{"title":"Towards Automated and Fine-Grain Reuse of Configurable Business Process Models","authors":"Marwa Mdimagh, Sami Bhiri","doi":"10.1109/WETICE.2019.00015","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00015","url":null,"abstract":"Configurable Business Process models (CBP-models for short) are inspired from the design by reuse paradigm. They present a starting point for modeling business processes. However, the individualization of these models is manual which makes it time-consuming and error-prone. Moreover, using such models, business experts are not allowed to reuse a process fragment from this model. Thus, we propose a CPB-model with a hierarchical structure and capability annotated tasks. With such a structure, it is possible to point directly to a target fragment and reuse it. Moreover, the capability-annotation enabled us to develop an algorithm that generates automatically a question flow for a given CBP-model.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"485 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116029359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud","authors":"Luciano Ocone, M. Rak, Umberto Villano","doi":"10.1109/WETICE.2019.00027","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00027","url":null,"abstract":"Applications executed in the cloud can exploit its elasticity features, varying dynamically the amount of leased resources so as to adapt to load variations and to guarantee good quality of service. As auto scaling has severe implications on execution costs, making optimal scaling choices is of paramount importance. This paper presents an analysis method based on off-line benchmarking that allows to define scaling policies to be used by auto-scalers. The indexes obtained by benchmarking multiple deployment configurations can be used on-line, to scale the application making a trade-off between cost and user-perceived performance.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126685172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEW 2019: Data Exploration in the Web 3.0 Age","authors":"M. Atzori, B. Pes","doi":"10.1109/WETICE.2019.00037","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00037","url":null,"abstract":"Now in its third edition, the Data Exploration in the Web 3.0 Age (DEW) track of the IEEE International WETICE Conference continues to bring together researchers and practitioners from both the Academia and Industry working in the areas related to data exploration, in a very broad sense. Papers accepted for presentation at DEW 2019 are representatives of emerging topics in the fields of data and text mining, machine learning, semantic web and Internet of things.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology Design Patterns for Representing Knowledge in the Disaster Risk Domain","authors":"A. Mazimwe, I. Hammouda, A. Gidudu","doi":"10.1109/WETICE.2019.00066","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00066","url":null,"abstract":"The success of disaster risk management efforts depends on the ability of multiple stakeholders to share disaster-related information. Semantic integration of such heterogeneous information requires ontology building. The top-down approach of ontology building has several disadvantages to knowledge representation. To support the process of ontology engineering, a bottom-up-approach that utilizes modular Ontology Design Patterns (ODPs) with weak dependencies can be used to overcome the disadvantages of the top-down approach. To bridge the availability gap of patterns for representing disaster knowledge, the study identifies existing and emerging patterns that can be used to organize disaster knowledge. Based on the eXtreme Design (XD) methodology and key informant interviews, Competency Questions (CQs) were listed from domain stakeholders. Consequently, corresponding patterns covering the CQs were also identified and developed. This study identifies emerging patterns such as Event Type ODP for representing risky and hazardous events. The QualityCausation ODP is also identified for representing the causality nature of vulnerability. The resulting patterns are aligned to the DOLCE foundational ontology and can be used to organize data in the disaster domain.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121101841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Antonio Borrelli, G. D. Lucca, Vittoria Nardone, A. Santone
{"title":"Formal Verification of Radio Communication Management in Railway Systems Using Model Checking Technique","authors":"Antonio Borrelli, G. D. Lucca, Vittoria Nardone, A. Santone","doi":"10.1109/WETICE.2019.00060","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00060","url":null,"abstract":"The European Railway Traffic Management System has the purpose to provide a common signaling system for all the European nations. It consists of two subsystems: the trackside subsystem (TSS) and the on-board subsystem (OBS) that communicate to exchange information about the state of the trackside and/or the train. Radio communication can take place according to the requirements specification reported in ERTMS/ETCS SUBSET-026-3. As the communication between TSS and OBS is a critical issue, we exploit model checking to verify the correctness of the communication process as specified in the SUBSET-026-3. The results achieved during the experimentation seem to be very promising.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124905719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating Privacy-Related Risks for Android Users","authors":"E. Tramontana, Gabriella Verga","doi":"10.1109/WETICE.2019.00059","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00059","url":null,"abstract":"Generally, when an app runs on an Android device, users are asked to approve accesses to sensitive data or resources that require Android dangerous permissions. Otherwise, for other resources, requiring normal permissions, no approval is asked. Once access to resources has been gained, an app could send confidential data outside of the device, with no obvious abuse of security policies. Hence, users could witness a data leak, and, in general terms, a loss of control on data accessed, and about the ways they have been used. This paper shows the mechanisms that an app could use to gain sensitive data, hence breaching user privacy. Then, in order to preserve privacy, a novel and general defence solution is proposed, protecting data and resources in Android devices. Moreover, users are given the ability to configure which accesses have to be prevented and which are granted. As a proof of concept, our protection solution has been embedded in Wikipedia app, however is general and available for any app.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127560544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Bennani, S. Ebersold, M. Hamlaoui, B. Coulette, M. Nassar
{"title":"A Collaborative Decision Approach for Alignment of Heterogeneous Models","authors":"S. Bennani, S. Ebersold, M. Hamlaoui, B. Coulette, M. Nassar","doi":"10.1109/WETICE.2019.00032","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00032","url":null,"abstract":"Design of complex systems goes through a multiview paradigm in which separate teams, from different business viewpoints, build partial models describing the system. As they are expressed in different languages, these partial models are called heterogeneous models. To maintain the global system's consistency, we propose a collaborative approach that combines Group Decision Making (GDM) and Model-Based Engineering. This paper presents a metamodel for collaborative decision elaboration via a set of decision policies which are instances of GDM patterns. Our approach is illustrated with a hospital Emergency Department case study and is supported by a tool allowing models alignment through GDM based processes.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carmelo Fabio Longo, C. Santoro, Federico Fausto Santoro
{"title":"Meaning Extraction in a Domotic Assistant Agent Interacting by Means of Natural Language","authors":"Carmelo Fabio Longo, C. Santoro, Federico Fausto Santoro","doi":"10.1109/WETICE.2019.00013","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00013","url":null,"abstract":"This paper presents a software architecture to let users interact with their smart home devices, through the commonly used social network channels. The software, called FABULOS, is the result of the combination of components used to interact with devices and social networks, and a rule-based artificial intelligence, which implements the base logic for the automation. The core of the software architecture is the translation service, which has the objective of extracting the meaning of the sentences provided by text and voice messages by users in natural language, transforming them into proper device commands. In order to achieve this, the proposed solution relies on an approach which has the capability to interpret and extract the meaning of the intentions plus the entities involved, associated to the sentences sent by the users. A description of a realistic casestudy, which shows an example of how the proposed software behaves in a real interaction with an user, is also included in the paper.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114316858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abhinav Khare, Giovanni Merlino, F. Longo, A. Puliafito, O. Vyas
{"title":"Toward a Trustless Smart City: the #SmartME Experience","authors":"Abhinav Khare, Giovanni Merlino, F. Longo, A. Puliafito, O. Vyas","doi":"10.1109/WETICE.2019.00051","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00051","url":null,"abstract":"A Smart City is an example of a domain where citizens and institutions, at any level, should be empowered by actually decentralizing any mechanism and process that can escape single-authority control and the grip of centrally-managed bureaucracies, while at the same time not relying on any single party trusting any other. In line with this key insight, in this paper, we have designed and implemented a decentralized, trustless system for (environmental) sensing data acquisition, storage, and consumption, in the context of a real-world Smart City deployment and with the participation of independent, institutional, stakeholders. This Open Data system has been extended with an end-user wizard for user-friendly and trustless (i.e., independent) data audit. The acquisition layer requires nodes to authenticate when sending readings. Last but not least, the storage layer is again trustless, as institutions can pool together their resources, without trusting one another, nor entrusting the administration of the system to any third party.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124961499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ontology-Based Monitoring System in Vineyards of the Burgundy Region","authors":"Amira Mouakher, Rami Belkaroui, Aurélie Bertaux, Ouassila Labbani, Clémentine Hugol-Gential, C. Nicolle","doi":"10.1109/WETICE.2019.00070","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00070","url":null,"abstract":"Given the France's rich wine heritage as well as its pioneering position as the world's second wine producer, the production of high quality wines plays a role of primary importance. The recent development of IOT and efficient big data processing has been shown to provide purposeful issue to permanent monitoring during the entire wine making process. Standing within this trend, we introduce in this paper an intelligent system for vineyards monitoring in the Burgundy region. The main trust of the proposed system relies on the use of the Swrl rules in WineCloud ontology. The design of the ontology is mainly based on information gathered from interviews with wine growers. In addition, sensor data is also collected and used to feed the ontology after being processed. The system is used in the aim to have better grape quality with an improved vineyard management. To do so, association rules are extracted from the collected data aiming to provide useful knowledge to forecast vine diseases.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}