ECNLP 3 the Workshop on E-Commerce and NLP Proceedings

Total Page:16

File Type:pdf, Size:1020Kb

ECNLP 3 the Workshop on E-Commerce and NLP Proceedings ECNLP 3 The Workshop on e-Commerce and NLP Proceedings of the Third Workshop July 10, 2020 c 2020 The Association for Computational Linguistics Order copies of this and other ACL proceedings from: Association for Computational Linguistics (ACL) 209 N. Eighth Street Stroudsburg, PA 18360 USA Tel: +1-570-476-8006 Fax: +1-570-476-0860 [email protected] ISBN 978-1-952148-21-7 ii Introduction It is our great pleasure to welcome you to the Third International Workshop on e-Commerce and NLP (ECNLP). This workshop focuses on intersection of Natural Language Processing (NLP) and e-Commerce. NLP and information retrieval (IR) have been powering e-Commerce applications since the early days of the fields. Today, NLP and IR already play a significant role in e-Commerce tasks, including product search, recommender systems, product question answering, machine translation, sentiment analysis, product description and review summarization, and customer review processing. With the exploding popularity of chatbots and shopping assistants – both text- and voice-based – NLP, IR, question answering, and dialogue systems research is poised to transform e-Commerce once again. The ECNLP workshop series was designed to provide a venue for the dissemination of late-breaking research results and ideas related to e-commerce and online shopping, as well as a forum where new and unfinished ideas could be discussed. After the successful ECNLP workshops at The Web Conference in 2019 and 2020, we are happy to host ECNLP 3 at ACL 2020 and once again bring together researchers from both academia and industry. We have received a larger number of submissions than we could accept for presentation. ECNLP 3 received 21 submissions of long and short research papers. In total, ECNLP 3 featured 13 accepted papers (62% acceptance rate). The selection process was competitive and we believe it resulted in a balanced and varied program that is appealing to audiences from the various sub-areas of e-Commerce. We would like to thank everyone who submitted a paper to the workshop. We would also like to express our gratitude to the members of the Program Committee for their timely reviews, and for supporting the tight schedule by providing reviews at short notice. We hope that you enjoy the workshop! The ECNLP Organizers May 2020 iii Organizers: Shervin Malmasi (Amazon, USA) Surya Kallumadi (The Home Depot, USA) Nicola Ueffing (eBay Inc, Germany) Oleg Rokhlenko (Amazon, USA) Eugene Agichtein (Emory University, USA) Ido Guy (eBay Inc, Israel) Program Committee: Amita Misra (IBM) Arushi Prakash (Zulily) Besnik Fetahu (L3S Research Center / Leibniz University of Hannover) Cheng Wang (NEC Laboratories Europe) David Martins de Matos (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa) Debanjan Mahata (Bloomberg) Emerson Paraiso (Pontificia Universidade Catolica do Parana) Giuseppe Castellucci (Amazon) Gregor Leusch (eBay) Irina Temnikova (Sofia University, Bulgaria) Jacopo Tagliabue (Coveo) Lesly Miculicich (École polytechnique fédérale de Lausanne - Idiap) Mladen Karan (TakeLab, University of Zagreb) Raksha Sharma (IIT Roorkee) Simone Filice (Amazon) Wai Lam (The Chinese University of Hong Kong) Xiaoting Zhao (Etsy) Yitong Li (The University of Melbourne) v Table of Contents Bootstrapping Named Entity Recognition in E-Commerce with Positive Unlabeled Learning Hanchu Zhang, Leonhard Hennig, Christoph Alt, Changjian Hu, Yao Meng and Chao Wang. .1 How to Grow a (Product) Tree: Personalized Category Suggestions for eCommerce Type-Ahead Jacopo Tagliabue, Bingqing Yu and Marie Beaulieu . .7 Deep Learning-based Online Alternative Product Recommendations at Scale Mingming Guo, Nian Yan, Xiquan Cui, San He Wu, Unaiza Ahsan, Rebecca West and Khalifeh Al Jadda.......................................................................................19 A Deep Learning System for Sentiment Analysis of Service Calls YananJia.............................................................................. 24 Using Large Pretrained Language Models for Answering User Queries from Product Specifications Kalyani Roy, Smit Shah, Nithish Pai, Jaidam Ramtej, Prajit Nadkarni, Jyotirmoy Banerjee, Pawan Goyal and Surender Kumar . 35 Improving Intent Classification in an E-commerce Voice Assistant by Using Inter-Utterance Context Arpit Sharma . 40 Semi-Supervised Iterative Approach for Domain-Specific Complaint Detection in Social Media Akash Gautam, Debanjan Mahata, Rakesh Gosangi and Rajiv Ratn Shah . 46 Item-based Collaborative Filtering with BERT Tian Wang and Yuyangzi Fu . 54 Semi-supervised Category-specific Review Tagging on Indonesian E-Commerce Product Reviews Meng Sun, Marie Stephen Leo, Eram Munawwar, Paul C. Condylis, Sheng-yi Kong, Seong Per Lee, Albert Hidayat and Muhamad Danang Kerianto . 59 Deep Hierarchical Classification for Category Prediction in E-commerce System DehongGao........................................................................... 64 SimsterQ: A Similarity based Clustering Approach to Opinion Question Answering Aishwarya Ashok, Ganapathy Natarajan, Ramez Elmasri and Laurel Smith-Stvan . 69 e-Commerce and Sentiment Analysis: Predicting Outcomes of Class Action Lawsuits Stacey Taylor and Vlado Keselj . 77 On Application of Bayesian Parametric and Non-parametric Methods for User Cohorting in Product Search Shashank Gupta . 86 vii Bootstrapping Named Entity Recognition in E-Commerce with Positive Unlabeled Learning Hanchu Zhang1 Leonhard Hennig2 Christoph Alt2 Changjian Hu1 Yao Meng1 Chao Wang1 1Lenovo Research Artificial Intelligence Lab 2German Research Center for Artificial Intelligence (DFKI) zhanghc9,hucj1,mengyao1,wangchao31 @lenovo.com { leonhard.hennig,christoph.alt @dfki.de} { } Abstract pressed as complex noun phrases instead of proper names. Product and component category terms Named Entity Recognition (NER) in domains are often combined with brand names, model num- like e-commerce is an understudied prob- bers, and attributes (“hard drive” “SSD hard lem due to the lack of annotated datasets. → drive” “WD Blue 500 GB SSD hard drive”), Recognizing novel entity types in this do- → main, such as products, components, and at- which are almost impossible to enumerate exhaus- tributes, is challenging because of their lin- tively. In such a low-coverage setting, employing a guistic complexity and the low coverage of ex- simple dictionary-based approach would result in isting knowledge resources. To address this very low recall, and yield very noisy labels when problem, we present a bootstrapped positive- used as a source of labels for a supervised machine unlabeled learning algorithm that integrates learning algorithm. To address the drawbacks of domain-specific linguistic features to quickly and efficiently expand the seed dictionary. The dictionary-based labeling, Peng et al.(2019) pro- model achieves an average F1 score of 72.02% pose a positive-unlabeled (PU) NER approach that on a novel dataset of product descriptions, an labels positive instances using a seed dictionary, improvement of 3.63% over a baseline BiL- but makes no label assumptions for the remain- STM classifier, and in particular exhibits better ing tokens (Bekker and Davis, 2018). The authors recall (4.96% on average). validate their approach on the CoNLL, MUC and Twitter datasets for standard entity types, but it 1 Introduction is unclear how their approach transfers to the e- The vast majority of existing named entity recogni- commerce domain and its entity types. tion (NER) methods focus on a small set of promi- nent entity types, such as persons, organizations, Contributions We adopt the PU algorithm of diseases, and genes, for which labeled datasets are Peng et al.(2019) to the domain of consumer elec- readily available (Tjong Kim Sang and De Meulder, tronic product descriptions, and evaluate its effec- 2003; Smith et al., 2008; Weischedel et al., 2011; tiveness on four entity types: Product, Component, Li et al., 2016). There is a marked lack of studies in Brand and Attribute. Our algorithm bootstraps many other domains, such as e-commerce, and for NER with a seed dictionary, iteratively labels more novel entity types, e.g. products and components. data and expands the dictionary, while account- The lack of annotated datasets in the e- ing for accumulated errors from model predictions. commerce domain makes it hard to apply super- During labeling, we utilize dependency parsing to vised NER methods. An alternative approach is efficiently expand dictionary matches in text. Our to use dictionaries (Nadeau et al., 2006; Yang experiments on a novel dataset of product descrip- et al., 2018), but freely available knowledge re- tions show that this labeling mechanism, combined sources, e.g. Wikidata (Vrandecicˇ and Krotzsch¨ , with a PU learning strategy, consistently improves 2014) or YAGO (Suchanek et al., 2007), contain F1 scores over a standard BiLSTM classifier. Iter- only very limited information about e-commerce ative learning quickly expands the dictionary, and entities. Manually creating a dictionary of suffi- further improves model performance. The pro- cient quality and coverage would be prohibitively posed approach exhibits much better recall than expensive. This is amplified by the fact that in the baseline model, and generalizes better to un- the e-commerce domain, entities are frequently ex- seen entities. 1 Proceedings of the 3rd Workshop on e-Commerce and NLP (ECNLP 3), pages 1–6 Online, July 10, 2020. c 2020 Association for Computational Linguistics Algorithm 1: Iterative Bootstrapping NER Input: Dictionary
Recommended publications
  • A Holistic Framework for Open Low-Power Internet of Things
    A Holistic Framework for Open Low-Power Internet of Things Technology Ecosystems Peng Hu1, Member, IEEE Abstract The low-power Internet of Things (IoT) has been thriving because of the recent technological advancement and ecosystems meeting the vertical application requirements and market needs. An open IoT technology ecosystem of the low-power IoT has become increasingly important to all the players and stakeholders and to the research community. However, there are several mainstream low-power IoT ecosystems available out of industry consortia or research projects and there are different models implied in them. We need to identify the working framework behind the scene and find out the principle of driving the future trends in the industry and research community. With a close look at these IoT technology ecosystems, four major business models are identified that can lead to the proposed ecosystem framework. The framework considers the technical building blocks, market needs, and business vertical segments, where these parts are making the IoT evolve as a whole for the years to come. I. Introduction Internet advances with the openness in mind, so does the Internet of Things (IoT). An IoT system benefit from various kinds of technologies and developmental efforts driven by open IoT technology ecosystems involving open standards, open source tools, and open platforms with key stakeholders. Over the past decade, the innovative sensors, embedded systems, cloud computing, wireless networking technologies have been enriching the openness of IoT systems and fulfilling the needs of IoT system development. As a result, on the one hand, these technologies enable the extremely less power consumption on IoT devices than before, which enables a broad spectrum of zero-battery and battery-powered applications.
    [Show full text]
  • Wireless Sensor Networks Technology and Simulation Software’S
    ISSN (Online) 2278-1021 IJARCCE ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 5, May 2016 An Overview on Wireless Sensor Networks Technology and Simulation Software’s Vijay S. Kale1, Rohit D. Kulkarni2 Associate Professor, Department of Electronic Science, KTHM College, Nashik, Maharashtra, India1 M. Phil. Student, Department of Electronic Science, KTHM College, Nashik, Maharashtra, India2 Abstract: Advances in wireless networking, micro-fabrication and integration of sensors and actuators manufactured using micro-electromechanical system (MEMS) technology and embedded microprocessors have enabled a new generation of massive-scale sensor networks suitable for a range of commercial and military applications. Sensor networks promise to couple end users directly to sensor measurements and provide information that is precisely localized in time and/or space, according to the user’s needs or demands. Node-level design simulators simulate the behaviour of a sensor network on a per-node basis. Using simulation, designers can quickly study the performance in terms of timing, power, bandwidth, and scalability without implementing them on actual hardware and dealing with the actual physical phenomena. The present communication gives the brief survey of wireless sensor network (WSN), WSN components, details of operating systems (TinyOS, RIOT, Nano-RK, MANTIS etc.) and WSN simulation software’s (NS2, OMNET++, J-Sim, JiST, GloMoSim, SSFNet etc.). The aim is to provide a better understanding of the current research issues in this field and outline the use of certain tools to meet the design objectives which will be useful to learner/researcher to develop WSNs applications. Keywords: Sensor nodes, Architecture, Operating system, Simulation software, Wireless technology.
    [Show full text]
  • Deployment of Tinyos for Online Water Sensing
    TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.6, June 2014, pp. 4802 ~ 4807 DOI: 10.11591/telkomnika.v12i6.5525 4802 Deployment of TinyOS for Online Water Sensing Xin Wang*, Pan Xu Key Laboratory of Advanced Process Control for Light Industry (Ministry of Education), Jiangnan University, Wuxi 214122, PR China *Corresponding author, e-mail: [email protected] Abstract Current quality assessment methods of water parameters are mainly laboratory based, require fresh supplies of chemicals, trained staff and are time consuming. Sensor networks are great alternatives for such requirements. We present a practical application of wireless networks: a remote water monitoring system running TinyOS. The contents of several chemicals in the water are sensed and transmitted. The sensor data are collected and transmitted via ZigBee and GPRS. Instead of focusing on theoretic issues such as routing algorithms, network lifetime and so on, we investigate special techniques involved in the implementation of the system while employing TinyOS and its special programming language. Keywords: TinyOS, hierarchical network, embedded operating system, water sensing 1. Introduction TinyOS is an open source, BSD-licensed operating system designed for low-power wireless devices, such as those used in sensor networks, ubiquitous computing, personal area networks, smart buildings, and smart meters. To confront the water pollution, various water monitoring systems based on cellular mobile network have been developed [1, 2]. These systems may assist environmental protection agencies in providing continuous water monitoring with minimum interaction of man interference. But, with such systems, the rare channel resources and hardware are greatly wasted when the monitoring nodes are distributed in higher density.
    [Show full text]
  • Wireless Communication : Wi-Fi, Bluetooth, IEEE 802.15.4, DASH7
    Wireless Communication : Wi-Fi, Bluetooth, IEEE 802.15.4, DASH7 Helen Fornazier, Aurélien Martin, Scott Messner 16 march 2012 Abstract This article has for objective to introduce the basic concepts of and to compare dierent wireless technologies applied to embedded systems. It focuses on Wi-Fi, Bluetooth, IEEE 802.15.4 and Dash7. For each technology, this article covers multiplexing, topology, range, energy consumption, data rate, application, security and peculiarities. At the end of the article, the developer should be able to choose the best wireless technology for their own embedded application and have a basic notion as to how to integrate the technology into their system. Contents 1 Introduction 3 2 Wi-Fi 3 2.1 Origins . 3 2.2 Frequency Channels . 4 2.3 Multiplexing . 4 2.4 Network Topology . 4 2.4.1 Infrastructure Topology (Point-to-Point or Point- to-Multipoint) . 4 2.4.2 Ad-Hoc Topology . 5 2.5 Layers Denitions . 5 2.6 Range, Power Consumption, Data Rate . 8 2.7 Security . 8 2.8 Particularities and Embedded Applications . 8 2.8.1 Wi-Fi Conguration Interface . 10 2.8.2 Embedded Software integration . 10 2.8.3 Other Considerations . 10 2.8.4 Applications of Ad Hoc: Wi-Fi Direct . 12 3 Bluetooth 12 3.1 Origins . 12 3.2 Frequency Channels . 12 3.3 Multiplexing . 13 1 3.4 Network Topology . 13 3.4.1 Piconet Topology . 13 3.4.2 Scatternet Topology . 13 3.5 Layers Denitions . 13 3.5.1 The Bluetooth Controller . 15 3.5.2 The Bluetooth Host .
    [Show full text]
  • Source Code Vulnerabilities in Iot Software Systems
    Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 3, 1502-1507 (2017) ASTESJ www.astesj.com ISSN: 2415-6698 Special Issue on Recent Advances in Engineering Systems Source Code Vulnerabilities in IoT Software Systems Saleh Mohamed Alnaeli*,1, Melissa Sarnowski2, Md Sayedul Aman3, Ahmed Abdelgawad3, Kumar Yelamarthi3 1CSEPA, University of Wisconsin-Colleges, 53715, USA 2Computer Science, University of Wisconsin-Fox Valley, 54952, USA 3College of Science and Engineering, Central Michigan University, 48859, USA A R T I C L E I N F O A B S T R A C T Article history: An empirical study that examines the usage of known vulnerable statements in software Received: 02 June, 2017 systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 Accepted: 21 July, 2017 open source systems comprised of millions of lines of code and containing thousands of Online: 15 August, 2017 files. Static analysis methods are applied to each system to determine the number of unsafe commands (e.g., strcpy, strcmp, and strlen) that are well-known among research Keywords: communities to cause potential risks and security concerns, thereby decreasing a system’s unsafe commands robustness and quality. These unsafe statements are banned by many companies (e.g., vulnerable software Microsoft). The use of these commands should be avoided from the start when writing code scientific and should be removed from legacy code over time as recommended by new C/C++ security language standards. Each system is analyzed and the distribution of the known unsafe static analysis commands is presented.
    [Show full text]
  • A Long-Distance RF-Powered Sensor Node with Adaptive Power Management for Iot Applications
    sensors Article A Long-Distance RF-Powered Sensor Node with Adaptive Power Management for IoT Applications Matteo Pizzotti 1,2,* ID , Luca Perilli 1 ID , Massimo del Prete 2, Davide Fabbri 2, Roberto Canegallo 3, Michele Dini 1, Diego Masotti 2 ID , Alessandra Costanzo 1,2, Eleonora Franchi Scarselli 1,2 ID and Aldo Romani 1,2 ID 1 Advanced Research Center on Electronic Systems, University of Bologna, Via Toffano 2/2, Bologna 40126, Italy; [email protected] (L.P.); [email protected] (M.D.); [email protected] (A.C.); [email protected] (E.F.S.); [email protected] (A.R.) 2 Department of Electrical, Electronic, and Information Engineering, University of Bologna, Via Risorgimento 2, Bologna 40126, Italy; [email protected] (M.d.P.); [email protected] (D.F.); [email protected] (D.M.) 3 STMicroelectronics, Via Camillo Olivetti, Agrate Brianza 20864, Italy; [email protected] * Correspondence: [email protected]; Tel.: +39-054-733-9537 Received: 30 June 2017; Accepted: 26 July 2017; Published: 28 July 2017 Abstract: We present a self-sustained battery-less multi-sensor platform with RF harvesting capability down to −17 dBm and implementing a standard DASH7 wireless communication interface. The node operates at distances up to 17 m from a 2 W UHF carrier. RF power transfer allows operation when common energy scavenging sources (e.g., sun, heat, etc.) are not available, while the DASH7 communication protocol makes it fully compatible with a standard IoT infrastructure. An optimized energy-harvesting module has been designed, including a rectifying antenna (rectenna) and an integrated nano-power DC/DC converter performing maximum-power-point-tracking (MPPT).
    [Show full text]
  • Sensor Networks and Their Applications: Investigating the Role of Sensor Web Enablement
    Sensor Networks and Their Applications: Investigating the Role of Sensor Web Enablement A Thesis submitted for the degree of Communications Engineering Doctorate (EngD) Jeffery George Foley Communications & Information Systems Research Group Department of Electronic & Electrical Engineering University College London BT Group plc, BT Centre, 81 Newgate Street, London EC1A 7AJ March 2014 Statement of Originality I, Jeffery George Foley, confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. Signed: _______________________________ Date: ________________________________ 2 Abstract The Engineering Doctorate (EngD) was conducted in conjunction with BT Research on state-of-the-art Wireless Sensor Network (WSN) projects. The first area of work is a literature review of WSN project applications, some of which the author worked on as a BT Researcher based at the world renowned Adastral Park Research Labs in Suffolk (2004-09). WSN applications are examined within the context of Machine-to-Machine (M2M); Information Networking (IN); Internet/Web of Things (IoT/WoT); smart home and smart devices; BT’s 21st Century Network (21CN); Cloud Computing; and future trends. In addition, this thesis provides an insight into the capabilities of similar external WSN project applications. Under BT’s Sensor Virtualization project, the second area of work focuses on building a Generic Architecture for WSNs with reusable infrastructure and ‘infostructure’ by identifying and trialling suitable components, in order to realise actual business benefits for BT. The third area of work focuses on the Open Geospatial Consortium (OGC) standards and their Sensor Web Enablement (SWE) initiative.
    [Show full text]
  • Ondrej Kreibich Wireless Diagnostic Methods in an Aerospace Application
    Czech Technical University in Prague Faculty of Electrical Engineering DOCTORAL THESIS OndˇrejKreibich Wireless diagnostic methods in an aerospace application Department of Measurement Supervisor of the doctoral thesis: doc. Ing. Radislav Sm´ıd,PhD.ˇ Study programme: Electrical Engineering and Information Technology Specialization: Air Traffic Control February 2014 Acknowledgement There are a number of people without whom this thesis might not have been written, and to whom I am greatly indebted. First and foremost, I have to thank my parents and my brother for their love and support throughout my life. A very special acknowledgement goes to my girlfriend Ester, who loved and supported me during the final, critical months of my dissertation. I would like to give my sincerely thanks to my supervisor, Associate Prof. Radislav Smid, PhD., for his guidance and support throughout my studies, and especially for his confidence in me. His comments and questions have helped me greatly in completing the manuscript. I am grateful to him for discussing and inter- preting some of the results presented in this thesis. Finally, my thanks to all my friends who have supported me or influenced me along the way. I declare that I carried out this doctoral thesis independently, and only with the cited sources, literature and other professional sources. In Prague date ............ signature of the author N´azevpr´ace:Metody bezdr´atov´ediagnostiky v leteck´ych aplikac´ıch Autor: Ing. OndˇrejKreibich Katedra: Katedra mˇeˇren´ı, CVUTˇ v Praze, FEL Vedouc´ıdisertaˇcn´ıpr´ace: doc. Ing. Radislav Sm´ıd,Ph.D.,ˇ Katedra mˇeˇren´ı Abstrakt: Strategie pl´anovan´e´udrˇzby je zaloˇzenana pr˚ubˇeˇzn´emsledov´an´ıstavu zaˇr´ızen´ıse syst´ememvˇcasn´ehovarov´an´ıpˇrednestandardn´ımistavy v chov´an´ısle- dovan´ehozaˇr´ızen´ı.
    [Show full text]
  • Internet De Les Coses : Arquitectures, Protocols I Aplicacions
    L’Internet de les Coses: arquitectures, protocols i aplicacions Estudiant: Mario Pareja Nieto MUET UOC-URL Setembre 2014 – Gener 2015 Consultor: Pere Tuset Peiró 11 de Gener de 2015 Pàgina 2 Resum Les demandes d’informació de la societat actual són cada cop més elevades, creixen inexorablement dia a dia. La principal premisa que ens trobem és que, a través del tractament i anàlisi d’aquesta informació es podrà obtenir un major coneixement del medi que ens envolta. Al seu torn, la intenció final és que aquest major grau coneixement repercutirà, d’una manera o altra, en majors beneficis per als individus i per la societat en general; en definitiva, una major qualitat de vida. Més informació comporta més comunicació mitjançant mitjans telemàtics, per tal de que els usuaris puguin comunicar-se entre ells o bé amb les màquines, segons l’esquema tradicional de comunicació home-home o home-màquina. Per la seva banda i, sense cap mena de dubte, avui dia la principal xarxa global de comunicacions és Internet, tant en l’àmbit personal com a professional. Per tant, tenim que la majòria de les comunicacions usuari-usuari o usuari- màquina que es realitzen avui dia ho fan a través d’aquesta xarxa global. L’Internet de les Coses (IoT o Internet of Things, en anglès) és un concepte encara prou recent, que representa un pas més enllà en les comunicacions a la Xarxa, segons el qual aquestes darreres passen a ser directament màquina a màquina (M2M o Machine-To-Machine, en anglès) i sense cap tipus d’interacció per part de cap usuari.
    [Show full text]
  • Évaluation Et Amélioration Des Plates-Formes Logicielles Pour Réseaux De Capteurs Sans-Fil, Pour Optimiser La Qualité De Service Et L’Énergie Kévin Roussel
    Évaluation et amélioration des plates-formes logicielles pour réseaux de capteurs sans-fil, pour optimiser la qualité de service et l’énergie Kévin Roussel To cite this version: Kévin Roussel. Évaluation et amélioration des plates-formes logicielles pour réseaux de capteurs sans- fil, pour optimiser la qualité de service et l’énergie. Autre [cs.OH]. Université de Lorraine, 2016. Français. NNT : 2016LORR0051. tel-01754653 HAL Id: tel-01754653 https://hal.univ-lorraine.fr/tel-01754653 Submitted on 30 Mar 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. AVERTISSEMENT Ce document est le fruit d'un long travail approuvé par le jury de soutenance et mis à disposition de l'ensemble de la communauté universitaire élargie. Il est soumis à la propriété intellectuelle de l'auteur. Ceci implique une obligation de citation et de référencement lors de l’utilisation de ce document. D'autre part, toute contrefaçon, plagiat, reproduction illicite encourt une poursuite pénale. Contact : [email protected] LIENS Code de la Propriété Intellectuelle.
    [Show full text]
  • Content-Centric Networking in the Internet of Things
    Content-Centric Networking in the Internet of Things Otto Waltari Helsinki 25.11.2013 M.Sc. thesis UNIVERSITY OF HELSINKI Department of Computer Science HELSINGIN YLIOPISTO HELSINGFORS UNIVERSITET UNIVERSITY OF HELSINKI Tiedekunta Fakultet Faculty Laitos Institution Department Faculty of Science Department of Computer Science Tekijä Författare Author Otto Waltari Työn nimi Arbetets titel Title Content-Centric Networking in the Internet of Things Oppiaine Läroämne Subject Computer Science Työn laji Arbetets art Level Aika Datum Month and year Sivumäärä Sidoantal Number of pages M.Sc. thesis 25.11.2013 45 sivua Tiivistelmä Referat Abstract Advanced low-cost wireless technologies have enabled a huge variety of real life applications in the past years. Wireless sensor technologies have emerged in almost every application eld imaginable. Smartphones equipped with Internet connectivity and home electronics with networking capability have made their way to everyday life. The Internet of Things (IoT) is a novel paradigm that has risen to frame the idea of a large scale sensing ecosystem, in which all possible devices could contribute. The denition of a thing in this context is very vague. It can be anything from passive RFID tags on retail packaging to intelligent transducers observing the surrounding world. The amount of connected devices in such a worldwide sensing network would be enormous. This is ultimately challenging for the current Internet architecture which is several decades old and is based on host-to-host connectivity. The current Internet addresses content by location. It is based on point-to-point connections, which eventually means that every connected device has to be uniquely addressable through a hostname or an IP address.
    [Show full text]
  • A Review on Reliability, Security and Memory Management of Numerous Operating Systems
    Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol. 7, No. 3, Sep 2019, pp. 577~585 ISSN: 2089-3272, DOI: 10.11591/ijeei.v7i3.987 577 A Review on Reliability, Security and Memory Management of Numerous Operating Systems Mohammad Marufuzzaman1, Shafin Al Karim2, Md Saifur Rahman3, Noor Mohammad Zahid4, Lariyah Mohd Sidek5 1,5Sustainable Technology and Environment Group, Institute of Energy Infrastructure, Universiti Tenaga Nasional, 43000, Kajang, Selangor,Malaysia 2-4American International University, Dhaka, Bangladesh. Article Info ABSTRACT Article history: With the improvement of technology and the growing needs of computer systems, it is needed to ensure that operating systems are able to provide the Received Jan 25, 2019 required functionalities. To provide these functionality operating systems are Revised May 1, 2019 designed to maintain some design factors such as scalability, security, Accepted Jun 26, 2019 reliability, performance, memory management, energy efficiency. However, none of these factors can be achieved directly without facing any challenges. This research studied several design issues that are connected to each other in Keyword: terms of providing an effective result. Therefore, this review article tried to reveal the major issues, which are independently more complex to solve at IoT once. Finally, this research provides a guideline to overcome the challenges Scalabilitye for future researchers by studying many research articles based on these Energy efficiency design issues. Operating system Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Mohammad Marufuzzaman, Sustainable Technology and Environment Group, Institute of Energy Infrastructure, Universiti Tenaga Nasional, 43000, Kajang, Selangor,Malaysia Email: [email protected] 1.
    [Show full text]