4-6 Aug. 2017
Filter Results
-
[Front cover]
Publication Year: 2017, Page(s): c1|
PDF (1151 KB)
-
[Title page i]
Publication Year: 2017, Page(s): i|
PDF (37 KB)
-
[Title page iii]
Publication Year: 2017, Page(s): iii|
PDF (122 KB)
-
[Copyright notice]
Publication Year: 2017, Page(s): iv|
PDF (118 KB)
-
Table of contents
Publication Year: 2017, Page(s):v - xii|
PDF (160 KB)
-
-
Message from Program Co-Chairs
Publication Year: 2017, Page(s):xiv - xv -
Conference Organization
Publication Year: 2017, Page(s):xvi - xvii|
PDF (85 KB)
-
IRI 2017 Program Committee
Publication Year: 2017, Page(s):xviii - xix|
PDF (91 KB)
-
IRI 2017 Steering Committee
Publication Year: 2017, Page(s): xx|
PDF (68 KB)
-
DIM 2017 Workshop Organization
Publication Year: 2017, Page(s): xxi|
PDF (75 KB)
-
EM-RITE 2017 Workshop Organization
Publication Year: 2017, Page(s): xxii|
PDF (81 KB)
-
FMi 2017 Workshop Organization
Publication Year: 2017, Page(s): xxiii|
PDF (85 KB)
-
IICPS 2017 Workshop Organization
Publication Year: 2017, Page(s): xxiv|
PDF (71 KB)
-
SMA2 2017 Workshop Organization
Publication Year: 2017, Page(s): xxv|
PDF (76 KB)
-
Keynote Talks
Publication Year: 2017, Page(s):xxvi - xxxiiiProvides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»
-
Towards Managing Complex Data Sharing Policies with the Min Mask Sketch
Publication Year: 2017, Page(s):1 - 8
Cited by: Papers (1)More data is currently being collected and shared by software applications than ever before. In many cases, the user is asked if either all or none of their data can be shared. We hypothesize that in some cases, users would like to share data in more complex ways. In order to implement the sharing of data using more complicated privacy preferences, complex data sharing policies must be used. These... View full abstract»
-
Cyber-Secure UAV Communications Using Heuristically Inferred Stochastic Grammars and Hard Real-Time Adaptive Waveform Synthesis and Evolution
Publication Year: 2017, Page(s):9 - 15This paper initially describes how an inferred context-free (stochastic) grammar can be used to verify command transmissions and serve as a hedge against a successful cyber-attack. The remainder of the paper addresses a computational problem not amenable to closed-form solution; namely, the hard real-time (~57 usec) synthesis of a desired waveform through the adaptive modification of a carrier wav... View full abstract»
-
Access Control Models for Virtual Object Communication in Cloud-Enabled IoT
Publication Year: 2017, Page(s):16 - 25The Internet of Things (IoT) is the latest evolution of the Internet, encompassing an enormous number of connected physical "things." The access-control oriented (ACO) architecture was recently proposed for cloud-enabled IoT, with virtual objects (VOs) and cloud services in the middle layers. A central aspect of ACO is to control communication among VOs. This paper develops operational and adminis... View full abstract»
-
Malware Collection and Analysis
Publication Year: 2017, Page(s):26 - 31
Cited by: Papers (1)This paper describes the various malware datasets that we have obtained permissions to host at the University of Arizona as part of a National Science Foundation funded project. It also describes some other malware datasets that we are in the process of obtaining permissions to host at the University of Arizona. We have also discussed some preliminary work we have carried out on malware analysis u... View full abstract»
-
Unsupervised Terminological Ontology Learning Based on Hierarchical Topic Modeling
Publication Year: 2017, Page(s):32 - 41In this paper, we present hierarchical relation-based latent Dirichlet allocation (hrLDA), a data-driven hierarchical topic model for extracting terminological ontologies from a large number of heterogeneous documents. In contrast to traditional topic models, hrLDA relies on noun phrases instead of unigrams, considers syntax and document structures, and enriches topic hierarchies with topic relati... View full abstract»
-
Extracting Knowledge from Technical Reports for the Valuation of West Texas Intermediate Crude Oil Futures
Publication Year: 2017, Page(s):42 - 48We propose and demonstrate an approach for the often attempted problem of market prediction. We restrict our study to a widely purchased and well recognized commodity, crude oil, which experiences significant volatility. Robust debate exists over the applicability of the weak and semi-strong versions of the Efficient Market Hypothesis (EMH) to financial markets. In this paper we train nine learner... View full abstract»
-
Business Objects plus (BO+): An Approach to Enhance Service Reuse and Integration in Cross-Domain SOA Compounds
Publication Year: 2017, Page(s):49 - 58With globalization and rising competition, innovation cycles have shortened in recent years. Thus, the need for flexible and quickly changeable IT systems motivated companies to adopt new technologies and IT architectures, leading to novel concepts like the Industrial Internet of Things or Industrie 4.0. These concepts make it necessary to propagate information through multiple software systems an... View full abstract»
-
On Using Disparate Scholarly Data to Identify Potential Members for Interdisciplinary Research Groups
Publication Year: 2017, Page(s):59 - 68Supporting interdisciplinary research (IDR) requires detecting the expertise needed to solve complex problems and identifying researchers with that expertise. Universities have adopted various expertise systems, many of which use publications and keywords to identify experts. Research expertise is dynamic in nature as one's expertise may change over time. Relying solely on publications to infer re... View full abstract»
-
Traffic Surveillance System for Bridge Vibration Analysis
Publication Year: 2017, Page(s):69 - 74
Cited by: Papers (1)The vibration response of a damaged bridge is known to have changed characteristics. To analyze the response, we start by collecting waveforms of the vibration immediately following the passage of a vehicle. We then need to isolate just those vibrations caused by a single heavy vehicle, if the vibration characteristics are to be accurate. In this paper, we propose a traffic-vibration analysis syst... View full abstract»