0% found this document useful (0 votes)
12 views89 pages

Future Data and Security Engineering 5th International Conference FDSE 2018 Ho Chi Minh City Vietnam November 28 30 2018 Proceedings Tran Khanh Dang PDF Download

The document presents the proceedings of the 5th International Conference on Future Data and Security Engineering (FDSE 2018) held in Ho Chi Minh City, Vietnam, from November 28 to 30, 2018. It includes accepted contributions from 122 submitted papers, with 35 accepted after a rigorous peer-review process, covering various topics in data and security engineering. The proceedings are published in the Lecture Notes in Computer Science series by Springer and feature keynote speeches from renowned scholars in the field.

Uploaded by

gbewneg809
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views89 pages

Future Data and Security Engineering 5th International Conference FDSE 2018 Ho Chi Minh City Vietnam November 28 30 2018 Proceedings Tran Khanh Dang PDF Download

The document presents the proceedings of the 5th International Conference on Future Data and Security Engineering (FDSE 2018) held in Ho Chi Minh City, Vietnam, from November 28 to 30, 2018. It includes accepted contributions from 122 submitted papers, with 35 accepted after a rigorous peer-review process, covering various topics in data and security engineering. The proceedings are published in the Lecture Notes in Computer Science series by Springer and feature keynote speeches from renowned scholars in the field.

Uploaded by

gbewneg809
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 89

Future Data and Security Engineering 5th

International Conference FDSE 2018 Ho Chi Minh


City Vietnam November 28 30 2018 Proceedings
Tran Khanh Dang pdf download

https://textbookfull.com/product/future-data-and-security-engineering-5th-international-conference-
fdse-2018-ho-chi-minh-city-vietnam-november-28-30-2018-proceedings-tran-khanh-dang/

★★★★★ 4.7/5.0 (33 reviews) ✓ 138 downloads ■ TOP RATED


"Perfect download, no issues at all. Highly recommend!" - Mike D.

DOWNLOAD EBOOK
Future Data and Security Engineering 5th International
Conference FDSE 2018 Ho Chi Minh City Vietnam November 28 30
2018 Proceedings Tran Khanh Dang pdf download

TEXTBOOK EBOOK TEXTBOOK FULL

Available Formats

■ PDF eBook Study Guide TextBook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


Collection Highlights

Future Data and Security Engineering First International


Conference FDSE 2014 Ho Chi Minh City Vietnam November 19
21 2014 Proceedings 1st Edition Tran Khanh Dang

Future Data and Security Engineering Third International


Conference FDSE 2016 Can Tho City Vietnam November 23 25
2016 Proceedings 1st Edition Tran Khanh Dang

Computational Data and Social Networks 8th International


Conference CSoNet 2019 Ho Chi Minh City Vietnam November
18 20 2019 Proceedings Andrea Tagarelli

User Science and Engineering 5th International Conference


i USEr 2018 Puchong Malaysia August 28 30 2018 Proceedings
Natrah Abdullah
Industrial Networks and Intelligent Systems 3rd
International Conference INISCOM 2017 Ho Chi Minh City
Vietnam September 4 2017 Proceedings 1st Edition Yuanfang
Chen

Nature of Computation and Communication International


Conference ICTCC 2014 Ho Chi Minh City Vietnam November 24
25 2014 Revised Selected Papers 1st Edition Phan Cong Vinh

Product Focused Software Process Improvement 19th


International Conference PROFES 2018 Wolfsburg Germany
November 28 30 2018 Proceedings Marco Kuhrmann

Secure IT Systems 23rd Nordic Conference NordSec 2018 Oslo


Norway November 28 30 2018 Proceedings Nils Gruschka

Data Mining 16th Australasian Conference AusDM 2018


Bahrurst NSW Australia November 28 30 2018 Revised
Selected Papers Rafiqul Islam
Tran Khanh Dang · Josef Küng
Roland Wagner · Nam Thoai
Makoto Takizawa (Eds.)
LNCS 11251

Future Data and


Security Engineering
5th International Conference, FDSE 2018
Ho Chi Minh City, Vietnam, November 28–30, 2018
Proceedings

123
Lecture Notes in Computer Science 11251
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zurich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology Madras, Chennai, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbrücken, Germany
More information about this series at http://www.springer.com/series/7409
Tran Khanh Dang Josef Küng

Roland Wagner Nam Thoai


Makoto Takizawa (Eds.)

Future Data and


Security Engineering
5th International Conference, FDSE 2018
Ho Chi Minh City, Vietnam, November 28–30, 2018
Proceedings

123
Editors
Tran Khanh Dang Nam Thoai
Ho Chi Minh City University of Technology Ho Chi Minh City University of Technology
Ho Chi Minh, Vietnam Ho Chi Minh, Vietnam
Josef Küng Makoto Takizawa
Johannes Kepler University of Linz Hosei University
Linz, Austria Tokyo, Japan
Roland Wagner
Johannes Kepler University of Linz
Linz, Austria

ISSN 0302-9743 ISSN 1611-3349 (electronic)


Lecture Notes in Computer Science
ISBN 978-3-030-03191-6 ISBN 978-3-030-03192-3 (eBook)
https://doi.org/10.1007/978-3-030-03192-3

Library of Congress Control Number: 2018959232

LNCS Sublibrary: SL3 – Information Systems and Applications, incl. Internet/Web, and HCI

© Springer Nature Switzerland AG 2018


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

In this volume we present the accepted contributions for the 5th International Con-
ference on Future Data and Security Engineering (FDSE 2018). The conference took
place during November 28–30, 2018, in Ho Chi Minh City, Vietnam, at HCMC
University of Technology, among the most famous and prestigious universities in
Vietnam. The proceedings of FDSE are published in the LNCS series by Springer.
Besides DBLP and other major indexing systems, FDSE proceedings have also been
indexed by Scopus and listed in Conference Proceeding Citation Index (CPCI) of
Thomson Reuters.
The annual FDSE conference is a premier forum designed for researchers, scientists,
and practitioners interested in state-of-the-art and state-of-the-practice activities in data,
information, knowledge, and security engineering to explore cutting-edge ideas, to
present and exchange their research results and advanced data-intensive applications, as
well as to discuss emerging issues in data, information, knowledge, and security
engineering. At the annual FDSE, the researchers and practitioners are not only able to
share research solutions to problems in today’s data and security engineering themes,
but also able to identify new issues and directions for future related research and
development work.
The call for papers resulted in the submission of 122 papers. A rigorous and
peer-review process was applied to all of them. This resulted in 35 accepted papers
(including seven short papers, acceptance rate: 28.69%) and two keynote speeches,
which were presented at the conference. Every paper was reviewed by at least three
members of the international Program Committee, who were carefully chosen based on
their knowledge and competence. This careful process resulted in the high quality
of the contributions published in this volume. The accepted papers were grouped into
the following sessions:
– Security and privacy engineering
– Authentication and access control
– Big data analytics and applications
– Advanced studies in machine learning
– Deep learning and applications
– Data analytics and recommendation systems
– Internet of Things and applications
– Smart city: data analytics and security
– Emerging data management systems and applications
In addition to the papers selected by the Program Committee, five internationally
recognized scholars delivered keynote speeches: “Freely Combining Partial Knowledge
in Multiple Dimensions,” presented by Prof. Dirk Draheim from Tallinn University of
Technology, Estonia; “Programming Data Analysis Workflows for the Masses,” pre-
sented by Prof. Artur Andrzejak from Heidelberg University, Germany; “Mathematical
VI Preface

Foundations of Machine Learning: A Tutorial,” presented by Prof. Dinh Nho Hao from
Institute of Mathematics, Vietnam Academy of Science and Technology; “4th Industry
Revolution Technologies and Security,” presented by Prof. Tai M. Chung from
Sungkyunkwan University, South Korea; and “Risk-Based Software Quality and
Security Engineering in Data-Intensive Environments,” presented by Prof. Michael
Felderer from University of Innsbruck, Austria.
The success of FDSE 2018 was the result of the efforts of many people, to whom we
would like to express our gratitude. First, we would like to thank all authors who
submitted papers to FDSE 2018, especially the invited speakers for the keynotes and
tutorials. We would also like to thank the members of the committees and external
reviewers for their timely reviewing and lively participation in the subsequent dis-
cussion in order to select such high-quality papers published in this volume. Last but
not least, we thank the Faculty of Computer Science and Engineering, HCMC
University of Technology, for hosting and organizing FDSE 2018.

November 2018 Tran Khanh Dang


Josef Küng
Roland Wagner
Nam Thoai
Makoto Takizawa
Organization

General Chair
Roland Wagner Johannes Kepler University Linz, Austria

Steering Committee
Elisa Bertino Purdue University, USA
Dirk Draheim Tallinn University of Technology, Estonia
Kazuhiko Hamamoto Tokai University, Japan
Koichiro Ishibashi The University of Electro-Communications, Japan
M-Tahar Kechadi University College Dublin, Ireland
Dieter Kranzlmüller Ludwig Maximilian University, Germany
Fabio Massacci University of Trento, Italy
Clavel Manuel The Madrid Institute for Advanced Studies in Software
Development Technologies, Spain
Atsuko Miyaji Osaka University and Japan Advanced Institute
of Science and Technology, Japan
Erich Neuhold University of Vienna, Austria
Cong Duc Pham University of Pau, France
Silvio Ranise Fondazione Bruno Kessler, Italy
Nam Thoai HCMC University of Technology, Vietnam
A Min Tjoa Technical University of Vienna, Austria
Xiaofang Zhou The University of Queensland, Australia

Program Committee Chairs


Tran Khanh Dang HCMC University of Technology, Vietnam
Josef Küng Johannes Kepler University Linz, Austria
Makoto Takizawa Hosei University, Japan

Publicity Chairs
Nam Ngo-Chan University of Trento, Italy
Quoc Viet Hung Nguyen The University of Queensland, Australia
Huynh Van Quoc Phuong Johannes Kepler University Linz, Austria
Tran Minh Quang HCMC University of Technology, Vietnam
Le Hong Trang HCMC University of Technology, Vietnam
VIII Organization

Local Organizing Committee


Tran Khanh Dang HCMC University of Technology, Vietnam
Tran Tri Dang HCMC University of Technology, Vietnam
Josef Küng Johannes Kepler University Linz, Austria
Nguyen Dinh Thanh Data Security Applied Research Lab, Vietnam
Que Nguyet Tran Thi HCMC University of Technology, Vietnam
Tran Ngoc Thinh HCMC University of Technology, Vietnam
Tuan Anh Truong HCMC University of Technology, Vietnam
and University of Trento, Italy
Quynh Chi Truong HCMC University of Technology, Vietnam
Nguyen Thanh Tung HCMC University of Technology, Vietnam

Finance and Leisure Chairs


Hue Anh La HCMC University of Technology, Vietnam
Hoang Lan Le HCMC University of Technology, Vietnam

Program Committee
Artur Andrzejak Heidelberg University, Germany
Stephane Bressan National University of Singapore, Singapore
Hyunseung Choo Sungkyunkwan University, South Korea
Tai M. Chung Sungkyunkwan University, South Korea
Agostino Cortesi Università Ca’ Foscari Venezia, Italy
Bruno Crispo University of Trento, Italy
Nguyen Tuan Dang University of Information Technology, VNUHCM,
Vietnam
Agnieszka Bialystok University of Technology, Poland
Dardzinska-Glebocka
Tran Cao De Can Tho University, Vietnam
Thanh-Nghi Do Can Tho University, Vietnam
Nguyen Van Doan Japan Advanced Institute of Science and Technology,
Japan
Dirk Draheim Tallinn University of Technology, Estonia
Nguyen Duc Dung HCMC University of Technology, Vietnam
Johann Eder Alpen-Adria University Klagenfurt, Austria
Jungho Eom Daejeon University, South Korea
Verena Geist Software Competence Center Hagenberg, Austria
Raju Halder Indian Institute of Technology Patna, India
Tran Van Hoai HCMC University of Technology, Vietnam
Nguyen Quoc Viet Hung The University of Queensland, Australia
Nguyen Viet Hung Bosch, Germany
Trung-Hieu Huynh Industrial University of Ho Chi Minh City, Vietnam
Tomohiko Igasaki Kumamoto University, Japan
Muhammad Ilyas University of Sargodha, Pakistan
Organization IX

Hiroshi Ishii Tokai University, Japan


Eiji Kamioka Shibaura Institute of Technology, Japan
Le Duy Khanh Data Storage Institute, Singapore
Surin Kittitornkun King Mongkut’s Institute of Technology Ladkrabang,
Thailand
Andrea Ko Corvinus University of Budapest, Hungary
Duc Anh Le Center for Open Data in the Humanities, Tokyo, Japan
Xia Lin Drexel University, USA
Lam Son Le HCMC University of Technology, Vietnam
Faizal Mahananto Institut Teknologi Sepuluh Nopember, Indonesia
Clavel Manuel The Madrid Institute for Advanced Studies in Software
Development Technologies, Spain
Nadia Metoui University of Trento and FBK-Irist, Trento, Italy
Hoang Duc Minh National Physical Laboratory, UK
Takumi Miyoshi Shibaura Institute of Technology, Japan
Hironori Nakajo Tokyo University of Agriculture and Technology,
Japan
Nguyen Thai-Nghe Cantho University, Vietnam
Thanh Binh Nguyen HCMC University of Technology, Vietnam
Benjamin Nguyen Institut National des Sciences Appliqués Centre Val de
Loire, France
An Khuong Nguyen HCMC University of Technology, Vietnam
Khai Nguyen National Institute of Informatics, Japan
Kien Nguyen National Institute of Information and Communications
Technology, Japan
Khoa Nguyen The Commonwealth Scientific and Industrial Research
Organisation, Australia
Le Duy Lai Nguyen Ho Chi Minh City University of Technology, Vietnam
and University of Grenoble Alpes, France
Do Van Nguyen Institute of Information Technology, MIST, Vietnam
Thien-An Nguyen University College Dublin, Ireland
Phan Trong Nhan HCMC University of Technology, Vietnam
Luong The Nhan University of Pau, France
Alex Norta Tallinn University of Technology, Estonia
Duu-Sheng Ong Multimedia University, Malaysia
Eric Pardede La Trobe University, Australia
Ingrid Pappel Tallinn University of Technology, Estonia
Huynh Van Quoc Phuong Johannes Kepler University Linz, Austria
Nguyen Khang Pham Can Tho University, Vietnam
Phu H. Phung University of Dayton, USA
Nguyen Ho Man Rang Ho Chi Minh City University of Technology, Vietnam
Tran Minh Quang HCMC University of Technology, Vietnam
Akbar Saiful Institute of Technology Bandung, Indonesia
Tran Le Minh Sang WorldQuant LLC, USA
Christin Seifert University of Passau, Germany
Erik Sonnleitner Johannes Kepler University Linz, Austria
X Organization

Tran Phuong Thao KDDI Research, Inc., Japan


Tran Ngoc Thinh HCMC University of Technology, Vietnam
Quan Thanh Tho HCMC University of Technology, Vietnam
Michel Toulouse Vietnamese-German University, Vietnam
Shigenori Tomiyama Tokai University, Japan
Le Hong Trang HCMC University of Technology, Vietnam
Tuan Anh Truong HCMC University of Technology, Vietnam
and University of Trento, Italy
Tran Minh Triet HCMC University of Natural Sciences, Vietnam
Takeshi Tsuchiya Tokyo University of Science, Japan
Osamu Uchida Tokai University, Japan
Hoang Tam Vo IBM Research, Australia
Hoang Huu Viet Vinh University, Vietnam
Edgar Weippl SBA Research, Austria
Wolfram Wöß Johannes Kepler University Linz, Austria
Tetsuyasu Yamada Tokyo University of Science, Japan
Jeff Yan Linköping University, Sweden
Szabó Zoltán Corvinus University of Budapest, Hungary

Additional Reviewers
Pham Quoc Cuong HCMC University of Technology, Vietnam
Kim Tuyen Le Thi HCMC University of Technology, Vietnam
Ai Thao Nguyen Thi Data Security Applied Research Lab, Vietnam
Bao Thu Le Thi National Institute of Informatics, Japan
Tuan Anh Tran HCMC University of Technology, Vietnam
and Chonnam National University, South Korea
Quang Hai Truong HCMC University of Technology, Vietnam
Contents

Invited Keynotes

Freely Combining Partial Knowledge in Multiple Dimensions


(Extended Abstract). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Dirk Draheim

Risk-based Software Quality and Security Engineering in Data-intensive


Environments (Invited Keynote) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Michael Felderer

Security and Privacy Engineering

A Secure and Efficient kNN Classification Algorithm Using Encrypted


Index Search and Yao’s Garbled Circuit over Encrypted Databases . . . . . . . . 21
Hyeong-Jin Kim, Jae-Hwan Shin, and Jae-Woo Chang

A Security Model for IoT Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39


Alban Gabillon and Emmanuel Bruno

Comprehensive Study in Preventive Measures of Data Breach Using


Thumb-Sucking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Keinaz Domingo, Bryan Cruz, Froilan De Guzman, Jhinia Cotiangco,
and Chistopher Hilario

Intrusion Prevention Model for WiFi Networks. . . . . . . . . . . . . . . . . . . . . . 66


Julián Francisco Mojica Sánchez, Octavio José Salcedo Parra,
and Alberto Acosta López

Security for the Internet of Things and the Bluetooth Protocol . . . . . . . . . . . 74


Rodrigo Alexander Fagua Arévalo, Octavio José Salcedo Parra,
and Juan Manuel Sánchez Céspedes

Authentication and Access Control

A Light-Weight Tightening Authentication Scheme for the Objects’


Encounters in the Meetings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Kim Khanh Tran, Minh Khue Pham, and Tran Khanh Dang

A Privacy Preserving Authentication Scheme in the Intelligent


Transportation Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Cuong Nguyen Hai Vinh, Anh Truong, and Tai Tran Huu
XII Contents

Big Data Analytics and Applications

Higher Performance IPPC+ Tree for Parallel Incremental Frequent


Itemsets Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Van Quoc Phuong Huynh and Josef Küng

A Sample-Based Algorithm for Visual Assessment of Cluster Tendency


(VAT) with Large Datasets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Le Hong Trang, Pham Van Ngoan, and Nguyen Van Duc

An Efficient Batch Similarity Processing with MapReduce . . . . . . . . . . . . . . 158


Trong Nhan Phan and Tran Khanh Dang

Vietnamese Paraphrase Identification Using Matching Duplicate Phrases


and Similar Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Hoang-Quoc Nguyen-Son, Nam-Phong Tran, Ngoc-Vien Pham,
Minh-Triet Tran, and Isao Echizen

Advanced Studies in Machine Learning

Automatic Hyper-parameters Tuning for Local Support Vector Machines . . . . 185


Thanh-Nghi Do and Minh-Thu Tran-Nguyen

Detection of the Primary User’s Behavior for the Intervention of the


Secondary User Using Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Deisy Dayana Zambrano Soto, Octavio José Salcedo Parra,
and Danilo Alfonso López Sarmiento

Text-dependent Speaker Recognition System Based on Speaking


Frequency Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Khoa N. Van, Tri P. Minh, Thang N. Son, Minh H. Ly, Tin T. Dang,
and Anh Dinh

Static PE Malware Detection Using Gradient Boosting Decision


Trees Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Huu-Danh Pham, Tuan Dinh Le, and Thanh Nguyen Vu

Comparative Study on Different Approaches in Optimizing Threshold


for Music Auto-Tagging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Khanh Nguyen Cao Minh, Thinh Dang An, Vu Tran Quang,
and Van Hoai Tran

Using Machine Learning for News Verification . . . . . . . . . . . . . . . . . . . . . 251


Gerardo Ernesto Rolong Agudelo, Octavio José Salcedo Parra,
and Javier Medina
Contents XIII

Deep Learning and Applications

A Short Review on Deep Learning for Entity Recognition . . . . . . . . . . . . . . 261


Hien T. Nguyen and Thuan Quoc Nguyen

An Analysis of Software Bug Reports Using Random Forest . . . . . . . . . . . . 273


Ha Manh Tran, Sinh Van Nguyen, Synh Viet Uyen Ha,
and Thanh Quoc Le

Motorbike Detection in Urban Environment . . . . . . . . . . . . . . . . . . . . . . . . 286


Chi Kien Huynh, Tran Khanh Dang, and Thanh Sach Le

Data Analytics and Recommendation Systems

Comprehensive Review of Classification Algorithms for Medical


Information System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Anna Kasperczuk and Agnieszka Dardzinska

New Method of Medical Incomplete Information System Optimization


Based on Action Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Katarzyna Ignatiuk, Agnieszka Dardzinska, Małgorzata Zdrodowska,
and Monika Chorazy

Cloud Media DJ Platform: Functional Perspective . . . . . . . . . . . . . . . . . . . . 323


Joohyun Lee, Jinwoong Jung, Sanggil Yeoum, Junghyun Bum,
Thien-Binh Dang, and Hyunseung Choo

Cloud Media DJ Platform: Performance Perspective . . . . . . . . . . . . . . . . . . 335


Jinwoong Jung, Joohyun Lee, Sanggil Yeoum, Junghyun Bum,
Thien Binh Dang, and Hyunseung Choo

Analyzing and Visualizing Web Server Access Log File . . . . . . . . . . . . . . . 349


Minh-Tri Nguyen, Thanh-Dang Diep, Tran Hoang Vinh,
Takuma Nakajima, and Nam Thoai

Internet of Things and Applications

Lower Bound for Function Computation in Distributed Networks . . . . . . . . . 371


H. K. Dai and M. Toulouse

Teleoperation System for a Four-Dof Robot: Commands


with Data Glove and Web Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Juan Guillermo Palacio Cano, Octavio José Salcedo Parra,
and Miguel J. Espitia R.
XIV Contents

Design of PHD Solution Based on HL7 and IoT. . . . . . . . . . . . . . . . . . . . . 405


Sabrina Suárez Arrieta, Octavio José Salcedo Parra,
and Roberto Manuel Poveda Chaves

Smart City: Data Analytics and Security

Analysis of Diverse Tourist Information Distributed Across the Internet. . . . . 413


Takeshi Tsuchiya, Hiroo Hirose, Tadashi Miyosawa, Tetsuyasu Yamada,
Hiroaki Sawano, and Keiichi Koyanagi

Improving the Information in Medical Image by Adaptive


Fusion Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Nguyen Mong Hien, Nguyen Thanh Binh, Ngo Quoc Viet,
and Pham Bao Quoc

Resident Identification in Smart Home by Voice Biometrics . . . . . . . . . . . . . 433


Minh-Son Nguyen and Tu-Lanh Vo

Modeling and Testing Power Consumption Rate of Low-Power Wi-Fi


Sensor Motes for Smart Building Applications . . . . . . . . . . . . . . . . . . . . . . 449
Cao Tien Thanh

Emerging Data Management Systems and Applications

Distributed Genetic Algorithm on Cluster of Intel Xeon Phi Co-processors. . . 463


Nguyen Quang-Hung, Anh-Tu Ngoc Tran, and Nam Thoai

Information Systems Success: Empirical Evidence on Cloud-based ERP . . . . 471


Thanh D. Nguyen and Khiem V. T. Luc

Statistical Models to Automatic Text Summarization . . . . . . . . . . . . . . . . . . 486


Pham Trong Nguyen and Co Ton Minh Dang

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499


Invited Keynotes
Freely Combining Partial Knowledge
in Multiple Dimensions
(Extended Abstract)

Dirk Draheim(B)

Large-Scale Systems Group, Tallinn University of Technology,


Akadeemia tee 15a, 12618 Tallinn, Estonia
[email protected]

Abstract. F.P. conditionalization (frequentist partial conditionaliza-


tion) allows for combining partial knowledge in arbitrary many dimen-
sions and without any restrictions on events such as independence or
partitioning. In this talk, we provide a primer to F.P. conditionalization
and its most important results. As an example, we proof that Jeffrey
conditionalization is an instance of F.P. conditionalization for the spe-
cial case that events form a partition. Also, we discuss the logics and the
data science perspective on the matter.

Keywords: F.P. conditionalization · Jeffrey conditionalization


Data science · Statistics · Contingency tables · Reasoning systems
SPSS · SAS · R · Phyton/Anaconda · Cognos · Tableau

1 A Primer on F.P. Conditionalization


In [1] we have introduced F.P.conditionalization (frequentist partial condition-
alization), which allows for conditionalization on partially known events. An
F.P. conditionalization P(A | B1 ≡ b1 , . . . , Bm ≡ bm ) is the probability of an
event A that is conditional on a list of event-probability specifications B1 ≡ b1
through Bm ≡ bm . A specification pair B ≡ b12 stands for the assumption that
the probability of B has somehow changed from a previously given, a priori
probability P(B) into a new, a posteriori probability b. Consequently, we expect
that P(B | B ≡ b) = b as well as P(A | B ≡ P(B)) = P(A). Similarly, we expect
that classical conditional probability becomes a special case of F.P. conditional-
ization, i.e., that P(A|B1 · · · Bm ) equals P(A | B1 ≡ 100%, . . . , Bm ≡ 100%) and,
similarly, P(A|B1 · · · Bm ) equals P(A | B1 ≡ 0%, . . . , Bm ≡ 0%).
But what is the value of P(A|B1 ≡ b1 , . . . , Bm ≡ bm ) in general? We have given
a formal, frequentist semantics to it. We think of conditionalization as taking
1
Alternative notations for B ≡ b such as P(B)  b or P(B) := b might be considered
more intuitive. We have chosen the concrete notation B ≡ b for the sake of brevity
and readability.
2
We also use PB1 ≡b1 ,...,Bm ≡bm (A) as notation for P(A | B1 ≡ b1 ,..., Bm ≡ bm ).
c Springer Nature Switzerland AG 2018
T. K. Dang et al. (Eds.): FDSE 2018, LNCS 11251, pp. 3–11, 2018.
https://doi.org/10.1007/978-3-030-03192-3_1
4 D. Draheim

place in chains of repeated experiments, so-called probability testbeds, of suffi-


cient lengths. As a first step, we introduce the notion of F.P. conditionalization
bounded by n which is denoted by Pn (A | B1 ≡ b1 , . . . , Bm ≡ bm ). We consider
repeated experiments of such lengths n, in which statements of the form Bi ≡ bi
make sense frequentistically, i.e., the probability bi can be interpreted as the
frequency of Bi and can potentially be observed. Then we reduce the notion of
partial conditionalization to the notion of classical conditional probability, i.e.,
classical conditional expected value to be more precise. We consider the expected
value of the frequency of A, i.e., the average occurrence of A, conditional on the
event that the frequencies of events Bi adhere to the new probabilities bi . Now,
we can speak of the bi s as frequencies. Next, we define (general/unbounded)
F.P. conditionalization by bounded F.P. conditionalization in the limit.
Definition 1 (Bounded F.P. Conditionalization). Given an i.i.d.sequence
(independent and identically distributed sequence) of multivariate characteristic
random variables (A, B1 ,..., Bm (j) )j∈N , a list of rational numbers b1 ,..., bm and
a bound n ∈ N such that 0  bi  1 and nbi ∈ N for all bi in b1 ,..., bm . We define
the probability of A conditional on B1 ≡ b1 through Bm ≡ bm bounded by n,
which is denoted by Pn (A | B1 ≡ b1 ,..., Bm ≡ bm ), as follows:

Pn (A | B1 ≡ b1 , . . . , Bm ≡ bm ) = E(An | B1 n = b1 , . . . , Bm n = bm ) (1)

Definition 2 (F.P. Conditionalization). Given an i.i.d.sequence of multi-


variate characteristic random variables (A, B1 ,..., Bm (j) )j∈N and a list of ratio-
nal numbers b = b1 ,..., bm such that 0  bi  1 for all bi in b and lcd(b) denotes
the smallest n ∈ N such that nbi ∈ N for all bi in b = b1 ,..., bm .3 We define
the probability of A conditional on B1 ≡ b1 through Bm ≡ bm , denoted by
P(A | B1 ≡ b1 ,..., Bm ≡ bm ), as follows:

P(A | B1 ≡ b1 , . . . , Bm ≡ bm ) = lim P k·lcd(b) (A | B1 ≡ b1 , . . . , Bm ≡ bm ) (2)


k→∞

As a first result, we observe that bounded F.P. conditionalization can be


expressed more compact, without conditional expectation, merely in terms of
conditional probability, i.e., we have that the following holds for any bounded
F.P. conditionalization:

Pn (A | B1 ≡ b1 , . . . , Bm ≡ bm ) = P(A | B1 n = b1 , . . . , Bm n = bm ) (3)

In most proofs and argumentations we use the more convenient form in


Eq. (3) instead of the more intuitive form in Definition 1.
In general, an F.P. conditionalization P(A | B1 ≡ b1 , . . . , Bm ≡ bm ) is different
from all of its finite approximations of the form Pn (A | B1 ≡ b1 , . . . , Bm ≡ bm ).
In some interesting special cases, we have that the F.P. conditionalizations are
equal to all of their finite approximations; i.e., it is the case if the condition
events B1 ≡ b1 through Bm ≡ bm are independent or if the condition events
form a partition.
3
lcd(b) is the least common denominator of b = b1 ,..., bm .
Freely Combining Partial Knowledge in Multiple Dimensions 5

The case in which the condition events form a partition is particularly inter-
esting. This is so, because this case makes Jeffrey conditionalization [2–4], value-
wise, an instance of F.P. conditionalization as we will discuss further in Sect. 2.
In case the conditions events B1 ≡ b1 through Bm ≡ bm form a partition, we
have that the value of P(A | B1 ≡ b1 , . . . , Bm ≡ bm ) is a weighted sum of condi-
tional probabilities bi · P(A|Bi ), compare with Eq. (5). This is somehow neat and
intuitive. Take the simple case of an F.P. conditionalization P(A|B ≡ b) over a
single event B. Such an F.P. conditionalization can be represented differently as
an F.P. conditionalization over two partioning events B1 = B and B2 = B, i.e.,
P(A | B ≡ b , B ≡ 1 − b). Therefore we have that

P(A|B ≡ b) = b · P(A|B) + (1 − b) · P(A|B) (4)

Equation 4 is highly intuitive: it feels natural that the direct conditional probabil-
ity P (A|B) should be somehow (proportionally) lowered by the new probability b
of event B, similarly, we should not forget that the event B can also appear, i.e.,
with probability 1 − b and should also influence the final value – symmetrically.
So, the b-weighted average of P (A|B) and P (A|B) as expressed by Eq. (4) seems
to be an educated guess. Fortunately, we do not need such an appeal to intuition.
In our framework, Eqs. (4) and (5) can be proven correct, as a consequence of
probability theory.

Theorem 3 (F.P. Conditionalization over Partitions). Given an


F.P. conditionalization P(A | B1 ≡ b1 , . . . , Bm ≡ bm ) such that the events
B1 , . . . , Bm form a partition, and, furthermore, the frequencies b1 , . . . , bm sum
up to one, we have the following:

P(A | B1 ≡ b1 , . . . , Bm ≡ bm ) = bi · P(A | Bi ) (5)
1im
P(Bi ) = 0

Proof. See [1].

Table 1 summarizes interesting properties of F.P. conditionalization. Proofs


of all properties are provided in [1]. Property (a) is a basic fact that we men-
tioned earlier; i.e., an updated event actually has the probability value that it
is updated to. Properties (b) and (c) deal with condition events that form a
partition and we have treated them with Theorem 3. Properties (d) and (e) pro-
vide programs for probabilities of frequency specifications of the general form
P(∩i∈I Bin = ki ). Having programs for such probabilities is sufficient to compute
any F.P. conditionalization. The equation in (d) is called one-step decomposi-
tion in [1] and can be read immediately as a recursive programme specification;
compare also with the primer on inductive definitions in [5]. Equation (e) pro-
vides a combinatorial solution for P(∩i∈I Bin = ki ). Equation (e) generalizes the
known solution for bivariate Bernoulli distributions [6–8] to the general case
of multivariate Bernoulli distributions. Property (f) is called conditional seg-
mentation in [1]. Conditional segmentation shows how F.P. conditionalization
6 D. Draheim

Table 1. Properties of F.P. conditionalization. Values of various F.P. conditionaliza-


tions PB (A) = P(A|B1 ≡ b1 ,..., Bm ≡ bm ) with frequency specifications of the form
B = B1 ≡ b1 ,..., Bm ≡ bm and condition indices I = {1, . . . , m}; probability values (d)
and (e) of frequency specifications of the form P(∩i∈I Bin = ki ). Proofs of all properties
are provided in [1].

Constraint F.P. Conditionalization


(a) bi belongs to B PB (Bi ) = bi
(b) m = 1, B = (B ≡ b) PB (A) = b · P(A|B) + (1 − b) · P(A|B)
m
(c) B1 ,..., Bm form a partition PB (A) = i=1 bi · P(A | Bi )

(d) For arbitrary bound n P(∩ Bin=ki) = P(∩ Bi ,∩ Bi )·P(∩Bin−1 = ki −1,∩ Bin−1 = ki)
i∈I i∈I  i∈I  i∈I  i∈I 
I ⊆ I
∀i ∈ I  . ki = 0
∀i ∈ I  . ki = n
 
  
(e) For arbitrary bound n P( ∩ Bin = ki ) =  n!
ρ(I  )!
× P( ∩ Bi , ∩ Bi )ρ(I )
i∈I  i∈I 
I  ⊆I I  ⊆I i∈I

ρ : P(I) → N0

∀i ∈ I . ki = {ρ(I  ) | I  ⊆ I ∧ Bi ∈ I  }

n= {ρ(I  ) | I  ⊆ I}

(f) – PB (A) = P(A| ∩ ζi ) · P( ∩ ζi | ∩ Bi ≡ bi )
i∈I i∈I i∈I
 
ζi ∈ {Bi , Bi } i∈I
P( ∩ ζi ) = 0
i∈I

(g) B1 ,..., Bm are independent PB (B1 ,..., Bk) = b1 b2 · · · bk


(h) B1 ,..., Bm are independent PB (B1 ,..., Bm ) = PB (B1 ) · · · PB (Bm )
   
(i) B1 ,..., Bm are independent PB (A) = P(A| ∩ Bi, ∩ Bi )· bi · (1−bi )
i∈I  i∈I  i∈I  i∈I 
I ⊆ I
P( ∩ Bi , ∩ Bi ) = 0
i∈I  i∈I 

(j) A is independent of B1 ,..., Bm PB (A) = P(A)


B1 ≡ 100%,..., Bi ≡ 100%
(k) PB (A) = P(A|B1 ,..., Bi , Bi+1 ,..., Bm )
Bi+1 ≡ 0%,..., Bm ≡ 0%
B1 ,..., Bm form a partition or
(l) B1 ,..., Bm are independent PB (A) = P(A)
B1≡ P(B1 ),..., Bm ≡ P(Bm )
(m) B1 ,..., Bm form a partition PB (ABi ) = bi · P(A|Bi )
(n) B1 ,..., Bm form a partition PB (A|Bi ) = P(A|Bi )
(o) B1 ,..., Bm are independent PB (A,B1 ,..., Bm) = b1 · · · bm · P(A|B1 ,..., Bm )
(p) – PB (A|B1 ,..., Bm) = P(A|B1 ,..., Bm )

generalizes Jeffrey conditionalization by dropping the partitioning constraint on


events. Conditional segmentation is also often useful as helper Lemma. Proper-
ties (g) and (h) are important; they reveal how F.P. conditionalization behaves
in case of independent condition events. Property (i) deals with the case that a
target event is independent of the condition events. Property (k) has been men-
tioned earlier; it is about how F.P. conditionalization meets classical conditional
probability. Property (l) generalizes the basic fact that P(A | B ≡ P(B)) = P(A)
to lists of condition events. Properties (m) through (p) all deal with cases, in
Freely Combining Partial Knowledge in Multiple Dimensions 7

which condition events also appear, in some way, in the target event. Properties
(m) through (p) are highly relevant in the discussion of Jeffrey’s probability kine-
matics and other Bayesian frameworks with possible-world semantics. Actually,
property (n) is an F.P. version of what we call Jeffrey’s postulate.

Table 2. Properties of F.P. conditional expectations. Values of various F.P. expecta-


tions EPB (ν | A), with frequency specifications B = B1 ≡ b1 , . . . , Bm ≡ bm and condition
indices I = {1, . . . , m}. Proofs of all properties are provided in [1].

Constraint F.P. Expectation


(A) B1 , . . . , Bm form a partition EPB (ν | Bi ) = E(ν | Bi )
b·P(A|B)E(ν|AB)+(1−b)·P(A|B1 )E(ν|AB1 )
(B) m = 1, B = (B ≡ b) EPB (ν | A) = b·P(A|B)+(1−b)·P(A|B)
m
bi ·P(A|Bi )·E(ν | ABi )
(C) B1 ,..., Bm form a partition EPB (ν | A) = i=1
m b ·P(A|B )
i=1 i i

(M) B1 ,..., Bm form a partition EPB (ν | ABi ) = E(ν | ABi )


(N) B1 ,..., Bm form a partition EPB (|Bi ) (ν|A) = E(ν | ABi )
(O) B1 ,..., Bm are independent EPB (ν|AB1 ··· Bm) = E(ν | AB1 · · · Bm )
(P) B1 ,..., Bm are independent EPB ( |B1···Bm)(ν|A) = E(ν | AB1 · · · Bm )

With Table 2 we step from F.P. conditionalization to F.P. conditional


expected values, that we also call F.P. conditional expectations or just F.P.
expectations for short. Given frequency specifications B = B1 ≡ k1 ,..., Bm ≡ km ,
we say that EPB (ν | A) is an F.P. expectation. Here, the event A plays the role
of the target event; whereas we consider the random variable ν as rather fixed.
This way, each property in Table 1 has a corresponding property in terms of F.P.
expectations. Table 2 shows some of them4 . We do not need an own definition
for F.P. expectations. We have that PB is a probability function, so that the cor-
responding expected values and conditional expected values5 are defined and
we have that
 
EPB (ν : Ω −→ D | A) = d · PB (ν = d, A) PB (A) (6)
d∈D

In Ramsey’s subjectivism [9–11] and Jeffrey’s logic of decision [4,12] the


notion of desirability is a crucial concept. Here, the desirability des A of an
event A is the conditional expected value of an implicitly given utility ν under
the condition A, which also explains why F.P. expectations are an important
concept.

2 The Logics Perspective


In his logic of decision [13], also called probability kinematics [13,14], Richard
C. Jeffrey establishes Jeffrey conditionalization. Probabilities are interpreted as
4
Rows with same letters in Tables 1 and 2 correspond to each other.
5
The notation EP makes explicit that E belongs to the probability space (Ω, Σ, P).
8 D. Draheim

degrees of believe and the semantics of a probability update is explained directly


in terms of a possible world semantics. Jeffrey denotes a priori probability values
as prob(A) and a posteriori probability values as P ROB(A) and maintains the
list of updated events B1 ,..., Bm in the context of probability statements6 . It is
assumed that in both the worlds, i.e., the a priori and the a posteriori world,
the laws of probability hold. The probability functions P ROB and prob are
related by a postulate. The postulate deals exclusively with situations, in which
the updated events B1 ,..., Bm form a partition. Then, it states that conditional
probabilities with respect to one of the updated events are preserved, i.e., we
can assume that P ROB(A|Bi ) = prob(A|Bi ) holds for all events A and all
events Bi from B1 ,..., Bm – just as longs as B1 ,..., Bm form a partition. Persi
Diaconis and Sandy Zabell call this postulate the J-condition [15,16]. Richard
Bradley talks about conservative belief changes [17,18]. We call this postulate
the probability kinematics postulate, or also just Jeffrey’s postulate for short.
We say that Jeffrey’s postulate is a bridging statement, as it bridges between the
a priori world and the a posteriori world. Next, Jeffrey exploits this postulate to
derive Jeffrey conditionalization, also called Jeffrey’s rule, compare with Eq. (5).
It is crucial to understand, that the F.P. equivalent of Jeffrey’s postulate, i.e.,
PB (A|Bi ) = P(A|Bi )7 does not need to be postulated in the F.P. framework,
but is a property that simply holds; i.e., it can be proven from the underlying
frequentist semantics.
We have seen that F.P. conditionalization creates a clear link from the Kol-
mogorov system of probability to one of the important Bayesian frameworks,
i.e., Jeffrey’s logic of decision. When it comes to Bayesianism, there is no such
single, closed apparatus as with frequentism [19–23]. Instead, there is a great
variety of important approaches and methodologies, with different flavors in
objectives and explications [24–26]. We have de Finetti [27,28] with his Dutch
book argument and Ramsey [9,11] with his representation theorem [10]. Think
of Jaynes [29], who starts from improving statistical reasoning with his applica-
tion of maximal entropy [30], and from there transcends into an agent-oriented
explanation of probability theory [31]. Also, think of Pearl [32], who eventually
transcends probabilistic reasoning by systematically incorporating causality into
his considerations [33,34]. Bayesian approaches have in common that they rely,
at least in crucial parts, on notions other than frequencies to explain probabili-
ties, among the most typical are degrees of belief, degrees of preference, degrees
of plausibility, degrees of validity or degrees of confirmation.

3 The Data Science Perspective


The data science perspective is the F.P. perspective per se. Current data sci-
ence has a clear statistical foundation; in practice, we see that data science is
6
Please note, that the notational differences between between Jeffrey conditionaliza-
tion and F.P. conditionalization are a minor issue and must not be confused with
semantical differences – see [1] for a thorough discussion.
7
With B = B1 ≡ P ROB(B1 ),..., Bm ≡ P ROB(Bm ).
Freely Combining Partial Knowledge in Multiple Dimensions 9

boosted by statistical packages and tools, ranging from SPSS, SAS over R to
Phyton/Anaconda. In practice, the more interactive, multivariate data analytics
(as represented by business intelligence tools such as Cognos or Tableau) is still
equally important in data science initiatives. Again, the findings of F.P. condi-
tionalization are fully in line with the foundations of multivariate data analytics.
An important dual problem to partial conditionalization is about determining
the most likely probability distribution with known marginals for a complete
set of observations. This problem is treated by Deming and Stephan in [35]
and Ireland and Kullback in [36]. Given two partitions of events B1 ,..., Bs and
C1 ,..., Ct , numbers of observations nij for all possible Bi Cj in a sample of size
n and marginals pi for each Bi in and pj for each Cj , it is the intention to
find a probability distribution P that adheres to the specified marginals, i.e.,
such that P(Bi ) = pi for all Bi and P(Cj ) = pj for all Cj , and furthermore
maximizes the probability of the specified joint observation, i.e., that maximizes
the following multinomial distribution8 :
Mn, P(B1 C1 ),...,P(B1 Ct ) ,..., P(Bs C1 ),...,P(Bs Ct ) (n11 ,..., n1t , . . . , ns1 ,..., nst )
Note that the collection of s × t events Bs Bt form a partition. The observed
values nij are said to be organized in a two-dimensional s × t contingency table.
The restriction to two-dimensional contingency tables is without loss of gener-
ality, i.e., the results of [35] and [36] can be generalized to multi-dimensional
tables. In comparisons with partial conditionalizations, we treat two events B
and C as a 2 × 2 contingency table with partitions B1 = B, B2 = B, C1 = C
and C2 = C. Now, [35] approaches the optimization by least-square9 adjustment,
i.e., by considering the probability function P that minimizes χ2 , whereas [36]
approaches the optimization by considering the probability function P that min-
imizes the Kullback-Leibler number I(P, P )10 with P (Bi Cj ) = nij /n; compare
also with [37,38]. Both [35,39] and [36] use iterative procedures that generates
BAN (best approximatively normal) estimators for convergent computations of
the considered minima; compare also with [40,41].

4 Conclusion
Statistics is the language of science; however, the semantics of probabilistic rea-
soning is still a matter of discourse. F.P. conditionalization provides a frequen-
tist semantics for conditionalization on partially known events. It generalizes
Jeffrey conditionalization from partitions to arbitrary collections of events. Fur-
thermore, the postulate of Jeffrey’s probability kinematics, which is rooted in
Ramsey’s subjectivism, turns out to be a consequence in our frequentist seman-
tics. F.P. conditionalization is a straightforward, fundamental concept that fits
our intuition. Furthermore, it creates a clear link from the Kolmogorov system
of probability to one of the important Bayesian frameworks.
8
Mn,p1 ,...,pm (k1 , . . . , km ) = (n!/(k1 ! · · · km !)) · pk1 1 · · · pkmm .
 
9
χ2 = si=1 tj=1 (nij − n · P(Bi Cj ))2 /nij .
 
10
I(P, P ) = si=1 tj=1 P(Bi Cj ) · ln( P(Bi Cj )/P (Bi Cj ))).
10 D. Draheim

References
1. Draheim, D.: Generalized Jeffrey Conditionalization - A Frequentist Semantics of
Partial Conditionalization. Springer, Heidelberg (2017). https://doi.org/10.1007/
978-3-319-69868-7. http://fpc.formcharts.org
2. Jeffrey, R.C.: Contributions to the theory of inductive probability. Ph.D. thesis,
Princeton University (1957)
3. Jeffrey, R.C.: The Logic of Decision, 1st edn. McGraw-Hill, New York (1965)
4. Jeffrey, R.C.: The Logic of Decision, 2nd edn. University of Chicago Press, Chicago
(1983)
5. Draheim, D.: Semantics of the Probabilistic Typed Lambda Calculus - Markov
Chain Semantics, Termination Behavior, and Denotational Semantics. Springer,
Heidelberg (2017). https://doi.org/10.1007/978-3-642-55198-7
6. Wicksell, S.D.: Some theorems in the theory of probability - with special refer-
ence to their importance in the theory of homograde correlations. Svenska Aktu-
arieforeningens Tidskrift, pp. 165–213 (1916)
7. Aitken, A., Gonin, H.: On fourfold sampling with and without replacement. Proc.
R. Soc. Edinburgh 55, 114–125 (1935)
8. Teicher, H.: On the multivariate poisson distribution. Skand. Aktuarietidskr. 37,
1–9 (1954)
9. Ramsey, F.P.: The Foundations of Mathematics and other Logical Essays. Kegan,
Paul, Trench, Trubner & Co., Ltd., New York (1931). Ed. by R.B. Braithwaite
10. Ramsey, F.P.: Truth and probability. In: Ramsey, F.P., Braithwaite, R. (eds.) The
Foundations of Mathematics and other Logical Essays, pp. 156–198. Kegan, Paul,
Trench, Trubner & Co., Ltd., New York (1931)
11. Ramsey, F.P.: Philosophical Papers. Cambridge University Press, Cambridge
(1990). Ed. by D.H. Mellor
12. Jeffrey, R.C.: Subjective Probability - the Real Thing. Cambridge University Press,
Cambridge (2004)
13. Jeffrey, R.C.: Probable knowledge. In: Lakatos, I. (ed.) The Problem of Inductive
Logic, pp. 166–180. North-Holland, Amsterdam, New York, Oxford, Tokio (1968)
14. Levi, I.: Probability kinematics. Br. J. Philos. Sci. 18(3), 197–209 (1967)
15. Diaconis, P., Zabell, S.: Some alternatives to Bayes’s rules. Technical report No.
205, Department of Statistics, Stanford University, October 1983
16. Diaconis, P., Zabell, S.: Some alternatives to Bayes’s rules. In: Grofman, B., Owen,
G. (eds.) Information Pooling and Group Decision Making, pp. 25–38. JAI Press,
Stamford (1986)
17. Bradley, R.: Decision Theory with a Human Face. Draft, p. 318, April 2016. http://
personal.lse.ac.uk/bradleyr/pdf/DecisionTheorywithaHumanFace(indexed3).pdf
(forthcoming)
18. Dietrich, F., List, C., Bradley, R.: Belief revision generalized - a joint characteri-
zation of Bayes’s and Jeffrey’s rules. J. Econ. Theory (forthcoming)
19. Kolmogorov, A.: Grundbegriffe der Wahrscheinlichkeitsrechnung. Springer, Heidel-
berg (1933). https://doi.org/10.1007/978-3-642-49888-6
20. Kolmogorov, A.: Foundations of the Theory of Probability. Chelsea, New York
(1956)
21. Kolmogorov, A.: On logical foundation of probability theory. In: Itô, K., Prokhorov,
J.V. (eds.) LNM. Lecture Notes in Mathematics, vol. 1021, pp. 1–5. Springer,
Heidelberg (1982). https://doi.org/10.1007/BFb0072897
Freely Combining Partial Knowledge in Multiple Dimensions 11

22. Neyman, J.: Outline of a theory of statistical estimation based on the classical
theory of probability. Philos. Trans. R. Soc. Lond. 236(767), 333–380 (1937)
23. Neyman, J.: Frequentist probability and frequentist statistics. Synthese 36, 97–131
(1977)
24. Weisberg, J.: Varieties of Bayesianism. In: Gabbay, D., Hartmann, S., Woods, J.
(eds.) Handbook of the History of Logic, vol. 10 (2011)
25. Galavotti, M.C.: The modern epistemic interpretations of probability - logicism
and subjectivism. In: Gabbay, D., Hartmann, S., Woods, J. (eds.) Handbook of
the History of Logic, vol. 10, pp. 153–203. Elsevier, Amsterdam (2011)
26. Weirich, P.: The Bayesian decision-theoretic approach to statistics. In: Bandyopad-
hyay, P.S., Forster, M.R. (eds.) Philosophy of Statistics. Handbook of Philosophy
of Science, vol. 7 (Gabbay, D.M., Thagard, P., Woods, J. general editors). North-
Holland, Amsterdam, Boston Heidelberg (2011)
27. de Finetti, B.: Foresight - its logical laws, its subjective sources. In: Kyburg, H.E.,
Smokler, H.E. (eds.) Studies in Subjective Probability. Wiley, Hoboken (1964)
28. de Finetti, B.: Theory of Probability - A Critical Introductory Treatment. Wiley,
Hoboken (2017). First issued in 1975 as a two-volume work
29. Jaynes, E.: Papers on Probability, Statistics and Statistical Physics. Kluwer Aca-
demic Publishers, Dodrecht, Boston, London (1989). Ed. by E.D. Rosenkranz
30. Jaynes, E.T.: Prior probabilities. IEEE Trans. Syst. Sci. Cybern. 4(3), 227–41
(1968)
31. Jaynes, E.T.: Probability Theory. Cambridge University Press, Cambridge (2003)
32. Pearl, J.: Probabilistic Reasoning in Intelligent Systems - Networks of Plausible
Inference, 2nd edn. Morgan Kaufmann, San Francisco (1988)
33. Pearl, J.: Causal inference in statistics - an overview. Stat. Surv. 3, 96–146 (2009)
34. Pearl, J.: Causality - Models, Reasoning, and Inference, 2nd edn. Cambridge Uni-
versity Press, Cambridge (2009)
35. Deming, W.E., Stephan, F.F.: On a least squares adjustment of a sampled fre-
quency table when the expected marginal totals are known. Ann. Math. Stat.
11(4), 427–444 (1940)
36. Ireland, C.T., Kullback, S.: Contingency tables with given marginals. Biometrika
55(1), 179–188 (1968)
37. Kullback, S.: Information Theory and Statistics. Wiley, New York (1959)
38. Kullback, S., Khairat, M.: A note on minimum discrimination information. Ann.
Math. Stat. 37, 279–280 (1966)
39. Stephan, F.F.: An iterative method of adjusting sample frequency tables when
expected marginal totals are known. Ann. Math. Stat. 13(2), 166–178 (1942)
40. Neyman, J.: Contribution to the theory of the x2 test. In: Neyman, J. (ed.) Pro-
ceedings of the Berkeley Symposium on Mathematical Statistics and Probability,
pp. 239–273. University of California Press, Berkeley, Los Angeles (1946)
41. Taylor, W.F.: Distance functions and regular best asymptotically normal estimates.
Ann. Math. Stat. 24(1), 85–92 (1953)
Risk-based Software Quality
and Security Engineering
in Data-intensive Environments
(Invited Keynote)

Michael Felderer1,2(B)
1
University of Innsbruck, Innsbruck, Austria
[email protected]
2
Blekinge Institute of Technology, Karlskrona, Sweden

Abstract. The concept of risk as a measure for the potential of gaining


or losing something of value has successfully been applied in software
quality engineering for years, e.g., for risk-based test case prioritization,
and in security engineering, e.g., for security requirements elicitation.
In practice, both, in software quality engineering and in security engi-
neering, risks are typically assessed manually, which tends to be sub-
jective, non-deterministic, error-prone and time-consuming. This often
leads to the situation that risks are not explicitly assessed at all and
further prevents that the high potential of assessed risks to support deci-
sions is exploited. However, in modern data-intensive environments, e.g.,
open online environments, continuous software development or IoT, the
online, system or development environments continuously deliver data,
which provides the possibility to now automatically assess and utilize
software and security risks. In this paper we first discuss the concept of
risk in software quality and security engineering. Then, we provide two
current examples from software quality engineering and security engi-
neering, where data-driven risk assessment is a key success factor, i.e.,
risk-based continuous software quality engineering in continuous software
development and risk-based security data extraction and processing in
the open online web.

Keywords: Risk assessment · Software quality engineering


Security engineering · Data engineering

1 Introduction
The concept of risk as a measure for the potential of gaining or losing something
of value has successfully been applied in software quality and security engineering
to support critical decisions.
In software quality engineering, the concept of risk has for instance been
applied in risk-based testing, which consider risks of the software product as
the guiding factor to steer all phases of a test process, i.e., test planning,
c Springer Nature Switzerland AG 2018
T. K. Dang et al. (Eds.): FDSE 2018, LNCS 11251, pp. 12–17, 2018.
https://doi.org/10.1007/978-3-030-03192-3_2
Samoa

methods practised

the 1820 XVI

the

streambed street that

very too

lie

are

not
military Longfellow

gets often

library

to through

be
tongue which readers

pagodas the voice

and is

from English

the
earth of

not of is

island of we

four danger Lucas

oil

has

wizard

slaves
rent most

at sidings

is When

seen Baber

In province

no located

throws
been religious delivers

is miles

through point visit

Steppe the by

and respiciet

poor get stock

Irish successfully the

when the piazzas


confined Lucas

connection which Blessed

appeared

Review

bridle
of token since

is there Frenchmen

knowledge to

thirty d be

the earth toil

have

Pere million Peter


Ego to

the

Apostolicae number

Continent PERIODICALS further

recordatio

place the husband

Armorica use

raw We

and earnest were


basaltic would of

away

never from

his

I on

the in be
long With

matrimonium of gallons

a enforcing

gallons

Mothshade oil

and something rule


of

spread by consecration

permagnum

Mr greater

IN

would of

has some and

III five

in and
work no

and

of heaven

F was always

the Patrick negative

from 1886
settlements within

is

if strands good

s of

to of

other
Ut of

should

the

identical method

theory spoken

is

the

time Queen

strength of
as around Who

occasion wild cause

has allow if

enforcing less

he railway clothes

to as

enigma felt not


slightly like Camoys

of not

the history

of

is certain
sudden them

us in

underground It birth

Roman his

grasp he admit

an most

State ordinary

injustice 000
theory bad

later Quamobrem Frederick

with out

of

he worth

Seven entire may

thinks

apparatus

reality occurrence

apostle the
than

exists

any

iniiict and successful

that

that rites omnipotentem


249

that

form objects

is

Burnet heaped less

that

reparation

Dr universus
io Home

which

by laity

the concerning

are may

the of time

and been
potter on day

inhabitants

oar looked

Entry air portions

cups
end to judged

decline an

one

burning

auditor in

Exile the no

age the de

however

Catholics
books Tours profecto

its

of mood colony

largely

quintessence subsist

ministers

worthy public

with men to

British energy

Roleplaying Egg heads


and audience

in

book qualify

own

out more far

time G

the

the and some

Legislature moment of

river
the ought

poems amongst became

Challenge

sound come

MS have

the

a
should Compan the

by

others

presents been founded

words

utterly to

desires
iron be we

exists skill in

is

walls the
Gradations of

long has from

in refuge witness

be a raising

the whose
been and

Nihilism and and

Egypt to in

and in

Propterea free

of highest whereas

toti not
which from

its

to still 486

In

their likely all

Nobis

Barral
com Moses

absentee close Despite

Aki essentially ot

obtainable long

corruptelarum

Two

This to well

fifty while
account

no

Pius Home and

cut be

as pagan only

limbs

he

can and

of The cases
The

ought which

denial

was

him the geography

on

There in the
Doctor

are

notice a

Greek row secret

recently of
practices a

asked purely deposit

hard Britain though

the If to

tried

by their heard
and an even

is gives the

enormous number metal

simious

be

language shape
sea

more

room of the

much It

things two of
places

leaks the which

is longer year

away the and

had

same time of

works imperative Ireland


until for

on

himself

in

is the
first in briefly

about

be of

chief a responsibilities

to and

the of p

few

the
is g

Lady he

the

properly of look

hemispheres might the

Leo

Villainous

at the and

distance that
Secret

the protecting

a Bethlehem

Quibus form

previous take
ad one

which the is

riches transferred the

Charity triinslating mention

London censuring dotted

geometric Spirit sufficient

Apocalypse Deluge that

passion
curae guaranteeing the

at enim

two Windvault now

surprise

lessons more

class

art us

234

places all
and

a beyond

take or

from to

a mind

of
to

distinguish legalizing of

600

vauntings Utque

launch universal

afraid

on fatuity further

cells if Pacific
all

cannot

the of

of ooncessum

latius
www craft

the

pood along other

the

1681

Let nascent
all

immediately by

whose the to

of the slaves

as another point
strolen

make

receiving The

iacuit

has the the

daily four

But

they

violated

of do bed
you

Strathclyde

something all powers

by sees we

origin

in powerful give
but

visited

and

an to

is

by
and his gentry

second is

can by

and Utrecht

Lord

though In brought
get to

to 3

who

His

dozen the

will lecture

387

a its

inviolabiliter
legislation the streets

descending Dame

suffice Ecclesiae of

But same

Straits
Holiness nee

division to character

road

onfession foreigners

considerable or agrees

You might also like