Computer Science & Engineering: Recent submissions
Now showing items 461-480 of 2427
-
An Ontology-Based Context-Aware Mobile System for On-the-Move Tourists
( Springer Verlag , 2013 , Conference)Ontology-based model in context-aware systems offers more expressiveness, semantically sharing and interoperability. It supports reasoning tasks in a better way than other approaches. However, the main concern with ontology ... -
IDRISI-RA: The First Arabic Location Mention Recognition Dataset of Disaster Tweets
( Association for Computational Linguistics (ACL) , 2023 , Conference)Extracting geolocation information from social media data enables effective disaster management, as it helps response authorities; for example, in locating incidents for planning rescue activities, and affected people for ... -
Are We Ready for this Disaster? Towards Location Mention Recognition from Crisis Tweets
( Association for Computational Linguistics (ACL) , 2020 , Conference)The widespread usage of Twitter during emergencies has provided a new opportunity and timely resource to crisis responders for various disaster management tasks. Geolocation information of pertinent tweets is crucial for ... -
Overview of CheckThat! 2020 English: Automatic Identification and Verification of Claims in Social Media
( CEUR-WS , 2020 , Conference)We present an overview of the third edition of the CheckThat! Lab at CLEF 2020. The lab featured five tasks in Arabic and English, and here we focus on the three English tasks. Task 1 challenged the participants to predict ... -
ArCOV19-Rumors: Arabic COVID-19 Twitter Dataset for Misinformation Detection
( Association for Computational Linguistics (ACL) , 2021 , Conference)In this paper we introduce ArCOV19-Rumors, an Arabic COVID-19 Twitter dataset for misinformation detection composed of tweets containing claims from 27th January till the end of April 2020. We collected 138 verified claims, ... -
Overview of CheckThat! 2020 Arabic: Automatic Identification and Verification of Claims in Social Media
( CEUR-WS , 2020 , Conference)In this paper, we present an overview of the Arabic tasks of the third edition of the CheckThat! Lab at CLEF 2020. The lab featured three Arabic tasks over social media (and the Web): Task 1 on check-worthiness estimation, ... -
Overview of the CLEF-2018 CheckThat! Lab on Automatic Identification and Verification of Political Claims. Task 2: Factuality
( CEUR-WS , 2018 , Conference)We present an overview of the CLEF-2018 CheckThat! Lab on Automatic Identification and Verification of Political Claims, with focus on Task 2: Factuality. The task asked to assess whether a given check-worthy claim made ... -
Ontology-based model in tourism context-aware systems
( IEEE Computer Society , 2013 , Conference)Different approaches have been used to model contextual information in context-aware systems. Comparing to other models, ontology-based modeling offers more expressiveness, semantically sharing and interoperability. It ... -
Security Supply Chain Using UAVs: Validation and Development of a UAV-Based Model for Qatar's Mega Sporting Events
( Multidisciplinary Digital Publishing Institute (MDPI) , 2023 , Article)Unmanned aircraft vehicles (UAVs) are now used to support security precautions in search and rescue operations to track and evaluate critical services, to provide cybersecurity measures by transporting security supply chain ... -
A New Shift in Implementing Unmanned Aerial Vehicles (UAVs) in the Safety and Security of Smart Cities: A Systematic Literature Review
( Multidisciplinary Digital Publishing Institute (MDPI) , 2023 , Article Review)The rapid rise of Unmanned Aerial Vehicles (UAVs) and their integration into smart city initiatives has sparked a surge of research interest in a broad array of thematic areas. This study undertakes a comprehensive review ... -
Risk-Management Framework and Information-Security Systems for Small and Medium Enterprises (SMEs): A Meta-Analysis Approach
( Multidisciplinary Digital Publishing Institute (MDPI) , 2023 , Article)Information-technology (IT) security standards are regularly updated in a rapidly changing technological world to maintain pace with advanced technologies. This study was motivated by the realization that established IT ... -
Effective Collaboration in the Management of Access Control Policies: A Survey of Tools
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article Review)Access control (AC) tools implement security policies for controlling access to various assets, including file systems, physical resources, and social media posts. They are also used as pedagogical tools for exploring and ... -
Threat-specific security risk evaluation in the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ... -
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ... -
Interactive Graphical Access Control Tools
( IEEE Computer Society , 2023 , Conference)Access control (AC) policy creation and implementation is challenging because of its complex structure and specifications. This paper explores the potential of two novel interactive graphical displays whose design draws ... -
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
( IEEE , 2023 , Article)Data centers serve as the backbone for cloud computing, enterprise services, and infrastructure-based offerings. One area of ongoing research in data center networking focuses on innovating new topologies for large-scale ... -
Hybrid Machine Learning for Network Anomaly Intrusion Detection
( IEEE , 2020 , Conference)In this paper, a hybrid approach of combing two machine learning algorithms is proposed to detect the different possible attacks by performing effective feature selection and classification. This system uses Random Forest ... -
Machine Learning Techniques for Network Anomaly Detection: A Survey
( IEEE , 2020 , Conference)Nowadays, distributed data processing in cloud computing has gained increasing attention from many researchers. The intense transfer of data has made the network an attractive and vulnerable target for attackers to exploit ... -
Secure Wireless Sensor Networks for Anti-Jamming Strategy Based on Game Theory
( IEEE , 2023 , Conference)The Wireless Sensor Networks (WSN) are designed to remotely monitor and control specific physical or environmental conditions. However, due to the open nature of WSN, many threats and attacks may arise by malicious users ... -
Annotator rationales for labeling tasks in crowdsourcing
( Elsevier , 2020 , Article)When collecting item ratings from human judges, it can be difficult to measure and enforce data quality due to task subjectivity and lack of transparency into how judges make each rating decision. To address this, we ...