Information Systems: Modeling, Development, and Integration - Third International United Information Systems Conference, UNISCON 2009, Sydney, Australia, April 21-24, 2009, Proceedings

von: Will Aalst, John Mylopoulos, Norman M. Sadeh, Michael J. Shaw, Clemens Szyperski, Jianhua Yang, Athu

Springer-Verlag, 2009

ISBN: 9783642011122 , 579 Seiten

Format: PDF, OL

Kopierschutz: Wasserzeichen

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Online-Lesen für: Windows PC,Mac OSX,Linux

Preis: 73,78 EUR

Mehr zum Inhalt

Information Systems: Modeling, Development, and Integration - Third International United Information Systems Conference, UNISCON 2009, Sydney, Australia, April 21-24, 2009, Proceedings


 

Title Page

2

Preface

5

Organization

7

Table of Contents

11

Keynotes (Abstracts)

11

Model-Based Design - A Chance for Good Quality Products and Services by Integrating Intelligence

16

Process Modelling – What Really Matters

18

ISTA Papers

11

Information Systems Modelling

11

Robust Web Services Provisioning through On-Demand Replication

19

Introduction

19

Preliminaries

20

Anatomy of Web Services

21

Web Services and Web Service Hosts

21

Stationary and Mobile Web Services

22

System Design

22

Dynamic Web Services Replication

24

Replication Decision Model

24

Deployment Transparency

25

Host Matchmaking and Selection

26

Implementation and Experimentation

28

Implementation

28

Experimentation

29

Conclusion

30

References

30

Modelling and Maintenance of Very Large Database Schemata Using Meta-structures

32

Introduction

32

Internal Dimensions of Skeletons and Subschemata

33

Meta-structures in Subschemata and Schema Skeletons

34

Construction Meta-structures

35

Lifespan Meta-structures

37

Context Meta-structures

39

Application of Meta-structures in Data Modelling

40

Design by Units

40

Incremental Structuring

40

The String Bag Modelling Approach

41

Rigid Structuring and Principles of Schema Abstraction

42

Conclusion

42

References

43

SOM-Based Dynamic Image Segmentation for Sign Language Training Simulator

44

Introduction

44

Related Work

45

Dynamic Image Clustering

47

Data Preparation

47

Interpretation of Clusters

50

Experimental Results

51

Conclusion and Future Work

54

References

54

Agile Software Solution Framework: An Analysis of Practitioners’ Perspectives

56

Introduction

56

Research Methodology

58

Analysis and Results

59

Software Methodology Core Aspects

60

Software Methodology Construction and Selection Factors

61

Agile Governance

61

Agile Knowledge

62

Business Value and Agile Software Development Methodology

63

Business Policy Impact on Agile Software Development Methodology

64

Validity and Limitations

65

Conclusion

66

References

66

Facilitating Inter-organisational Collaboration via Flexible Sharing of Rapidly Developed Web Applications

68

Introduction

68

Need for Sharing Web Applications

69

Features of Information Sharing in Dynamic eCollaboration

69

General Principles of Sharing Information on the World Wide Web

69

Limitations of Current Approaches to Sharing

70

Bitlet Framework Overview

71

Bitlet Fundamental Architecture Shift

71

Key Advantages and Features

73

The Role of Bitlets in Facilitating Dynamic eCollaboration

73

Advantages of Using SBO for Building Web Applications

74

Sharing SBO Based Applications Using Bitlets

75

Conclusion

77

References

78

Sales Forecasting Using an Evolutionary Algorithm Based Radial Basis Function Neural Network

80

Introduction

80

Literature Review

81

The Proposed HPG Algorithm

82

The Dissect of the HPG Algorithm

83

Experiment Results and Comparison

84

Experimental Parameters Setting

85

Building ARIMA Models

85

The Error Measures of the Sales Forecasting Performance

86

Conclusions

87

References

87

Micro Implementation of Join Operation at Clustering Nodes of Heterogenous Sensor Networks

90

Introduction

90

Data Stream Join Operation

91

Clustering Nodes in Heterogenous Sensor Networks

91

Implementation of Join Operation at a Clustering Node

92

Structure of the Paper

93

Previous Works

93

Formal Backgrounds

94

Basic Concepts

94

Incremental Processing of Join Operation

96

Optimization of Join Operation

97

Micro Implementation of Join Operation

98

Firmware Implementation of Join Operation

99

Experimental Results

100

Joining Two Streams

101

Joining Several Streams

102

Summary

104

References

104

Facilitating Reuse of Code Checking Rules in Static Code Analysis

106

Introduction

106

Background

107

Code Checking Rules

107

Design Decisions and Quality Requirements

108

The Rationale Behind the Code Checking Rules

108

Code Checking Rules and Design Decisions

108

Code Checking Rules and Design Patterns

109

Code Checking Rules and Quality Requirements

110

Code Checking Rules and Software Quality Characteristics

111

A Conceptual Model of Code Checking Rules and Their Rationale

112

Rule Reuse

113

Rule Reuse Cases

113

Rule Reuse Scenarios

113

Related Work

114

Source-Level (White-Box) Rule Reuse

114

Code Quality and Black-Box Rule Reuse

115

Conclusions and Future Work

116

References

116

Achieving Adaptivity Through Strategies in a Distributed Software Architecture

118

Introduction

118

Motivating Example

119

ARMANIS’ Architectural Model

120

The Request Execution Protocol Model

121

System Strategies

122

Connectivity Strategies

123

ARMANIS Applied to a Case Study

124

Implementation Notes

127

Conclusions and Further Work

127

References

128

Genetic Algorithm Application for Traffic Light Control

130

Introduction

130

Related Work

130

Model Design for Traffic Light

131

Variables

131

Cellular Automata

131

The Model’s Algorithms

132

Comparisons between Static and Dynamic Control

133

Conclusions and Future Work

134

References

135

Weaving Business Processes and Rules: A Petri Net Approach

136

Introduction

136

Business Rules and Aspect-Orientation

137

Modeling Business Rules with PrT Nets

138

Weaving Rule Nets into Process Nets

140

Conclusion

141

References

141

Enterprise Business Process Modelling

12

Modeling Actions in Dynamic Engineering Design Processes

142

Introduction

142

Related Work

143

Action Modeling Framework of PSI

145

Preliminaries

145

Action Kinds

146

Dependencies and Concurrency

149

Implementation and Evaluation

152

Concluding Remarks

155

References

155

Replenishment Policy with Deteriorating Raw Material Under a Supply Chain: Complexity and the Use of Ant Colony Optimization

157

Introduction

157

Problem Description

158

Ant Colony Optimization for DLSPDRM

159

The Property and Theorem of the DLSPDRM

159

Development of Ant Colony Optimization

161

Numerical Analysis

164

Conclusions

166

References

166

Appendix: Notation of DLSPDRM Is Defined as Follows

167

An Algorithm for Propagating-Impact Analysis of Process Evolutions

168

Introduction

168

Background

170

KAT for Process Modelling

170

Process Example Using KAT

171

DISN Impacts of Process Element Evolution

173

Mapping of Process Expressions in KAT to Binary Tree Structures

173

Algorithm in Locating DISN Impact of Process Evolution

175

Validation of the DISN Impact Locating Algorithm

177

Conclusion

178

References

178

Business Process Improvements in Production Planning of ERP System Using Enhanced Process and Integrated Data Models

180

Introduction

180

Framework for Business Process Integration, Automation and Optimisation

182

Business Process Improvements Using Enhanced Process and Integrated Data Models

183

Integrated Master and Transaction Data in ERP System Environment

185

Master Data Integration Using Unitary Structures

187

Production Planning and Execution Using Integrated Master and Transaction Data

188

Conclusions

190

References

191

Computing the Cost of Business Processes

193

Introduction

193

Representation of Cost and Reliability in BPD’s

193

Calculation Method

194

Patterns for Cost Calculation

195

Pattern 1: n Tasks in a Sequential Order

195

Pattern 2: n Tasks in a Parallel Order

196

Pattern 3: Conditional Branching

196

Pattern 4: ”n” Successive Possibilities

197

Example: Breaking a BPD into Patterns

197

Further Work and Conclusion

198

References

198

Formalizing Computer Forensics Process with UML

199

Introduction

199

Necessary Parts for the Computer Forensics Process

200

UML Model for Forensics Process

201

Conclusion

204

References

204

Information Retrieval and NLP

12

Improving Product Usage Monitoring and Analysis with Semantic Concepts

205

Introduction

205

Related Work

207

Example Scenario

207

Approach

208

Overview

208

Ontologies

210

Implementation

212

Observation Specification and Data Collection via D’PUIS

212

Semantic Process Mining Using ProM

213

Conclusion

214

References

215

Using GA and KMP Algorithm to Implement an Approach to Learning Through Intelligent Framework Documentation

217

Introduction

217

Objective

218

Framework Documentation

218

Documentation Approaches

218

Literature Review

219

Implementation of GA and KMP

219

Genetic Algorithm (GA)

220

Knuth-Morris-Pratt (KMP) Algorithm

221

The Intelligent Documentation Approach

222

Implementation: The Prototype

223

Collaboration Diagram

224

User Interface and Sample Results

225

Discussions

226

Conclusion and Future Work

226

References

227

Computer-Based Assessment: From Objective Tests to Automated Essay Grading. Now for Automated Essay Writing?

229

Motivation for the Study

229

Essay Scoring Technology

230

The Value of Essays

230

Essays for Sale

231

Automatically Grading Essays

231

Computer Generated Essays

232

Architecture of the Gatherer

233

Searching the Web

233

Document Formats

233

Observations, Ongoing Work and Conclusions

234

References

235

Attitudes Toward ICT of Electronic Distance Education (ePJJ) Students at the Institute of Education Development, University Technology Mara

237

Introduction

237

Background

237

Statement of the Problem

238

Methodology

238

Findings

238

Discussions

241

Conclusion

242

Recommendation

242

References

242

e-Learning and Training

13

Metaverse Services: Extensible Learning with Mediated Teleporting into 3D Environments

244

Introduction

244

Background and Motivation

245

Existing Approaches and Considerations

246

Sloodle

246

No Integration

247

Background to SLURLs

247

Proposed Approach

248

Architecture

248

Implementation

249

Benefits

252

Conclusion and Future Work

253

References

254

Combining Simulation and Animation of Queueing Scenarios in a Flash-Based Discrete Event Simulator

255

Introduction

255

The DES Framework

256

The Distribution Package

257

The DataCollectors Package

257

The Monitor Package

258

The Resource Package

258

Graphical Objects in DES Models

259

Flash Components

260

Example

261

Conclusions

265

References

265

Preservation of Client Credentials Within Online Multi-user Virtual Environments Used as Learning Spaces

267

Introduction

267

Background and Motivation

268

Existing Approaches and Considerations

269

Limitations of Current Approaches

271

Proposed Approach

272

Interoperability of MUVEs

272

Benefits of the Approach

274

Conclusions and Future Work

275

References

275

Short Term Stock Prediction Using SOM

277

Introduction

277

Self-Organizing Map

278

The Proposed Method

279

Preprocessing

279

Clustering Analysis

279

Self-Organizing Map

280

Experimental Results

280

Conclusion

281

References

281

Datamining, Datawarehousing, and Visualization

13

Rules and Patterns for Website Orchestration

283

Introduction

283

Related Work

284

Placement Prerequisites

285

Patterns

285

Grids

285

Story

286

Dynamic Placement

286

Placement Problems

287

Placement Strategies

289

Mashup Placement

290

Conclusion

293

References

294

Visual Intelligence Density

295

Introduction

295

Visual Decision Making Problems and Requirements

296

Information Visualization Systems

297

Visual Intelligence Density

298

Visual Decision Making Process

298

The VDSSG Framework

300

The VDSSG Architecture

301

Implementation

302

A Static Visualization

303

A Simple Animated Visualization

303

A Sophisticated Animated Visualization

304

Conclusion

305

References

305

A Framework for Data Quality in Data Warehousing

307

Introduction

307

Problem Statement

308

Literature Review

308

A Framework for Data Quality in Data Warehousing

309

Use Case

311

Conclusions

311

References

312

Visuco: A Tool for Visualizing Software Components Usability

313

Introduction

313

Our Proposal

314

Adapting the Metaphor to Component Usability

314

VISUCO: A Tool to Assess Usability Software Component

316

Conclusions and Futures Work

317

References

318

Information Sytems Adaption, Integration, and Security

13

Study of Using the Meta-model Based Meta-design Paradigm for Developing and Maintaining Web Applications

319

Introduction

319

Related Work

320

Meta-model Based Meta-design Paradigm to Develop Web Applications

321

Infrastructure

321

Learning Environment

322

Socio-technical Environment

323

Case-Study

323

Discussion

327

Conclusion

328

References

328

Lost in Translation? Transformation Nets to the Rescue!

330

Introduction

330

Transformation Nets at a Glance

331

The Static Part of Transformation Nets

332

Representing Metamodel Elements as Places

333

Representing Model Elements as Tokens

334

The Dynamic Part of Transformation Nets

335

Lessons Learned

339

Related Work

340

Conclusion and Future Work

341

References

342

Metamodeling Foundation for Software and Data Integration

343

Introduction

343

Computation Independent Metamodel

344

Platform Specific Metamodels

345

SAP R/3 Platform Specific Metamodel

346

Platform Independent Metamodel

347

Structure and Communication

348

Property and Behavior

349

Semantic and Annotation Metamodel

350

Conflict Analysis

351

Connector Generation

352

Conclusion

353

References

354

Medical Personal Data in Secure Information Systems

355

Introduction

355

Data Protection in Slovenia

356

Personal Data Protection Act

356

Healthcare Databases Act

357

Regulations for Personal Data and Other Sensitive Data Protection

357

Conclusion

358

References

359

Implementing Medication Management Software Effectively Within a Hospital Environment: Gaining Benefits from Metaphorical Design

361

Introduction

361

Literature Review

362

Methodology (Design Research)

363

Research Approach and Context

364

Findings and Discussion

366

Limitations and Challenges

367

Conclusions

367

References

368

Information Systems Architecture and Technologies

14

Exploring the Potential of Component-Oriented Software Development Application

370

Introduction

370

Information Gathering

371

Questionnaire Design

373

Population Determination

373

Data Presentation

374

Current Practice

374

Component Users’ Experience

376

Non-component Users’ Perception

377

Discussion

378

Related Work

379

Conclusion

380

References

380

On Using Semantic Transformation Algorithms for XML Safe Update

382

Introduction

382

XML Updates

383

Overview

383

Related Works

384

XML Updates Using SQL/XML

385

Safe Updates Framework

386

Primitive Safe Update Framework

386

Semantic Safe Update Framework

386

Proposed Algorithms

387

Implementation

389

Analysis

391

Conclusion

392

References

392

Storing and Querying Graph Data Using Efficient Relational Processing Techniques

394

Introduction

394

Related Work

395

Organization of the Paper

396

Preliminaries

396

Labelled Graphs

396

Graph Containment Queries

396

Relational Processing of Directed Labelled Graphs

397

Vertex-Edge Mapping Scheme

397

Edge-Edge Mapping Scheme

398

Relational Processing of Undirected Labelled Graphs

400

Edge-Vertex Mapping Scheme

400

Relational-Based Optimization for Graph Queries

402

Injecting Selectivity Annotations for SQL Predicates

402

Relational Indexes Support for SQL-based Graph Queries

403

Performance Evaluation

404

Conclusions

406

References

406

SecCom: A Prototype for Integrating Security-Aware Components

408

Introduction

408

Security-Aware Integration

410

SecCom Prototype

411

Processing Example

412

Running of SecCom.

415

Implementation

415

Conclusion

417

References

417

Incorporating Software Testing as a Discipline in Curriculum of Computing Courses

419

Introduction

419

Overview of the Software Testing Course

420

Learning Outcomes

421

Lecture

421

Lab Session

422

Assessments

423

Challenges and Solution

424

Student Feedback

424

Impact on Australian Markets

425

References

425

Information Systems Applications and Web Intelligence

14

Intelligent Recruitment Services System

426

Introduction

426

Overview

428

Method Description

429

Curriculum Vitae Clustering

429

Clustering CVs Using Integrate Approach

430

Applicants’ CVs Annotation

431

Conclusion

433

References

433

Challenges and Opportunities Relating to RFID Implementation in the Healthcare System

435

Introduction

435

RFID Implementation Challenges in HMS

437

RFID in the Hospital Information System – A Case Study

439

RFID Model for Healthcare Systems

439

RFID-Enabled HIS Application

440

Discussions and Results

442

Conclusions and Future Work

444

References

445

Communities of Practice and Semantic Web Stimulating Collaboration by Document Markup

447

Introduction

447

Methods

448

A Case Study on Community of Practice

448

Novel Techniques for Technical Communications

449

Services for Reducing Barriers

449

Stimulating Technical Cooperation

450

Implementation

450

Conclusion and Outlook

451

References

451

eCOMO Papers

15

Modelling and Analysis Challenges

15

Conceptualizing Software Life Cycle

453

Introduction

453

The Flow Model

454

Example of FM Modeling

458

Waterfall Model

460

The Flow Model and the Waterfall Model

461

Flow-Based Waterfall Model

462

Requirements Phase

463

Requirements Traceability

466

Design Phase

468

Conclusion

470

References

471

Modeling Complex Adaptive Systems

473

Introduction

473

Collaborative Infrastructures

474

A Blueprint for Modeling

476

Modeling Activities

476

The Business Activity Model

477

Social Network Models - Extending Network Diagrams to Collaboration Graphs

479

Coordination Pattern

479

Creating Enterprise Collaboration Networks

480

The Collaboration Graph for an Outsourcing Example

480

Mapping to an Implementation

481

Summary

482

References

482

Designing Modular Architectures for Cross-Organizational Electronic Interaction

484

Introduction

484

Architecture Framework for Modular Cross-Organizational Interaction

486

C-Component

486

L-Component

487

O-Component

487

Conclusion

489

References

489

Modelling in Action

15

Modelling the Bullwhip Effect Dampening Practices in a Limited Capacity Production Network

490

Bullwhip and Production Capacity: An Overview

490

Bullwhip Solution Approaches: Collaboration Practices and Smoothing Replenishment Rules

491

Methodology: Continuous Time Domain

492

Models: Mathematical Formalism

493

Performance Metrics, Experimental Sets, Data Analysis

495

Experimental Sets and Results

497

Conclusions

498

References

499

A Comparative Analysis of Knowledge Management in SMEs

502

Introduction

502

Knowledge Management

503

A Unify Knowledge Management Model and Research Design

504

Data Analysis

506

Infrastructure Capability

506

Process Capability

507

Purposes of KM Adoption

508

Discussion

508

Conclusion

509

References

510

Supporting Strategic Decision Making in an Enterprise University Through Detecting Patterns of Academic Collaboration

511

Introduction

511

Scientific Networks, as a Precursor to Collaborative Academic Networks

512

Information Sources and Visual Analysis of Academic Networks

512

Interestingness and Aspects of Measuring It

514

Interestingness in Collaborative Networks

515

ExtractingInformation about Collaboration

516

Data Set

516

Methodology

516

Analysis

517

Conclusions and Future Work

521

References

521

Dynamic User Modeling for Personalized Advertisement Delivery on Mobile Devices

523

Introduction

523

The LUNA Project

524

A Dynamic User Model for Personalized Ads Delivery

525

Long Term User Interest Frameworks

525

Short Term User Interest Framework

527

Conclusion and Future Work

528

Reference

528

MBSDI Papers

15

A Graphical Query Language for Querying Petri Nets

529

Introduction

529

Related Works

529

Petri Net

530

Petri Net Query Language (PNQL)

532

Preliminaries

532

Syntax and Semantics of PNQL

533

Complexity of Evaluating Model Patterns

537

Conclusions and Future Perspectives

538

References

539

Model Checking by Generating Observers from an Interface Specification Between Components

541

Introduction

541

A System Model and a Query of UPPAAL

543

Generation of Observers

544

Specification Format of an Interface between Two Components

544

Modification of Timed Automata of a System Model

545

Procedure of Generating Observers

546

Adequacy of a Generated Observer’s Behavior

549

Application to a Communication Protocol System and Evaluations

549

Conclusion

552

References

552

A Meta-modeling Framework to Support Accountability in Business Process Modeling

554

Introduction

554

Related Work

555

Accountability Meta-model in OMG MDA Framework

556

Accountability Meta-model

556

Service Contract Meta-model

556

Service Accountability Meta-model

557

Formal Specification of the Contract and Accountability Meta-model

558

Application of the Accountability Meta-model

562

Conclusion and Future Work

563

References

564

Appendix A

565

Extensible and Precise Modeling for Wireless Sensor Networks

566

Introduction

566

Metamodels and Models for WSN Applications

567

Generic Metamodel Elements

567

Domain-Specific Metamodel Elements

571

Platform Specific Metamodel Elements

573

Creating a Model Based on the Metamodel

573

Model Validation with OCL

574

Model-to-Code Transformation

575

Preliminary Evaluation

576

Conclusion

576

References

577

Author Index

578