40,726 research outputs found
Towards the Automatic Classification of Documents in User-generated Classifications
There is a huge amount of information scattered on the World Wide Web. As the information flow occurs at a high speed in the WWW, there is a need to organize it in the right manner so that a user can access it very easily. Previously the organization of information was generally done manually, by matching the document contents to some pre-defined categories. There are two approaches for this text-based categorization: manual and automatic. In the manual approach, a human expert performs the classification task, and in the second case supervised classifiers are used to automatically classify resources. In a supervised classification, manual interaction is required to create some training data before the automatic classification task takes place. In our new approach, we intend to propose automatic classification of documents through semantic keywords and building the formulas generation by these keywords. Thus we can reduce this human participation by combining the knowledge of a given classification and the knowledge extracted from the data. The main focus of this PhD thesis, supervised by Prof. Fausto Giunchiglia, is the automatic classification of documents into user-generated classifications. The key benefits foreseen from this automatic document classification is not only related to search engines, but also to many other fields like, document organization, text filtering, semantic index managing
Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption
Nowadays, advanced security mechanisms exist to protect data, systems, and
networks. Most of these mechanisms are effective, and security experts can
handle them to achieve a sufficient level of security for any given system.
However, most of these systems have not been designed with focus on good
usability for the average end user. Today, the average end user often struggles
with understanding and using security mecha-nisms. Other security mechanisms
are simply annoying for end users. As the overall security of any system is
only as strong as the weakest link in this system, bad usability of IT security
mechanisms may result in operating errors, resulting in inse-cure systems.
Buying decisions of end users may be affected by the usability of security
mechanisms. Hence, software provid-ers may decide to better have no security
mechanism then one with a bad usability. Usability of IT security mechanisms is
one of the most underestimated properties of applications and sys-tems. Even IT
security itself is often only an afterthought. Hence, usability of security
mechanisms is often the after-thought of an afterthought. This paper presents
some guide-lines that should help software developers to improve end user
usability of security-related mechanisms, and analyzes com-mon applications
based on these guidelines. Based on these guidelines, the usability of email
encryption is analyzed and an email encryption solution with increased
usability is presented. The approach is based on an automated key and trust
man-agement. The compliance of the proposed email encryption solution with the
presented guidelines for usable security mechanisms is evaluated
Towards an open cloud marketplace: vision and first steps
As one of the most promising, emerging concepts in Information Technology (IT), cloud computing is transforming how IT is consumed and managed; yielding improved cost efficiencies, and delivering flexible, on-demand scalability by reducing computing infrastructures, platforms, and services to commodities acquired and paid-for on-demand through a set of cloud providers. Today, the transition of cloud computing from a subject of research and innovation to a critical infrastructure is proceeding at an incredibly fast pace. A potentially dangerous consequence of this speedy transition to practice is the premature adoption, and ossification, of the models, technologies, and standards underlying this critical infrastructure. This state of affairs is exacerbated by the fact that innovative research on production-scale platforms is becoming the purview of a small number of public cloud providers. Specifically, the academic research communities are effectively excluded from the opportunity to contribute meaningfully to the evolution not to mention innovation and healthy mutation of cloud computing technologies. As the dependence on our society and economy on cloud computing increases, so does the realization that the academic research community cannot be shut out from contributing to the design and evolution of this critical infrastructure. In this article we provide an alternative vision that of an Open Cloud eXchange (OCX) a public cloud marketplace, where many stakeholders, rather than just a single cloud provider, participate in implementing and operating the cloud, thus creating an ecosystem that will bring the innovation of a broader community to bear on a much healthier and more efficient cloud marketplace
Tortoise: Interactive System Configuration Repair
System configuration languages provide powerful abstractions that simplify
managing large-scale, networked systems. Thousands of organizations now use
configuration languages, such as Puppet. However, specifications written in
configuration languages can have bugs and the shell remains the simplest way to
debug a misconfigured system. Unfortunately, it is unsafe to use the shell to
fix problems when a system configuration language is in use: a fix applied from
the shell may cause the system to drift from the state specified by the
configuration language. Thus, despite their advantages, configuration languages
force system administrators to give up the simplicity and familiarity of the
shell.
This paper presents a synthesis-based technique that allows administrators to
use configuration languages and the shell in harmony. Administrators can fix
errors using the shell and the technique automatically repairs the higher-level
specification written in the configuration language. The approach (1) produces
repairs that are consistent with the fix made using the shell; (2) produces
repairs that are maintainable by minimizing edits made to the original
specification; (3) ranks and presents multiple repairs when relevant; and (4)
supports all shells the administrator may wish to use. We implement our
technique for Puppet, a widely used system configuration language, and evaluate
it on a suite of benchmarks under 42 repair scenarios. The top-ranked repair is
selected by humans 76% of the time and the human-equivalent repair is ranked
1.31 on average.Comment: Published version in proceedings of IEEE/ACM International Conference
on Automated Software Engineering (ASE) 201
Historical Grassland Turboveg Database Project. 2067 Relevés recorded by Dr Austin O’ Sullivan 1962 – 1982
User Guide and CD of Database are availableEnd of project reportThe more common grassland types occupy about 70% of the Irish landscape (O’Sullivan, 1982), but information on these vegetation types is rare. Generally, Irish grasslands are distinguished based on the intensity of their management (improved or semi-natural grasslands), and the drainage conditions and acidity of the soil (dry or wet, calcareous or acidic grassland types) (Fossitt, 2000). However, little is known about their floristic composition and the changes in floristic composition over time. The current knowledge on grassland vegetation is mostly based on a survey of Irish grasslands by Dr. Austin O’Sullivan completed in the 1960’s and 1970’s (O’Sullivan, 1982). In this survey O’Sullivan identified Irish grassland types in accordance with the classification of continental European grasslands based on the principles of the School of Phytosociology. O’Sullivan distinguished five main grassland types introducing agricultural criteria as well as floristic criteria into grassland classification (O’Sullivan, 1982). In 1978, O’Sullivan made an attempt at mapping Ireland’s vegetation types including the five grassland types distinguished in his later publication as well as two types of peatland vegetation (Figures 1 and 2). This map was completed using 1960’s soils maps (National Soil Survey, Teagasc, Johnstown Castle) and a subsample of the dataset on the composition of Irish grasslands. Phytosociological classification of vegetation is based on the full floristic composition of the vegetation as determined by assessing the abundance and spatial structure of the plant species in a given area. The actual area of the survey (or relevé) is determined according to strict criteria, which include how representative the sample area is for the wider vegetation (i.e. how many of the species found in the wider area are also present in the survey area).National Parks and Wildlife Service of the Department of the Environment, Heritage and Local Government, Dublin, Ireland
Hierarchical video surveillance architecture: a chassis for video big data analytics and exploration
There is increasing reliance on video surveillance systems for systematic derivation, analysis and interpretation of the data needed for predicting, planning, evaluating and implementing public safety. This is evident from the massive number of surveillance cameras deployed across public locations. For example, in July 2013, the British Security Industry Association (BSIA) reported that over 4 million CCTV cameras had been installed in Britain alone. The BSIA also reveal that only 1.5% of these are state owned. In this paper, we propose a framework that allows access to data from privately owned cameras, with the aim of increasing the efficiency and accuracy of public safety planning, security activities, and decision support systems that are based on video integrated surveillance systems. The accuracy of results obtained from government-owned public safety infrastructure would improve greatly if privately owned surveillance systems ‘expose’ relevant video-generated metadata events, such as triggered alerts and also permit query of a metadata repository. Subsequently, a police officer, for example, with an appropriate level of system permission can query unified video systems across a large geographical area such as a city or a country to predict the location of an interesting entity, such as a pedestrian or a vehicle. This becomes possible with our proposed novel hierarchical architecture, the Fused Video Surveillance Architecture (FVSA). At the high level, FVSA comprises of a hardware framework that is supported by a multi-layer abstraction software interface. It presents video surveillance systems as an adapted computational grid of intelligent services, which is integration-enabled to communicate with other compatible systems in the Internet of Things (IoT)
RRS Discovery Cruise 368, 15 Jul - 04 Aug 2011. Hydrographic measurements on WOCE line A16N
RRS Discovery Cruise 368 was a repeat occupation of part of the Atlantic hydrographic section designated by the World Ocean Circulation Experiment (WOCE) as A16N. A total of 29 CTDO (conductivity-temperature-depth-oxygen) stations were occupied. This included one test station, 27 stations between 49N and 23N on the WOCE A16N ‘20W’ line, and one final station near the ESTOC site close to Tenerife. Continuous profile measurements were CTDO and Lowered Acoustic Doppler Current Profiler (LADCP). Discrete bottle measurements from a 24-place rosette included salinity and dissolved oxygen analysed on board, and dissolved inorganic nutrients, Dissolved Inorganic Carbon and Total Alkalinity for analysis ashore. Underway measurements included Vessel-Mounted ADCP, surface ocean measurements and surface meteorology. The cruise was a UK contribution to the GO-SHIP sustained hydrography program. It was a partial repeat of the line designated in WOCE as A16N, which was previously occupied as a comprehensive cruise in 2003. In addition, a microbial program was carried out as an opportunistic activity by scientists who would remain on board for the following cruise.This report describes the methods used to acquire and process the data on board the ship during RRS Discovery Cruise 368.<br/
- …