2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)最新文献

筛选
英文 中文
Towards Automated and Fine-Grain Reuse of Configurable Business Process Models 实现可配置业务流程模型的自动化和细粒度重用
Marwa Mdimagh, Sami Bhiri
{"title":"Towards Automated and Fine-Grain Reuse of Configurable Business Process Models","authors":"Marwa Mdimagh, Sami Bhiri","doi":"10.1109/WETICE.2019.00015","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00015","url":null,"abstract":"Configurable Business Process models (CBP-models for short) are inspired from the design by reuse paradigm. They present a starting point for modeling business processes. However, the individualization of these models is manual which makes it time-consuming and error-prone. Moreover, using such models, business experts are not allowed to reuse a process fragment from this model. Thus, we propose a CPB-model with a hierarchical structure and capability annotated tasks. With such a structure, it is possible to point directly to a target fragment and reuse it. Moreover, the capability-annotation enabled us to develop an algorithm that generates automatically a question flow for a given CBP-model.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"485 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116029359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud 基于基准的云端自动扩展Web应用的成本分析
Luciano Ocone, M. Rak, Umberto Villano
{"title":"Benchmark-Based Cost Analysis of Auto Scaling Web Applications in the Cloud","authors":"Luciano Ocone, M. Rak, Umberto Villano","doi":"10.1109/WETICE.2019.00027","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00027","url":null,"abstract":"Applications executed in the cloud can exploit its elasticity features, varying dynamically the amount of leased resources so as to adapt to load variations and to guarantee good quality of service. As auto scaling has severe implications on execution costs, making optimal scaling choices is of paramount importance. This paper presents an analysis method based on off-line benchmarking that allows to define scaling policies to be used by auto-scalers. The indexes obtained by benchmarking multiple deployment configurations can be used on-line, to scale the application making a trade-off between cost and user-perceived performance.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126685172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DEW 2019: Data Exploration in the Web 3.0 Age DEW 2019: Web 3.0时代的数据探索
M. Atzori, B. Pes
{"title":"DEW 2019: Data Exploration in the Web 3.0 Age","authors":"M. Atzori, B. Pes","doi":"10.1109/WETICE.2019.00037","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00037","url":null,"abstract":"Now in its third edition, the Data Exploration in the Web 3.0 Age (DEW) track of the IEEE International WETICE Conference continues to bring together researchers and practitioners from both the Academia and Industry working in the areas related to data exploration, in a very broad sense. Papers accepted for presentation at DEW 2019 are representatives of emerging topics in the fields of data and text mining, machine learning, semantic web and Internet of things.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontology Design Patterns for Representing Knowledge in the Disaster Risk Domain 灾害风险领域知识表示的本体设计模式
A. Mazimwe, I. Hammouda, A. Gidudu
{"title":"Ontology Design Patterns for Representing Knowledge in the Disaster Risk Domain","authors":"A. Mazimwe, I. Hammouda, A. Gidudu","doi":"10.1109/WETICE.2019.00066","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00066","url":null,"abstract":"The success of disaster risk management efforts depends on the ability of multiple stakeholders to share disaster-related information. Semantic integration of such heterogeneous information requires ontology building. The top-down approach of ontology building has several disadvantages to knowledge representation. To support the process of ontology engineering, a bottom-up-approach that utilizes modular Ontology Design Patterns (ODPs) with weak dependencies can be used to overcome the disadvantages of the top-down approach. To bridge the availability gap of patterns for representing disaster knowledge, the study identifies existing and emerging patterns that can be used to organize disaster knowledge. Based on the eXtreme Design (XD) methodology and key informant interviews, Competency Questions (CQs) were listed from domain stakeholders. Consequently, corresponding patterns covering the CQs were also identified and developed. This study identifies emerging patterns such as Event Type ODP for representing risky and hazardous events. The QualityCausation ODP is also identified for representing the causality nature of vulnerability. The resulting patterns are aligned to the DOLCE foundational ontology and can be used to organize data in the disaster domain.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121101841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal Verification of Radio Communication Management in Railway Systems Using Model Checking Technique 基于模型检验技术的铁路系统无线电通信管理形式化验证
Antonio Borrelli, G. D. Lucca, Vittoria Nardone, A. Santone
{"title":"Formal Verification of Radio Communication Management in Railway Systems Using Model Checking Technique","authors":"Antonio Borrelli, G. D. Lucca, Vittoria Nardone, A. Santone","doi":"10.1109/WETICE.2019.00060","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00060","url":null,"abstract":"The European Railway Traffic Management System has the purpose to provide a common signaling system for all the European nations. It consists of two subsystems: the trackside subsystem (TSS) and the on-board subsystem (OBS) that communicate to exchange information about the state of the trackside and/or the train. Radio communication can take place according to the requirements specification reported in ERTMS/ETCS SUBSET-026-3. As the communication between TSS and OBS is a critical issue, we exploit model checking to verify the correctness of the communication process as specified in the SUBSET-026-3. The results achieved during the experimentation seem to be very promising.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124905719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigating Privacy-Related Risks for Android Users 降低Android用户隐私相关风险
E. Tramontana, Gabriella Verga
{"title":"Mitigating Privacy-Related Risks for Android Users","authors":"E. Tramontana, Gabriella Verga","doi":"10.1109/WETICE.2019.00059","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00059","url":null,"abstract":"Generally, when an app runs on an Android device, users are asked to approve accesses to sensitive data or resources that require Android dangerous permissions. Otherwise, for other resources, requiring normal permissions, no approval is asked. Once access to resources has been gained, an app could send confidential data outside of the device, with no obvious abuse of security policies. Hence, users could witness a data leak, and, in general terms, a loss of control on data accessed, and about the ways they have been used. This paper shows the mechanisms that an app could use to gain sensitive data, hence breaching user privacy. Then, in order to preserve privacy, a novel and general defence solution is proposed, protecting data and resources in Android devices. Moreover, users are given the ability to configure which accesses have to be prevented and which are granted. As a proof of concept, our protection solution has been embedded in Wikipedia app, however is general and available for any app.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127560544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Collaborative Decision Approach for Alignment of Heterogeneous Models 异构模型对齐的协同决策方法
S. Bennani, S. Ebersold, M. Hamlaoui, B. Coulette, M. Nassar
{"title":"A Collaborative Decision Approach for Alignment of Heterogeneous Models","authors":"S. Bennani, S. Ebersold, M. Hamlaoui, B. Coulette, M. Nassar","doi":"10.1109/WETICE.2019.00032","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00032","url":null,"abstract":"Design of complex systems goes through a multiview paradigm in which separate teams, from different business viewpoints, build partial models describing the system. As they are expressed in different languages, these partial models are called heterogeneous models. To maintain the global system's consistency, we propose a collaborative approach that combines Group Decision Making (GDM) and Model-Based Engineering. This paper presents a metamodel for collaborative decision elaboration via a set of decision policies which are instances of GDM patterns. Our approach is illustrated with a hospital Emergency Department case study and is supported by a tool allowing models alignment through GDM based processes.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Meaning Extraction in a Domotic Assistant Agent Interacting by Means of Natural Language 基于自然语言交互的多域辅助智能体意义提取
Carmelo Fabio Longo, C. Santoro, Federico Fausto Santoro
{"title":"Meaning Extraction in a Domotic Assistant Agent Interacting by Means of Natural Language","authors":"Carmelo Fabio Longo, C. Santoro, Federico Fausto Santoro","doi":"10.1109/WETICE.2019.00013","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00013","url":null,"abstract":"This paper presents a software architecture to let users interact with their smart home devices, through the commonly used social network channels. The software, called FABULOS, is the result of the combination of components used to interact with devices and social networks, and a rule-based artificial intelligence, which implements the base logic for the automation. The core of the software architecture is the translation service, which has the objective of extracting the meaning of the sentences provided by text and voice messages by users in natural language, transforming them into proper device commands. In order to achieve this, the proposed solution relies on an approach which has the capability to interpret and extract the meaning of the intentions plus the entities involved, associated to the sentences sent by the users. A description of a realistic casestudy, which shows an example of how the proposed software behaves in a real interaction with an user, is also included in the paper.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114316858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Toward a Trustless Smart City: the #SmartME Experience 迈向无信任的智慧城市:#SmartME体验
Abhinav Khare, Giovanni Merlino, F. Longo, A. Puliafito, O. Vyas
{"title":"Toward a Trustless Smart City: the #SmartME Experience","authors":"Abhinav Khare, Giovanni Merlino, F. Longo, A. Puliafito, O. Vyas","doi":"10.1109/WETICE.2019.00051","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00051","url":null,"abstract":"A Smart City is an example of a domain where citizens and institutions, at any level, should be empowered by actually decentralizing any mechanism and process that can escape single-authority control and the grip of centrally-managed bureaucracies, while at the same time not relying on any single party trusting any other. In line with this key insight, in this paper, we have designed and implemented a decentralized, trustless system for (environmental) sensing data acquisition, storage, and consumption, in the context of a real-world Smart City deployment and with the participation of independent, institutional, stakeholders. This Open Data system has been extended with an end-user wizard for user-friendly and trustless (i.e., independent) data audit. The acquisition layer requires nodes to authenticate when sending readings. Last but not least, the storage layer is again trustless, as institutions can pool together their resources, without trusting one another, nor entrusting the administration of the system to any third party.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124961499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Ontology-Based Monitoring System in Vineyards of the Burgundy Region 基于本体的勃艮第葡萄园监测系统
Amira Mouakher, Rami Belkaroui, Aurélie Bertaux, Ouassila Labbani, Clémentine Hugol-Gential, C. Nicolle
{"title":"An Ontology-Based Monitoring System in Vineyards of the Burgundy Region","authors":"Amira Mouakher, Rami Belkaroui, Aurélie Bertaux, Ouassila Labbani, Clémentine Hugol-Gential, C. Nicolle","doi":"10.1109/WETICE.2019.00070","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00070","url":null,"abstract":"Given the France's rich wine heritage as well as its pioneering position as the world's second wine producer, the production of high quality wines plays a role of primary importance. The recent development of IOT and efficient big data processing has been shown to provide purposeful issue to permanent monitoring during the entire wine making process. Standing within this trend, we introduce in this paper an intelligent system for vineyards monitoring in the Burgundy region. The main trust of the proposed system relies on the use of the Swrl rules in WineCloud ontology. The design of the ontology is mainly based on information gathered from interviews with wine growers. In addition, sensor data is also collected and used to feed the ontology after being processed. The system is used in the aim to have better grape quality with an improved vineyard management. To do so, association rules are extracted from the collected data aiming to provide useful knowledge to forecast vine diseases.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信