{"title":"Do We Have Tools for Developing Green Applications? - IDE Tool with Power Management Computation Plugin","authors":"Tina Ho, Rebecca Chen, Jerry Chang","doi":"10.1109/ICEBE.2012.29","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.29","url":null,"abstract":"Power resources on the mobile device are always valuable, meanwhile there are 4.6 billion mobile-phone subscribers worldwide. The total amount of energy consumed and the carbon footprint on those mobile devices is considerable which implies developing tools for green applications to become ever more critical. However, there is currently no effective way for application developers to know the power consumption of their applications, nor a development tool to disable unnecessary or optional functions when device power reaches to lower levels. In this paper, we propose an application development tool that provides the power consumption information in integrated development environment (IDE) tools. By using our tool, application developers can clearly evaluate power consumption of applications they develop, and decide whether to down grade or turn off minor functions or features to switch to power saving mode while power resource is limited.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"1990 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128226868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection","authors":"Christoph Fritsch, G. Pernul","doi":"10.1109/ICEBE.2012.39","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.39","url":null,"abstract":"Dynamic run-time selection and sourcing of service components provide considerable potential in todays changing business world. They provide means to counter agility, flexibility and the ability to integrate applications originating from systems of different security domains. While the advantages are obvious strong implications to security in general and authorization and access control in particular do exist. In this paper we present an infrastructure-based approach for en-route dynamic credential enrichment. It enables dynamic replacement of access-restricted service instances by implementing runtime supplementation of security tokens. If authorized, a security intermediary accesses user profiles and retrieves security tokens supplied by identity providers and needed for access control at dynamically selected access-restricted service instances.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115731695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of P2P Virtual World Infrastructure","authors":"Bingqing Shen, J. Guo, Philip Chen","doi":"10.1109/ICEBE.2012.55","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.55","url":null,"abstract":"With the development of computer science and virtual reality technology, virtual world evolves along the way of computer game development, from arcade games, console system games, LAN games, Internet connectivity games, unstructured games, games with player generation of content, worlds with designer-provided objectives, games with social networks, and open virtual worlds [1]. Traditional server-client structure does not scale well at least in the following three aspects which are limited number of players in each server, single point of failure risk, and unbalanced computation resource. This survey investigates another alternative, peer-to-peer (P2P) virtual world software infrastructure, to address these traditional architectural issues.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nikolaus Huber, A. Hoorn, A. Koziolek, Fabian Brosig, Samuel Kounev
{"title":"S/T/A: Meta-Modeling Run-Time Adaptation in Component-Based System Architectures","authors":"Nikolaus Huber, A. Hoorn, A. Koziolek, Fabian Brosig, Samuel Kounev","doi":"10.1109/ICEBE.2012.21","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.21","url":null,"abstract":"Modern virtualized system environments usually host diverse applications of different parties and aim at utilizing resources efficiently while ensuring that quality-of-service requirements are continuously satisfied. In such scenarios, complex adaptations to changes in the system environment are still largely performed manually by humans. Over the past decade, autonomic self-adaptation techniques aiming to minimize human intervention have become increasingly popular. However, given that adaptation processes are usually highly system specific, it is a challenge to abstract from system details enabling the reuse of adaptation strategies. In this paper, we propose a novel modeling language (meta-model) providing means to describe system adaptation processes at the system architecture level in a generic, human-understandable and reusable way. We apply our approach to three different realistic contexts (dynamic resource allocation, software architecture optimization, and run-time adaptation planning) showing how the gap between complex manual adaptations and their autonomous execution can be closed by using a holistic model-based approach.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124690174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SecEPM: A Security Engineering Process Model for Electronic Business Processes","authors":"Jörn Eichler","doi":"10.1109/ICEBE.2012.41","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.41","url":null,"abstract":"Business process management (BPM) and accompanying systems allow organizations to react faster both to environmental and market changes. Therefore, BPM is widely applied in industry. Although organizations depend on the secure enactment of electronic business processes, existing BPM languages and techniques provide only little support for security. Several approaches have been proposed to close the gap for security in the domain of BPM. Nevertheless, an approach to develop secure electronic business processes systematically is still missing. In this paper, we provide the design as well as key entities of our Security Engineering Process Model (SecEPM) for electronic business processes. SecEPM guides security, business process, and domain experts through the development of secure business processes from the identification of security goals to the selection and configuration of security controls. It integrates security in the development life cycle of electronic business processes in a flexible way, thus allowing for a secure, adaptable organization.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131234576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining Contextual Knowledge for Context-Aware Recommender Systems","authors":"Wenping Zhang, Raymond Y. K. Lau, Xiaohui Tao","doi":"10.1109/ICEBE.2012.65","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.65","url":null,"abstract":"With the rapid growth of the number of electronic transactions conducted over the Internet, recommender systems have been proposed to provide consumers with personalized product recommendations. A hybrid symbolic and quantitative approach for recommender agent systems is promising because it can improve the recommender agents' prediction effectiveness, learning autonomy, and explanatory power. However, recommender agents must be empowered with sufficient domain-specific knowledge so as to reason about specific recommendation contexts to improve their prediction accuracy. This paper illustrates a novel text mining method which is applied to automatically extract domain-specific knowledge for context-aware recommendations. According to our preliminary experiments, recommender agents empowered by the text mining mechanism outperform the agents without text mining capabilities. To our best knowledge, this is the first study of integrating text mining method into a symbolic logical framework for the development of recommender agents.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"1037 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116270043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear Modelling and Optimization to Evaluate Customer Satisfaction and Loyalty","authors":"Alireza Faed, O. Hussain, Mehdi Faed, Z. Saberi","doi":"10.1109/ICEBE.2012.32","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.32","url":null,"abstract":"In this study, a conceptual framework is postulated to mathematically evaluate and ascertain the hypothesised relationship that perceived value and interactivity has with customer dissatisfaction issues. Then, the relationship between customer satisfaction issues and loyalty and customer acquisition, will be tested to enhance customer satisfaction and loyalty. For the qualitative part of the research, an interview survey was conducted of 40 employees at the Fremantle port of Western Australia and the collected data was analysed using NVivo. In the second data collection phase, a survey questionnaire was distributed to 60 port customers. Using data envelopment analysis (DEA), the important and most important customers were selected from the sample. In the final stage, utilising linear modelling, a positive association between the variables was established. Our results illustrated that all of the antecedents and consequences of customer satisfaction issues positively affect the issues. All of the activities were conducted under i-CRM control.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122774454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Selection of Services under Temporal Constraints in Cloud Computing","authors":"Yanhua Du, Xiaofei Wang, Lifeng Ai, Xitong Li","doi":"10.1109/ICEBE.2012.48","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.48","url":null,"abstract":"To guarantee the successful execution of service based process, one important requirement is QoS-driven dynamic selection of candidate services. The existing methods fail to consider the temporal constraints in build-time, and dynamic re-planning of execution plans in run-time. In this paper, we propose a novel penalty-based genetic algorithm to dynamically select the services for service based process under temporal constraints. Our approach can efficiently select the appropriate services in practical business environment. Furthermore, if some temporal constraints are violated in run-time, we provide solutions to re-plan them so that the violations can be resolved. This approach is particularly applicable and efficient for large-scale and complex processes. Finally, a prototype system has been developed to support the automatically execution of our approach.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"26 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113978989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iaas Cloud Selection using MCDM Methods","authors":"Z. Rehman, O. Hussain, F. Hussain","doi":"10.1109/ICEBE.2012.47","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.47","url":null,"abstract":"The popularity of cloud computing and IaaS has spawned numerous cloud service providers which offer various cloud services, including IaaS, to cloud users. These services vary considerably in terms of their performance and cost and the selection of a suitable cloud service becomes a complex decision making issue for a cloud service user. Furthermore, the cloud services have several attributes all of which are the criteria that have to be taken into account when making a service selection decision. In the presence of these multiple criteria, a compromise has to be made because in most real-world situations, no single service exceeds all other services in all criteria but one service may be better in terms of some of the criteria while other services may outperform it if judged on the basis of the remaining criteria. Multi-criteria decision-making is a sub-field in operations research that deals with the techniques to solve such multi-criteria problems. There are several methods of multicriteria decision-making. In this paper, we use key multi-criteria decision-making methods for IaaS cloud service selection in a case study which contains five basic performance measurements of thirteen cloud services by a third party monitoring service. We demonstrate the use of these multi-criteria methods for cloud service selection and compare the results obtained by using each method to find out how the choice of a particular MCDM method affects the outcome of the decision-making process for IaaS cloud service selection.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132916038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Chieu, Manas Singh, Chunqiang Tang, M. Viswanathan, Ashu Gupta
{"title":"Automation System for Validation of Configuration and Security Compliance in Managed Cloud Services","authors":"T. Chieu, Manas Singh, Chunqiang Tang, M. Viswanathan, Ashu Gupta","doi":"10.1109/ICEBE.2012.53","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.53","url":null,"abstract":"Validation of configuration and security compliance at the time of creating new service is an important part of service management process and governance in most IT delivery organizations. It is performed to ensure that security risks, governance controls and vulnerabilities are proactively managed through the lifecycle of the services, and to guarantee that all discovered problems and issues are addressed and remediated for quality assurance before the services are delivered to customers. The validation process is complex and is typically carried out by following a checklist with questions and answers through manual steps that are time consuming and error prone. This lengthy process is particularly troublesome when providing managed cloud services to enterprise customers with a pre-specified request fulfillment time in SLA. In order to improve the timeliness and quality of cloud services, we have introduced an automation system to orchestrate the validation process with executable scripts to be executed against the services. We will describe a novel policy mechanism to capture exception rules for eliminating possible interference in security configuration contained in the scripts. We will explain how our system is designed and implemented to fulfill the needs of large enterprises from both the service provider's and the service consumer's vantage points.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132130082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}