Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Databases and Information Systems

Comparison Mining From Text, Maksim Tkachenko Dec 2018

Comparison Mining From Text, Maksim Tkachenko

Dissertations and Theses Collection (Open Access)

Online product reviews are important factors of consumers' purchase decisions. They invade more and more spheres of our life, we have reviews on books, electronics, groceries, entertainments, restaurants, travel experiences, etc. More than 90 percent of consumers read online reviews before they purchase products as reported by various consumers surveys. This observation suggests that product review information enhances consumer experience and helps them to make better-informed purchase decisions. There is an enormous amount of online reviews posted on e-commerce platforms, such as Amazon, Apple, Yelp, TripAdvisor. They vary in information and may be written with different experiences and preferences.

If …


Secure Enforcement Of Isolation Policy On Multicore Platforms With Virtualization Techniques, Siqi Zhao Aug 2018

Secure Enforcement Of Isolation Policy On Multicore Platforms With Virtualization Techniques, Siqi Zhao

Dissertations and Theses Collection (Open Access)

A number of virtualization based systems have been proposed in the literature as an effective measure against the adversaries with the kernel privilege. However, under a systematic analysis, such systems exhibit vulnerabilities that can still be exploited by such an attacker with the kernel privilege. The fundamental reason is that there is an inherent incompatibility between the tamper-proof requirement and the complete mediation requirement of the reference monitor model. The incompatibility manifests in the virtualization based systems in the form of a discrepancy between the enforcement capability demanded by the high-level policy and the one achievable through the system design …


Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal Aug 2018

Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal

Dissertations and Theses Collection (Open Access)

Synergistic interactions between task/resource allocation and multi-agent coordinated planning/assignment exist in many problem domains such as trans- portation and logistics, disaster rescue, security patrolling, sensor networks, power distribution networks, etc. These domains often feature dynamic environments where allocations of tasks/resources may have complex dependencies and agents may leave the team due to unforeseen conditions (e.g., emergency, accident or violation, damage to agent, reconfiguration of environment).


Context Recovery In Location-Based Social Networks, Wen Haw Chong Jul 2018

Context Recovery In Location-Based Social Networks, Wen Haw Chong

Dissertations and Theses Collection (Open Access)

This dissertation addresses context recovery in Location-Based Social Networks (LBSN), which are platforms where users post content from various locations. With this general LBSN definition, many existing social media platforms that support user-generated location relevant content using mobile devices could also qualify as LBSNs. Context recovery for such user posts refers to recovering the venue and the semantic contexts of these user posts. Such information is useful for user profiling and to support various applications such as venue recommendation and location- based advertising.


Entity Summarization Of Reviews And Micro-Reviews, Thanh Son Nguyen May 2018

Entity Summarization Of Reviews And Micro-Reviews, Thanh Son Nguyen

Dissertations and Theses Collection (Open Access)

Along with the regular review content, there is a new type of user-generated content arising from the prevalence of mobile devices and social media, that is micro-review. Micro-reviews are bite-size reviews (usually under 200 char- acters), commonly posted on social media or check-in services, using a mobile device. They capture the immediate reaction of users, and they are rich in information, concise, and to the point. Both reviews and micro-reviews are useful for users to get to know the entity of interest, thus facilitating users in making their decision of purchasing or dining. However, the abundant number of both reviews …


Recommending Apis For Software Evolution, Ferdian Thung May 2018

Recommending Apis For Software Evolution, Ferdian Thung

Dissertations and Theses Collection (Open Access)

Softwares are constantly evolving. This evolution has been made easier through the use of Application Programming Interfaces (APIs). By leveraging APIs, developers reuse previously implemented functionalities and concentrate on writing new codes. These APIs may originate from either third parties or internally from other compo- nents of the software that are currently developed. In the first case, developers need to know how to find and use third party APIs. In the second case, developers need to be aware of internal APIs in their own software. In either case, there is often too much information to digest. For instance, finding the …


Automatic Vulnerability Detection And Repair, Siqi Ma May 2018

Automatic Vulnerability Detection And Repair, Siqi Ma

Dissertations and Theses Collection (Open Access)

Vulnerability becomes a major threat to the security of many systems, including computer systems (e.g., Windows and Linux) and mobile systems (e.g., Android and iOS). Attackers can steal private information and perform harmful actions by exploiting unpatched vulnerabilities. Vulnerabilities often remain undetected for a long time as they may not affect the typical functionalities of systems. Thus, it is important to detect and repair a vulnerability in time. However, it is often difficult for a developer to detect and repair a vulnerability correctly and timely if he/she is not a security expert. Fortunately, automatic repair approaches significantly assist developers to …