Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2013

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 30 of 186

Full-Text Articles in Databases and Information Systems

Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz Dec 2013

Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz

Electrical and Computer Engineering Publications

: Advances in Web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This work focuses on the storage aspect of cloud computing, specifically on data management in cloud environments. Traditional relational databases were designed in a different hardware and software era and are facing challenges in meeting the performance and scale requirements of Big Data. NoSQL and NewSQL data stores present themselves as alternatives that can handle huge volume of data. Because of the …


Efficiency And Reliability Of The Transit Data Lifecycle: A Study Of Multimodal Migration, Storage, And Retrieval Techniques For Public Transit Data, Matthew Ahrens Dec 2013

Efficiency And Reliability Of The Transit Data Lifecycle: A Study Of Multimodal Migration, Storage, And Retrieval Techniques For Public Transit Data, Matthew Ahrens

Honors Program Theses and Projects

No abstract provided.


Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith Dec 2013

Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith

AFIT Patents

A method of managing patient care and emergency response following a Chemical, Biological, Radiological, or Nuclear Explosive (CBRNE) attack and maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA). The method including identifying each patient with a unique patient identifier, the identifier based upon the geospatial location of the patient, the geospatial location including at least the latitude and longitude of the patient when first treated, the unique patient identifier being part of patient data. Providing a collection point of patient data to form a patient data database where in the patient location data may be used to …


A Systems Approach To Countermeasures In Credibility Assessment Interviews, Nathan Twyman, Ryan M. Schuetzler, Jeffrey Gainer Proudfoot, Aaron Elkins Dec 2013

A Systems Approach To Countermeasures In Credibility Assessment Interviews, Nathan Twyman, Ryan M. Schuetzler, Jeffrey Gainer Proudfoot, Aaron Elkins

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Countermeasures, or techniques for hiding guilt during a credibility assessment examination, have long been an important topic in cognitive psychology and criminal justice fields. With recent IS research on automated screening systems, understanding the potential for countermeasures in this new paradigm is of increasing importance. This paper reports on a large experiment examining countermeasures in an automated deception detection screening context. The effectiveness of traditional countermeasure types (mental and physical) are examined, as well as an exploratory approach of trying several countermeasures at once. The exploratory approach was tested to investigate a proposed novel systems-inspired solution to countermeasures—triangulating on deception …


Modeling Temporal Adoptions Using Dynamic Matrix Factorization, Freddy Chong-Tat Chua, Richard Jayadi Oentaryo, Ee Peng Lim Dec 2013

Modeling Temporal Adoptions Using Dynamic Matrix Factorization, Freddy Chong-Tat Chua, Richard Jayadi Oentaryo, Ee Peng Lim

Research Collection School Of Computing and Information Systems

The problem of recommending items to users is relevant to many applications and the problem has often been solved using methods developed from Collaborative Filtering (CF). Collaborative Filtering model-based methods such as Matrix Factorization have been shown to produce good results for static rating-type data, but have not been applied to time-stamped item adoption data. In this paper, we adopted a Dynamic Matrix Factorization (DMF) technique to derive different temporal factorization models that can predict missing adoptions at different time steps in the users' adoption history. This DMF technique is an extension of the Non-negative Matrix Factorization (NMF) based on …


Dynamic Joint Sentiment-Topic Mode, Yulan He, Chenghua Lin, Wei Gao, Kam-Fai Wong Dec 2013

Dynamic Joint Sentiment-Topic Mode, Yulan He, Chenghua Lin, Wei Gao, Kam-Fai Wong

Research Collection School Of Computing and Information Systems

Social media data are produced continuously by a large and uncontrolled number of users. The dynamic nature of such data requires the sentiment and topic analysis model to be also dynamically updated, capturing the most recent language use of sentiments and topics in text. We propose a dynamic Joint Sentiment-Topic model (dJST) which allows the detection and tracking of views of current and recurrent interests and shifts in topic and sentiment. Both topic and sentiment dynamics are captured by assuming that the current sentiment-topic-specific word distributions are generated according to the word distributions at previous epochs. We study three different …


A Simple Integration Of Social Relationship And Text Data For Identifying Potential Customers In Microblogging, Guansong Pang, Shengyi Jiang, Dongyi Chen Dec 2013

A Simple Integration Of Social Relationship And Text Data For Identifying Potential Customers In Microblogging, Guansong Pang, Shengyi Jiang, Dongyi Chen

Research Collection School Of Computing and Information Systems

Identifying potential customers among a huge number of users in microblogging is a fundamental problem for microblog marketing. One challenge in potential customer detection in microblogging is how to generate an accurate characteristic description for users, i.e., user profile generation. Intuitively, the preference of a user’s friends (i.e., the person followed by the user in microblogging) is of great importance to capture the characteristic of the user. Also, a user’s self-defined tags are often concise and accurate carriers for the user’s interests. In this paper, for identifying potential customers in microblogging, we propose a method to generate user profiles via …


Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow Dec 2013

Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow

Research Collection School Of Computing and Information Systems

Simulator-based training is in constant pursuit of increasing level of realism. The transition from doctrine-driven computer-generated forces (CGF) to adaptive CGF represents one such effort. The use of doctrine-driven CGF is fraught with challenges such as modeling of complex expert knowledge and adapting to the trainees’ progress in real time. Therefore, this paper reports on how the use of adaptive CGF can overcome these challenges. Using a self-organizing neural network to implement the adaptive CGF, air combat maneuvering strategies are learned incrementally and generalized in real time. The state space and action space are extracted from the same hierarchical doctrine …


Query-Document-Dependent Fusion: A Case Study Of Multimodal Music Retrieval, Zhonghua Li, Bingjun Zhang, Yi Yu, Jialie Shen, Ye Wang Dec 2013

Query-Document-Dependent Fusion: A Case Study Of Multimodal Music Retrieval, Zhonghua Li, Bingjun Zhang, Yi Yu, Jialie Shen, Ye Wang

Research Collection School Of Computing and Information Systems

In recent years, multimodal fusion has emerged as a promising technology for effective multimedia retrieval. Developing the optimal fusion strategy for different modality (e.g. content, metadata) has been the subject of intensive research. Given a query, existing methods derive a unified fusion strategy for all documents with the underlying assumption that the relative significance of a modality remains the same across all documents. However, this assumption is often invalid. We thus propose a general multimodal fusion framework, query-document-dependent fusion (QDDF), which derives the optimal fusion strategy for each query-document pair via intelligent content analysis of both queries and documents. By …


Partial Least Squares Regression On Grassmannian Manifold For Emotion Recognition, M. Liu, R. Wang, Zhiwu Huang, S. Shan, X. Chen Dec 2013

Partial Least Squares Regression On Grassmannian Manifold For Emotion Recognition, M. Liu, R. Wang, Zhiwu Huang, S. Shan, X. Chen

Research Collection School Of Computing and Information Systems

In this paper, we propose a method for video-based human emotion recognition. For each video clip, all frames are represented as an image set, which can be modeled as a linear subspace to be embedded in Grassmannian manifold. After feature extraction, Class-specific One-to-Rest Partial Least Squares (PLS) is learned on video and audio data respectively to distinguish each class from the other confusing ones. Finally, an optimal fusion of classifiers learned from both modalities (video and audio) is conducted at decision level. Our method is evaluated on the Emotion Recognition In The Wild Challenge (EmotiW 2013). The experimental results on …


Two Formulas For Success In Social Media: Social Learning And Network Effects, Liangfei Qiu, Qian Tang, Andrew B. Whinston Dec 2013

Two Formulas For Success In Social Media: Social Learning And Network Effects, Liangfei Qiu, Qian Tang, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

This paper examines social learning and network effects that are particularly important for online videos, considering the limited marketing campaigns of user-generated content. Rather than combining both social learning and network effects under the umbrella of social contagion or peer influence, we develop a theoretical model and empirically identify social learning and network effects separately. Using a unique data set from YouTube, we find that both mechanisms have statistically and economically significant effects on video views, and which mechanism dominates depends on the specific video type.


Modeling Preferences With Availability Constraints, Bingtian Dai, Hady W. Lauw Dec 2013

Modeling Preferences With Availability Constraints, Bingtian Dai, Hady W. Lauw

Research Collection School Of Computing and Information Systems

User preferences are commonly learned from historical data whereby users express preferences for items, e.g., through consumption of products or services. Most work assumes that a user is not constrained in their selection of items. This assumption does not take into account the availability constraint, whereby users could only access some items, but not others. For example, in subscription-based systems, we can observe only those historical preferences on subscribed (available) items. However, the objective is to predict preferences on unsubscribed (unavailable) items, which do not appear in the historical observations due to their (lack of) availability. To model preferences in …


Topicsketch: Real-Time Bursty Topic Detection From Twitter, Wei Xie, Feida Zhu, Jing Jiang, Ee Peng Lim, Ke Wang Dec 2013

Topicsketch: Real-Time Bursty Topic Detection From Twitter, Wei Xie, Feida Zhu, Jing Jiang, Ee Peng Lim, Ke Wang

Research Collection School Of Computing and Information Systems

Twitter has become one of the largest platforms for users around the world to share anything happening around them with friends and beyond. A bursty topic in Twitter is one that triggers a surge of relevant tweets within a short time, which often reflects important events of mass interest. How to leverage Twitter for early detection of bursty topics has therefore become an important research problem with immense practical value. Despite the wealth of research work on topic modeling and analysis in Twitter, it remains a huge challenge to detect bursty topics in real-time. As existing methods can hardly scale …


Using Micro-Reviews To Select An Efficient Set Of Reviews, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas Nov 2013

Using Micro-Reviews To Select An Efficient Set Of Reviews, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas

Research Collection School Of Computing and Information Systems

Online reviews are an invaluable resource for web users trying to make decisions regarding products or services. However, the abundance of review content, as well as the unstructured, lengthy, and verbose nature of reviews make it hard for users to locate the appropriate reviews, and distill the useful information. With the recent growth of social networking and micro-blogging services, we observe the emergence of a new type of online review content, consisting of bite-sized, 140 character-long reviews often posted reactively on the spot via mobile devices. These micro-reviews are short, concise, and focused, nicely complementing the lengthy, elaborate, and verbose …


Efficient Index-Based Approaches For Skyline Queries In Location-Based Applications, Ken C. K. Lee, Baihua Zheng, Cindy Chen, Chi-Yin Chow Nov 2013

Efficient Index-Based Approaches For Skyline Queries In Location-Based Applications, Ken C. K. Lee, Baihua Zheng, Cindy Chen, Chi-Yin Chow

Research Collection School Of Computing and Information Systems

Enriching many location-based applications, various new skyline queries are proposed and formulated based on the notion of locational dominance, which extends conventional one by taking objects' nearness to query positions into account additional to objects' nonspatial attributes. To answer a representative class of skyline queries for location-based applications efficiently, this paper presents two index-based approaches, namely, augmented R-tree and dominance diagram. Augmented R-tree extends R-tree by including aggregated nonspatial attributes in index nodes to enable dominance checks during index traversal. Dominance diagram is a solution-based approach, by which each object is associated with a precomputed nondominance scope wherein query points …


Predicting Best Answerers For New Questions: An Approach Leveraging Topic Modeling And Collaborative Voting, Yuan Tian, Pavneet Singh Kochhar, Ee Peng Lim, Feida Zhu, David Lo Nov 2013

Predicting Best Answerers For New Questions: An Approach Leveraging Topic Modeling And Collaborative Voting, Yuan Tian, Pavneet Singh Kochhar, Ee Peng Lim, Feida Zhu, David Lo

Research Collection School Of Computing and Information Systems

Community Question Answering (CQA) sites are becoming increasingly important source of information where users can share knowledge on various topics. Although these platforms bring new opportunities for users to seek help or provide solutions, they also pose many challenges with the ever growing size of the community. The sheer number of questions posted everyday motivates the problem of routing questions to the appropriate users who can answer them. In this paper, we propose an approach to predict the best answerer for a new question on CQA site. Our approach considers both user interest and user expertise relevant to the topics …


Covariance Selection By Thresholding The Sample Correlation Matrix, Binyan Jiang Nov 2013

Covariance Selection By Thresholding The Sample Correlation Matrix, Binyan Jiang

Research Collection School Of Computing and Information Systems

This article shows that when the nonzero coefficients of the population correlation matrix are all greater in absolute value than (C1logp/n)1/2 for some constant C1, we can obtain covariance selection consistency by thresholding the sample correlation matrix. Furthermore, the rate (logp/n)1/2 is shown to be optimal.


Predicting User's Political Party Using Ideological Stances, Swapna Gottopati, Minghui Qiu, Liu Yang, Feida Zhu, Jing Jiang Nov 2013

Predicting User's Political Party Using Ideological Stances, Swapna Gottopati, Minghui Qiu, Liu Yang, Feida Zhu, Jing Jiang

Research Collection School Of Computing and Information Systems

Predicting users political party in social media has important impacts on many real world applications such as targeted advertising, recommendation and personalization. Several political research studies on it indicate that political parties’ ideological beliefs on sociopolitical issues may influence the users political leaning. In our work, we exploit users’ ideological stances on controversial issues to predict political party of online users. We propose a collaborative filtering approach to solve the data sparsity problem of users stances on ideological topics and apply clustering method to group the users with the same party. We evaluated several state-of-the-art methods for party prediction task …


Second Order Online Collaborative Filtering, Jing Lu, Steven C. H. Hoi, Jialei Wang, Peilin Zhao Nov 2013

Second Order Online Collaborative Filtering, Jing Lu, Steven C. H. Hoi, Jialei Wang, Peilin Zhao

Research Collection School Of Computing and Information Systems

Collaborative Filtering (CF) is one of the most successful learning techniques in building real-world recommender systems. Traditional CF algorithms are often based on batch machine learning methods which suffer from several critical drawbacks, e.g., extremely expensive model retraining cost whenever new samples arrive, unable to capture the latest change of user preferences over time, and high cost and slow reaction to new users or products extension. Such limitations make batch learning based CF methods unsuitable for real-world online applications where data often arrives sequentially and user preferences may change dynamically and rapidly. To address these limitations, we investigate online collaborative …


A Link-Bridged Topic Model For Cross-Domain Document Classification, Pei Yang, Wei Gao, Qi Tan, Kam-Fai Wong Nov 2013

A Link-Bridged Topic Model For Cross-Domain Document Classification, Pei Yang, Wei Gao, Qi Tan, Kam-Fai Wong

Research Collection School Of Computing and Information Systems

Transfer learning utilizes labeled data available from some related domain (source domain) for achieving effective knowledge transformation to the target domain. However, most state-of-the-art cross-domain classification methods treat documents as plain text and ignore the hyperlink (or citation) relationship existing among the documents. In this paper, we propose a novel cross-domain document classification approach called Link-Bridged Topic model (LBT). LBT consists of two key steps. Firstly, LBT utilizes an auxiliary link network to discover the direct or indirect co-citation relationship among documents by embedding the background knowledge into a graph kernel. The mined co-citation relationship is leveraged to bridge the …


Automatic Domain Identification For Linked Open Data, Sarasi Lalithsena, Pascal Hitzler, Amit P. Sheth, Prateek Jain Nov 2013

Automatic Domain Identification For Linked Open Data, Sarasi Lalithsena, Pascal Hitzler, Amit P. Sheth, Prateek Jain

Kno.e.sis Publications

Linked Open Data (LOD) has emerged as one of the largest collections of interlinked structured datasets on the Web. Although the adoption of such datasets for applications is increasing, identifying relevant datasets for a specific task or topic is still challenging. As an initial step to make such identification easier, we provide an approach to automatically identify the topic domains of given datasets. Our method utilizes existing knowledge sources, more specifically Freebase, and we present an evaluation which validates the topic domains we can identify with our system. Furthermore, we evaluate the effectiveness of identified topic domains for the purpose …


Semantics-Empowered Big Data Processing With Applications, Krishnaprasad Thirunarayan, Amit P. Sheth Nov 2013

Semantics-Empowered Big Data Processing With Applications, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

We discuss the nature of Big Data and address the role of semantics in analyzing and processing Big Data that arises in the context of Physical-Cyber-Social Systems. We organize our research around the Five Vs of Big Data, where four of the Vs are harnessed to produce the fifth V - value. To handle the challenge of Volume, we advocate semantic perception that can convert low-level observational data to higher-level abstractions more suitable for decision-making. To handle the challenge of Variety, we resort to the use of semantic models and annotations of data so that much of the intelligent processing …


A Social Network-Empowered Research Analytics Framework For Project Selection, Thushari Silva, Zhiling Guo, Jian Ma, Hongbing Jiang, Huaping Chen Nov 2013

A Social Network-Empowered Research Analytics Framework For Project Selection, Thushari Silva, Zhiling Guo, Jian Ma, Hongbing Jiang, Huaping Chen

Research Collection School Of Computing and Information Systems

Traditional approaches for research project selection by government funding agencies mainly focus on the matching of research relevance by keywords or disciplines. Other research relevant information such as social connections (e.g., collaboration and co-authorship) and productivity (e.g., quality, quantity, and citations of published journal articles) of researchers is largely ignored. To overcome these limitations, this paper proposes a social network-empowered research analytics framework (RAF) for research project selections. Scholarmate.com, a professional research social network with easy access to research relevant information, serves as a platform to build researcher profiles from three dimensions, i.e., relevance, productivity and connectivity. Building upon profiles …


Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon Nov 2013

Social Sensing For Urban Crisis Management: The Case Of Singapore Haze, Philips Kokoh Prasetyo, Ming Gao, Ee Peng Lim, Christie N. Scollon

Research Collection School Of Computing and Information Systems

Sensing social media for trends and events has become possible as increasing number of users rely on social media to share information. In the event of a major disaster or social event, one can therefore study the event quickly by gathering and analyzing social media data. One can also design appropriate responses such as allocating resources to the affected areas, sharing event related information, and managing public anxiety. Past research on social event studies using social media often focused on one type of data analysis (e.g., hashtag clusters, diffusion of events, influential users, etc.) on a single social media data …


Social Informatics, Adam Jatowt, Ee-Peng Lim, Ying Ding, Asako Miura, Taro Tezuka, Gael Dias, Katsumi Tanaka, Andrew J. Flanagin, Bing Tian Dai Nov 2013

Social Informatics, Adam Jatowt, Ee-Peng Lim, Ying Ding, Asako Miura, Taro Tezuka, Gael Dias, Katsumi Tanaka, Andrew J. Flanagin, Bing Tian Dai

Research Collection School Of Computing and Information Systems

This book constitutes the proceedings of the 5th International Conference on Social Informatics, SocInfo 2013, held in Kyoto, Japan, in November 2013. The 23 full papers, 15 short papers, and three poster papers included in this volume were carefully reviewed and selected from 103 submissions. The papers present original research work on studying the interplay between socially-centric platforms and social phenomena.


Electroweak Measurements In Electron-Positron Collisions At W-Boson-Pair Energies At Lep, S. Schael, Manoj Thulasidas Nov 2013

Electroweak Measurements In Electron-Positron Collisions At W-Boson-Pair Energies At Lep, S. Schael, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

Electroweak measurements performed with data taken at the electron–positron collider LEP at CERN from 1995 to 2000 are reported. The combined data set considered in this report corresponds to a total luminosity of about 3 fb −1 collected by the four LEP experiments ALEPH, DELPHI, L3 and OPAL, at centre-of-mass energies ranging from 130 GeV to 209 GeV. Combining the published results of the four LEP experiments, the measurements include total and differential cross-sections in photon-pair, fermion-pair and four-fermion production, the latter resulting from both double-resonant WW and ZZ production as well as singly resonant production. Total and differential cross-sections …


Why Do I Retweet It? An Information Propagation Model For Microblogs, Fabio Pezzoni, Jisun An, Andrea Passarella, Jon Crowcroft, Marco Conti Nov 2013

Why Do I Retweet It? An Information Propagation Model For Microblogs, Fabio Pezzoni, Jisun An, Andrea Passarella, Jon Crowcroft, Marco Conti

Research Collection School Of Computing and Information Systems

Microblogging platforms are Web 2.0 services that represent a suitable environment for studying how information is propagated in social networks and how users can become influential. In this work we analyse the impact of the network features and of the users' behaviour on the information diffusion. Our analysis highlights a strong relation between the level of visibility of a message in the flow of information seen by a user and the probability that the user further disseminates the message. In addition, we also highlight the existence of other latent factors that impact on the dissemination probability, correlated with the properties …


Information Vs Interaction: An Alternative User Ranking Model For Social Networks, Wei Xie, Ai Phuong Hoang, Feida Zhu, Ee Peng Lim Nov 2013

Information Vs Interaction: An Alternative User Ranking Model For Social Networks, Wei Xie, Ai Phuong Hoang, Feida Zhu, Ee Peng Lim

Research Collection School Of Computing and Information Systems

The recent years have seen an unprecedented boom of social network services, such as Twitter, which boasts over 200 million users. In such big social platforms, the influential users are ideal targets for viral marketing to potentially reach an audience of maximal size. Most proposed algorithms rely on the linkage structure of the respective underlying network to determine the information flow and hence indicate a users influence. From social interaction perspective, we built a model based on the dynamic user interactions constantly taking place on top of these linkage structures. In particular, in the Twitter setting we supposed a principle …


Upsizer: Synthetically Scaling An Empirical Relational Database, Y. C. Tay, Bing Tian Dai, Daniel T. Wang, Eldora Y. Sun, Yong Lin, Yuting Lin Nov 2013

Upsizer: Synthetically Scaling An Empirical Relational Database, Y. C. Tay, Bing Tian Dai, Daniel T. Wang, Eldora Y. Sun, Yong Lin, Yuting Lin

Research Collection School Of Computing and Information Systems

The TPC benchmarks have helped users evaluate database system performance at different scales. Although each benchmark is domain-specific, it is not equally relevant to different applications in the same domain. The present proliferation of applications also leaves many of them uncovered by the very limited number of current TPC benchmarks. There is therefore a need to develop tools for application-specific database benchmarking. This paper presents UpSizeR, a software that addresses the Dataset Scaling Problem: Given an empirical set of relational tables D and a scale factor s, generate a database state e D that is similar to D but s …


Classification In P2p Networks With Cascade Support Vendor Machines, Hock Hee Ang, Vivekanand Gopalkrishnan, Steven C. H. Hoi, Wee-Keong Ng Nov 2013

Classification In P2p Networks With Cascade Support Vendor Machines, Hock Hee Ang, Vivekanand Gopalkrishnan, Steven C. H. Hoi, Wee-Keong Ng

Research Collection School Of Computing and Information Systems

Classification in Peer-to-Peer (P2P) networks is important to many real applications, such as distributed intrusion detection, distributed recommendation systems, and distributed antispam detection. However, it is very challenging to perform classification in P2P networks due to many practical issues, such as scalability, peer dynamism, and asynchronism. This article investigates the practical techniques of constructing Support Vector Machine (SVM) classifiers in the P2P networks. In particular, we demonstrate how to efficiently cascade SVM in a P2P network with the use of reduced SVM. In addition, we propose to fuse the concept of cascade SVM with bootstrap aggregation to effectively balance the …