A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Prepared scan
2017
Proceedings of the Symposium on Applied Computing - SAC '17
The ability of NoSQL systems to scale better than traditional relational databases motivates a large set of applications to migrate their data to NoSQL systems, even without aiming to exploit the provided ...
In this paper, we analyse this cost in Apache HBase and propose a new scan operation, named Prepared Scan, that optimizes the access to data structured in a regular manner by taking advantage of a well-known ...
SAC 2017 , 2017 April 03-07, 2017, Marrakech, Morocco c 2017 ACM. ...
doi:10.1145/3019612.3019863
dblp:conf/sac/NevesVPO17
fatcat:y5bt7xfmzfbhdjzal4asmktszu
Ranking novel regulatory genes in gene expression profiles using NetExpress
2017
Proceedings of the Symposium on Applied Computing - SAC '17
Both of these factors play significant roles in influencing the accuracy of the process. ...
A common computational method is to reverse engineer a regulatory network from gene expression profile, and sanitize the network using known information about the genes, their interactions and other properties ...
The authors would like to thank Aminul Islam for implementing the prototype NetExpress system. ...
doi:10.1145/3019612.3021289
pmid:34095903
pmcid:PMC8173485
dblp:conf/sac/YelbayGJ17
fatcat:tehgnxy4fvhwvb2q7txmyqfiq4
Formal verification of storm topologies through D-VerT
2017
Proceedings of the Symposium on Applied Computing - SAC '17
The verification is based on a translation of Storm topologies into the CLTLoc metric temporal logic. ...
The need for highly reliable applications able to handle huge amounts of data and the availability of infrastructures for distributed computing rapidly led industries to develop frameworks for streaming ...
SAC 2017 , 2017 April 03-07, 2017, Marrakech, Morocco Copyright 2017 ACM 978-1-4503-4486-9/17/04. . . $15.00 http://dx.doi.org/10.1145/3019612.3019769 Groupon (www.groupon.com), Spotify (www.spotify.com ...
doi:10.1145/3019612.3019769
dblp:conf/sac/MarconiBR17
fatcat:u3m7osmssbdltnyiohejfo65qe
Defining an architecture for evolving environments
2017
Proceedings of the Symposium on Applied Computing - SAC '17
The architecture of a system specifies how the system should be designed and built. ...
We claim that an iterative architecture process is required, where the technical concerns are separated from the non-technical ones. Furthermore, a strong guiding vision is required. ...
The resulting architecture from this process is discussed at [15] . SAC 2017 , 2017 April 03-07, 2017, Marrakech, Morocco © 2017 ACM. ...
doi:10.1145/3019612.3019902
dblp:conf/sac/HyysaloHSKJSP17
fatcat:eqi67l7txffhfcaeqpwociqzvm
A versatile high-performance visual fiducial marker detection system with scalable identity encoding
2017
Proceedings of the Symposium on Applied Computing - SAC '17
The experimental evaluation of the system on a real robot indicates that while the proposed algorithm achieves similar accuracy to other state-of-the-art methods, it is faster by two orders of magnitude ...
A key concept of our system is the separation of the detection and identification steps, where the first step is based on a computationally efficient circular marker detection, and the identification step ...
SAC 2017 , 2017 April 03-07, 2017, Marrakech, Morocco Copyright 2017 ACM 978-1-4503-4486-9/17/04. . . $15.00 http://dx.doi.org/10.1145/3019612.3019709 (a) WhyCon (b) ARTags (c) AprilTag (d) WhyCode (e) ...
doi:10.1145/3019612.3019709
dblp:conf/sac/LightbodyKH17
fatcat:okopb5rmcjhxvfrkxkvkbz5wlm
Declarative process mining for DCR graphs
2017
Proceedings of the Symposium on Applied Computing - SAC '17
We contribute (a) a process mining algorithm for DCR graphs, (b) a proposal for a set of metrics quantifying output model quality, and (c) a preliminary example-based comparison with the Declare Maps Miner ...
The algorithm takes a contradiction-based approach, that is, we initially assume that all possible constraints hold, subsequently removing constraints as they are observed to be violated by traces in the ...
SAC 2017 April 03-07, 2017, Marrakech, Morocco c 2017 Copyright held by the owner/author(s). ACM ISBN 978-1-4503-4486-9/17/04. ...
doi:10.1145/3019612.3019622
dblp:conf/sac/DeboisHLU17
fatcat:676r2rg37jc7vbkiz4aysytglu
Phantom walkabouts in wireless sensor networks
2017
Proceedings of the Symposium on Applied Computing - SAC '17
In the seminal work on SLP, phantom routing was proposed as a viable approach to address SLP. ...
As wireless sensor networks (WSNs) have been applied across a spectrum of application domains, the problem of source location privacy (SLP) has emerged as a significant issue, particularly in security-critical ...
SAC 2017 , 2017 April 03 -07, 2017, Marrakech, Morocco c 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM. ...
doi:10.1145/3019612.3019732
dblp:conf/sac/GuBJ17
fatcat:wrjnaehcnveq7ezxjvd5n6kigi
Evolutionary role mining in complex networks by ensemble clustering
2017
Proceedings of the Symposium on Applied Computing - SAC '17
We compare two weighting functions, based on age and distribution of data, to incorporate temporal behavior of nodes in the role discovery. ...
This paper proposes a new method to determine structural roles in a dynamic network based on the current position of nodes and their historic behavior. ...
The work is also within FourEyes, a research line within project "TEC4Growth/NORTE-01-0145-FEDER-000020". ...
doi:10.1145/3019612.3019815
dblp:conf/sac/ChoobdarRS17
fatcat:ux6doplyajbsjabu4cfnmataiu
Deconstructing source location privacy-aware routing protocols
2017
Proceedings of the Symposium on Applied Computing - SAC '17
Much of the previous work on SLP have focused on the development of various protocols to enhance the level of SLP imparted to the network, under various attacker models and other conditions. ...
Others works have focused on analysing the level of SLP being imparted by a specific protocol. ...
SAC 2017 , 2017 April 03 -07, 2017, Marrakech, Morocco c 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM. ...
doi:10.1145/3019612.3019655
dblp:conf/sac/JhumkaB17
fatcat:i76qpzkv3rds3doant356k63me
Reconfigurable service-based architecture based on variability description
2017
Proceedings of the Symposium on Applied Computing - SAC '17
However, existing ADLs that support dynamic reconfiguration do not explicitly model variation points on which the reconfiguration is based. ...
Furthermore, an implementation code can be automatically generated from the architectural description. ...
2017 , 2017 April 03-07, 2017, Marrakech, Morocco © 2017 ACM. ...
doi:10.1145/3019612.3019767
dblp:conf/sac/AdjoyanS17
fatcat:uu5ufy77ynauppr4hs3vqltvtq
Security and privacy preserving data aggregation in cloud computing
2017
Proceedings of the Symposium on Applied Computing - SAC '17
However, most current approaches fall short in meeting one of several of the requirements for privacy preserving smart metering systems. ...
Moreover, we present also an implementation of the proposed architecture as well as a series of experiments that have been carried out in order to assess how the proposed solution performs in comparison ...
SAC 2017 , 2017 April 03 -07, 2017, Marrakech, Morocco ACM 978-1-4503-4486-9/17/04. . . $15.00 http://dx.doi.org/10.1145/3019612.3019795
|S| i=1 ei,j for all i ∈ {1, ..., |S|} (the sum of the current ...
doi:10.1145/3019612.3019795
dblp:conf/sac/SilvaMVB17
fatcat:kn4b7wld65dy3bw576ylmvvqsy
Multicriteria optimization in distributed micro-conveying platform
2017
Proceedings of the Symposium on Applied Computing - SAC '17
The smart surface is composed of a 2D array of decentralized micro-modules. Each micro-module is composed of a microactuator, a microsensor, computing and communication units. ...
The long term vision optimizes on the lifespan of the system and maintenance issues. We describe the best way to deal with these two aspects and their impact on the smart surface performance. ...
SAC 2017 , 2017 April 03-07, 2017, Marrakech, Morocco Copyright 2017 ACM 978-1-4503-4486-9/17/04. . . $15.00 http://dx.doi.org/10.1145/3019612.3019704
Figure 1 : 1 The conveyor and the path taken by ...
doi:10.1145/3019612.3019704
dblp:conf/sac/MabedDS17
fatcat:i3svjx6dnffpjcosyiyxdrlayq
Attacks landscape in the dark side of the web
2017
Proceedings of the Symposium on Applied Computing - SAC '17
To date, the research community has focused on understanding the size and characteristics of the Dark Web and the services and goods that are offered in its underground markets. ...
In particular, by deploying a high interaction honeypot in the Tor network for a period of seven months, we conducted a measurement study of the type of attacks and of the attackers behavior that affect ...
SAC 2017, April 03 -07, 2017, Marrakech, Morocco c 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM. ...
doi:10.1145/3019612.3019796
dblp:conf/sac/CatakogluBB17
fatcat:gs4ime7t2vf45asffoesoyq6lu
Measuring login webpage security
2017
Proceedings of the Symposium on Applied Computing - SAC '17
While much prior research has focused on the strengths and weaknesses of textual passwords, this paper puts a spotlight on the security of the login webpages themselves. ...
Our findings on open-source web frameworks and content management systems confirm the lack of support against the login attacker. ...
, and the Swedish research agency VR. ...
doi:10.1145/3019612.3019798
dblp:conf/sac/AckerHS17
fatcat:iolgixfbando5hqbh4pfnpi3zy
Supporting behavioral consistency in adaptive case management
2019
unpublished
By offering a business-driven approach based on business ontology and high-level behavioral patterns for the creation of [...] ...
To support business administrators during the creation or amendment of case templates, this thesis proposes an approach for the efficient behavioral verification of case templates based on reduction techniques ...
in Adaptive Case Management" In: Proceedings of the Symposium on Applied Computing (SAC '17), Marrakech, Morocco -April 03 -07, 2017, ISBN: 978-1-4503-4486-9. ...
doi:10.25365/thesis.57572
fatcat:kde67u53jrcrjdrdo757buuw5i