2014 ieee 15th international conference on information ...toc.proceedings.com/25543webtoc.pdfredwood...

14
IEEE Catalog Number: ISBN: CFP14IRI-POD 978-1-4799-5881-8 2014 IEEE 15th International Conference on Information Reuse and Integration (IRI 2014) Redwood City, California, USA 13-15 August 2014

Upload: others

Post on 24-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

IEEE Catalog Number: ISBN:

CFP14IRI-POD 978-1-4799-5881-8

2014 IEEE 15th International Conference on Information Reuse and Integration (IRI 2014)

Redwood City, California, USA 13-15 August 2014

Page 2: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

i

Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)

TABLE OF CONTENTS

Forward ................................................................................................................................................ xiv

Message from Program Co-chairs ......................................................................................................... xv

Conference Organizers ........................................................................................................................ xvii

Program Committee ............................................................................................................................. xix

Keynotes .............................................................................................................................................. xxii

Workshop Keynotes ............................................................................................................................ xxx

Industry Talks .................................................................................................................................... xxxii

Tutorials ........................................................................................................................................... xxxvi

Panel .............................................................................................................................................. xxxviii

IRI-HI 2014 Program Committee .................................................................................................... xxxix

FMi 2014 Program Committee .............................................................................................................. xl

DIM 2014 Program Committee .......................................................................................................... xlii

EM-RITE 2014 Program Committee ................................................................................................. xliii

WICSOC 2014 Program Committee .................................................................................................. xliv

SocialSec 2014 Program Committee ................................................................................................... xlv

IICPS 2014 Program Committee ........................................................................................................ xlvi

NatSec'2014 Program Committee ..................................................................................................... xlvii

Industry Committee .......................................................................................................................... xlviii

Sponsors ................................................................................................................................................ xlix

Technical Papers ...................................................................................................................................... l

Session A11: Information Security & Privacy I

Detecting and Resolving Inconsistencies in Firewalls .............................................................................. 1

Du Zhang, Lavanya Jujjavarapu and Meiliu Lu

California State University, Sacramento, USA

Stream Computing for Large-Scale, Multi-Channel Cyber Threat Analytics ........................................... 8

Douglas Schales (1)

, Mihai Christodorescu (2)

, Xin Hu (1)

, Jiyong Jang (1)

, Josyula Rao (1)

, Reiner

Sailer (1)

, Marc Stoecklin (1)

, Wietse Venema (1)

and Ting Wang (1)

(1)

IBM Research, USA (2)

Qualcomm Research, USA

Policy-Driven Security Management for Fog Computing: Preliminary Framework and A Case Study 16

Page 3: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

ii

Clinton Dsouza, Gail-Joon Ahn and Marthony Taguinod

Arizona State University, USA

Deploying Malware Detection Software for Smart Phones .................................................................... 24

Bhavani Thuraisingham, Nathan McDaniel and Latifur Khan

The University of Texas at Dallas, USA

Session A12: Software Design, Testing and Reuse

Test Logic Reuse Through Unit Test Patterns: A Test Automation Framework for Software Product

Lines ................................................................................................................................................. 28

Glauco Silva Neves and Patrícia Vilain

Universidade Federal de Santa Catarina, Florianópolis, SC, Brazil

From Requirements to Software Design: An Automated Solution for Packaging Software Classes ..... 36

Yasaman Amannejad, Mohammad Moshirpour, Behrouz H. Far and Reda Alhajj

University of Calgary, Canada

Ontology-based User Requirements Decomposition for Component Selection for Highly Available

Systems ............................................................................................................................................ 44

Mahin Abbasipour (1)

, Margarete Sackmann (1)

, Ferhat Khendek (1)

and Maria Toeroe (2)

(1)

Concordia University, Montreal, Canada (2)

Ericsson Inc., Montreal, Canada

Specification-Based Testing with Buchi Automata: Transition Coverage Criteria and Property

Refinement ....................................................................................................................................... 52

Li Tan and Bolong Zeng

Washington State University, USA

Session A13W: First Workshop on Social Network Security (SocialSec 2014)

Consumer-Centric Protection for Online Social Networks ..................................................................... 62

Raja Naeem Akram, Ryan K. L. Ko, and Tsz Fung Law

University of Waikato, Hamilton, New Zealand

A Study of ClickJacking Worm Propagation in Online Social Networks ............................................... 68

Mohammad Reza Faghani and Uyen Trang Nguyen

York University, Toronto, Canada

Detecting Unintentional Information Leakage in Social Media News Comments ................................. 74

Inbal Yahav, David Schwartz and Gahl Silverman

Bar-Ilan University, Israel

Session A14W: WICSOC 2014: Social Media, Crowdsourcing, and Public Health

A Framework for Comparing Early Warning Systems across Domains: A Step Toward a

Data-Integrated Public Health EWS ................................................................................................ 80

Henry Kim (1)

, Marek Laskowski (1)

, Seyed Moghadas (1)

, Amirehsan Sajad (1)

and Maaz Asif (2)

(1)

York University, Toronto, Canada (2)

Queen’s University, Toronto, Canada

Much more to it: The relation between Facebook usage and self-esteem .............................................. 87

Montathar Faraon and Mauri Kaipainen

Page 4: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

iii

Södertörn University, Sweden

Text Classification for Automatic Detection of Alcohol Use-Related Tweets: A Feasibility Study ....... 93

Yin Aphinyanaphongs, Bisakha Ray, Alexander Statnikov and Paul Krebs

NYU Langone Medical Center, USA

Towards Chronic Emergency Response Communities for Anaphylaxis ................................................ 98

David Schwartz (1)

, Abdelouahab Bellou (2)

, Luis Garcia-Castrillo (3)

, Antonella Muraro (4)

and

Nikolaos Papadopoulos (5)

(1)

Bar-Ilan University, Israel (2)

University Rennes 1, Rennes, France (3)

Hospital Universitario Marques de Valdecilla, Cantabria, Spain (4)

Padua General University Hospital, Padua, Italy (5)

The University of Manchester, United Kingdom

Leveraging Online Social Media for Capturing Observations of Daily Living and Ecological

Momentary Assessment ................................................................................................................. 104

Mohd Anwar

North Carolina A&T State University, USA

Session A21: Information Security & Privacy II

Detect Phishing by Checking Content Consistency .............................................................................. 109

Yi-Shin Chen (1)

, Huei-Xin Liu (1)

, Yi-Hsuan Yu (1)

and Pang-Chieh Wang (2)

(1)

National Tsing Hua University, Taiwan (2)

Industrial Technology Research Institute, Taiwan

DiCoTraM: A Distributed and Coordinated DDoS flooding attack tailored Traffic Monitoring.......... 120

Saman Taghavi Zargar, James Joshi and David Tipper

University of Pittsburgh, USA

Access Control Reinforcement over Searchable Encryption ................................................................ 130

Abdellah Kaci and Thouraya Bouabana-Tebibel

Ecole nationale Supérieure d'Informatique, Alger, Algeria

LEAF:A Social Network-based Intervention Tool for IPV Survivors .................................................. 138

Balaji Palanisamy, Sheldon Sensenig, James Joshi and Rose Constantino

University of Pittsburgh, USA

Session A22: Big Data/Networks & Cloud Computing

Uncertainty reasoning for the "Big Data" Semantic Web ..................................................................... 147

Loukia Karanikola (1)

, Isambo Karali (1)

and Sally Mcclean (2)

(1)

University of Athens, Greece (2)

University of Ulster, UK

Semantics Management for Big Networks ........................................................................................... 155

Bassem Mokhtar (1)

and Mohamed Eltoweissy (2)

(1)

Alexandria University, Egypt (2)

Virginia Military Institute, USA

Cloud-based monitoring and analysis of yield efficiency in precision farming ................................... 163

Li Tan and Riley Wortman

Washington State University, USA

Page 5: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

iv

SMOPD-C: An Autonomous Vertical Partitioning Technique for Distributed Databases on Cluster

Computers ...................................................................................................................................... 171

Liangzhe Li and Le Gruenwald

University of Oklahoma, USA

Session A23: Information Reuse & Extraction

Argumentation Schemes for the Reuse of Argumentation Information in Collaborative Risk

Management ................................................................................................................................... 179

Ruan C. B. Pozzebon (1)

, Luís A. L. Silva (1)

, Lisandra M. Fontoura (1)

and John A. Campbell (2)

(1)

Universidade Federal de Santa Maria, Brazil (2)

University College London, UK

SOA-GovMM: A Meta Model for a Comprehensive SOA Governance Repository ............................ 187

Jan Königsberger, Stefan Silcher and Bernhard Mitschang

University of Stuttgart, Germany

Towards Facilities to Introduce Solutions for MDE in Development Environments with Reusable

Assets ............................................................................................................................................. 195

Fabio P. Basso and Claudia M. L. Werner and Toacy C. Oliveira

Federal University of Rio de Janeiro, Brazil

Extracting control-flow from text ......................................................................................................... 203

Pol Schumacher and Mirjam Minor

D-60325 Frankfurt am Main, Germany

Session A32: Social Networks, Crowdsourcing & Multiagent Systems

Towards Model Driven Crowdsourcing: First Experiments, Methodology and Transformation ......... 211

Samyr Vale

Federal University of Maranhão, Brazil

Toward Inferring the Age of Twitter Users with their Use of Nonstandard Abbreviations and

Lexicon .......................................................................................................................................... 219

Nathaniel Moseley (1)

, Cecilia Ovesdotter Alm (1)

and Manjeet Rege (2)

(1)

Rochester Institute of Technology, USA (2)

University of St. Thomas, USA

Extracting Top-k Most Influential Nodes by Activity Analysis ............................................................ 227

Myungcheol Doo (1)

and Ling Liu (2)

(1)

Applied Research Center, Arris, USA (2)

Georgia Institute of Technology, USA

Detection of Implied Scenarios in Multiagent Systems with Clustering Agents’ Communications .... 237

Fatemeh Hendijani Fard and Behrouz H. Far

University of Calgary, Canada

Session A33: Data Analysis, Management & Integration

A value-oriented specification for weak sequencing validation ........................................................... 245

Thouraya Bouabana-Tebibel (1)

and Stuart H. Rubin (2)

(1)

Ecole nationale Supérieure d’Informatique, Algiers, Algeria (2)

SPAWAR Systems Center Pacific, San Diego, USA

Page 6: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

v

Optimizing Online Spatial Data Analysis with Sequential Query Patterns .......................................... 253

Chunqiu Zeng, Hongtai Li, Huibo Wang, Yudong Guang, Chang Liu, Tao Li, Shu-Ching Chen

and Naphtali Rishe

Florida International University, USA

Extending Automated Intelligence Systems via Graph Database : A Case Study of the

“Meth Hunter” ............................................................................................................................... 261

Mark Blair (1)

, Yunkai Liu (1)

and Theresa Vitolo (2)

(1)

DAGIR Co., USA (2)

Gannon University, USA

Mapping Specifications for Ranked Hierarchical Trees in Data Integration Systems .......................... 269

Sarfaraz Soomro, Andréa Matsunaga and José Fortes

University of Florida, USA

Session A34W: Information Reuse and Integration in Health Informatics (IRI-HI)

How Ranker and Learner Choice Affects Classification Performance on Noisy Bioinformatics

Data ................................................................................................................................................ 277

Ahmad Abu Shanab, Taghi Khoshgoftaar, Randall Wald and Amri Napolitano

Florida Atlantic University, USA

On the analysis of Alzheimer’s disease Gene Expression Dataset using Clustering and Association

Rule Mining ................................................................................................................................... 283

Benoit Le Quéau, Omair Shafiq and Reda Alhajj

University of Calgary, Canada

Towards a Technology Roadmap for Big Data Applications in the Healthcare Domain ...................... 291

Sonja Zillner (1,4)

, Heiner Oberkampf (1)

, Claudia Bretschneider (1)

, Amrapali Zaveri (3)

,

Werner Faix (4)

, Sabrina Neururer (2,5)

(1)

Siemens AG, Munich, Germany (2)

Innsbruck Medical University, Austria (3)

University Leipzig, Germany (4)

Steinbeis University, Berlin, Germany (5)

University of Innsbruck, Austria

The Effect of Noise Level and Distribution on Classification of Easy Gene Microarray Data ............ 297

Randall Wald, Taghi Khoshgoftaar and Ahmad Abu Shanab

Florida Atlantic University, USA

Session B11: Data Mining and Knowledge Discovery I

Improving the Random Forest Algorithm by Randomly Varying the Size of the Bootstrap Samples . 303

Md Nasim Adnan

Charles Sturt University, Australia

Stability of Filter- and Wrapper-based Software Metric Selection Techniques .................................... 309

Huanjing Wang (1)

, Taghi M. Khoshgoftaar (2)

and Amri Napolitano (2)

(1)

Western Kentucky University, USA (2)

Florida Atlantic University, USA

Classification Performance of Three Approaches for Combining Data Sampling and Gene

Selection on Bioinformatics Data .................................................................................................. 315

Page 7: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

vi

Taghi Khoshgoftaar, Ali Fazelpour, David Dittman and Amri Napolitano

Florida Atlantic University, USA

Data-Oriented Intelligent Transportation Systems ................................................................................ 322

Hamdy Ibrahim (1,2)

and Behrouz Far (1)

(1)

University of Calgary, Canada (2)

University of Calgary, Canada

Session B12: AI & Decision Support Systems

Any-Time Knowledge Revision ........................................................................................................... 330

Eric Gregoire

Universit´e d’Artois, France

A method for text-line segmentation for unconstrained Arabic and Persian handwritten text image .. 338

Reza Shakoori

University of Mumbai, India

Particle Swarm Optimization Protocol for Clustering in Wireless Sensor Networks: A Realistic

Approach ........................................................................................................................................ 345

Riham Elhabyan and Mustapha Yagoub

University of Ottawa, Canada

SEM² Suite - towards a Tool Suite for Supporting Knowledge Management in Situation

Awareness Systems ........................................................................................................................ 351

Andrea Salfinger (1)

, Daniel Neidhart (1)

, Werner Retschitzegger (1)

, Wieland Schwinger (1)

and Stefan Mitsch (2)

(1)

Johannes Kepler University Linz, Austria (2)

Carnegie Mellon University, USA

Session B13W: Workshop on Formal Methods Integration (FMi)

Age semantics based State Space Computation of Time Petri Nets ..................................................... 361

Abdelkrim Abdelli

USTHB University, Algeria

Proving that your Dart will Hit the Mark: An Introduction to Dart Contracts ...................................... 369

Patrice Chalin

Kansas State University, USA

Towards Ray Optics Formalization of Optical Imaging Systems ......................................................... 378

Umair Siddique and Sofiene Tahar

Concordia University, Montreal, Canada

Time properties Verification of UML/MARTE Real-Time Systems .................................................... 386

Aymen Louati (1,2)

, Kamel Barkaoui (2)

and Chadlia Jerad (1)

(1)

Tunis El Manar, Tunisie (2)

Saint-Martin, Paris, France

Session B14W: First International Workshop on Information Integration in Cyber Physical Systems (IICPS 2014)

Advancing WSN Physical Security Adopting TPM-based Architectures ............................................. 394

Page 8: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

vii

Ermanno Battista (1)

, Mario Barbareschi (1)

, Antonino Mazzeo (1)

and Sridhar Venkatesan (2)

(1)

University of Naples Federico II, Italy (2)

George Mason University, USA

A Hardware Accelerator for Data Classification within the Sensing Infrastructure ............................. 400

Mario Barbareschi (1)

, Ermanno Battista (1)

, Nicola Mazzocca (1)

and Sridhar Venkatesan (2)

(1)

University of Naples Federico II, Italy (2)

George Mason University, USA

Investigating the Feasibility of LEAP+ in ZigBee Specification ......................................................... 406

Mohammad Rezaeirad (1)

, Sahar Mazloom (1)

, Muhammad Aamir Iqbal (2)

, Dmitri Perkins (2)

and Magdy Bayoumi (2)

(1)

George Mason University, USA (2)

University of Louisiana at Lafayette, USA

A Cluster-based Key Management Framework for Resource Constraint Networks ............................ 413

Mohammad Rezaeirad (1)

, Sahar Mazloom (1)

, Mahdi Orooji (2)

, Dmitri Perkins (3)

and Magdy Bayoumi (3)

(1)

George Mason University, USA (2)

Case Western Reserve University, USA (3)

University of Louisiana at Lafayette, USA

Session B21: Data Mining and Knowledge Discovery II

Using Incremental Clustering Technique in Collaborative Filtering Data Update ............................... 420

Xiwei Wang and Jun Zhang

University of Kentucky, USA

Improving Software Quality Estimation by Combining Feature Selection Strategies with Sampled

Ensemble Learning ........................................................................................................................ 428

Taghi Khoshgoftaar (1)

, Kehan Gao (2)

and Amri Napolitano (1)

(1)

Florida Atlantic University, USA (2)

Eastern Connecticut State University, USA

Evaluating Distance Measures and Times Series Clustering for Temporal Patterns Retrieval. ............ 434

Sidahmed Benabderrahmane (1)

, René Quiniou (1)

and Thomas Guyet (2)

(1)

INRIA, Rennes, France (2)

IRISA, Rennes, France

Analyzing Immediate Correlations between Baby Names and Pop Culture in North America in

the 21st Century ............................................................................................................................. 442

Abra Gurnett, Robin Besson, Omair Shafiq, Reda Alhajj

University of Calgary, Canada

Session B22: Information Security & Privacy III

A Unification of Access Control and Data Services ............................................................................. 450

David Ferraiolo (1)

, Serban Gavrila (1)

and Wayne Jansen (2)

(1)

National Institute of Standards and Technology, USA (2)

Bayview Behavioral Consulting, USA

Real-time Anomaly Detection Over VMware Performance Data Using Storm ................................... 458

Mohiuddin Solaimani, Latifur Khan and Bhavani Thuraisingham

Page 9: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

viii

The University of Texas at Dallas, USA

A Secure two-party Password-authenticated Key Exchange protocol .................................................. 466

Maryam Saeed (1)

, Hadi Shahriar Shahhoseini (1)

, Ali Mackvandi (2)

, Mohammad Reza

Rezaeinezhad (2)

, Mansour Naddafiun (2)

and Mohammad Zare Bidoki (2)

(1)

Iran University of Science and Technology, Iran (2)

R&D Department of Pishgaman Kavir Yazd Cooperative, Iran

Session B23W: Workshop on Formal Methods Integration (FMi)

Reachability in Hierarchical Machines ................................................................................................. 475

Omer Nguena Timo (1)

, Alexandre Petrenko (1)

, Arnaud Dury (1)

and S Ramesh (2)

(1)

Computer Research Institute of Montreal, Canada (2)

GM Global R&D, USA

Formalization and analysis of Timed BPEL ......................................................................................... 483

Imed Eddine Chama, Nabil Belala and Djamel Eddine Saϊdouni

University Constantine II, Algeria

A Paradigm integration in a specification course .................................................................................. 492

Manuel A. Martins (1)

, Alexandre Madeira (2)

, Luis Barbosa (2)

and Renato Neves (2)

(1)

Univ. Aveiro, Portugal (2)

Univ. Minho, Portugal

A CEGAR Approach for the Reachability Analysis of Hybrid Sequential Function Charts ................ 500

Johanna Nellen and Erika Abraham

RWTH Aachen University, Germany

Session B24W: First International Workshop on Information Integration in Cyber Physical Systems (IICPS 2014)

Next-Generation Technologies for Preventing Accidental Death of Children Trapped in Parked

Vehicles .......................................................................................................................................... 508

Vittoria Aiello (1)

, Parnian Najafi Borazjani (2)

, Ermanno Battista (3)

and

Massimiliano Albanese (2)

(1)

R2M Innovations, USA (2)

George Mason University, USA (3)

University of Naples Federico II, Italy

Automatic Evaluation of Medical Doctors' Performances while Using a Cricothyrotomy Simulator . 514

Daniela D'Auria and Fabio Persia

University of Naples ”Federico II”, Italy

A Peer-to-Peer Network Architecture for Emerging Applications ........................................................ 520

Khondkar Islam

George Mason University, USA

Caruso: Interactive Headphones for a Dynamic 3D Audio Application in the Cultural Heritage

Context ........................................................................................................................................... 525

Daniela D'Auria, Dario Di Mauro, Davide Maria Calandra and Francesco Cutugno

University of Naples ”Federico II”, Italy

Session C11: Data Mining and Knowledge Discovery III

Page 10: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

ix

Finding the Most Evident Co-Clusters on Weblog Dataset Using Frequent Super-Sequence Mining . 529

Xinran Yu and Turgay Korkmaz

The University of Texas at San Antonio, USA

Data Integration and Clustering for Real Time Crash Prediction ......................................................... 537

Elahe Paikari, Mohammad Moshirpour, Reda Alhajj and Behrouz Far

University of Calgary, Canada

Leveraging the Web for Automating Tag Expansion for Low-Content Items ...................................... 545

Ayush Singhal and Jaideep Srivastava

University of Minnesota, USA

iSRD: Spam Review Detection with Imbalanced Data Distributions................................................... 553

Hamzah Al Najada and Xingquan Zhu

Florida Atlantic University, USA

Utilizing Concept Correlations for Effective Imbalanced Data Classification ..................................... 561

Yilin Yan (1)

, Yang Liu (1)

, Mei-Ling Shyu (1)

and Min Chen (2)

(1)

University of Miami, USA (2)

University of Washington Bothell, USA

Session C12: Knowledge Discovery & Disaster Management

Towards a Refactoring Catalogue for Knowledge Discovery Metamodel ........................................... 569

Rafael S. Durelli (1)

, Daniel San Martín (2)

, Marcio Eduardo Delamaro (1)

and Valter Camargo (2)

(1)

Universidade de S˜ao Paulo, Brazil (2)

Universidade Federal de S˜ao Carlos, Brazil

A Mapping Study on Architecture-Driven Modernization ................................................................... 577

Rafael S. Durelli (2,3)

, Daniel San Martín (1)

, Bruno Marinho (1)

, Raphael Honda (1)

,

Marcio Eduardo Delamaro (3)

, Nicolas Anquetil (2)

and Valter Camargo (1)

(1)

Universidade Federal de S˜ao Carlos, Brazil (2)

INRIA, France (3)

Universidade de S˜ao Paulo, Brazil

Generating Textual Storyline to Improve Situation Awareness in Disaster Management .................... 585

Wubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen and Ning Xie

Florida International University, USA

A Bipartite-Graph Based Approach for Disaster Susceptibility Comparisons among Cities ............... 593

Wubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen, Ning Xie and Jinpeng Wei

Florida International University, USA

Session C13W: The 3rd IEEE International Workshop on Empirical Methods for Recognizing Inference in Text (EM-RITE 2014)

Word Segmentation Refinement by Wikipedia for Textual Entailment ................................................ 600

Chuan-Jie Lin and Yu-Cheng Tu

National Taiwan Ocean University, Taiwan

Analysis of Identifying Linguistic Phenomena for Recognizing Inference in Text .............................. 607

Min-Yuh Day and Ya-Jung Wang

Tamkang University, Taiwan

Page 11: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

x

Sense Decomposition from E-HowNet for Word Similarity Measurement .......................................... 613

Cheng-Wei Shih, Yu-Lun Hsieh and Wen-Lian Hsu

Academia Sinica, Taiwan

Peer Review in Online Forums: Classifying Feedback-Sentiment ....................................................... 619

Greg Harris, Anand Panangadan and Viktor Prasanna

University of Southern California, USA

Mining the User Clusters on Facebook Fan Pages Based on Topic and Sentiment Analysis ............... 627

Kuan-Cheng Lin (1)

, Shih-Hung Wu (1)

, Liang-Pu Chen (2)

, Tsun Ku (3)

, and Gwo-Dong Chen (3)

(1)

Chaoyang University of Technology, Taiwan (2)

Institute for Information Industry, Taiwan (3)

National Central University, Taiwan

Session C14W: Workshop on Advances in Nature-Inspired Cyber Security: Science, Engineering and Economics (NatSec'2014)

Sniper: A Framework for Detecting Attack Attempts to Open Source Web Applications at the

Run Time ........................................................................................................................................ 633

Abdullah Almurayh

University of Colorado at Colorado Springs, USA

CyPhyMASC: Evolutionary Monitoring, Analysis, Sharing and Control Platform for SmartGrid

Defense .......................................................................................................................................... 639

Mohamed Azab (2,3)

and Mohamed Eltoweissy (1,3)

(1)

Virginia Military Institute, USA (2)

Alexandria, Egypt (3)

Virginia Tech, USA

THE EVOLUTION OF NETWORK BASED CYBERSECURITY NORMS: An Analytical

Narrative ........................................................................................................................................ 646

Atin Basuchoudhary (1)

and Nazli Choucri (2)

(1)

Virginia Military Institute, USA (2)

Massachusetts Institute of Technology, USA

Session C21: Data Mining and Knowledge Discovery IV

Language Independent Analysis and Classification of Discussion Threads in Coursera MOOC

Forums ........................................................................................................................................... 654

Lorenzo A. Rossi (1)

and OmprakashGnawali (2)

(1)

University of Southern California, USA (2)

University of Houston, USA

Automatically Predicting the Helpfulness of Online Reviews ............................................................. 662

Yadong Zhang and Du Zhang

California State University, Sacramento, USA

A Hidden Treasure? Evaluating and Extending Latent Methods for Link-based Classification .......... 669

Aaron Fleming, Luke McDowell and Zane Markel

U.S. Naval Academy, USA

Session C22: Geo/Medical Informatics and Multimedia Systems

Page 12: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

xi

Interpreting Medical Tables as Linked Data to Generate Meta-Analysis Reports ................................ 677

Varish Mulwad, Tim Finin and Anupam Joshi

University of Maryland, Baltimore County, USA

Understanding Implicit and Explicit Interface Tools to Perform Visual Analytics Tasks ..................... 687

Dong Hyun Jeong (1)

, Soo-Yeon Ji (2)

, Tera Greensmith (3)

, Byunggu Yu (1)

and Remco Chan (4)

(1)

University of the District of Columbia, USA (2)

Bowie State University, USA (3)

Simon Fraser University, Canada (4)

Tufts University, USA

The Power of Fear: Facial Emotion Analysis of CEOs to Forecast Firm Performance ....................... 695

Yanjia Sun, Ali Akansu and James Cicon

New Jersey Institute of Technology, USA

Designing a Two-Level Monitoring Method to Detect Network Abnormal Behaviors ........................ 703

Soo-Yeon Ji (1)

, Seonho Choi (1)

and Dong Hyun Jeong (2)

(1)

Bowie State University, USA (2)

University of the District of Columbia, USA

Session C23W: The 3rd IEEE International Workshop on Data Integration and Mining (DIM 2014)

A Proximity Measure for Link Prediction in Social User-Item Networks ............................................ 710

Chun-Hao Fu, Cheng-Shang Chang and Duan-Shin Lee

National Tsing Hua University, Taiwan

Outlier Detection based on k-Neighborhood MST ............................................................................... 718

Qingsheng Zhu, Xiaogang Fan and Ji Feng

Chongqing University, China

An Ensemble Classification Approach for Handling Spatio-Temporal Drifts in Partially Labeled

Data Streams .................................................................................................................................. 725

Tegjyot Singh Sethi, Mehmed Kantardzic, Elaheh Arabmakki and Hanquing Hu

University of Louisville, USA

Understanding Co-evolution in Large Multi-relational Social Networks ............................................. 733

Ayush Singhal, Atanu Roy and Jaideep Srivastava

University of Minnesota - Twin Cities, USA

A Sketch-based Conceptual Level Data Integration Methodology ....................................................... 741

Loredana Caruccio, Vincenzo Deufemia and Giuseppe Polese

University of Salerno, Italy

DataGopher: A context based search engine for research datasets ....................................................... 749

Ayush Singhal, Ravindra Kasturi and Jaideep Srivastava

University of Minnesota, USA

Session C31: Data Mining and Knowledge Discovery V

Rolling Window Time Series Prediction using MapReduce ................................................................. 757

Lei Li, Farzad Noorian, Duncan J.M. Moss, Philip H.W. Leong

The University of Sydney, Australia

Page 13: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

xii

Correlation-based Re-ranking for Semantic Concept Detection ........................................................... 765

Hsin-Yu Ha (1)

, Fausto C. Fleites (1)

, Shu-Ching Chen (1)

and Min Chen (2)

(1)

Florida International University, USA (2)

University of Washington Bothell, USA

Timed Sequential Pattern Mining Based on Confidence in Accumulated Intervals ............................. 771

Chichang Jou, Huan-Jyh Shyur and Chih-Yu Yen

Tamkang University, Taiwan

RLS-A Reduced Labeled Samples Approach for Streaming Imbalanced Data with Concept Drift ..... 779

Elaheh Arabmakki, Mehmed Kantardzic and Tegjyot Singh Sethi

University of Louisville, USA

Session C32: Fuzzy Systems & Heuristic Optimization

UFOM: Unified Fuzzy Ontology Matching.......................................................................................... 787

Yinuo Zhang, Anand Panangadan and Viktor Prasanna

University of Southern California, USA

Applying Pareto ant colony optimization to solve bi-objective forest transportation planning

problems ......................................................................................................................................... 795

Pengpeng Lin, Jun Zhang and Marco A Contreras

University of Kentucky, USA

Extending Modern SAT Solvers for Models Enumeration ................................................................... 803

Said Jabbour, Jerry Lonlac, Lakhdar Sais and Yakoub Salhi

University of Artois, Lens, France

Detecting Geo-spatial Weather Clusters using Dynamic Heuristic Subspaces ..................................... 811

Suman Deb Roy and Gilad Lotan

Betaworks Studio, USA

Session SP: Poster Session

Bayesian Updating for Time Series Missing Data Discovery and Uncertainty Estimation

(TSMDDUE) .................................................................................................................................. 819

Sara Aghakhani, Reda Alhajj and Philip Chang

University of Calgary, Canada

UML Activity Diagram To Event-B: A Model Transformation Approach Based on the Institution

Theory ............................................................................................................................................ 823

Amine Achouri and Jemni Ben Ayed Leila

University of Tunis, Tunisia

A Semantic Multi-Modal Information Retrieval Approach based on Linked Data to Multimedia

Convergent Environments.............................................................................................................. 830

Natasha Correia Queiroz Lino, Clauirton Siebra and Manoel De Albuquerque Lira Amaro

Federal University of Paraiba, Joao Pessoa, Brazil

Rotation Invariant Face Recognition Survey ........................................................................................ 835

Gabriel Castañeda, Taghi Khoshgoftaar and Randall Wald

Florida Atlantic University, USA

Using Document Space For Relational Search ..................................................................................... 841

Page 14: 2014 IEEE 15th International Conference on Information ...toc.proceedings.com/25543webtoc.pdfRedwood City, California, USA 13-15 August 2014 IEEE Catalog Number: ISBN: CFP14IRI-POD

xiii

Richard Drake and Ken Pu

University of Ontario Inst of Technology, Canada

An Extension to the Data-driven Ontology Evaluation ........................................................................ 845

Hlomani Hlomani and Deborah Stacey

University of Guelph, Canada

Using Feature Selection and Classification to Build Effective and Efficient Firewalls ....................... 850

Randall Wald (1)

, Flavio Villanustre (2)

, Taghi Khoshgoftaar (1)

, Richard Zuech (1)

,

Jarvis Robinson (2)

and Edin Muharemagic (2)

(1)

Florida Atlantic University, USA (2)

LexisNexis Business Information Solutions, USA

Tire-Road Friction Estimation Utilizing Smartphones ......................................................................... 855

Michael Jaynes and Ram Dantu

University of North Texas, USA

Who Wrote This Paper? Learning for Authorship De-identification Using Stylometric Featuress ...... 859

Jose Hurtado, Napat Taweewitchakreeya and Xingquan Zhu

Florida Atlantic University, USA

Automatically Classifying and Interpreting Polar Datasets with Apache Tika ..................................... 863

Ann Burgess (1)

and Chris Mattmann (2)

(1)

University of Southern California, USA (2)

California Institute of Technology, USA

Kalman-Filter Algorithm and PMUs for State Estimation of Distribution Networks .......................... 868

Faridoon Shabani, Mohanmad Vaziri, Mahdi Amini, Mahyar Zarghami and Suresh Vadhva

California State University, Sacramento, USA

Reuse and Integration of Healthcare Information for Subjects in a Clinical Trial for Treatment of

Recurrent Respiratory Papillomatosis ............................................................................................ 874

Anatoly Goldstein

Massachusetts General Hospital Center for Laryngeal Surgery and Voice Rehabilitation, USA

Author Index ...................................................................................................................................... 881