WEBIST 2015 Abstracts


Area 1 - Internet Technology

Full Papers
Paper Nr: 20
Title:

Model-driven Development of RESTful APIs

Authors:

Vitaliy Schreibmann and Peter Braun

Abstract: We propose a model-driven approach for creating RESTful APIs. Today, REST APIs are developed by using frameworks and libraries that support software developers on the level of the chosen programming language, i.e., a lower level of abstraction. We argue that the development process can benefit from a model-driven approach, where an API is modeled on a higher level of abstraction by using a new formal language that was designed in particular for this application domain. From this model, the source code of the API is generated automatically, along with necessary code on the business logic and database layer. The benefits of this approach include higher productivity, better maintenance, higher quality, and documentation for free.

Paper Nr: 35
Title:

O3 - A Webpage Preprocessing Tool

Authors:

Karthik Senthil, Karthik S. Bhat, Nitin Jamadagni, Sudeep Sureshan and Gaurav Prasad

Abstract: One of the prime factors for the success of the internet is determined by the time taken to load a web page. Even a difference of a few hundred milliseconds in the response time will largely affect the number of users of a web page to shift from one to the other. So, in the commercial market, providing quick service to the users is of utmost importance in remaining ahead of competitors. In this paper, we mainly address this issue by applying various optimization techniques at the front-end to improve the user experience by reducing the load time of the web pages. Though the overall optimization is purely web page-dependent, the optimization techniques not only reduce the time taken to load the page, but also reduce the load on the server.

Paper Nr: 43
Title:

Web-mediated Augmentation and Interactivity Enhancement of Omni-directional Video in Both 2D and 3D

Authors:

Maarten Wijnants, Kris Van Erum, Peter Quax and Wim Lamotte

Abstract: Video consumption has since the emergence of the medium largely been a passive affair. This paper proposes augmented Omni-Directional Video (ODV) as a novel format to engage viewers and to open up new ways of interacting with video content. Augmented ODV blends two important contemporary technologies: Augmented Video Viewing and 360 degree video. The former allows for the addition of interactive features to Web-based video playback, while the latter unlocks spatial video navigation opportunities. The augmented ODV principle is exposed to developers through a collection of standards-compliant Web interfaces, this way allowing for a wide range of usage scenarios and heterogeneous consumer profiles to be targeted in a broad spectrum of application domains. The paper covers the extensive set of technologies powering the concept, hereby addressing a variety of topics ranging from content authoring and editing to visualization and rendering. Two use case prototypes showcase the expressiveness and practical feasibility of the augmented ODV methodology, while performance evaluation results establish that the augmented ODV implementation is computationally sufficiently lightweight to warrant execution on low-cost PC hardware and even tablet devices.

Paper Nr: 88
Title:

WebCrySIL - Web Cryptographic Service Interoperability Layer

Authors:

Florian Reimair, Peter Teufl and Thomas Zefferer

Abstract: Today’s applications need to work with a heterogeneous collection of platforms. Servers, desktops, mobile devices, and web browsers share data and workload. Many of these applications handle sensitive data or even have security as their core feature. Secure messaging, password storage, encrypted cloud storage applications or alike make use of cryptographic algorithms and protocols. These algorithms and protocols require keys. The keys in turn have to be provisioned, securely stored, and shared between various devices. Unfortunately, handling the keys and the availability of cryptographic APIs evokes non-trivial challenges in current heterogeneous platform environments. Also, the implementation of APIs supporting cryptographic protocols on arbitrary platforms require significant effort, which is a major challenge when new cryptographic protocols become available. Our approach, the Crypto Service Interoperability Layer (CrySIL), enables applications to securely store/use/share key material and supports a wide range of cryptographic protocols and algorithms on heterogeneous platforms. CrySIL complements existing solutions that mitigate the aforementioned problems through central services by allowing for more flexible deployment scenarios. In this work, we explain the motivation of CrySIL, describe its architecture, highlight its deployment in a typical heterogeneous application use case and reflect on achievements and shortcomings.

Short Papers
Paper Nr: 27
Title:

A Test Environment for Web Single Page Applications (SPA)

Authors:

Hans Findel and Jaime Navon

Abstract: The architecture of web applications has evolved in the last few years. The need to provide a native-like quality user experience has forced developers to move code to the client side (JavaScript). The dramatic increase in the size of the JavaScript code was addressed first with the help of powerful libraries (jQuery) and more recently with the help of JavaScript frameworks. But although nowadays most web applications use these powerful JavaScript frameworks, there is not much information about the impact on performance that the inclusion of this additional code will produce. One possible reason is the lack of simple and flexible tools to test the application when it is actually running in a real browser. We developed a test framework and tools that allows the developer to easily put under test different implementation options. The tools are implemented as plugins for the most popular browsers so the application can run in its real environment. To validate the usefulness of the tools we performed extensive test to a 6 different implementations of a single web application. We found important performance differences across the tested frameworks. In particular, we found that the Backbone instance was faster and used fewer resources.

Paper Nr: 39
Title:

May SmartPhones Help to Maintain Audience Attention During Presentations?

Authors:

Matteo Ciman, Yari Formaggio, Ombretta Gaggi and Marco Regazzo

Abstract: In this paper we describe a new tool for interactive presentations: the speaker shows a common slideshow on the screen, and the users can see the same slide in their smartphone or tablet, independently from its model and brand. The system can be used for both on-line and on-site presentations and encourages the user to perform social activities, e. g., comment or like a slide. The author can also submit a questionnaire or a poll to the audience and see in real-time the answers. Our tool has been used during 37 different events, followed by 3753 users. We recorded the actions of the users and, depending on the different kind of events, the average of actions ranges from 1 to 8 per user per presentation. This data shows that our tool helps to increase users engagement and to maintain user attention.

Paper Nr: 46
Title:

A Flexible Architecture to Monitor Dynamic Web Services Composition

Authors:

Flavio Corradini, Francesco De Angelis, Daniele Fani' and Andrea Polini

Abstract: A Service Oriented Architecture aims to facilitate interaction of loosely coupled services in large-scale dynamic systems. Despite a decade’s active research and development, Web Services still remain undependable (Bourne et al., 2012). In literature many proposals attempt to overcome interoperability issues, particularly typical of not-orchestrated Web Service (WS) compositions. Although these techniques aid to discover potential interoperability mismatches, they do not fit well with flexibility and dynamism, desirable characteristics e.g. in choreographies. Here unsafe run-time changes may compromise a correct execution. To support such dynamism and to mitigate the effects of such failures, we propose a flexible architecture able to realize dynamic WS compositions, supporting run-time monitoring and verification techniques. The technique we chose is a novel run-time algorithm capable to predict potential failures that can happen in near future states of a choreography. It admits an integration ”a-priori” and monitors the run-time services behaviour to provide information about possible errors when these can happen.

Paper Nr: 47
Title:

Watermarking PDF Documents using Various Representations of Self-inverting Permutations

Authors:

Maria Chroni and Stavros Nikolopoulos

Abstract: Portable Document Format (PDF) documents are extensively used over the internet for information exchange and due to the ease of copying and distributing they are susceptible to threats like illegal copying, redistribution, and plagiarism. This work provides to web users copyright protection of their PDF documents by proposing efficient and easily implementable techniques for PDF watermarking; our techniques are based on the ideas of our recently proposed watermarking techniques for software, image, and audio, expanding thus the digital objects that can be efficiently watermarked through the use of self-inverting permutations. In particular, we present various representations of a self-inverting permutation p* namely 1D-representation, 2D-representation, and RPG-representation, and show that theses representations can be efficiently applied to PDF watermarking. Indeed, we first present an audio-based technique for marking a PDF document T by exploiting the 1D-representation of a permutation p*, and then, since pages of a PDF document T are 2D objects, we present an image-based algorithm for encoding p* into T by first mapping the elements of p* into a matrix A* and then using the information stored in A* to mark invisibly specific areas of PDF document T. Finally, we describe a graph-based watermarking algorithm for embedding a self-inverting permutation p* into the document structure of a PDF file T by exploiting the RPG-representation of p* and the structure of a PDF document. We have evaluated the embedding and extracting algorithms by testing them on various and different in characteristics PDF documents.

Paper Nr: 48
Title:

mPOW – Mobile Support for Health Care Students on Work Placements

Authors:

Eric Bonnici and Samia Oussena

Abstract: This paper outlines the development of a mobile application called “mPOW” as part of a KT (Knowledge Transfer) partnership project between the University of West London and Arc Technology Ltd. The aim of this project is to provide improved support for HE (Higher Education) students while on a work placement. The design considerations and solutions for designing a cross-platform application are discussed and presented, and the result is an app that is applicable to students from various universities who attend a range of distinct work placements. The application may also be used online as well as offline with the result that students are not tied down to space and time.

Paper Nr: 49
Title:

Facilitating the Reactive Web - A Condition Action System using Node.js

Authors:

Alexander Gröflin, Dominic Bosch, Martin Guggisberg and Helmar Burkhart

Abstract: The orchestration of the Web is a big issue for Web users all around the world. Web users have a high interest in services, which are able to personalise and customise the Web. However, for Web reactivity there exists only a few limited solutions that allow the aggregation of Web resources. This paper takes a look at existing event-based methods that build upon Event-Condition-Action (ECA) Rules and Complex Event Processing (CEP). Moreover, this paper illustrates the architecture of a fully functioning Condition Action System prototype for the creation of reactivity in between Web resources. In a proof of concept, we could detect and determine the change interval of electronic newspaper headlines. With the proposed system, we are able to orchestrate Web resources e.g. Detecting Web Changes.

Paper Nr: 57
Title:

Identity Management in Cloud Platforms using VOMS and SPID

Authors:

Francesco De Angelis, Fausto Marcantoni, Alberto Polzonetti and Samuele Rilli

Abstract: Cloud computing is being adopted more and more in recent years. It offers several benefits, such as high elasticity, availability and cost reduction, but yet presents some issues. Among the most important, the potential lack of security can affect the spreading of this technology. As cloud computing is pushing forward to the digital era, where users can have their own digital identity to access restricted resources or services, a reliable authentication and authorization system would attract more users to get involved in such process. This paper proposes an integration of the VOMS (Virtual Organization Membership Service) system for authorization and SPID (Sistema Pubblico per la gestione dell'Identità Digitale) system for authentication, within Cloud Foundry PaaS (Platform as a Service) model. Considerations, differences and interoperability matters will be addressed in order to provide a comprehensive scheme.

Paper Nr: 60
Title:

User Interface Design for Responsive Web Applications

Authors:

Hernán Casalánguida and Juan Eduardo Durán

Abstract: The design of web applications that adapt to different kinds of devices is now a necessity. The responsive web design (RWD) is an actual approach to this problem. There exists a large quantity of responsive frameworks (RF) for developing RWDs. In particular for the domain of Rich internet applications and for the adaptation of applications to different kinds of devices we have found a few adaptive design approaches that start with abstract user interface (UI) models; however, such approaches did not take into account the use of RFs. The problem of defining a development process from an abstract UI model to a RF is interesting due to some reasons; a good process should consider: an abstract UI model whose elements are abstractions for RF widgets, the use of tools for RFs that generate part of the final UI code, the use of model transformations to map abstract UI elements onto widgets of the RF. In this paper we created an abstract UI model called RIAAD2 that considers abstractions for all the UI elements of a selected set of RFs, and we developed a process for the creation of a final UI using a RF that considers the above requirements.

Paper Nr: 67
Title:

Towards a Comprehensive XML Benchamrk

Authors:

Fatima Al-Sedairi, Mohammed Al-Badawi and Abdallah Al-Hamdani

Abstract: XML benchmarks are tools used for measuring and evaluating the performance of new XML developments such as XML/RDBMS/OO mapping techniques and XML storages. With XML benchmarks, the evaluation process is done by executing predefined query-set over the benchmark's dataset members; where the performance of the new development is compared against the performance of some existing techniques. Yet, none of the existing XML benchmarks seems directly investigated the effect of sought data location on the query performance. This research is an attempt to investigate the rationale of adding the Data Dimension (DD) to the 3D~XBench features. To achieve this, a new set of queries was added to the query-set of the 3D~XBench to test the effect of changing the location of the sought records. The preliminarily experimental results have shown that the query execution time is also driven by the location of the sought data in the underlying XML database; and therefore, the Data Dimension can be added to the existing features of the 3D XML Benchmark.

Paper Nr: 69
Title:

SemTopMF - Prediction Recomendation by Semantic Topics Through Matrix Factorization Approach

Authors:

Nidhi Kushwaha and O. P. Vyas

Abstract: The Matrix Factorization model proved as a state of art technique in the field of Recommender Systems. The latent factors in these techniques are mathematically derived factors that are useful in terms of dimensionality reduction and sparsity removal. In this paper, we exploited the information on these latent factors in addition with semantic knowledge fetched from the DBpedia dataset to predict the movies to users, based on their selected topics in the past. We incorporate matrix factorization with the Semantic information to increase the accuracy of the recommendation and also increase the contextual information into it. For handling cold start users, we also provide an opportunity for the user, to select topics at the run time and prediction will be made according to their selection. To improve the diversity of the prediction in both the cases we also used a specific strategy for the end user recommendation.

Paper Nr: 97
Title:

Proposal of a Standard Vocabulary for Services Discovery on the Internet of Things

Authors:

Mayka de Souza Lima, Admilson de Ribamar L. Riberio and Edward David Moreno

Abstract: Internet of Things (IoT) is the paradigm that will dominate the computing world in the coming years. Thus, studies should be performed in order to ensure improvements in the search for technologies that can create new standardized semantic vocabularies to find services provided by IoT. The aim of this work is to understand the concepts of vocabularies of ontology as well as technologies that use such semantic vocabularies. Thus, it was concluded that the proposed vocabulary increase the chances of finding the IoT services, integrated with applications that work with many wireless sensor devices.

Paper Nr: 99
Title:

GoThings - An Application-layer Gateway Architecture for the Internet of Things

Authors:

Wagner Luís de A. M. Macêdo, Tarcísio da Rocha and Edward David Moreno

Abstract: With the Internet of Things (IoT), it is predicted that the number of connected devices will reach 50 billion by 2020. Many of these devices often adopt, at application layer, mutually incompatible messaging protocols. A possible solution to this problem is to use a same messaging protocol among all devices. However, a single protocol is not always suitable for both constrained and unconstrained devices. Several solutions to the interoperability issue in the IoT have been proposed, but they neither provide transparent interoperation nor are extensible and configurable enough. Meanwhile, this paper proposes GoThings, a preliminary gateway architecture which can enable interconnectivity between different messaging protocols. GoThings is focused on extensibility, configurability and generality, in the context of IoT problems.

Paper Nr: 100
Title:

Online Banking Security and Usability - Towards an Effective Evaluation Framework

Authors:

Mansour Alsaleh, Abdulrahman Alarifi, Ziyad Alshaikh and Mohammad Zarour

Abstract: Convenience and the ability to perform advanced transactions encourage banks clients to use online banking. As security and usability are two growing concerns for online banking users, banks have invested heavily in improving their web portals security and user experience and trust in them. Despite considerable efforts to evaluate particular security and usability features in online banking, a dedicated security and usability evaluation framework that can be used as a guide in online banking development remains much less explored. In this work, we first extract security and usability evaluation metrics from the conducted literature review. We then include several other evaluation metrics that were not previously identified in the literature. We argue that the proposed online banking security and usability evaluation frameworks in the literature in addition to the existing standards of security best practices (e.g., NIST and ISO) are by no means comprehensive and lack some essential and key evaluation metrics that are of particular interest to online banking portals. In order to demonstrate the inadequacy of existing frameworks, we use some frameworks to evaluate five major banks. The evaluation reveals several shortcomings in identifying both missing or incorrectly implemented security and privacy features. Our goal is to encourage other researchers to build upon our work.

Paper Nr: 102
Title:

Using Anonymous Credentials for eID Authentication in the Public Cloud

Authors:

Bernd Zwattendorfer

Abstract: Unique identification and secure authentication are important processes in several security-sensitive areas of applications such as e-Government or e-Health. Within Europe, electronic IDs (eIDs) are the means to securely support these processes. In Austria, the Austrian citizen card is used by citizens for identification and authentication at online applications. Identification in Austria is based on a special data structure including multiple personal attributes stored on the citizen card. However, in the current situation it is only possible to disclose the complete identity of a citizen and not only parts of it. To bypass this issue and to increase privacy, in this paper we propose a security architecture which uses anonymous credentials for Austrian eID authentication to enable minimum/selective disclosure. Due to the use of anonymous credentials, our proposed architecture also allows the migration of important components of the Austrian eID system into a public cloud. A public cloud deployment has several advantages, in particular with respect to scalability and cost savings. While public cloud deployment brings up new issues relating to privacy, the use of anonymous credentials can mitigate these issues as they can ensure privacy with respect to the cloud provider.

Posters
Paper Nr: 72
Title:

Composition of Web-services Based on Semantic Description

Authors:

V. V. Klimov, A. A. Chernyshov and B. A. Shchukin

Abstract: The article is devoted to problems of web-services composition based on semantic descriptions in terms of OWL-S. Mathematical model of processes is represented and the task of web-services composition is given. Several types of web-services compositions are reviewed and their set-theoretical model is presented. The article contains the example of web-services composition in case of searching weather conditions at the point of aircraft arrival, which includes sequential and conditional types of composition.

Paper Nr: 101
Title:

ETL Transformation Algorithm for Facebook Opinion Data

Authors:

Afef Walha, Faiza Ghozzi and Faiez Gargouri

Abstract: Considered as a rich source of information, social networking sites have been created lot of buzz because people share and discuss their opinions freely. Sentiment analysis is used for knowing voice or response of crowd for products, services, organizations, individuals, events, etc. Due to their importance, people opinions are analyzed in several domains including information retrieval, semantic web, text mining. These researches define new classification techniques to assign positive or negative opinion. Decisional systems like WeBhouse, known by their data-consuming must be enriched by this kind of pertinent opinions to give better help to decision makers. Nevertheless, cleaning and transformation processes recognized by several approaches as a key of WeBhouse development, don’t deal with sentiment analysis. To fulfill this gap, we propose a new analysis algorithm which determines user’s sentiment score of a post shared on the social network Facebook. This algorithm analyzes user’s opinion depending on opinion terms and emoticons included in his comments. This algorithm is integrated in transformation process of ETL approach.

Paper Nr: 103
Title:

A Type-theoretic Approach to Cloud Data Integration

Authors:

Pavel Shapkin and Gregory Pomadchin

Abstract: We propose an architecture that helps to integrate data accessible via cloud application APIs. The central part of the platform is the domain ontology which is based on type theory. Typing is used to automate the building of integration solutions as well as for automatic verification of program code and compatibility between components.

Paper Nr: 108
Title:

A Tree-based Algorithm for Ranking Web Services

Authors:

Fatma Ezzahra Gmati, Nadia Yacoubi-Ayad, Afef Bahri, Salem Chakhar and Alessio Ishizaka

Abstract: The aim of this paper is to propose a new algorithm for Web services ranking. The proposed algorithm relies on a tree data structure that is constructed based on the scores of Web services. Two types of scores are considered, which are computed by respectively selecting the edge with the minimum or the edge with the maximum weight in the matching graph. The construction of the tree requires the successive use of both scores, leading to two different versions of the tree. The final ranking is obtained by applying a pre-order traversal on the tree and picks out all leaf nodes ordered from the left to the right. The performance evaluation shows that the proposed algorithm is most often better than similar ones.

Area 2 - Web Interfaces and Applications

Full Papers
Paper Nr: 11
Title:

Enhanced Information Access to Social Streams Through Word Clouds with Entity Grouping

Authors:

Martin Leginus, Leon Derczynski and Peter Dolog

Abstract: Intuitive and effective access to large volumes of information is increasingly important. As social media explodes as a useful source of information, so are methods required to access these large volumes of user-generated content. Word clouds are an effective information access tool. However, those generated over social media data often depict redundant and mis-ranked entries. This limits the users’ ability to browse and explore datasets. This paper proposes a method for improving word cloud generation over social streams. Named entity expressions in tweets are detected, disambiguated and aggregated into entity clusters. A word cloud is generated from terms that represent the most relevant entity clusters. We find that word clouds with grouped named entities attain significantly broader coverage and significantly decreased content duplication. Further, access to relevant entries in the collection is improved. An extrinsic crowdsourced user evaluation of generated word clouds was performed. Word clouds with grouped named entities are rated as significantly more relevant and more diverse with respect to the baseline. In addition, we found that word clouds with higher levels of Mean Average Precision (MAP) are more likely to be rated by users as being relevant to the concepts reflected. Critically, this supports MAP as a tool for predicting word cloud quality without requiring a human in the loop.

Paper Nr: 40
Title:

Compatibility Modeling and Testing of REST API based on REST Chart

Authors:

Li Li and Wu Chou

Abstract: Compatibility of REST API has become an acute issue in many large scale distributed software systems where many REST APIs evolve rabidly with new services and service updates. To address this problem in a generic fashion independent of the REST API implementations, this paper presents an approach based on REST Chart, a Petri-Net based XML language and modelling framework to describe and track down the variations among REST APIs. In addition, an efficient algorithm is developed that can perform the fast model checking to determine the compatibility between two REST APIs from their REST Chart representations. Unlike conventional monolithic client architecture based backward compatibility testing approaches, REST Chart compatibility modelling is defined formally in terms of a client operational model that decomposes the client side service infrastructure into two reusable functional modules: a client oracle that selects hyperlinks to follow for a given goal, and a client agent that carries out the interaction as instructed by the oracle. A prototype system has been implemented and the preliminary experimental results show that the approach is feasible and promising.

Paper Nr: 52
Title:

Real Time Bidirectional Translator of Portuguese Sign Language

Authors:

Paula Escudeiro, Nuno Escudeiro, Rosa Reis, Pedro Rodrigues, Jorge Lopes, Marcelo Norberto, Ana Bela Baltasar, Maciel Barbosa and José Bidarra

Abstract: The communication with deaf by means of written text is not as efficient as it might seem. In fact, there is a very deep gap between sign language and spoken/written language. The deployment of tools to assist the daily communication between deaf people and the rest may be a significant contribution to the social inclusion of the deaf community. The work described in this paper addresses the development of a bidirectional translator between Portuguese Sign Language and Portuguese text and a serious game to promote the learning of the Portuguese Sign Language. The translator from sign language to text employs two devices, namely the Microsoft Kinect and 5DT Sensor Gloves in order to gather data about the motion and shape of the hands. The hands configurations are classified using Support Vector Machines. The classification of the movement and orientation of the hands is achieved through the use of Dynamic Time Warping algorithm. The translator exhibits a precision higher than 90%. In the other direction, the translation of Portuguese text to Portuguese Sign Language is supported by a 3D avatar which interprets the entered text and performs the corresponding animations. As a complement, we also present a serious game directed to assist in the difficult task of learning the Portuguese Sign Language.

Short Papers
Paper Nr: 21
Title:

Towards Conformance Testing of REST-based Web Services

Authors:

Luigi Lo Iacono and Hoai Viet Nguyen

Abstract: Despite the lack of standardisation for building REST-ful HTTP applications, the deployment of REST-based Web Services has attracted an increased interest. This gap causes, however, an ambiguous interpretation of REST and induces the design and implementation of REST-based systems following proprietary approaches instead of clear and agreed upon definitions. Issues arising from these shortcomings have an influence on service properties such as the loose coupling of REST-based services via a unitary service contract and the automatic generation of code. To overcome such limitations, at least two prerequisites are required: the availability of specifications for implementing REST-based services and auxiliaries for auditing the compliance of those services with such specifications. This paper introduces an approach for conformance testing of REST-based Web Services. This appears conflicting at the first glance, since there are no specifications available for implementing REST by, e.g., the prevalent technology set HTTP/URI to test against. Still, by providing a conformance test tool and leaning it on the current practice, the exploration of service properties is enabled. Moreover, the real demand for standardisation gets explorable by such an approach. First investigations conducted with the developed conformance test system targeting major Cloud-based storage services expose inconsistencies in many respects which emphasizes the necessity for further research and standardisation.

Paper Nr: 30
Title:

An Architecture for Dynamic and Adaptive User Activity Planning Systems

Authors:

Jaime Pavlich-Mariscal, Yolima Uribe, Luisa Fernanda Barrera-León, Nadia Alejandra Mejia-Molina, Angela Carrillo-Ramos, Alexandra Pomares Quimbaya, Rosa Maria Vicari, Ramon Fabregat and Silvia Baldiris

Abstract: A plan is an organized set of activities that are performed to achieve certain goals. Changing environments have multiple requirements: users have diverse needs and preferences, the context may be different for each user, depending on the time, location, and access devices (e.g., mobile devices, desktop computers). Above all, these types of environments have a key element in common: they require the creation of dynamic and adaptive plans, which can address different situations and provide the best set of activities for each user and context. This paper proposes an architecture for the creation of dynamic and adaptive planning systems that can address specific user needs and contexts. This specification encompasses the main components of a planning process and can be translated into more concrete implementations. As part of the validation of this approach, this paper describes the prototyping effort and an ongoing case study of an educational web application.

Paper Nr: 54
Title:

COP-VW: Cone-over-Projection Directional Model Viewer

Authors:

Jefferson Amaral da Silva and Karla Donato Fook

Abstract: An important feature for geographic systems is to identify directional relationships between objects stored in Spatial Database Management Systems (SDMS). This feature is used with other information type, such as Metric and Topological Relationships. This features group provides relative positioning between Geographical Objects in some direction, and supports decision makers job, such as to decide where setting up certain buildings, opening of access roads, and installation of transmission towers, for instance. Some approaches addresses to direction definition, but without implementation. Cone-Over-Projection Directional Model (COP Model) refines directions definition and enhances spatial queries accuracy in a significant form. The Model has a computational tool to support its application. This work presents the COP Model implementation through COP Viewer (COP-VW) application that uses Geometric Algorithms added to an SDMS located in a Web Server. Several users can access COP Model resources at different geographical locations, and different geodatabases can be available to environmental and urban planning decisions. This is a first step to migrate COP Model to mobile platform.

Paper Nr: 66
Title:

Post Processing Method that Acts on Two-dimensional Clusters of User Data to Produce Dead Bands and Improve Classification

Authors:

David Adrian Sanders and Alexander Gegov

Abstract: A post processing method is described that acts on two-dimensional clusters of data produced from a data mining system. Dead bands are automatically created that further define the clusters. This was achieved by defining data within the dead bands as NOT belonging to either cluster. The three clusters produced were definitely YES, definitely NO and a new set of DON’T KNOW. The creation of the new set improved the accuracy of decisions made about the data remaining in YES and NO clusters. The introduction of the dead bands was achieved by either setting a radius during the learning process or by setting a straight line boundary. Each radius (or line) was calculated during the learning process by considering the twodimensional position of each of the users within each cluster of dimensions. A radius line (or straight line) was then introduced so that the 80% of users within a particular dimension who were nearest to the origin (or edge) were placed into a set. The other 20% were outside the radius line (or straight line) and not recorded as being part of the set. If the two lines did not overlap, then this sometimes created a dead-band that contained users with less certain results and that in turn increased the accuracy of the other sets. Two case studies are presented as examples of that improvement.

Paper Nr: 85
Title:

MiDAS: A Model-Driven Approach for Adaptive Software

Authors:

José Bocanegra, Jaime Pavlich-Mariscal and Angela Carrillo-Ramos

Abstract: Some of the main problems in software engineering for adaptive software are: the lack of mechanisms to specify adaptive characteristics in software requirements; the difficulty to obtain a functional adaptive system based on the elicited requirements; and the need of maintaining synchronization and traceability between the requirements, design and implementation. To address the above problems, this paper proposes MiDAS, a framework that uses a model-driven approach to develop adaptive software. Specifically, MiDAS provides: (i) a new language for requirements engineering process that takes into account uncertainty in adaptive software; (ii) a method to derive concrete implementations in specific architectures supporting run-time adaptation; and, (iii) a mechanism to maintain traceability and synchronization between requirements specifications, design models and implementation architectures.

Paper Nr: 89
Title:

Content-based Image Retrieval System with Relevance Feedback

Authors:

Hanen Karamti, Mohamed Tmar and Faiez Gargouri

Abstract: In the Content-based image retrieval (CBIR) system, user can express his interest with an image to search images from large database. The retrieval technique uses only the visual contents of images. In recent years with the technological advances, there remain many challenging research problems that continue to attract researchers from multiple disciplines such as the indexing, storing and browsing in the large database. However, traditional methods of image retrieval might not be sufficiently effective when dealing these research problems. Therefore there is a need for an efficient way for facilitate to user to find his need in these large collections of images. Therefore, building a new system to retrieve images using the relevance feedback’s technique is necessary in order to deal with such problem of image retrieval. In this paper, a new CBIR system is proposed to retrieve the similar images by integrating a relevance feedback. This system can be exploited to discover a new proper query representation and to improve the relevance of the retrieved results. The results obtained by our system are illustrated through some experiments on images from the MediaEval2014 collection.

Posters
Paper Nr: 42
Title:

Development of a Design Model for Functionality and Content Access from Rich Internet Application Requirements

Authors:

Juan Eduardo Durán and Hernán Casalánguida

Abstract: We have found several methodologies for the development of rich internet applications (RIA); however, they did not give enough attention to the problem of defining both appropriate notations and adequate process for developing the user interface (UI) of functionality and content access (UIFCA). The UIFCA is important, because it concerns with the global organization/behaviour of the UI of a RIA application; the UIFCA is complex in several RIA applications due to the several tasks/workflows/business process that need to be organized/accessed, and the use of single page applications and desktop like UIs. A good model for functionality and content access (MFCA) should be expressive enough, respect some abstraction requirements, and be understandable by the client; a good process to develop a MFCA should consider the creation of parts of the MFCA by the client, its completion by analysts, its early validation by clients, and the refinement of MFCA elements. In this work, we defined a metamodel called RIAFCA for building MFCAs, and a development process involving RIAFCA respecting these requirements. The metamodel and the process are illustrated with the help of an online e-mail application case study.

Paper Nr: 61
Title:

ConvertView - A Tool for Conversion and Visualization of Open Heterogenic Governmental Data to the RDF Standard

Authors:

Clóvis H. Nascimento, Ricardo A. Afonso, Vinicius C. Garcia and Carlo M. Revoredo da Silva

Abstract: The diversity and relevance of the information made available by many governments, using the principles defined by the open data manifest, creates an opportunity for the populations aid in many fields of governmental administration, such as security, transportation, health care and education. However, most of this information was generated in unstructured digital files, making them hard to use. This paper presents an approach for the structuring of data, improving the processing and extraction of information. Thus, we created a tool based on a cloud computing environment, which has high processing and storage ability, to create files in a homogeneous and structured format, allowing for ominous and specific queries; contributing to the access of the information.

Paper Nr: 64
Title:

An Approach for Automated Service Selection and Ranking using Services Choreography

Authors:

Firmino Silva, Claudia-Melania Chituc and Paul Grefen

Abstract: In today’s highly competitive market, it is critical to provide customers services with a high level of configuration to answer their business needs. Knowing in advance the performance associated with a specific choreography of services (e.g., by taking into account the expected results of each component service) represents an important asset that allows businesses to provide a global service tailored to customers’ specific requests. This research work aims at advancing the state-of-the-art in this area by proposing an approach for service selection and ranking using services choreography, predicting the behavior of the services considering customers’ requirements and preferences, business process constraints and characteristics of the execution environment.

Paper Nr: 81
Title:

Automatic Recognition of Personality from Digital Annotations

Authors:

Nizar Omheni, Anis Kalboussi, Omar Mazhoud and Ahmed Hadj Kacem

Abstract: There is an increasing interest in understanding human perception based on reading and writing behaviours. Such researches are interested to seek knowledge of an individual’s personality as a way to predict their behaviours and preferences across different contexts and environments. Recent works show significant relation between the reader personality and his reading behaviours. Based on these findings, annotation activity is considered as potential source to predict certain personality traits of readers. In this paper, we take advantage of such theoretical works and we propose an online environment of active reading used to explore practically the utility of annotation in reflecting an accurate user personality profile. We apply the paired t-test to evaluate the system’s efficiency to measure human traits versus the scores of personality traits measured using the Neo-IPIP inventory. Our findings show plainly that some traits of users’ personalities can be predicted accurately from digital annotation traces during online reading session.

Paper Nr: 109
Title:

IXSI - Interface for X-Sharing Information

Authors:

Wolfgang Kluth, Markus C. Beutel, Sevket Gökay, Karl-Heinz Krempels, Christian Samsel and Christoph Terwelp

Abstract: The increasing demand for mobility, especially for individual transport, leads to more pollution, congested cities and shortage of parking. New ways of mobility could mitigate these issues. Unfortunately, such forms of mobility, i.e. carsharing, are usually isolated services, because of the missing integration with other mobility modes. Our aim is to offer a combination of heterogeneous services on a single platform. We argue that such an integration allows optimal offers and higher usability and therefore results with a higher acceptance among travelers. Embedding a vehicle rental system into a travel information system information-wise is a step forward. For this purpose, we developed an interface for x-sharing information, short IXSI, specialized in connecting vehicle rental systems with a travel information system. IXSI is an XML-based, B2B interface with functions for, e.g., exchanging basic vehicle data and price information. The interface enables travel information systems to perform bookings of carsharing and bikesharing vehicles and therefore allows the customer to use traditional public transport services as well as rental services seamlessly. Furthermore, we briefly present our IXSI implementations on travel information and vehicle rental system side.

Area 3 - Society, e-Business and e-Government

Full Papers
Paper Nr: 13
Title:

Effects of Task Significance, Coordination and Incentive Mechanisms on Motivation of Online Teams

Authors:

Juliana de Melo Bezerra, Lara Santos Diniz, Victor da Silva Montalvão and Celso Massaki Hirata

Abstract: Online teams are useful due to both flexibility and facility to gather resources originally dispersed. However, its intrinsic characteristic of separation in space and time imposes challenges to participation. Belief in task significance has positive effects on moving members to participate, while incentive mechanisms can be added to foster participation. Coordination is a central to a successful collaboration, since it guides members’ participation. As participation is driven by motivation, we focus on motivation. We conducted an experiment to analyze the effects on motivation of the following aspects: task significance, quality of team coordination, and usage of incentive mechanisms. We discuss the relevance of these aspects; the characteristics that make them contribute to or interfere on online motivation; as well as the interplay among the aspects that can increase or reduce the aspects’ effect.

Paper Nr: 14
Title:

AHP-based Metric for Tie Strength of Online Friendships

Authors:

Juliana de Melo Bezerra, Gabriel Marques and Celso Massaki Hirata

Abstract: Not all friends have the same importance to an individual, and even the importance of a friend can vary over time. In order to keep friends close, online relational maintenance strategies can be employed. The knowledge about the tie strength of an online relation can be useful to social, technical or commercial purposes. In this paper, we define a metric for tie strength in online friendships. We investigate variables related to friendship maintenance as well as their relative importance. Analytic Hierarchy Process (AHP) is a decision method used to find the relevance of the selected variables. We conduct experiments that show a high acceptance of the metric based on assessments of real users.

Paper Nr: 44
Title:

A Modular and Flexible Identity Management Architecture for National eID Solutions

Authors:

Thomas Lenz and Bernd Zwattendorfer

Abstract: Identification and authentication are essential processes in various areas of application where access to sensitive data needs to be protected and regulated. To achieve this, usually identity-management systems are put into place, where an identity provider manages digital identities and handles the identification and authentication process for a service provider, which hosts the protected data. Identity management is no new topic and hence several identity management systems have evolved over time. However, new rising requirements also demand modifications and improvements in the field of identity management. In particular, the need for exchanging or federating identities across domains or even borders requires new interoperable solutions and flexible identity management architectures. In this paper we present a flexible and modular identity management architecture which focuses on federation and interoperability capabilities based on plug-able components. Due to that, new arising requirements such as the support of different authentication protocols can be easily fulfilled by implementing appropriate plug-ins. Hence, our proposed architecture is especially applicable for high qualified identification systems such as national eIDs and their federation across borders. We further illustrate the applicability of our architecture by implementing it to be used as an identity provider for Austrian eGovernment applications, on the one side being applicable for national authentications and, on the other side, in a cross-border context.

Short Papers
Paper Nr: 25
Title:

Social Media Analytics in Customer Service: A Literature Overview - An Overview of Literature and Metrics Regarding Social Media Analysis in Customer Service

Authors:

Volker Stich, Roman Emonts-Holley and Roman Senderek

Abstract: The main problem with social media analytics is not the abundance of measurable metrics but the lack of a coherent structure or overview that describes and organizes metrics in order to make them useful for the customer service of organizations. Thus, this paper aims to organize and categorize key performance indicators (KPI) for social media on the one hand and provide a literature overview about social media in customer service on the other hand. The KPI are grouped into six categories customer experience, customer interaction, customer activation, customer satisfaction, reach and finance and the literature is evaluated by three criteria. The three criteria are: social metrics, multidimensional variables and evaluation of financial benefit. Our evaluation identifies a research gap in the social media applied in customer service. The first results concerning the researched KPI show that a large amount of metrics is available, but only a few of them are actually currently applied by companies to evaluate their customer service.

Paper Nr: 65
Title:

It Is Artificial Idiocy That Is Alarming, Not Artificial Intelligence

Authors:

David Sanders and Giles Tewkesbury

Abstract: Lots of people believe the brain can be simulated by machines and because brains are intelligent, simulated brains must also be intelligent; thus machines can be intelligent. This position Paper discusses whether that is true and whether we should be worried about it if it is.

Posters
Paper Nr: 78
Title:

An Individual’s Two Thinking Systems in Online C2C Auctions

Authors:

Sang Cheol Park

Abstract: With regard to dealing with an individual decision processing approach, little empirical work has been conducted to explain bidders’ behavior by adopting two thinking systems processes, such as the controlled and uncontrolled thinking systems. Therefore, this research attempts to address the two thinking system architecture of an individual’s decision in online bidding context. By constructing our research model from the perspective of two thinking systems, this study can provide an alternative theoretical lens by which online bidders may be viewed, thus bolstering our current understanding as to how willingness to continue bidding is driven.

Area 4 - Web Intelligence

Full Papers
Paper Nr: 15
Title:

The Information Value of Context for a Mobile News Service

Authors:

Toon De Pessemier, Kris Vanhecke and Luc Martens

Abstract: Traditional recommender systems provide personal suggestions based on the user’s preferences, without taking into account any additional contextual information such as time or device type. However, in many applications, this contextual information may be relevant for the human decision process, and as a result, be important to incorporate into the recommendation process, which gave rise to context-aware recommender systems. However, the information value of contextual data for the recommendation process is highly dependent on the application domain and the users’ consumption behavior in different contextual situations. This research aims to assess the information value of context for a recommender system of a mobile news service by analyzing user interactions and feedback. A large-scale user study shows that context-aware recommendations outperform traditional recommendations, but also indicates that the accuracy improvement might be limited in a real-life situation. Service usage takes place in a limited number of different contexts due to user habits and repetitive behavior, leaving little room for optimization based on the context. Data fragmentation over different contextual situations strengthens the sparsity problem, thereby limiting the user-perceived accuracy gain obtained by incorporating context in the recommender. These findings are important for news providers when considering to offer context-aware recommendations.

Paper Nr: 22
Title:

Combining Opinion Mining with Collaborative Filtering

Authors:

Manuela Angioni, Maria Laura Clemente and Franco Tuveri

Abstract: An experimental analysis of a combination of Opinion Mining and Collaborative Filtering algorithms is presented. The analysis used the Yelp dataset in order to have both the textual reviews and the star ratings provided by the users. The Opinion Mining algorithm was used to work on the textual reviews, while the Collaborative Filtering worked on the star ratings. The research activity carried out shows that most of the Yelp users provided star ratings corresponding to the related textual review, but in many cases an inconsistence was evident. A set of thresholds and coefficients were applied in order to test a hypothesis about the influence of restaurant popularity on the user ratings. Interesting results have been obtained in terms of Root Mean Squared Error (RMSE).

Paper Nr: 24
Title:

Identifying Users with Atypical Preferences to Anticipate Inaccurate Recommendations

Authors:

Benjamin Gras, Armelle Brun and Anne Boyer

Abstract: The social approach in recommender systems relies on the hypothesis that users’ preferences are coherent between users. To recommend a user some items, it uses the preferences of other users, who have preferences similar to those of this user. Although this approach has shown to produce on average high quality recommendations, which makes it the most commonly used approach, some users are not satisfied. Being able to anticipate if a recommender will provide a given user with inaccurate recommendations, would be a major advantage. Nevertheless, little attention has been paid in the literature to studying this particular point. In this work, we assume that a part of the users who are not satisfied do not respect the assumption made by the social approach of recommendation: their preferences are not coherent with those of others; they have atypical preferences. We propose measures to identify these users, upstream of the recommendation process, based on their profile only (their preferences). The experiments conducted on a state of the art corpus show that these measures allow to identify reliably a subset of users with atypical preferences, who will get inaccurate recommendations.

Paper Nr: 28
Title:

Time-aware Link Prediction in RDF Graphs

Authors:

Jaroslav Kuchař, Milan Dojchinovski and Tomas Vitvar

Abstract: When a link is not explicitly present in an RDF dataset, it does not mean that the link could not exist in reality. Link prediction methods try to overcome this problem by finding new links in the dataset with support of a background knowledge about the already existing links in the dataset. In dynamic environments that change often and evolve over time, link prediction methods should also take into account the temporal aspects of data. In this paper, we present a novel time-aware link prediction method. We model RDF data as a tensor and take into account the time when RDF data was created. We use an ageing function to model a retention of the information over the time; lower the significance of the older information and promote more recent. Our evaluation shows that the proposed method improves quality of predictions when compared with methods that do not consider the time information.

Paper Nr: 29
Title:

Review-based Entity-ranking Refinement

Authors:

Panagiotis Gourgaris, Andreas Kanavos, Christos Makris and Georgios Perrakis

Abstract: In this paper, we address the problem of entity ranking using opinions expressed in users’ reviews. There is an abundance of opinions on the web, which includes reviews of products and services. Specifically, we examine techniques which utilize clustering information, for coping with the obstacle of the entity ranking problem. Building on this framework, we propose a probabilistic network scheme that employs a topic identification method so as to modify ranking of results based on user personalization. The contribution lies in the construction of a probabilistic network which takes as input the belief of the user for each query (initially, all entities are equivalent) and produces a new ranking for the entities as output. We evaluated our implemented methodology with experiments with the OpinRank Dataset where we observed an improved retrieval performance to current re-ranking methods.

Paper Nr: 36
Title:

Extracting Representative Image from Web Page

Authors:

Najlah Gali, Andrei Tabarcea and Pasi Fränti

Abstract: A web page typically contains a blend of information. For a particular user, only informative data such as main content and representative images are considered useful, while non-informative data such as advertisements and navigational banners are not. In this work, we focus on selecting a representative image that would best represent the content of a web page. Existing techniques rely on prior knowledge of website specific templates and on text body. We extract all images, analyze and rank them according to their features and functionality in the web page. We select the highest scored image as the representative image. Our method is fully automated, template independent, and not limited to a certain type of web pages.

Paper Nr: 41
Title:

A Lightweight Approach for Extracting Product Records from the Web

Authors:

Andrea Horch, Holger Kett and Anette Weisbecker

Abstract: Gathering product records from the Web is very important to both shoppers and on-line retailers for the purpose of comparing products and prices. For consumers, the reason for doing this is to find the best price for a product, whereas on-line retailers want to compare their offers with those of their competitors in order to remain competitive. Due to the huge number and vast array of product offers in the Web an automated approach for collecting product data is needed. In this paper we propose a lightweight approach to automatically identify and extract product records from arbitrary e-shop websites. For this purpose we have adopted and extended the existing technique called Tag Path Clustering for clustering similar HTML tag paths and developed a novel filtering mechanism especially for extracting product records from websites.

Paper Nr: 50
Title:

Knowing the past to Plan for the Future - An In-depth Analysis of the First 10 Editions of the WEBIST Conference

Authors:

Giseli Rabello Lopes, Bernardo Pereira Nunes, Luiz André P. Paes Leme, Terhi Nurmikko-Fuller and Marco A. Casanova

Abstract: Over the last ten years, members of the WEBIST community have dedicated their time and efforts to face a number of research challenges, making significant advances in Information Systems and pointing to new directions for innovation and learning. After ten successful WEBIST conferences and several scientific publications, an extensive analysis of the WEBIST conferences has been carried out (involving authors, publications, conference impact, topics coverage, community analysis and other aspects) to possibly assist us to further advance Information Systems. Thus, in this paper, we present an in-depth analysis of the last ten WEBIST conferences based on social network analysis, bibliometrics and statistical measures and describe a Web-based application built on top of triplified datasets to interactively explore the findings and possibly assist the Information Systems community to reveal new directions.

Paper Nr: 51
Title:

Translation of Relational and Non-relational Databases into RDF with xR2RML

Authors:

Franck Michel, Loïc Djimenou, Catherine Faron-Zucker and Johan Montagnat

Abstract: With the growing amount of data being continuously produced, it is crucial to come up with solutions to expose data from ever more heterogeneous databases (e.g. NoSQL systems) as linked data. In this paper we present xR2RML, a language designed to describe the mapping of various types of databases to RDF. xR2RML flexibly adapts to heterogeneous query languages and data models while remaining free from any specific language or syntax. It extends R2RML, the W3C recommendation for the mapping of relational databases to RDF, and relies on RML for the handling of various data representation formats. We analyse data models of several modern databases as well as the format in which query results are returned, and we show that xR2RML can translate any data element within such results into RDF, relying on existing languages such as XPath and JSONPath if needed. We illustrate some features of xR2RML such as the generation of RDF collections and containers, and the ability to deal with mixed content.

Paper Nr: 53
Title:

User and Group Profiling in Touristic Web Portals Through Social Networks Analysis

Authors:

Silvia Rossi, Francesco Barile and Antonio Caso

Abstract: Touristic Web Portals can be considered windows on cultural cities. By providing all the necessary information in one single portal, the user is free to decide her/his preferred items/activities without the need of consulting different information sources. However, this kind of interface introduces the typical information overload problem. In this work, we present our framework for profiling both a single user and a group of users that relies on a not intrusive analysis of the users’ behaviors on social networks/media. By using data drawn from social networks, it is possible to obtain useful indirect information to profile occasional users. Moreover, the analysis of the behavior of small close groups on social networks may help an automatic system in the merge of the different preferences the users may have, simulating somehow a decision process similar to a natural interaction. In this direction, our aim is to identify key users taking in account concepts from research on users’ connectivity and on users’ communication activity.

Paper Nr: 56
Title:

STTL - A SPARQL-based Transformation Language for RDF

Authors:

Olivier Corby and Catherine Faron-Zucker

Abstract: The general research question addressed in this paper is How to transform RDF into other languages. This is of prime interest to present data selected and extracted from the Web of data in a format suitable for the user (e.g., HTML or CSV). Moreover, RDF can be viewed as a meta-model to represent on the Web of data other languages and models. The above research question then becomes How to generate the concrete syntax of expressions of a given language from their RDF representation. To answer these questions, we present SPARQL Template Transformation Language (STTL), a generic RDF transformation rule language, independent from the output language. We conceived it as a lightweight syntactic extension to SPARQL and we show how to compile it into standard SPARQL. We present a generic transformation rule engine implementing STTL and several RDF transformers we defined for various output languages, showing STTL’s expressive power.

Short Papers
Paper Nr: 18
Title:

Language Model and Clustering based Information Retrieval

Authors:

Irene Giakoumi, Christos Makris and Yiannis Plegas

Abstract: In this paper, we describe two novel frameworks for improving search results. Both of them organize relevant documents into clusters utilizing a new soft clustering method and language models. The first framework is query-independent and takes into account only the inter-document lexical or semantic similarities in order to form clusters. Also, we try to locate the duplicated content inside the formed clusters. The second framework is query-dependent and uses a query expansion technique for the cluster formation. The experimental evaluation demonstrates that the proposed method performs well in the majority of the results.

Paper Nr: 70
Title:

Humanizing the Internet of Things - Toward a Human-centered Internet-and-web of Things

Authors:

Antonio Pintus, Davide Carboni, Alberto Serra and Andrea Manchinu

Abstract: This paper envisions how the Internet of Things (IoT) complements the Internet of People to build a human-centered Internet-and-Web of Things. The Internet of Things should go beyond the Machine-to-Machine paradigm and must include people in its foundation, resulting in a “Humanized Internet of Things (H-IoT)”. Starting from a relevant work of Fiske, this paper defines how the Human-centred Internet of Things can embed the Fiske patterns in this particular domain. An analysis of some of existing IoT platforms and projects is also presented with the aim to analyse how real implementations are in the same direction of such social patterns.

Paper Nr: 73
Title:

A Language for Transforming the RDF Data on the Basis of Ontologies

Authors:

Pavel Shapkin and Leonid Shumsky

Abstract: Languages such as XSLT are used to transform XML documents based on their syntactical structure. The emergence of Semantic Web technologies brings new languages such as RDF and OWL which are able to represent the semantics of data. Currently there is no data transformation language which is capable of using this semantic information. In this paper a language is described which is aimed at transforming the RDF data. Like XSLT, it is based on templates. The transformation is driven by ontologies. Among the features of this language is the ability to check the validity of template systems, which guarantees that the transformation will terminate successfully without raising any errors. In order to prove this property the formal model of the language is studied.

Paper Nr: 75
Title:

Customer Feedback System - Evolution towards Semantically-enhanced Systems

Authors:

Oleksiy Khriyenko

Abstract: The digital economy requires services be created in nearly real time – while continuously listening to the customer. Managing and analysing the data collected about products and customers become very critical. Successful companies must collect data regarding customer behaviour in a sensible manner, understand their customers and engage in constant interaction with them. Nowadays, having a huge data storage capacity, everyone collects data and hopes that it will be useful someday. But, it is frustrating when you do not know whether something useful will come out of it. It is not a problem to collect data, but it is very difficult to analyse it. To utilize the data they collect and analyse customer feedback quickly, companies require automation of customer feedback processing. To hear a real voice of a customer, companies are trying to engage customer to the feedback provisioning process. Therefore, the paper reviews digitalized customer feedback strategies, highlights challenges of a feedback gathering and further computation. As a result, paper presents an approach for semantic enhancement of a customer feedback system.

Paper Nr: 90
Title:

Recommending Sources in News Recommender Systems

Authors:

Özlem Özgöbek, Jon Atle Gulla and R. Cenk Erdur

Abstract: Recommender systems aim to deliver the most suitable item to the user without the manual effort of the user. It is possible to see the applications of recommender systems in a lot of different domains like music, movies, shopping and news. Recommender system development have many challenges. But the dynamic and diverse environment of news domain makes news recommender systems a little bit more challenging than other domains. During the recommendation process of news articles, personalization and analysis of news content plays an important role. But beyond recommending the articles itself, we think that where the news come from is also very important. Different news sources have their own style, view and way of expression and they may give the user a complete, balanced and wide perspective of news stories. In this paper we explain the need for including news sources in news recommendation and propose a news source recommendation method by finding out the implicit relations and similarities between news sources by using semantics and association rules.

Paper Nr: 92
Title:

Web of Things in an Industrial Environment

Authors:

Leandro F. Rojas-Peña and Reinhard Langmann

Abstract: This paper summarizes the work around enhancing an existing Web-oriented Automation System (WOAS) that provides automation services; to support Virtual Devices (VD) that communicate directly with automation components like industrial controllers via Websockets. The presented architecture is a Cyber Physical System (CPS) oriented to production environments in the industry. After a short introduction a quick overview about the currently used technologies is presented. The central part of the work focuses on the implementation of the required interfaces on both sides of the system. The physical side uses a Programmable Logic Controllers (PLCs) as automation device. In the other side JavaScript and PHP are used to develop the client and server modules respectively. A simple demo application was created for the first tests and at the time, some basically delay measurements were realized.

Paper Nr: 98
Title:

Long Term Goal Oriented Recommender Systems

Authors:

Amir Hossein Nabizadeh, Alípio Mário Jorge and José Paulo Leal

Abstract: The main goal of recommender systems is to assist users in finding items of their interest in very large collections. The use of good automatic recommendation promotes customer loyalty and user satisfaction because it helps users to attain their goals. Current methods focus on the immediate value of recommendations and are evaluated as such. This is insufficient for long term goals, either defined by users or by platform managers. This is of interest in recommending learning resources to learn a target concept, and also when a company is organizing a campaign to lead users to buy certain products or moving to a different customer segment. Therefore, we believe that it would be useful to develop recommendation algorithms that promote the goals of users and platform managers (e.g. e-shop manager, e-learning tutor, ministry of culture promotor). Accordingly, we must define appropriate evaluation methodologies and demonstrate the concept on practical cases.

Paper Nr: 104
Title:

Can Social Network Be Used for Location-aware Recommendation?

Authors:

Pasi Fränti, Karol Waga and Chaitanya Khurana

Abstract: Our goal is to give recommendations for mobile users about interesting places around his current location. The only input is the user, location and time. In this work, we study whether the social network of the user can be utilized for improving recommendations. We will answer the following two questions: (1) can we measure user similarity based on their Facebook profile and location history, (2) do these imply usefulness for the recommendations.

Posters
Paper Nr: 19
Title:

User Influence and Follower Metrics in a Large Twitter Dataset

Authors:

Jari Veijalainen, Alexander Semenov and Miika Reinikainen

Abstract: Social media has become an important means to convey information. The microblogging service Twitter with about 284 million users and currently over 500 million tweets per day is an example. The site stores all the tweets once sent so that they can be retrieved later. The site has rather simple site ontology, i.e. the concepts it implements; the users are represented by a profile. They can follow other users, and a received tweet can be retweeted to all the followers of a user. In this paper we investigate diffusion of messages and influence of users on other users, mainly based on the retweet cascade size and attenuation patterns inside the cascade. We rely on a big data set collected after Boston marathon bombing on April 15, 2013. It contains about 8 million tweets and retweets sent by over 4 million different users. It was collected through the Twitter API that selects all the messages containing given keywords, including hashtags. We also collected all 7-8 billion followers of the above users during 2014. The follower relation is also used in influence estimations in some respects. The largest cascades originate from users with most followers and the cascade dies out after two or three frequency peaks.

Paper Nr: 74
Title:

ASIA - An Investigation Platform for Exploiting Open Source Information in the Fight Against Tax Evasion

Authors:

Clara Bacciu, Fabio Valsecchi, Matteo Abrate, Maurizio Tesconi and Andrea Marchetti

Abstract: Tax evasion is a widespread phenomenon confirmed by numerous European and American reports. To contrast it, governments already adopt software solutions that support tax inspectors in their investigations. However, the currently existing systems do not normally take advantage of the constant stream of data published on the Web. Instead, the ASIA project aims to prove the effectiveness of combining this kind of open source information with official data contained in Public Administration archives to fight tax evasion. Our prototype platform deals with two cases of investigation, people and businesses. Public officers have been involved throughout the project, and took part in a preliminary test phase which showed very promising results.

Paper Nr: 93
Title:

Comparing Competences on Academia and Occupational Contexts based on Similarity Measures

Authors:

Alexandra González Eras, Pablo Quezada S., Patricia Ludeña González and Carolina Gallardo

Abstract: This paper is a first contribution of a schema to match professional and work competences through similarity measures. In this contribution we focus on the determination of connections between university profiles based in standards (body of knowledge and thesauri) similarity measures and Natural Language Processing (NLP) techniques. Our first experiments proved that this hybrid schema got a promise results in the recognition of competency patterns in order to apply in the laboral context.

Paper Nr: 95
Title:

Problems and Limitations in the Design of a Web-API for IoT

Authors:

Eric Bernardes Chagas Barros, Admilson de Ribamar L. Ribeiro and Edward David Moreno

Abstract: The management of the large number of devices that exist in the IoT and wireless sensor networks can be a challenging for users, because besides these devices possess limitations of memory and processing, also have various configuration forms. Therefore, to make these self-configuring devices, the help of cloud computing can facilitate and resolve much of this challenge. Thus, this paper introduces the main problems and limitations of attempted use of Web-APIs for managing devices through its autoconfiguration.

Paper Nr: 110
Title:

A Notation for Discrimination Network Analysis

Authors:

Fabian Ohler and Christoph Terwelp

Abstract: Because of their ability to store, access, and process large amounts of data, Database Management Systems and Rule-based Systems are used in many information systems as information processing units. A basic function of a Rule-based System and a function of many Database Management Systems is to match conditions on the available data. To improve performance intermediate results are stored in Discrimination Networks. The resulting memory consumption and runtime cost depend on the structure of the Discrimination Network. A lot of research has been done in the area of optimising Discrimination Networks. In this paper we focus on re-using of network parts by multiple rule conditions. We introduce the block notation as a first step to enhance optimisation. The block notation allows for the identification of meaningful sharing constructs.

Area 5 - Mobile Information Systems

Full Papers
Paper Nr: 12
Title:

User Interaction Design for Mobile Product Recommender Systems

Authors:

Béatrice Lamche, Nada Šahinagic and Wolfgang Wörndl

Abstract: In this work we present the user interaction design process conducted for a mobile product recommender system that takes the user’s critiques into account. The main focus hereby lies on products, where the appearance is important. Smartphones reveal additional characteristics compared to desktop systems being devices that have smaller screens, a direct touch input method and can collect information about the current environment. The interaction model on which the work builds upon is focused on three key interaction activities between the user and the system: the initial preference elicitation process, the presentation of the resulting recommendations set and the preference feedback process. We conduct an interaction design process, involving work on establishing requirements, designing solutions that meet these requirements, producing an interactive prototype of the solution and finally, evaluating it in a two-step process. In total eleven designed alternatives, divided into three groups according to the interaction activities, were evaluated within a user study, showing the advantages and disadvantages of each interaction method.

Paper Nr: 80
Title:

Towards Transactional Electronic Services on Mobile End-user Devices - A Sustainable Architecture for Mobile Signature Solutions

Authors:

Thomas Zefferer

Abstract: In the European Union, transactional e-services from security-critical domains such as e-government or e-banking often require users to create legally binding electronic signatures. Currently available solutions, which enable users to create such signatures, have usually been designed for classical end-user devices such as desktop computers or laptops and cannot be applied on mobile end-user devices. This complicates a use of transactional e-services on mobile devices and excludes a growing number of users, who prefer mobile access to services. To address this problem, this paper develops a mobile signature solution that can be applied on mobile end-user devices. Possible architectures for this solution are systematically derived from a generic model first. The best alternative is subsequently determined by means of systematic assessments. This finally yields a technology-agnostic mobile signature solution that can be used as a basis for concrete implementations. By keeping the proposed solution on a rather abstract level, its validity is assured, even if available mobile technologies and the current state of the art change. This way, the proposed solution represents a sustainable basis for future signature solutions and paves the way for transactional e-services on mobile end-user devices.

Short Papers
Paper Nr: 26
Title:

Offline-provisioning and Synchronization of Content for Mobile Webapps

Authors:

Tim A. Majchrzak and Timo Hillmann

Abstract: Despite progress in the development of cross-platform frameworks, today’s apps often are realized either as native apps or as Webapps. The latter are easy to implement and rely on robust and future-proof technologies such as HTML5, Cascading Style Sheets (CSS) and JavaScript. However, Webapps commonly require a stable Internet connection. Recent developments facilitate offline-enabled Webapps. If an app is able to store data locally, it should also be enabled to synchronize with a server backend. We assess current HTML5 storage capabilities and discuss their possibilities along with considerations of mobile computing synchronization strategies. Our work includes the compilation of requirements that Webapps have regarding their offline capabilities. Moreover, we discuss the status quo of offline storage and give an outlook based on a proof-of-concept implementation.

Paper Nr: 31
Title:

Capturing Interactions in Face-To-Face Social Networks

Authors:

Francesco Ficarola and Andrea Vitaletti

Abstract: Online social networks, formed by cyber interactions between users, are nowadays explored in a number of papers. In this work, we present our experimental activity on Face-To-Face (F2F) social networks tracing physical interactions of humans in real-world scenarios. We briefly present the technologies to observe F2F social networks focusing on the SocioPatterns platform that we have employed in our real-world experiments. Motivated by the requirements of heterogeneous applications, we discuss how to tune the SocioPatterns collection protocol parameters in order to better capture fast interactions between users; carried out experiments confirm the effectiveness of such tuning.

Paper Nr: 76
Title:

Aspects of Context in Daily Search Activities - Survey about Nowadays Search Habits

Authors:

Melyara Mezzi and Nadjia Benblidia

Abstract: Over almost 70 years of perpetual improvement, Information Retrieval (IR), has had many approaches to satisfy one’s information need. In this paper, we want to put forward and measure the importance of the inclusion of a contextual dimension to enhance the relevance and effectiveness of a search task. Indeed, a search task is no more concerned with a query and a set of documents only, but it is related to a wide range of some extrinsic and intrinsic factors, so called “context”, which became a great challenge these last few years. Besides the emergence and the significance of the use of context in IR, we conducted a survey with 434 internet users to understand their search trends and habits. The results and discussion may contain valuable information for future researchers.

Paper Nr: 77
Title:

Using Wearables for Travel Assistance

Authors:

Christian Samsel, Igor Dudschenko, Wolfgang Kluth and Karl-Heinz Krempels

Abstract: In the last decade, personal mobility has become more diverse and more complex. Public transportation networks have grown bigger and new travel modes, e.g., car sharing, have emerged. Thus the required electronic travel assistance, usually provided by smartphone applications, has been well-established and is generally accepted. Unfortunately using a smartphone application to check the itinerary while travelling can be a hassle. The traveller has to pull out the device, unlock it, start the application and find the required information inside the application. In the meantime he or she is distracted which causes a loose of time and also may lead to dangerous situations, e.g., in traffic. To improve this situation we developed a smartwatch application following the Cascading Information Theory principle which assists the traveller by displaying all journey-related required information on his or her wrist and notifies him or her when necessary. The prototype of the application was evaluated in an initial user test (n = 5) and improvement compared to a single smartphone application was assessed. The evaluation results showed that users prefer a smartwatch/smartphone based solution over a pure smartphone application and are distracted for a shorter timespan.

Posters
Paper Nr: 71
Title:

Utilitarian Value and Hedonic Value of Mobile Service - Focusing on Mobile Addiction

Authors:

Soon Jae Kwon

Abstract: Mobile addiction (MA) has become more prevalent nowadays especially with the advancement of mobile services. This study is focus on studying MA in the context of users’ perceived hedonic and utilitarian values. This is done by empirically analysing the moderating effect of MA against three constructs which are users’ perceived hedonic value (PHV), perceived utilitarian value (PUV), perceived usefulness (PU) and fun experienced by using mobile service. A total of 166 participants were involved in the survey. The results showed that only the relationship between perceived hedonic value and fun was not moderated by mobile addiction. Meanwhile, the rest of the hypothesized relationships were supported.