Filters








15 Hits in 7.1 sec

Prepared scan

Francisco Neves, Ricardo Vilaça, José Pereira, Rui Oliveira
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
The ability of NoSQL systems to scale better than traditional relational databases motivates a large set of applications to migrate their data to NoSQL systems, even without aiming to exploit the provided  ...  In this paper, we analyse this cost in Apache HBase and propose a new scan operation, named Prepared Scan, that optimizes the access to data structured in a regular manner by taking advantage of a well-known  ...  SAC 2017 , 2017 April 03-07, 2017, Marrakech, Morocco c 2017 ACM.  ... 
doi:10.1145/3019612.3019863 dblp:conf/sac/NevesVPO17 fatcat:y5bt7xfmzfbhdjzal4asmktszu

Ranking novel regulatory genes in gene expression profiles using NetExpress

Belma Yelbay, Alexander Gow, Hasan M Jamil
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
Both of these factors play significant roles in influencing the accuracy of the process.  ...  A common computational method is to reverse engineer a regulatory network from gene expression profile, and sanitize the network using known information about the genes, their interactions and other properties  ...  The authors would like to thank Aminul Islam for implementing the prototype NetExpress system.  ... 
doi:10.1145/3019612.3021289 pmid:34095903 pmcid:PMC8173485 dblp:conf/sac/YelbayGJ17 fatcat:tehgnxy4fvhwvb2q7txmyqfiq4

Formal verification of storm topologies through D-VerT

Francesco Marconi, Marcello M. Bersani, Matteo Rossi
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
The verification is based on a translation of Storm topologies into the CLTLoc metric temporal logic.  ...  The need for highly reliable applications able to handle huge amounts of data and the availability of infrastructures for distributed computing rapidly led industries to develop frameworks for streaming  ...  SAC 2017 , 2017 April 03-07, 2017, Marrakech, Morocco Copyright 2017 ACM 978-1-4503-4486-9/17/04. . . $15.00 http://dx.doi.org/10.1145/3019612.3019769 Groupon (www.groupon.com), Spotify (www.spotify.com  ... 
doi:10.1145/3019612.3019769 dblp:conf/sac/MarconiBR17 fatcat:u3m7osmssbdltnyiohejfo65qe

Defining an architecture for evolving environments

Jarkko Hyysalo, Gavin Harper, Jaakko Sauvola, Anja Keskinarkaus, Ilkka Juuso, Miikka Salminen, Juha Partala
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
The architecture of a system specifies how the system should be designed and built.  ...  We claim that an iterative architecture process is required, where the technical concerns are separated from the non-technical ones. Furthermore, a strong guiding vision is required.  ...  The resulting architecture from this process is discussed at [15] . SAC 2017 , 2017 April 03-07, 2017, Marrakech, Morocco © 2017 ACM.  ... 
doi:10.1145/3019612.3019902 dblp:conf/sac/HyysaloHSKJSP17 fatcat:eqi67l7txffhfcaeqpwociqzvm

A versatile high-performance visual fiducial marker detection system with scalable identity encoding

Peter Lightbody, Tomáš Krajník, Marc Hanheide
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
The experimental evaluation of the system on a real robot indicates that while the proposed algorithm achieves similar accuracy to other state-of-the-art methods, it is faster by two orders of magnitude  ...  A key concept of our system is the separation of the detection and identification steps, where the first step is based on a computationally efficient circular marker detection, and the identification step  ...  SAC 2017 , 2017 April 03-07, 2017, Marrakech, Morocco Copyright 2017 ACM 978-1-4503-4486-9/17/04. . . $15.00 http://dx.doi.org/10.1145/3019612.3019709 (a) WhyCon (b) ARTags (c) AprilTag (d) WhyCode (e)  ... 
doi:10.1145/3019612.3019709 dblp:conf/sac/LightbodyKH17 fatcat:okopb5rmcjhxvfrkxkvkbz5wlm

Declarative process mining for DCR graphs

Søren Debois, Thomas T. Hildebrandt, Paw Høvsgaard Laursen, Kenneth Ry Ulrik
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
We contribute (a) a process mining algorithm for DCR graphs, (b) a proposal for a set of metrics quantifying output model quality, and (c) a preliminary example-based comparison with the Declare Maps Miner  ...  The algorithm takes a contradiction-based approach, that is, we initially assume that all possible constraints hold, subsequently removing constraints as they are observed to be violated by traces in the  ...  SAC 2017 April 03-07, 2017, Marrakech, Morocco c 2017 Copyright held by the owner/author(s). ACM ISBN 978-1-4503-4486-9/17/04.  ... 
doi:10.1145/3019612.3019622 dblp:conf/sac/DeboisHLU17 fatcat:676r2rg37jc7vbkiz4aysytglu

Phantom walkabouts in wireless sensor networks

Chen Gu, Matthew Bradbury, Arshad Jhumka
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
In the seminal work on SLP, phantom routing was proposed as a viable approach to address SLP.  ...  As wireless sensor networks (WSNs) have been applied across a spectrum of application domains, the problem of source location privacy (SLP) has emerged as a significant issue, particularly in security-critical  ...  SAC 2017 , 2017 April 03 -07, 2017, Marrakech, Morocco c 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM.  ... 
doi:10.1145/3019612.3019732 dblp:conf/sac/GuBJ17 fatcat:wrjnaehcnveq7ezxjvd5n6kigi

Evolutionary role mining in complex networks by ensemble clustering

Sarvenaz Choobdar, Pedro Ribeiro, Fernando Silva
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
We compare two weighting functions, based on age and distribution of data, to incorporate temporal behavior of nodes in the role discovery.  ...  This paper proposes a new method to determine structural roles in a dynamic network based on the current position of nodes and their historic behavior.  ...  The work is also within FourEyes, a research line within project "TEC4Growth/NORTE-01-0145-FEDER-000020".  ... 
doi:10.1145/3019612.3019815 dblp:conf/sac/ChoobdarRS17 fatcat:ux6doplyajbsjabu4cfnmataiu

Deconstructing source location privacy-aware routing protocols

Arshad Jhumka, Matthew Bradbury
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
Much of the previous work on SLP have focused on the development of various protocols to enhance the level of SLP imparted to the network, under various attacker models and other conditions.  ...  Others works have focused on analysing the level of SLP being imparted by a specific protocol.  ...  SAC 2017 , 2017 April 03 -07, 2017, Marrakech, Morocco c 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM.  ... 
doi:10.1145/3019612.3019655 dblp:conf/sac/JhumkaB17 fatcat:i76qpzkv3rds3doant356k63me

Reconfigurable service-based architecture based on variability description

Seza Adjoyan, Abdelhak-Djamel Seriai
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
However, existing ADLs that support dynamic reconfiguration do not explicitly model variation points on which the reconfiguration is based.  ...  Furthermore, an implementation code can be automatically generated from the architectural description.  ...  2017 , 2017 April 03-07, 2017, Marrakech, Morocco © 2017 ACM.  ... 
doi:10.1145/3019612.3019767 dblp:conf/sac/AdjoyanS17 fatcat:uu5ufy77ynauppr4hs3vqltvtq

Security and privacy preserving data aggregation in cloud computing

Leandro Ventura Silva, Rodolfo Marinho, Jose Luis Vivas, Andrey Brito
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
However, most current approaches fall short in meeting one of several of the requirements for privacy preserving smart metering systems.  ...  Moreover, we present also an implementation of the proposed architecture as well as a series of experiments that have been carried out in order to assess how the proposed solution performs in comparison  ...  SAC 2017 , 2017 April 03 -07, 2017, Marrakech, Morocco ACM 978-1-4503-4486-9/17/04. . . $15.00 http://dx.doi.org/10.1145/3019612.3019795 |S| i=1 ei,j for all i ∈ {1, ..., |S|} (the sum of the current  ... 
doi:10.1145/3019612.3019795 dblp:conf/sac/SilvaMVB17 fatcat:kn4b7wld65dy3bw576ylmvvqsy

Multicriteria optimization in distributed micro-conveying platform

Hakim Mabed, Eugen Dedu, Haithem Skima
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
The smart surface is composed of a 2D array of decentralized micro-modules. Each micro-module is composed of a microactuator, a microsensor, computing and communication units.  ...  The long term vision optimizes on the lifespan of the system and maintenance issues. We describe the best way to deal with these two aspects and their impact on the smart surface performance.  ...  SAC 2017 , 2017 April 03-07, 2017, Marrakech, Morocco Copyright 2017 ACM 978-1-4503-4486-9/17/04. . . $15.00 http://dx.doi.org/10.1145/3019612.3019704 Figure 1 : 1 The conveyor and the path taken by  ... 
doi:10.1145/3019612.3019704 dblp:conf/sac/MabedDS17 fatcat:i3svjx6dnffpjcosyiyxdrlayq

Attacks landscape in the dark side of the web

Onur Catakoglu, Marco Balduzzi, Davide Balzarotti
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
To date, the research community has focused on understanding the size and characteristics of the Dark Web and the services and goods that are offered in its underground markets.  ...  In particular, by deploying a high interaction honeypot in the Tor network for a period of seven months, we conducted a measurement study of the type of attacks and of the attackers behavior that affect  ...  SAC 2017, April 03 -07, 2017, Marrakech, Morocco c 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM.  ... 
doi:10.1145/3019612.3019796 dblp:conf/sac/CatakogluBB17 fatcat:gs4ime7t2vf45asffoesoyq6lu

Measuring login webpage security

Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
While much prior research has focused on the strengths and weaknesses of textual passwords, this paper puts a spotlight on the security of the login webpages themselves.  ...  Our findings on open-source web frameworks and content management systems confirm the lack of support against the login attacker.  ...  , and the Swedish research agency VR.  ... 
doi:10.1145/3019612.3019798 dblp:conf/sac/AckerHS17 fatcat:iolgixfbando5hqbh4pfnpi3zy

Supporting behavioral consistency in adaptive case management

Christoph Kaineder
2019 unpublished
By offering a business-driven approach based on business ontology and high-level behavioral patterns for the creation of [...]  ...  To support business administrators during the creation or amendment of case templates, this thesis proposes an approach for the efficient behavioral verification of case templates based on reduction techniques  ...  in Adaptive Case Management" In: Proceedings of the Symposium on Applied Computing (SAC '17), Marrakech, Morocco -April 03 -07, 2017, ISBN: 978-1-4503-4486-9.  ... 
doi:10.25365/thesis.57572 fatcat:kde67u53jrcrjdrdo757buuw5i