proposed along with detailed comparisons of the frameworks discussed, with regard to algorithm availability, scalability, speed, and more. The major tools profiled are Mahout,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SDPA: Sensor Data Processing Architecture for Modeling Semantic Data from Sensor Steams

    Publication Year: 2015, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1377 KB) | HTML iconHTML

    With the rapid deployment of a number of sensors, it is crucial to efficiently manage their data streams with heterogeneous properties. To achieve various sensor applications such as discovery and mashup, a method of retrieving meaningful information from raw sensor data is required. However, it is hard to analyze and represent the sensor data since sensors generate streaming data of different pat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Choosing an Appropriate Ensemble Classifier for Balanced Bioinformatics Data

    Publication Year: 2015, Page(s):17 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (899 KB) | HTML iconHTML

    Bioinformatics datasets contain a number of characteristics, such as noisy data and difficult to learn class boundaries, which make it challenge to build effective predictive models. One option for improving results is the use of ensemble learning methods, which involve combining the results of multiple predictive models into a single decision. Since we do not rely on a single model, we reduce the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time Stream Data Analytics for Multi-purpose Social Media Applications

    Publication Year: 2015, Page(s):25 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (818 KB) | HTML iconHTML

    This paper describes a real-time information integration and analytics system called InXite for multi-purpose applications. InXite is designed to detect evolving patterns and trends in streaming data including social media data (e.g., tweets). InXite comprises of multiple modules including InXite Registration and Dashboard, InXite Real-time Data Streamer, InXite Information Integrator and InXite A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What Happens to My Online Social Estate When I Am Gone? An Integrated Approach to Posthumous Online Data Management

    Publication Year: 2015, Page(s):31 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (898 KB) | HTML iconHTML

    Technology and the digital world have been making an important part of people's lives nowadays. As death is unquestionably a crucial and fundamental part of life, technology and the digital world ought to play an equally important role in end of life issues as well. For instance, the adoption of online social networks (OSNs) has been amplifying to cover large numbers of the world's population play... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Media Data Aggregation and Mining for Internet-Scale Customer Relationship Management

    Publication Year: 2015, Page(s):39 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1661 KB) | HTML iconHTML

    Industry and government organisations across the world increasingly use social media for Customer Relationship Management (CRM) activities that include communicating with customers about their services/products and distilling customer opinions for assessing their effectiveness. In this paper, we explore the exploitation of social media for CRM, and describe the development and functionality of VIZ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Maps through Semantic Web, Social Media, and Sentiment Analysis

    Publication Year: 2015, Page(s):49 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2195 KB) | HTML iconHTML

    In this paper we describe a new approach to creating rich, dynamic and customized maps for business or leisure activities, and demonstrate how the approach can be implemented through a prototype system. The approach is aimed at changing the way we map the world by providing a meaningful and personalized context that is augmented with the semantic web, social media integration and sentiment analysi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of Heterogeneous Web Services for Event-Based Social Networks

    Publication Year: 2015, Page(s):57 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1809 KB) | HTML iconHTML

    Event-based online social networks are Internet-based services that enable users to participate in real world experiences together. Event-based social networks can be created by a community of end-users based on their own interests in specific types of event and sources of event information. We propose a method to create such event-based social networks through integration of existing online infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Negative-Based Sampling for Multimedia Retrieval

    Publication Year: 2015, Page(s):64 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1477 KB) | HTML iconHTML

    Nowadays, in such a high-tech living lifestyle, profusion of multimedia data are produced and propagated around the world. To identify meaningful semantic concepts from the large amount of data, one of the major challenges is called the data imbalance problem. Data imbalance occurs when the number of positive instances (i.e., instances which contain the target concept) is greatly less than the num... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perceptually Lossless Image Coding Based on Foveated JND

    Publication Year: 2015, Page(s):72 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1142 KB) | HTML iconHTML

    Removing perceptual redundancy plays an important role in image compression. In this paper we developed a foveated just-noticeable-difference (FJND) model to quantify the perceptual redundancy in the image and integrate it in the H.265/HEVC intra encoding framework to provide a perceptually lossless image coding method. The experiments demonstrate that the proposed method effectively increases the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual and Textual Feature Fusion for Automatic Customs Tariff Classification

    Publication Year: 2015, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1221 KB) | HTML iconHTML

    The Harmonized Tariff Schedule for the classification of goods is a major determinant of customs duties and taxes. The basic HS Code is 6 digits long but can be extended according to the needs of the countries such as application of custom duties based on details of the product. Finding the correct, consistent, legally defensible HS Code is at the heart of Import Compliance. However finding the be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.