{"title":"Keynote Address 2","authors":"N. Bessis","doi":"10.1109/CISIS.2010.196","DOIUrl":"https://doi.org/10.1109/CISIS.2010.196","url":null,"abstract":"Computer-based developments over the last years have facilitated decision makers and problem solvers with numerous computational tools to support operational, tactical, and strategic levels of enquiry via the formation of collaborative virtual organizations. Current ITs are capable of supporting collaborative activities in the cyberspace. These cyber-enabled collaborations involve the emergence of multiple organizations that function as one unit through the use of their shared resources for the purpose of one or more identified goals. This cluster of collaborative organizations functioning as a unit towards an identified goal lasts for the lifetime of the identified goal. The fact that such collaboration is happening in cyberspace and that it has a transient life labels it as a virtual organization. On the other hand, the rapid developments in networking and resource integration domains have resulted in the emergence and in some instances to the maturation of distributed and collaborative paradigms such as Web Services, P2P, Grid and Cloud computing, data mashups and Web 2.0. During the last ten years, scientists have almost exclusively used these technologies for their own research and development purposes. Most of these developments are focused on developing the platforms and the communication and networking infrastructures for solving very complex problems. In this talk, the focus is shifting to more interdisciplinary application domains as possibly there is no better time to discuss about the inter-cooperation between virtual organizations using the ‘critical friend’ concept. The enabling nature of these technologies allows us to visualize the collaborative and synergetic use of next generation technology paradigms in a less conventional manner, which are currently problem focused. Specifically, current Web and Web 2.0 implementations and future manifestations will store and continuously produce a vast amount of distributed data, which if combined and analyzed through a collective and computational intelligence manner using next generation data technologies will make a difference in the virtual organizational setting and their user communities, which they cater for.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132137200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two Sides of Structuring Multi-Functional Software Systems: Function Hierarchy and Component Architecture","authors":"M. Broy","doi":"10.1109/SERA.2007.129","DOIUrl":"https://doi.org/10.1109/SERA.2007.129","url":null,"abstract":"We introduce a theory for the identification, modeling, and formalization of two methodologically essential, complementary views onto software and software intensive systems. One view addresses mainly tasks in requirements engineering when describing the overall system functionality from the users' point of view. By this view we aim at the specification of the comprehensive user functionalities of multifunctional systems in terms of their functions, features, and services as well as their mutual dependencies. This view leads to a function or service hierarchy. The other view essentially addresses the design phase with its task to develop logical architectures formed by networks of cooperating components that are specified by their interface behavior.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Neural Network Techniques Vs Statistical Methods in Capacity Planning","authors":"N. Vasudevan, G. Parthasarathy","doi":"10.1109/SERA.2007.66","DOIUrl":"https://doi.org/10.1109/SERA.2007.66","url":null,"abstract":"Capacity planning is a technique which can be used to predict the computing resource needs of an organization for the future after studying current usage patterns. This is of special import for adaptive enterprises, given the large infrastructure and large number of users. Determining resource needs beforehand can be very beneficial because it is a proactive approach and helps prevent resource crunches and service level violations. Accuracy of the predicted values, however, depends upon the methods used for the forecast and also upon the accuracy of the historical data. Historical data in the capacity planning sense is system performance data. Most of the approaches used for such a prediction make use of statistical methods or are based on queuing theory. This paper compares the traditional statistical based methods with a method based on neural networks. The training set for the neural network consists of historical values of a metric (for example CPU utilization percentage) for which the prediction is to be done. The advantages of this method over other methods have also been discussed. From the predicted information, we illustrate how capacity planning is done.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of effective Brain-wave Data Base(DB) building system using the five senses","authors":"Sang-Hyeon Jin, Hyeong-Oh Kwon, Jung-A Lee, Jeong-Hoon Shin","doi":"10.1109/SERA.2007.72","DOIUrl":"https://doi.org/10.1109/SERA.2007.72","url":null,"abstract":"Ubiquitous systems have grown explosively over the past few years. Nowadays users' need for high quality service leads to a variety of types of user terminals. As a result of these changes, various types of effective human computer interface methods have been developed. In many studies, researchers have focused on using brain-wave interface, that is to say, brain computer interaction (BCI). BCI is one of the research areas in human computer interaction (HCI). Nowadays, research which is related to BCI is under way to find out effective methods. But, most research related to BCI is not centralized and not systematic. These problems bring about ineffective results in research. In most research related to HCI and BCI, that is to say -pattern recognition, the most important foundation of the research is to build correct and sufficient database (DB). On this score, in this paper, we propose an effective brain wave DB building system for BCI. Apart from other kinds of pattern recognition, BCI has difficulties being stored in DB. Subjects as well as researchers do not know effective methods for gathering DB. Researchers do not know how to instruct subjects and subjects also do not know how to follow researchers' instruction. To solve these kinds of problems, we propose a novel architecture of DB building system using the five senses. Researcher instructs the subject to use the five senses. Subjects imagine the instructed senses. In real time, researches verify gathered brain wave data using spectrogram. To verify effectiveness of our proposed system, we analyze the spectrogram of gathered brain wave DB and pattern. On the basis of spectrogram and pattern analysis, we propose an effective brain wave DB building method using the five senses.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122832249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seok-Cheol Lee, Sam-bum Shin, Hyun-Suk Hwang, Chang Soo Kim
{"title":"A Study on the Circular Sensing Model with a Low Power Profile in Wireless Sensor Networks","authors":"Seok-Cheol Lee, Sam-bum Shin, Hyun-Suk Hwang, Chang Soo Kim","doi":"10.1109/SERA.2007.32","DOIUrl":"https://doi.org/10.1109/SERA.2007.32","url":null,"abstract":"Existing wireless sensor network devices based on micro-controller devices such as MICA have a serious limitation of power consumption because of dependent on AA or AAA batteries in executing nodes. However the nodes can keep their lifetime during one or more months, replacement of batteries and difficult maintenance of sensors are often needed. Therefore, it is essential for sensors to have a low power profile. In this paper, we present a method to find duration of sensing, detection of events, and circulation of sensing. Also, we implement a prototype of proposed model and simulate it about power consumption through a circular sensing method. Our main idea is to reduce power consumption for driving sensors through a circular sensing algorithm on wireless communication. We attained a result that our model can decrease power consumption up to almost 3 times. The effect is occurred from avoiding redundant transmission and decreasing the power for driving sensors.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128531007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Implementation of Multi-Modal Game Interface Based on PDAs","authors":"Kue-Bum Lee, Jung-hyun Kim, Kwang-seok Hong","doi":"10.1109/SERA.2007.48","DOIUrl":"https://doi.org/10.1109/SERA.2007.48","url":null,"abstract":"In computer animation and interactive computer games, gesture and speech modality can be a powerful interface between humans and computers. In this paper, we propose a personal digital assistant (PDA)- based multi-modal network game interface using speech, gesture and touch sensations. To verify the validity of our approach, we implement a multi-modal omok game using TCP/IP on a PDA network. The experimental results using the proposed multi-modal network game resulted in an average recognition rate of 97.4%, and accordingly as the weaknesses of uni- modality, such as incorrect command processing by recognition error, are offset by the strengths of other modalities, the user can enjoy a more interactive mobile game interface in any given environment.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"519 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129256953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design of Large Scale U-IT Application USN by USN Middleware","authors":"Hui-dong Ju, Hyuk Lim, H. Yoe","doi":"10.1109/SERA.2007.125","DOIUrl":"https://doi.org/10.1109/SERA.2007.125","url":null,"abstract":"Recently, the research trend and developmental tendency of ubiquitous computing technologies have been heading in the direction which seamlessly provides the optimum service to users through context- awareness, analogy and networking with various sensor nodes. There is an overwhelming need to develop the USN middleware platforms that have the functions for processing data, monitoring, merged communication environments and mutual compatibility with a variety of sensor networks. While research on a base technique in regard to hardware and communication of sensor networks is actively advancing, the middleware technique is still in the early stages. This paper identifies some drawbacks in the previous work. USN middleware was proposed to control application services through context- awareness processing, information collection from sensor networks and design of event-centric architecture.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130421629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong-Hyuk Moon, J. Nah, Jongsoo Jang, Chan-Hyun Youn
{"title":"An Optimized Time-constraint Job Distribution Scheme in Group based P2P Networks","authors":"Yong-Hyuk Moon, J. Nah, Jongsoo Jang, Chan-Hyun Youn","doi":"10.1109/SERA.2007.53","DOIUrl":"https://doi.org/10.1109/SERA.2007.53","url":null,"abstract":"Peer-to-peer (P2P) technology benefits from a tractable and flexible job distribution scheme. However due to the dynamic nature of P2P, the optimal decision point of job scheduling is still unpredictable and some DLT-like heuristics are not sufficient to be a promising candidate for this role. As a reason of that, in this paper we have proposed the optimized time-constraint job distribution scheme in group based P2P networks. This scheme supports the hybrid type of jobs according to divisibility property. Also, it provides the methodology (3 phase-algorithms) which guarantees efficient job distribution under the condition of minimum completion time of executing jobs. Through the simulation in the aspects of balancing and minimum completion time, we will discuss about its performance evaluation.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"15 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120821783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Anti-Collision Algorithm with Optimal Frame Size for RFID System","authors":"I. Joe, Juno Lee","doi":"10.1109/SERA.2007.20","DOIUrl":"https://doi.org/10.1109/SERA.2007.20","url":null,"abstract":"In this paper, we propose a novel anti-collision algorithm for generation 2 RFID system to estimate the number of tags and to use the optimal frame size. Depending on the number of tags, there exists the optimal frame size in the sense that the system efficiency is maximized. The number of tags can be estimated from the collision ratio in terms of collided slots per frame. In addition, we compare our proposed algorithm with other existing schemes by simulation. The proposed scheme is easy to implement, and the simulation results show that its performance improves significantly compared to other schemes in terms of the identification time and the number of consumed slots.","PeriodicalId":181543,"journal":{"name":"5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121705577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}