40,726 research outputs found

    Towards the Automatic Classification of Documents in User-generated Classifications

    Get PDF
    There is a huge amount of information scattered on the World Wide Web. As the information flow occurs at a high speed in the WWW, there is a need to organize it in the right manner so that a user can access it very easily. Previously the organization of information was generally done manually, by matching the document contents to some pre-defined categories. There are two approaches for this text-based categorization: manual and automatic. In the manual approach, a human expert performs the classification task, and in the second case supervised classifiers are used to automatically classify resources. In a supervised classification, manual interaction is required to create some training data before the automatic classification task takes place. In our new approach, we intend to propose automatic classification of documents through semantic keywords and building the formulas generation by these keywords. Thus we can reduce this human participation by combining the knowledge of a given classification and the knowledge extracted from the data. The main focus of this PhD thesis, supervised by Prof. Fausto Giunchiglia, is the automatic classification of documents into user-generated classifications. The key benefits foreseen from this automatic document classification is not only related to search engines, but also to many other fields like, document organization, text filtering, semantic index managing

    Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

    Full text link
    Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user. Today, the average end user often struggles with understanding and using security mecha-nisms. Other security mechanisms are simply annoying for end users. As the overall security of any system is only as strong as the weakest link in this system, bad usability of IT security mechanisms may result in operating errors, resulting in inse-cure systems. Buying decisions of end users may be affected by the usability of security mechanisms. Hence, software provid-ers may decide to better have no security mechanism then one with a bad usability. Usability of IT security mechanisms is one of the most underestimated properties of applications and sys-tems. Even IT security itself is often only an afterthought. Hence, usability of security mechanisms is often the after-thought of an afterthought. This paper presents some guide-lines that should help software developers to improve end user usability of security-related mechanisms, and analyzes com-mon applications based on these guidelines. Based on these guidelines, the usability of email encryption is analyzed and an email encryption solution with increased usability is presented. The approach is based on an automated key and trust man-agement. The compliance of the proposed email encryption solution with the presented guidelines for usable security mechanisms is evaluated

    Towards an open cloud marketplace: vision and first steps

    Full text link
    As one of the most promising, emerging concepts in Information Technology (IT), cloud computing is transforming how IT is consumed and managed; yielding improved cost efficiencies, and delivering flexible, on-demand scalability by reducing computing infrastructures, platforms, and services to commodities acquired and paid-for on-demand through a set of cloud providers. Today, the transition of cloud computing from a subject of research and innovation to a critical infrastructure is proceeding at an incredibly fast pace. A potentially dangerous consequence of this speedy transition to practice is the premature adoption, and ossification, of the models, technologies, and standards underlying this critical infrastructure. This state of affairs is exacerbated by the fact that innovative research on production-scale platforms is becoming the purview of a small number of public cloud providers. Specifically, the academic research communities are effectively excluded from the opportunity to contribute meaningfully to the evolution not to mention innovation and healthy mutation of cloud computing technologies. As the dependence on our society and economy on cloud computing increases, so does the realization that the academic research community cannot be shut out from contributing to the design and evolution of this critical infrastructure. In this article we provide an alternative vision that of an Open Cloud eXchange (OCX) a public cloud marketplace, where many stakeholders, rather than just a single cloud provider, participate in implementing and operating the cloud, thus creating an ecosystem that will bring the innovation of a broader community to bear on a much healthier and more efficient cloud marketplace

    A review of the state of the art in Machine Learning on the Semantic Web: Technical Report CSTR-05-003

    Get PDF

    Tortoise: Interactive System Configuration Repair

    Full text link
    System configuration languages provide powerful abstractions that simplify managing large-scale, networked systems. Thousands of organizations now use configuration languages, such as Puppet. However, specifications written in configuration languages can have bugs and the shell remains the simplest way to debug a misconfigured system. Unfortunately, it is unsafe to use the shell to fix problems when a system configuration language is in use: a fix applied from the shell may cause the system to drift from the state specified by the configuration language. Thus, despite their advantages, configuration languages force system administrators to give up the simplicity and familiarity of the shell. This paper presents a synthesis-based technique that allows administrators to use configuration languages and the shell in harmony. Administrators can fix errors using the shell and the technique automatically repairs the higher-level specification written in the configuration language. The approach (1) produces repairs that are consistent with the fix made using the shell; (2) produces repairs that are maintainable by minimizing edits made to the original specification; (3) ranks and presents multiple repairs when relevant; and (4) supports all shells the administrator may wish to use. We implement our technique for Puppet, a widely used system configuration language, and evaluate it on a suite of benchmarks under 42 repair scenarios. The top-ranked repair is selected by humans 76% of the time and the human-equivalent repair is ranked 1.31 on average.Comment: Published version in proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE) 201

    Historical Grassland Turboveg Database Project. 2067 Relevés recorded by Dr Austin O’ Sullivan 1962 – 1982

    Get PDF
    User Guide and CD of Database are availableEnd of project reportThe more common grassland types occupy about 70% of the Irish landscape (O’Sullivan, 1982), but information on these vegetation types is rare. Generally, Irish grasslands are distinguished based on the intensity of their management (improved or semi-natural grasslands), and the drainage conditions and acidity of the soil (dry or wet, calcareous or acidic grassland types) (Fossitt, 2000). However, little is known about their floristic composition and the changes in floristic composition over time. The current knowledge on grassland vegetation is mostly based on a survey of Irish grasslands by Dr. Austin O’Sullivan completed in the 1960’s and 1970’s (O’Sullivan, 1982). In this survey O’Sullivan identified Irish grassland types in accordance with the classification of continental European grasslands based on the principles of the School of Phytosociology. O’Sullivan distinguished five main grassland types introducing agricultural criteria as well as floristic criteria into grassland classification (O’Sullivan, 1982). In 1978, O’Sullivan made an attempt at mapping Ireland’s vegetation types including the five grassland types distinguished in his later publication as well as two types of peatland vegetation (Figures 1 and 2). This map was completed using 1960’s soils maps (National Soil Survey, Teagasc, Johnstown Castle) and a subsample of the dataset on the composition of Irish grasslands. Phytosociological classification of vegetation is based on the full floristic composition of the vegetation as determined by assessing the abundance and spatial structure of the plant species in a given area. The actual area of the survey (or relevé) is determined according to strict criteria, which include how representative the sample area is for the wider vegetation (i.e. how many of the species found in the wider area are also present in the survey area).National Parks and Wildlife Service of the Department of the Environment, Heritage and Local Government, Dublin, Ireland

    Hierarchical video surveillance architecture: a chassis for video big data analytics and exploration

    Get PDF
    There is increasing reliance on video surveillance systems for systematic derivation, analysis and interpretation of the data needed for predicting, planning, evaluating and implementing public safety. This is evident from the massive number of surveillance cameras deployed across public locations. For example, in July 2013, the British Security Industry Association (BSIA) reported that over 4 million CCTV cameras had been installed in Britain alone. The BSIA also reveal that only 1.5% of these are state owned. In this paper, we propose a framework that allows access to data from privately owned cameras, with the aim of increasing the efficiency and accuracy of public safety planning, security activities, and decision support systems that are based on video integrated surveillance systems. The accuracy of results obtained from government-owned public safety infrastructure would improve greatly if privately owned surveillance systems ‘expose’ relevant video-generated metadata events, such as triggered alerts and also permit query of a metadata repository. Subsequently, a police officer, for example, with an appropriate level of system permission can query unified video systems across a large geographical area such as a city or a country to predict the location of an interesting entity, such as a pedestrian or a vehicle. This becomes possible with our proposed novel hierarchical architecture, the Fused Video Surveillance Architecture (FVSA). At the high level, FVSA comprises of a hardware framework that is supported by a multi-layer abstraction software interface. It presents video surveillance systems as an adapted computational grid of intelligent services, which is integration-enabled to communicate with other compatible systems in the Internet of Things (IoT)

    RRS Discovery Cruise 368, 15 Jul - 04 Aug 2011. Hydrographic measurements on WOCE line A16N

    No full text
    RRS Discovery Cruise 368 was a repeat occupation of part of the Atlantic hydrographic section designated by the World Ocean Circulation Experiment (WOCE) as A16N. A total of 29 CTDO (conductivity-temperature-depth-oxygen) stations were occupied. This included one test station, 27 stations between 49N and 23N on the WOCE A16N ‘20W’ line, and one final station near the ESTOC site close to Tenerife. Continuous profile measurements were CTDO and Lowered Acoustic Doppler Current Profiler (LADCP). Discrete bottle measurements from a 24-place rosette included salinity and dissolved oxygen analysed on board, and dissolved inorganic nutrients, Dissolved Inorganic Carbon and Total Alkalinity for analysis ashore. Underway measurements included Vessel-Mounted ADCP, surface ocean measurements and surface meteorology. The cruise was a UK contribution to the GO-SHIP sustained hydrography program. It was a partial repeat of the line designated in WOCE as A16N, which was previously occupied as a comprehensive cruise in 2003. In addition, a microbial program was carried out as an opportunistic activity by scientists who would remain on board for the following cruise.This report describes the methods used to acquire and process the data on board the ship during RRS Discovery Cruise 368.<br/
    corecore