Yang / Aalst / Ginige | Information Systems: Modeling, Development, and Integration | E-Book | www.sack.de
E-Book

E-Book, Englisch, Band 20, 579 Seiten

Reihe: Lecture Notes in Business Information Processing

Yang / Aalst / Ginige Information Systems: Modeling, Development, and Integration

Third International United Information Systems Conference, UNISCON 2009, Sydney, Australia, April 21-24, 2009, Proceedings
1. Auflage 2009
ISBN: 978-3-642-01112-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

Third International United Information Systems Conference, UNISCON 2009, Sydney, Australia, April 21-24, 2009, Proceedings

E-Book, Englisch, Band 20, 579 Seiten

Reihe: Lecture Notes in Business Information Processing

ISBN: 978-3-642-01112-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



This volume constitutes the proceedings of the Third International United Information Systems Conference, UNISCON 2009, which was held in Sydney, Australia, during April 21-24, 2009. UNISCON 2009 combines three different events: 8th International Conference on Information Systems Technology and its Applications (ISTA 2009), 8th International Workshop on Conceptual Modelling Approaches for e-Business (eCOMO 2009), and 2nd International Workshop on Model-Based Software and Data Integration (MBSDI 2009). The overall 39 full papers and 14 short papers presented with two keynote speeches were carefully reviewed and selected from 115 submissions. The topics covered are: information systems modelling, information systems analysis, information systems integration, business process modelling, information retrieval and NLP, e-learning and training, datamining, datawarehousing, and visualization, and Web intelligence.

Yang / Aalst / Ginige Information Systems: Modeling, Development, and Integration jetzt bestellen!

Weitere Infos & Material


1;Title Page;2
2;Preface;5
3;Organization;7
4;Table of Contents;11
5;Keynotes (Abstracts);11
5.1;Model-Based Design - A Chance for Good Quality Products and Services by Integrating Intelligence;16
5.2;Process Modelling – What Really Matters;18
6;ISTA Papers;11
6.1;Information Systems Modelling;11
6.1.1;Robust Web Services Provisioning through On-Demand Replication;19
6.1.1.1;Introduction;19
6.1.1.2;Preliminaries;20
6.1.1.2.1;Anatomy of Web Services;21
6.1.1.2.2;Web Services and Web Service Hosts;21
6.1.1.2.3;Stationary and Mobile Web Services;22
6.1.1.3;System Design;22
6.1.1.4;Dynamic Web Services Replication;24
6.1.1.4.1;Replication Decision Model;24
6.1.1.4.2;Deployment Transparency;25
6.1.1.5;Host Matchmaking and Selection;26
6.1.1.6;Implementation and Experimentation;28
6.1.1.6.1;Implementation;28
6.1.1.6.2;Experimentation;29
6.1.1.7;Conclusion;30
6.1.1.8;References;30
6.1.2;Modelling and Maintenance of Very Large Database Schemata Using Meta-structures;32
6.1.2.1;Introduction;32
6.1.2.2;Internal Dimensions of Skeletons and Subschemata;33
6.1.2.3;Meta-structures in Subschemata and Schema Skeletons;34
6.1.2.3.1;Construction Meta-structures;35
6.1.2.3.2;Lifespan Meta-structures;37
6.1.2.3.3;Context Meta-structures;39
6.1.2.4;Application of Meta-structures in Data Modelling;40
6.1.2.4.1;Design by Units;40
6.1.2.4.2;Incremental Structuring;40
6.1.2.4.3;The String Bag Modelling Approach;41
6.1.2.4.4;Rigid Structuring and Principles of Schema Abstraction;42
6.1.2.5;Conclusion;42
6.1.2.6;References;43
6.1.3;SOM-Based Dynamic Image Segmentation for Sign Language Training Simulator;44
6.1.3.1;Introduction;44
6.1.3.2;Related Work;45
6.1.3.3;Dynamic Image Clustering;47
6.1.3.3.1;Data Preparation;47
6.1.3.3.2;Interpretation of Clusters;50
6.1.3.4;Experimental Results;51
6.1.3.5;Conclusion and Future Work;54
6.1.3.6;References;54
6.1.4;Agile Software Solution Framework: An Analysis of Practitioners’ Perspectives;56
6.1.4.1;Introduction;56
6.1.4.2;Research Methodology;58
6.1.4.3;Analysis and Results;59
6.1.4.3.1;Software Methodology Core Aspects;60
6.1.4.3.2;Software Methodology Construction and Selection Factors;61
6.1.4.3.3;Agile Governance;61
6.1.4.3.4;Agile Knowledge;62
6.1.4.3.5;Business Value and Agile Software Development Methodology;63
6.1.4.3.6;Business Policy Impact on Agile Software Development Methodology;64
6.1.4.4;Validity and Limitations;65
6.1.4.5;Conclusion;66
6.1.4.6;References;66
6.1.5;Facilitating Inter-organisational Collaboration via Flexible Sharing of Rapidly Developed Web Applications;68
6.1.5.1;Introduction;68
6.1.5.2;Need for Sharing Web Applications;69
6.1.5.2.1;Features of Information Sharing in Dynamic eCollaboration;69
6.1.5.2.2;General Principles of Sharing Information on the World Wide Web;69
6.1.5.2.3;Limitations of Current Approaches to Sharing;70
6.1.5.3;Bitlet Framework Overview;71
6.1.5.3.1;Bitlet Fundamental Architecture Shift;71
6.1.5.3.2;Key Advantages and Features;73
6.1.5.3.3;The Role of Bitlets in Facilitating Dynamic eCollaboration;73
6.1.5.4;Advantages of Using SBO for Building Web Applications;74
6.1.5.5;Sharing SBO Based Applications Using Bitlets;75
6.1.5.6;Conclusion;77
6.1.5.7;References;78
6.1.6;Sales Forecasting Using an Evolutionary Algorithm Based Radial Basis Function Neural Network;80
6.1.6.1;Introduction;80
6.1.6.2;Literature Review;81
6.1.6.3;The Proposed HPG Algorithm;82
6.1.6.3.1;The Dissect of the HPG Algorithm;83
6.1.6.4;Experiment Results and Comparison;84
6.1.6.4.1;Experimental Parameters Setting;85
6.1.6.4.2;Building ARIMA Models;85
6.1.6.4.3;The Error Measures of the Sales Forecasting Performance;86
6.1.6.5;Conclusions;87
6.1.6.6;References;87
6.1.7;Micro Implementation of Join Operation at Clustering Nodes of Heterogenous Sensor Networks;90
6.1.7.1;Introduction;90
6.1.7.1.1;Data Stream Join Operation;91
6.1.7.1.2;Clustering Nodes in Heterogenous Sensor Networks;91
6.1.7.1.3;Implementation of Join Operation at a Clustering Node;92
6.1.7.1.4;Structure of the Paper;93
6.1.7.2;Previous Works;93
6.1.7.3;Formal Backgrounds;94
6.1.7.3.1;Basic Concepts;94
6.1.7.3.2;Incremental Processing of Join Operation;96
6.1.7.3.3;Optimization of Join Operation;97
6.1.7.4;Micro Implementation of Join Operation;98
6.1.7.5;Firmware Implementation of Join Operation;99
6.1.7.6;Experimental Results;100
6.1.7.6.1;Joining Two Streams;101
6.1.7.6.2;Joining Several Streams;102
6.1.7.7;Summary;104
6.1.7.8;References;104
6.1.8;Facilitating Reuse of Code Checking Rules in Static Code Analysis;106
6.1.8.1;Introduction;106
6.1.8.2;Background;107
6.1.8.2.1;Code Checking Rules;107
6.1.8.2.2;Design Decisions and Quality Requirements;108
6.1.8.3;The Rationale Behind the Code Checking Rules;108
6.1.8.3.1;Code Checking Rules and Design Decisions;108
6.1.8.3.2;Code Checking Rules and Design Patterns;109
6.1.8.3.3;Code Checking Rules and Quality Requirements;110
6.1.8.3.4;Code Checking Rules and Software Quality Characteristics;111
6.1.8.4;A Conceptual Model of Code Checking Rules and Their Rationale;112
6.1.8.5;Rule Reuse;113
6.1.8.5.1;Rule Reuse Cases;113
6.1.8.5.2;Rule Reuse Scenarios;113
6.1.8.6;Related Work;114
6.1.8.6.1;Source-Level (White-Box) Rule Reuse;114
6.1.8.6.2;Code Quality and Black-Box Rule Reuse;115
6.1.8.7;Conclusions and Future Work;116
6.1.8.8;References;116
6.1.9;Achieving Adaptivity Through Strategies in a Distributed Software Architecture;118
6.1.9.1;Introduction;118
6.1.9.2;Motivating Example;119
6.1.9.3;ARMANIS’ Architectural Model;120
6.1.9.3.1;The Request Execution Protocol Model;121
6.1.9.3.2;System Strategies;122
6.1.9.3.3;Connectivity Strategies;123
6.1.9.4;ARMANIS Applied to a Case Study;124
6.1.9.4.1;Implementation Notes;127
6.1.9.5;Conclusions and Further Work;127
6.1.9.6;References;128
6.1.10;Genetic Algorithm Application for Traffic Light Control;130
6.1.10.1;Introduction;130
6.1.10.2;Related Work;130
6.1.10.3;Model Design for Traffic Light;131
6.1.10.3.1;Variables;131
6.1.10.3.2;Cellular Automata;131
6.1.10.3.3;The Model’s Algorithms;132
6.1.10.4;Comparisons between Static and Dynamic Control;133
6.1.10.5;Conclusions and Future Work;134
6.1.10.6;References;135
6.1.11;Weaving Business Processes and Rules: A Petri Net Approach;136
6.1.11.1;Introduction;136
6.1.11.2;Business Rules and Aspect-Orientation;137
6.1.11.3;Modeling Business Rules with PrT Nets;138
6.1.11.4;Weaving Rule Nets into Process Nets;140
6.1.11.5;Conclusion;141
6.1.11.6;References;141
6.2;Enterprise Business Process Modelling;12
6.2.1;Modeling Actions in Dynamic Engineering Design Processes;142
6.2.1.1;Introduction;142
6.2.1.2;Related Work;143
6.2.1.3;Action Modeling Framework of PSI;145
6.2.1.3.1;Preliminaries;145
6.2.1.3.2;Action Kinds;146
6.2.1.3.3;Dependencies and Concurrency;149
6.2.1.4;Implementation and Evaluation;152
6.2.1.5;Concluding Remarks;155
6.2.1.6;References;155
6.2.2;Replenishment Policy with Deteriorating Raw Material Under a Supply Chain: Complexity and the Use of Ant Colony Optimization;157
6.2.2.1;Introduction;157
6.2.2.2;Problem Description;158
6.2.2.3;Ant Colony Optimization for DLSPDRM;159
6.2.2.3.1;The Property and Theorem of the DLSPDRM;159
6.2.2.3.2;Development of Ant Colony Optimization;161
6.2.2.4;Numerical Analysis;164
6.2.2.5;Conclusions;166
6.2.2.6;References;166
6.2.2.7;Appendix: Notation of DLSPDRM Is Defined as Follows;167
6.2.3;An Algorithm for Propagating-Impact Analysis of Process Evolutions;168
6.2.3.1;Introduction;168
6.2.3.2;Background;170
6.2.3.2.1;KAT for Process Modelling;170
6.2.3.2.2;Process Example Using KAT;171
6.2.3.3;DISN Impacts of Process Element Evolution;173
6.2.3.4;Mapping of Process Expressions in KAT to Binary Tree Structures;173
6.2.3.5;Algorithm in Locating DISN Impact of Process Evolution;175
6.2.3.6;Validation of the DISN Impact Locating Algorithm;177
6.2.3.7;Conclusion;178
6.2.3.8;References;178
6.2.4;Business Process Improvements in Production Planning of ERP System Using Enhanced Process and Integrated Data Models;180
6.2.4.1;Introduction;180
6.2.4.2;Framework for Business Process Integration, Automation and Optimisation;182
6.2.4.3;Business Process Improvements Using Enhanced Process and Integrated Data Models;183
6.2.4.4;Integrated Master and Transaction Data in ERP System Environment;185
6.2.4.4.1;Master Data Integration Using Unitary Structures;187
6.2.4.4.2;Production Planning and Execution Using Integrated Master and Transaction Data;188
6.2.4.5;Conclusions;190
6.2.4.6;References;191
6.2.5;Computing the Cost of Business Processes;193
6.2.5.1;Introduction;193
6.2.5.2;Representation of Cost and Reliability in BPD’s;193
6.2.5.3;Calculation Method;194
6.2.5.4;Patterns for Cost Calculation;195
6.2.5.4.1;Pattern 1: n Tasks in a Sequential Order;195
6.2.5.4.2;Pattern 2: n Tasks in a Parallel Order;196
6.2.5.4.3;Pattern 3: Conditional Branching;196
6.2.5.4.4;Pattern 4: ”n” Successive Possibilities;197
6.2.5.5;Example: Breaking a BPD into Patterns;197
6.2.5.6;Further Work and Conclusion;198
6.2.5.7;References;198
6.2.6;Formalizing Computer Forensics Process with UML;199
6.2.6.1;Introduction;199
6.2.6.2;Necessary Parts for the Computer Forensics Process;200
6.2.6.3;UML Model for Forensics Process;201
6.2.6.4;Conclusion;204
6.2.6.5;References;204
6.3;Information Retrieval and NLP;12
6.3.1;Improving Product Usage Monitoring and Analysis with Semantic Concepts;205
6.3.1.1;Introduction;205
6.3.1.2;Related Work;207
6.3.1.3;Example Scenario;207
6.3.1.4;Approach;208
6.3.1.4.1;Overview;208
6.3.1.4.2;Ontologies;210
6.3.1.5;Implementation;212
6.3.1.5.1;Observation Specification and Data Collection via D’PUIS;212
6.3.1.5.2;Semantic Process Mining Using ProM;213
6.3.1.6;Conclusion;214
6.3.1.7;References;215
6.3.2;Using GA and KMP Algorithm to Implement an Approach to Learning Through Intelligent Framework Documentation;217
6.3.2.1;Introduction;217
6.3.2.2;Objective;218
6.3.2.3;Framework Documentation;218
6.3.2.3.1;Documentation Approaches;218
6.3.2.3.2;Literature Review;219
6.3.2.4;Implementation of GA and KMP;219
6.3.2.4.1;Genetic Algorithm (GA);220
6.3.2.4.2;Knuth-Morris-Pratt (KMP) Algorithm;221
6.3.2.5;The Intelligent Documentation Approach;222
6.3.2.6;Implementation: The Prototype;223
6.3.2.6.1;Collaboration Diagram;224
6.3.2.6.2;User Interface and Sample Results;225
6.3.2.7;Discussions;226
6.3.2.8;Conclusion and Future Work;226
6.3.2.9;References;227
6.3.3;Computer-Based Assessment: From Objective Tests to Automated Essay Grading. Now for Automated Essay Writing?;229
6.3.3.1;Motivation for the Study;229
6.3.3.2;Essay Scoring Technology;230
6.3.3.3;The Value of Essays;230
6.3.3.4;Essays for Sale;231
6.3.3.5;Automatically Grading Essays;231
6.3.3.6;Computer Generated Essays;232
6.3.3.7;Architecture of the Gatherer;233
6.3.3.8;Searching the Web;233
6.3.3.9;Document Formats;233
6.3.3.10;Observations, Ongoing Work and Conclusions;234
6.3.3.11;References;235
6.3.4;Attitudes Toward ICT of Electronic Distance Education (ePJJ) Students at the Institute of Education Development, University Technology Mara;237
6.3.4.1;Introduction;237
6.3.4.1.1;Background;237
6.3.4.2;Statement of the Problem;238
6.3.4.3;Methodology;238
6.3.4.4;Findings;238
6.3.4.5;Discussions;241
6.3.4.6;Conclusion;242
6.3.4.7;Recommendation;242
6.3.4.8;References;242
6.4;e-Learning and Training;13
6.4.1;Metaverse Services: Extensible Learning with Mediated Teleporting into 3D Environments;244
6.4.1.1;Introduction;244
6.4.1.2;Background and Motivation;245
6.4.1.3;Existing Approaches and Considerations;246
6.4.1.3.1;Sloodle;246
6.4.1.3.2;No Integration;247
6.4.1.3.3;Background to SLURLs;247
6.4.1.4;Proposed Approach;248
6.4.1.4.1;Architecture;248
6.4.1.4.2;Implementation;249
6.4.1.4.3;Benefits;252
6.4.1.5;Conclusion and Future Work;253
6.4.1.6;References;254
6.4.2;Combining Simulation and Animation of Queueing Scenarios in a Flash-Based Discrete Event Simulator;255
6.4.2.1;Introduction;255
6.4.2.2;The DES Framework;256
6.4.2.2.1;The Distribution Package;257
6.4.2.2.2;The DataCollectors Package;257
6.4.2.2.3;The Monitor Package;258
6.4.2.2.4;The Resource Package;258
6.4.2.3;Graphical Objects in DES Models;259
6.4.2.4;Flash Components;260
6.4.2.5;Example;261
6.4.2.6;Conclusions;265
6.4.2.7;References;265
6.4.3;Preservation of Client Credentials Within Online Multi-user Virtual Environments Used as Learning Spaces;267
6.4.3.1;Introduction;267
6.4.3.2;Background and Motivation;268
6.4.3.3;Existing Approaches and Considerations;269
6.4.3.4;Limitations of Current Approaches;271
6.4.3.5;Proposed Approach;272
6.4.3.5.1;Interoperability of MUVEs;272
6.4.3.6;Benefits of the Approach;274
6.4.3.7;Conclusions and Future Work;275
6.4.3.8;References;275
6.4.4;Short Term Stock Prediction Using SOM;277
6.4.4.1;Introduction;277
6.4.4.2;Self-Organizing Map;278
6.4.4.3;The Proposed Method;279
6.4.4.3.1;Preprocessing;279
6.4.4.3.2;Clustering Analysis;279
6.4.4.3.3;Self-Organizing Map;280
6.4.4.4;Experimental Results;280
6.4.4.5;Conclusion;281
6.4.4.6;References;281
6.5;Datamining, Datawarehousing, and Visualization;13
6.5.1;Rules and Patterns for Website Orchestration;283
6.5.1.1;Introduction;283
6.5.1.2;Related Work;284
6.5.1.3;Placement Prerequisites;285
6.5.1.3.1;Patterns;285
6.5.1.3.2;Grids;285
6.5.1.3.3;Story;286
6.5.1.4;Dynamic Placement;286
6.5.1.4.1;Placement Problems;287
6.5.1.4.2;Placement Strategies;289
6.5.1.4.3;Mashup Placement;290
6.5.1.5;Conclusion;293
6.5.1.6;References;294
6.5.2;Visual Intelligence Density;295
6.5.2.1;Introduction;295
6.5.2.2;Visual Decision Making Problems and Requirements;296
6.5.2.3;Information Visualization Systems;297
6.5.2.4;Visual Intelligence Density;298
6.5.2.5;Visual Decision Making Process;298
6.5.2.6;The VDSSG Framework;300
6.5.2.7;The VDSSG Architecture;301
6.5.2.8;Implementation;302
6.5.2.8.1;A Static Visualization;303
6.5.2.8.2;A Simple Animated Visualization;303
6.5.2.8.3;A Sophisticated Animated Visualization;304
6.5.2.9;Conclusion;305
6.5.2.10;References;305
6.5.3;A Framework for Data Quality in Data Warehousing;307
6.5.3.1;Introduction;307
6.5.3.2;Problem Statement;308
6.5.3.3;Literature Review;308
6.5.3.4;A Framework for Data Quality in Data Warehousing;309
6.5.3.5;Use Case;311
6.5.3.6;Conclusions;311
6.5.3.7;References;312
6.5.4;Visuco: A Tool for Visualizing Software Components Usability;313
6.5.4.1;Introduction;313
6.5.4.2;Our Proposal;314
6.5.4.3;Adapting the Metaphor to Component Usability;314
6.5.4.4;VISUCO: A Tool to Assess Usability Software Component;316
6.5.4.5;Conclusions and Futures Work;317
6.5.4.6;References;318
6.6;Information Sytems Adaption, Integration, and Security;13
6.6.1;Study of Using the Meta-model Based Meta-design Paradigm for Developing and Maintaining Web Applications;319
6.6.1.1;Introduction;319
6.6.1.2;Related Work;320
6.6.1.3;Meta-model Based Meta-design Paradigm to Develop Web Applications;321
6.6.1.3.1;Infrastructure;321
6.6.1.3.2;Learning Environment;322
6.6.1.3.3;Socio-technical Environment;323
6.6.1.4;Case-Study;323
6.6.1.4.1;Discussion;327
6.6.1.5;Conclusion;328
6.6.1.6;References;328
6.6.2;Lost in Translation? Transformation Nets to the Rescue!;330
6.6.2.1;Introduction;330
6.6.2.2;Transformation Nets at a Glance;331
6.6.2.3;The Static Part of Transformation Nets;332
6.6.2.3.1;Representing Metamodel Elements as Places;333
6.6.2.3.2;Representing Model Elements as Tokens;334
6.6.2.4;The Dynamic Part of Transformation Nets;335
6.6.2.5;Lessons Learned;339
6.6.2.6;Related Work;340
6.6.2.7;Conclusion and Future Work;341
6.6.2.8;References;342
6.6.3;Metamodeling Foundation for Software and Data Integration;343
6.6.3.1;Introduction;343
6.6.3.2;Computation Independent Metamodel;344
6.6.3.3;Platform Specific Metamodels;345
6.6.3.3.1;SAP R/3 Platform Specific Metamodel;346
6.6.3.4;Platform Independent Metamodel;347
6.6.3.4.1;Structure and Communication;348
6.6.3.4.2;Property and Behavior;349
6.6.3.5;Semantic and Annotation Metamodel;350
6.6.3.6;Conflict Analysis;351
6.6.3.7;Connector Generation;352
6.6.3.8;Conclusion;353
6.6.3.9;References;354
6.6.4;Medical Personal Data in Secure Information Systems;355
6.6.4.1;Introduction;355
6.6.4.2;Data Protection in Slovenia;356
6.6.4.2.1;Personal Data Protection Act;356
6.6.4.2.2;Healthcare Databases Act;357
6.6.4.3;Regulations for Personal Data and Other Sensitive Data Protection;357
6.6.4.4;Conclusion;358
6.6.4.5;References;359
6.6.5;Implementing Medication Management Software Effectively Within a Hospital Environment: Gaining Benefits from Metaphorical Design;361
6.6.5.1;Introduction;361
6.6.5.2;Literature Review;362
6.6.5.3;Methodology (Design Research);363
6.6.5.4;Research Approach and Context;364
6.6.5.5;Findings and Discussion;366
6.6.5.6;Limitations and Challenges;367
6.6.5.7;Conclusions;367
6.6.5.8;References;368
6.7;Information Systems Architecture and Technologies;14
6.7.1;Exploring the Potential of Component-Oriented Software Development Application;370
6.7.1.1;Introduction;370
6.7.1.2;Information Gathering;371
6.7.1.2.1;Questionnaire Design;373
6.7.1.2.2;Population Determination;373
6.7.1.3;Data Presentation;374
6.7.1.3.1;Current Practice;374
6.7.1.3.2;Component Users’ Experience;376
6.7.1.3.3;Non-component Users’ Perception;377
6.7.1.4;Discussion;378
6.7.1.5;Related Work;379
6.7.1.6;Conclusion;380
6.7.1.7;References;380
6.7.2;On Using Semantic Transformation Algorithms for XML Safe Update;382
6.7.2.1;Introduction;382
6.7.2.2;XML Updates;383
6.7.2.2.1;Overview;383
6.7.2.2.2;Related Works;384
6.7.2.2.3;XML Updates Using SQL/XML;385
6.7.2.3;Safe Updates Framework;386
6.7.2.3.1;Primitive Safe Update Framework;386
6.7.2.3.2;Semantic Safe Update Framework;386
6.7.2.4;Proposed Algorithms;387
6.7.2.5;Implementation;389
6.7.2.6;Analysis;391
6.7.2.7;Conclusion;392
6.7.2.8;References;392
6.7.3;Storing and Querying Graph Data Using Efficient Relational Processing Techniques;394
6.7.3.1;Introduction;394
6.7.3.1.1;Related Work;395
6.7.3.1.2;Organization of the Paper;396
6.7.3.2;Preliminaries;396
6.7.3.2.1;Labelled Graphs;396
6.7.3.2.2;Graph Containment Queries;396
6.7.3.3;Relational Processing of Directed Labelled Graphs;397
6.7.3.3.1;Vertex-Edge Mapping Scheme;397
6.7.3.3.2;Edge-Edge Mapping Scheme;398
6.7.3.4;Relational Processing of Undirected Labelled Graphs;400
6.7.3.4.1;Edge-Vertex Mapping Scheme;400
6.7.3.5;Relational-Based Optimization for Graph Queries;402
6.7.3.5.1;Injecting Selectivity Annotations for SQL Predicates;402
6.7.3.5.2;Relational Indexes Support for SQL-based Graph Queries;403
6.7.3.6;Performance Evaluation;404
6.7.3.7;Conclusions;406
6.7.3.8;References;406
6.7.4;SecCom: A Prototype for Integrating Security-Aware Components;408
6.7.4.1;Introduction;408
6.7.4.2;Security-Aware Integration;410
6.7.4.3;SecCom Prototype;411
6.7.4.3.1;Processing Example;412
6.7.4.3.2;Running of SecCom.;415
6.7.4.4;Implementation;415
6.7.4.5;Conclusion;417
6.7.4.6;References;417
6.7.5;Incorporating Software Testing as a Discipline in Curriculum of Computing Courses;419
6.7.5.1;Introduction;419
6.7.5.2;Overview of the Software Testing Course;420
6.7.5.2.1;Learning Outcomes;421
6.7.5.2.2;Lecture;421
6.7.5.2.3;Lab Session;422
6.7.5.2.4;Assessments;423
6.7.5.3;Challenges and Solution;424
6.7.5.4;Student Feedback;424
6.7.5.5;Impact on Australian Markets;425
6.7.5.6;References;425
6.8;Information Systems Applications and Web Intelligence;14
6.8.1;Intelligent Recruitment Services System;426
6.8.1.1;Introduction;426
6.8.1.2;Overview;428
6.8.1.3;Method Description;429
6.8.1.3.1;Curriculum Vitae Clustering;429
6.8.1.3.2;Clustering CVs Using Integrate Approach;430
6.8.1.3.3;Applicants’ CVs Annotation;431
6.8.1.4;Conclusion;433
6.8.1.5;References;433
6.8.2;Challenges and Opportunities Relating to RFID Implementation in the Healthcare System;435
6.8.2.1;Introduction;435
6.8.2.2;RFID Implementation Challenges in HMS;437
6.8.2.3;RFID in the Hospital Information System – A Case Study;439
6.8.2.3.1;RFID Model for Healthcare Systems;439
6.8.2.3.2;RFID-Enabled HIS Application;440
6.8.2.4;Discussions and Results;442
6.8.2.5;Conclusions and Future Work;444
6.8.2.6;References;445
6.8.3;Communities of Practice and Semantic Web Stimulating Collaboration by Document Markup;447
6.8.3.1;Introduction;447
6.8.3.2;Methods;448
6.8.3.3;A Case Study on Community of Practice;448
6.8.3.4;Novel Techniques for Technical Communications;449
6.8.3.4.1;Services for Reducing Barriers;449
6.8.3.4.2;Stimulating Technical Cooperation;450
6.8.3.5;Implementation;450
6.8.3.6;Conclusion and Outlook;451
6.8.3.7;References;451
7;eCOMO Papers;15
7.1;Modelling and Analysis Challenges;15
7.1.1;Conceptualizing Software Life Cycle;453
7.1.1.1;Introduction;453
7.1.1.2;The Flow Model;454
7.1.1.3;Example of FM Modeling;458
7.1.1.4;Waterfall Model;460
7.1.1.5;The Flow Model and the Waterfall Model;461
7.1.1.6;Flow-Based Waterfall Model;462
7.1.1.7;Requirements Phase;463
7.1.1.8;Requirements Traceability;466
7.1.1.9;Design Phase;468
7.1.1.10;Conclusion;470
7.1.1.11;References;471
7.1.2;Modeling Complex Adaptive Systems;473
7.1.2.1;Introduction;473
7.1.2.2;Collaborative Infrastructures;474
7.1.2.3;A Blueprint for Modeling;476
7.1.2.4;Modeling Activities;476
7.1.2.5;The Business Activity Model;477
7.1.2.6;Social Network Models - Extending Network Diagrams to Collaboration Graphs;479
7.1.2.6.1;Coordination Pattern;479
7.1.2.6.2;Creating Enterprise Collaboration Networks;480
7.1.2.7;The Collaboration Graph for an Outsourcing Example;480
7.1.2.8;Mapping to an Implementation;481
7.1.2.9;Summary;482
7.1.2.10;References;482
7.1.3;Designing Modular Architectures for Cross-Organizational Electronic Interaction;484
7.1.3.1;Introduction;484
7.1.3.2;Architecture Framework for Modular Cross-Organizational Interaction;486
7.1.3.2.1;C-Component;486
7.1.3.2.2;L-Component;487
7.1.3.2.3;O-Component;487
7.1.3.3;Conclusion;489
7.1.3.4;References;489
7.2;Modelling in Action;15
7.2.1;Modelling the Bullwhip Effect Dampening Practices in a Limited Capacity Production Network;490
7.2.1.1;Bullwhip and Production Capacity: An Overview;490
7.2.1.2;Bullwhip Solution Approaches: Collaboration Practices and Smoothing Replenishment Rules;491
7.2.1.3;Methodology: Continuous Time Domain;492
7.2.1.4;Models: Mathematical Formalism;493
7.2.1.5;Performance Metrics, Experimental Sets, Data Analysis;495
7.2.1.5.1;Experimental Sets and Results;497
7.2.1.6;Conclusions;498
7.2.1.7;References;499
7.2.2;A Comparative Analysis of Knowledge Management in SMEs;502
7.2.2.1;Introduction;502
7.2.2.2;Knowledge Management;503
7.2.2.3;A Unify Knowledge Management Model and Research Design;504
7.2.2.4;Data Analysis;506
7.2.2.4.1;Infrastructure Capability;506
7.2.2.4.2;Process Capability;507
7.2.2.4.3;Purposes of KM Adoption;508
7.2.2.5;Discussion;508
7.2.2.6;Conclusion;509
7.2.2.7;References;510
7.2.3;Supporting Strategic Decision Making in an Enterprise University Through Detecting Patterns of Academic Collaboration;511
7.2.3.1;Introduction;511
7.2.3.1.1;Scientific Networks, as a Precursor to Collaborative Academic Networks;512
7.2.3.1.2;Information Sources and Visual Analysis of Academic Networks;512
7.2.3.2;Interestingness and Aspects of Measuring It;514
7.2.3.2.1;Interestingness in Collaborative Networks;515
7.2.3.3;ExtractingInformation about Collaboration;516
7.2.3.3.1;Data Set;516
7.2.3.3.2;Methodology;516
7.2.3.3.3;Analysis;517
7.2.3.4;Conclusions and Future Work;521
7.2.3.5;References;521
7.2.4;Dynamic User Modeling for Personalized Advertisement Delivery on Mobile Devices;523
7.2.4.1;Introduction;523
7.2.4.2;The LUNA Project;524
7.2.4.3;A Dynamic User Model for Personalized Ads Delivery;525
7.2.4.3.1;Long Term User Interest Frameworks;525
7.2.4.3.2;Short Term User Interest Framework;527
7.2.4.4;Conclusion and Future Work;528
7.2.4.5;Reference;528
8;MBSDI Papers;15
8.1;A Graphical Query Language for Querying Petri Nets;529
8.1.1;Introduction;529
8.1.2;Related Works;529
8.1.3;Petri Net;530
8.1.4;Petri Net Query Language (PNQL);532
8.1.4.1;Preliminaries;532
8.1.4.2;Syntax and Semantics of PNQL;533
8.1.5;Complexity of Evaluating Model Patterns;537
8.1.6;Conclusions and Future Perspectives;538
8.1.7;References;539
8.2;Model Checking by Generating Observers from an Interface Specification Between Components;541
8.2.1;Introduction;541
8.2.2;A System Model and a Query of UPPAAL;543
8.2.3;Generation of Observers;544
8.2.3.1;Specification Format of an Interface between Two Components;544
8.2.3.2;Modification of Timed Automata of a System Model;545
8.2.3.3;Procedure of Generating Observers;546
8.2.3.4;Adequacy of a Generated Observer’s Behavior;549
8.2.4;Application to a Communication Protocol System and Evaluations;549
8.2.5;Conclusion;552
8.2.6;References;552
8.3;A Meta-modeling Framework to Support Accountability in Business Process Modeling;554
8.3.1;Introduction;554
8.3.2;Related Work;555
8.3.3;Accountability Meta-model in OMG MDA Framework;556
8.3.4;Accountability Meta-model;556
8.3.4.1;Service Contract Meta-model;556
8.3.4.2;Service Accountability Meta-model;557
8.3.4.3;Formal Specification of the Contract and Accountability Meta-model;558
8.3.5;Application of the Accountability Meta-model;562
8.3.6;Conclusion and Future Work;563
8.3.7;References;564
8.3.8;Appendix A;565
8.4;Extensible and Precise Modeling for Wireless Sensor Networks;566
8.4.1;Introduction;566
8.4.2;Metamodels and Models for WSN Applications;567
8.4.2.1;Generic Metamodel Elements;567
8.4.2.2;Domain-Specific Metamodel Elements;571
8.4.2.3;Platform Specific Metamodel Elements;573
8.4.2.4;Creating a Model Based on the Metamodel;573
8.4.3;Model Validation with OCL;574
8.4.4;Model-to-Code Transformation;575
8.4.5;Preliminary Evaluation;576
8.4.6;Conclusion;576
8.4.7;References;577
9;Author Index;578



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.