434 research outputs found
Ontology-based explanation of classifiers
The rise of data mining and machine learning use in many applications has brought new challenges related to classification. Here, we deal with the following challenge: how to interpret and understand the reason behind a classifier's prediction. Indeed, understanding the behaviour of a classifier is widely recognized as a very important task for wide and safe adoption of machine learning and data mining technologies, especially in high-risk domains, and in dealing with bias.We present a preliminary work on a proposal of using the Ontology-Based Data Management paradigm for explaining the behavior of a classifier in terms of the concepts and the relations that are meaningful in the domain that is relevant for the classifier
A game-based learning experience for improving cybersecurity awareness
The use of videogames is an established tool to train a systematic way of thinking that allows users to learn by gaming. In this paper, to address the increasing need of awareness in cybersecurity related issues, we present the realization of a Virtual Reality (VR) videogame targeted towards educating users in the context of cybersecurity
Interaction protocols for human-driven crisis resolution processes
This work aims at providing a crisis cell with process-oriented tools to manage crisis resolutions. Indeed, the crisis cell members have to define the crisis resolution process, adapt it to face crisis evolutions, and guide its execution. Crisis resolution processes are interaction-intensive processes: they not only coordinate the performance of tasks to be undertaken on the impacted world, but they also support regulatory interactions between possibly geographically distributed crisis cell members. In order to deal with such an interweaving, this paper proposes to use Interaction Protocols to both model formal interactions and ease a cooperative adaptation and guidance of crisis resolution processes. After highlighting the benefits of Interaction Protocols to support this human and collective dimension, the paper presents a protocol meta-model for their specification. It then shows how to suitably integrate specified protocols into crisis resolution processes and how to implement this conceptual framework into a service oriented architecture
Towards a Pervasive Access Control within Video Surveillance Systems
Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013)International audienceThis paper addresses two emerging challenges that multimedia distributed systems have to deal with: the user’s constant mobility and the information’s sensitivity. The systems have to adapt, in real time, to the user’s context and situation in order to provide him with relevant results without breaking the security and privacy policies. Distributed multimedia systems, such as the oneproposed by the LINDO project, do not generally consider both issues. In this paper, we apply an access control layer on top of the LINDO architecture that takes into consideration the user’s context and situation and recommends alternative resources to the user when he is facing an important situation. The proposed solution was implemented and tested in a video surveillance use case
Emergent semantics in distributed knowledge management
Organizations and enterprises have developed complex data and information exchange systems that are now vital for their daily operations. Currently available systems, however, face a major challenge. On todays global information infrastructure, data semantics is more and more context- and time-dependent, and cannot be fixed once and for all at design time. Identifying emerging relationships among previously unrelated information items (e.g., during data interchange) may dramatically increase their business value. This chapter introduce and discuss the notion of Emergent Semantics (ES), where both the representation of semantics and the discovery of the proper interpretation of symbols are seen as the result of a selforganizing process performed by distributed agents, exchanging symbols and adaptively developing the proper interpretation via multi-party cooperation and conflict resolution. Emergent data semantics is dynamically dependent on the collective behaviour of large communities of agents, which may have different and even conflicting interests and agendas. This is a research paradigm interpreting semantics from a pragmatic prospective. The chapter introduce this notion providing a discussion on the principles, research area and current state of the art
Recommended from our members
Query Extension Suggestions for Visual Query Systems Through Ontology Projection and Indexing
Ontology-based visual query formulation is a viable alternative to textual query editors in the Semantic Web domain for extracting data from structured data sources in terms of the skills and knowledge required. A visual query system is at any moment responsible for providing the user with query extension suggestions; however, suggestions leading to empty results are often not useful. To this end, in this article, we first present an approach for projecting OWL 2 ontologies into navigation graphs to be used for query formulation and then a solution where an efficient finite index is used to calculate non-ranked approximated extension suggestions for ontology-based visual query systems using navigation graphs. The results of our experiments suggest that one can efficiently project an ontology into a navigation graph, query it for running an interactive user interface, and suggest query extensions that do not lead to dead-ends
The future of Cybersecurity in Italy: Strategic focus area
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
Towards a Pervasive Access Control within Video Surveillance Systems
This paper addresses two emerging challenges that multimedia distributed systems have to deal with: the user’s constant mobility and the information’s sensitivity. The systems have to adapt, in real time, to the user’s context and situation in order to provide him with relevant results without breaking the security and privacy policies. Distributed multimedia systems, such as the oneproposed by the LINDO project, do not generally consider both issues. In this paper, we apply an access control layer on top of the LINDO architecture that takes into consideration the user’s context and situation and recommends alternative resources to the user when he is facing an important situation. The proposed solution was implemented and tested in a video surveillance use case
Recommended from our members
Computing: report leaps geographical barriers but stumbles over gender
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/62917/1/441025a.pd
- …