Distributed Systems

2014


  1. Computing a Second Opinion: Automated Reasoning and Statistical Inference applied to Medical Data (), Rijksuniversiteit Groningen, .

    BibTeX



    url
  2. From the Grid to the Smart Grid, Topologically (), Rijksuniversiteit Groningen, .

    BibTeX



    url
  3. Dynamic Rule-Based Reasoning in Smart Environments (), Rijksuniversiteit Groningen, .

    BibTeX



    url
  4. Bringing adaptiveness & resilience to e-health (, and ), Chapter in (N. Suri, G. Cabri, eds.), Auerbach Publication, CRC Press (Taylor + Francis Group), .

    BibTeX



  5. The Impact of Topology on Energy Consumption for Collection Tree Protocols: An Experimental Assessment through Evolutionary Computation (, , and ), In Applied Soft Computing, volume 16, .

    BibTeX



    urldoi
  6. Smart Education Modes and E-Learning Market: The Needs of the Next Generation (), In Smart Learning Environments Journal, The State of the Art in Smart Learning Issue, Springer, .

    BibTeX



  7. Leefplezier: Personalized Well-being (, , and ), In IEEE Intelligent Informatics Bulletin, volume 15, .

    BibTeX



    url
  8. Power Grid Complex Network Evolutions for the Smart Grid ( and ), In Physica A: Statistical Mechanics and its Applications, volume 396, .

    BibTeX



    url
  9. Generating Realistic Dynamic Prices and Services for the Smart Grid ( and ), In IEEE Systems Journal, volume 9, .

    BibTeX



  10. E-Mental Health Self-Management for Psychotic Disorders: State of the Art and Future Perspectives (, , , and ), In Psychiatric Services, volume 65, .

    BibTeX



    url
  11. Automated Runtime Repair of Business Processes (, , , and ), In Inf. Syst., volume 39, .

    BibTeX



    url
  12. Dynamic Constraint Satisfaction with Space Reduction in Smart Environments ( and ), In International Journal on Artificial Intelligence Tools, volume 23, .

    BibTeX



    url
  13. Self-healing protocols for infrastructural networks (, , and ), In International Conference on Critical Information Infrastructures Security, .

    BibTeX



  14. The Tradeoffs between Data Delivery Ratio and Energy Costs in Wireless Sensor Networks: A Multi-Objective Evolutionary Framework for Protocol Analysis (, , and ), In Genetic and Evolutionary Computation Conferenc, .

    BibTeX



    url
  15. E-learning Quality Assurance Practices and Benchmarks in Higher Education (), In World Conference on Educational Media and Technology, .

    BibTeX



    url
  16. HowNutsAreTheDutch: Personalized feedback on a national scale (, , , , , , , , , , and ), In AAAI Fall Symposium on Expanding the Boundaries of Health Informatics Using AI, .

    BibTeX



    url
  17. Leefplezier: Personalized well-being (, , and ), In Doctoral Consortium of the IEEE International Conference on Healthcare Informatics, .

    BibTeX



  18. Gamification in a Consulting Company (, and ), In 7th GI Workshop on Autonomous Systems, .

    BibTeX



  19. GreenMind - An Architecture and Realization for Energy Smart Buildings (, , and ), In International Conference on ICT for Sustainability, .

    BibTeX



    url
  20. Network Disruption and Recovery: Co-Evolution of Defender and Attacker in a Dynamic Game (, , , and ), In CompleNet 2014 5th Workshop on Complex Networks, .

    BibTeX



    url
  21. Predicting New Collaborations in Academic Citation Networks of IEEE and ACM Conferences (, , , , , , , and ), In International Conference on Social Computing, .

    Abstract

    In this paper we study the time evolution of academic collaboration networks by predicting the appearance of new links between authors. The accurate prediction of new collaborations between members of a collaboration network can help accelerate the realization of new synergies, foster innovation, and raise productivity. For this study, the authors collected a large data set of publications from 630 conferences of the IEEE and ACM of more than 257, 000 authors, 61, 000 papers, capturing more than 818, 000 collaborations spanning a period of 10 years. The data set is rich in semantic data that allows exploration of many features that were not considered in previous approaches. We considered a comprehensive set of 98 features, and after processing identified eight features as significant. Most significantly, we identified two new features as most significant predictors of future collaborations; 1) the number of common title words, and 2) number of common references in two authors’ papers. The link prediction problem is formulated as a binary classification problem, and three different supervised learning algorithms are evaluated, i.e. Na¨ıve Bayes, C4.5 decision tree and Support Vector Machines. Extensive efforts are made to ensure complete spatial isolation of information used in training and test instances, which to the authors’ best knowledge is unprecedented. Results were validated using a modified form of the classic 10-fold cross validation (the change was necessitated by the way training, and test instances were separated). The Support Vector Machine classifier performed the best among tested approaches, and correctly classified on average more than 80% of test instances and had a receiver operating curve (ROC) area of greater than 0.80.


    BibTeX



    url
  22. Utility-Based HTN Planning ( and ), In European Conference on Artificial Intelligence, .

    BibTeX



    url
  23. Spatial optimality in power distribution networks ( and ), In IEEE Complexity in Engineering Workshop, .

    BibTeX



    url
  24. The Smart Grid's Data Generating Potentials ( and ), In Federated Conference on Computer Science and Information Systems, .

    BibTeX



    url
  25. Towards a Robustness Evaluation Framework for BPEL Engines (, , and ), In International Conference on Service Oriented Computing & Applications, .

    BibTeX



    url
  26. Breaching IM Session Privacy Using Causality (, , , , , , , and ), In Global Communications Conference, .

    Abstract

    The breach of privacy in encrypted instant messenger (IM) service is a serious threat to user anonymity. Performance of previous de-anonymization strategies was limited to 65%. We perform network de-anonymization by taking advantage of the cause-effect relationship between sent and received packet streams and demonstrate this approach on a data set of Yahoo! IM service traffic traces. An investigation of various measures of causality shows that IM networks can be breached with a hit rate of 99%. A KCI Causality based approach alone can provide a true positive rate of about 97%. Individual performances of Granger, Zhang and IGCI causality are limited owing to the very low SNR of packet traces and variable network delays.


    BibTeX



    urldoi
  27. Itemset-based Mining of Constraints for Enacting Smart Environments (, , and ), In Symposium on Activity and Context Modeling and Recognition, .

    BibTeX



    url