2017 11th International Conference on Research Challenges in Information Science (RCIS)最新文献

筛选
英文 中文
A DSPL approach for the development of context-adaptable user interfaces 用于开发上下文适应性用户界面的DSPL方法
Thouraya Sboui
{"title":"A DSPL approach for the development of context-adaptable user interfaces","authors":"Thouraya Sboui","doi":"10.1109/RCIS.2017.7956570","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956570","url":null,"abstract":"The development of context-adaptable user interfaces (UI) is a main requirement to handle change in the context of use, ensure user centeredness and improve UI usability. In context-adaptable UIs, context informations are acquired from the end-user. This later can provide informations about his preferences and/or about his environment and the execution platform if sensors do not succeed to detect them automatically. In this paper and in order to develop a family of context-adaptable UIs, we propose, a Dynamic software product lines (DSPL) process. A DSPL process exploits the knowledge acquired in Software Product Line Engineering (SPLE) to develop systems that can be context-aware, or runtime adaptable.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128203137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Supporting modelers with model qualities and patterns 支持建模者使用模型质量和模式
Fabrice Boissier
{"title":"Supporting modelers with model qualities and patterns","authors":"Fabrice Boissier","doi":"10.1109/RCIS.2017.7956573","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956573","url":null,"abstract":"Modelers face multiple challenges in their work. In this paper, we focus on two of them. First, multiple modeling methods and tools are currently available. Modelers are sometimes limited by their tools or paradigms. Second, when multiple models are proposed for the same case, a decision maker needs criteria to decide which model to choose for his/her objective.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"67 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113960327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Are you ready? Towards the engineering of forensic-ready systems 你准备好了吗?朝着法医准备系统的工程方向发展
George Grispos, Jesús García-Galán, L. Pasquale, B. Nuseibeh
{"title":"Are you ready? Towards the engineering of forensic-ready systems","authors":"George Grispos, Jesús García-Galán, L. Pasquale, B. Nuseibeh","doi":"10.1109/RCIS.2017.7956555","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956555","url":null,"abstract":"As security incidents continue to impact organisations, there is a growing demand for systems to be ‘forensic-ready’ - to maximise the potential use of evidence whilst minimising the costs of an investigation. Researchers have supported organisational forensic readiness efforts by proposing the use of policies and processes, aligning systems with forensics objectives and training employees. However, recent work has also proposed an alternative strategy for implementing forensic readiness called forensic-by-design. This is an approach that involves integrating requirements for forensics into relevant phases of the systems development lifecycle with the aim of engineering forensic-ready systems. While this alternative forensic readiness strategy has been discussed in the literature, no previous research has examined the extent to which organisations actually use this approach for implementing forensic readiness. Hence, we investigate the extent to which organisations consider requirements for forensics during systems development. We first assessed existing research to identify the various perspectives of implementing forensic readiness, and then undertook an online survey to investigate the consideration of requirements for forensics during systems development lifecycles. Our findings provide an initial assessment of the extent to which requirements for forensics are considered within organisations. We then use our findings, coupled with the literature, to identify a number of research challenges regarding the engineering of forensic-ready systems.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115096619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A requirements driven approach to data warehouse consolidation 需求驱动的数据仓库整合方法
D. Prakash, N. Prakash
{"title":"A requirements driven approach to data warehouse consolidation","authors":"D. Prakash, N. Prakash","doi":"10.1109/RCIS.2017.7956580","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956580","url":null,"abstract":"Data mart consolidation does schema as well as data integration of data marts so as to produce a single physical data mart/warehouse. This implies that multiple data marts must exist. Our proposal is to integrate requirements specifications of data marts. This upstream integration saves the effort of downstream activities performed when data marts are independently developed and then integrated. Without this integration, we get a new problem of loss of business control. Our integration approach is organized in five steps.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134276323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security threat classification for outsourced IT projects 外包IT项目的安全威胁分类
Moneef Almutairi, S. Riddle
{"title":"Security threat classification for outsourced IT projects","authors":"Moneef Almutairi, S. Riddle","doi":"10.1109/RCIS.2017.7956579","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956579","url":null,"abstract":"Many organisations have adopted outsourcing for delivering critical IT services to their clients. Organisations need to identify the potential security threats of outsourced IT projects as early as possible to avoid or mitigate security incidents. Existing threat classification approaches suffer from limitations such as the lack of exhaustive threat classification criteria. In this paper, we propose a threat classification approach for outsourced IT projects. This approach aims to allow organisations to identify, minimise, mitigate, or eliminate security threats at the early stages of project execution.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128403667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IMEXT: A method and system to extract geolocated images from Tweets — Analysis of a case study IMEXT:一种从tweet中提取地理定位图像的方法和系统-案例研究分析
C. Francalanci, Paolo Guglielmino, Matteo Montalcini, Gabriele Scalia, B. Pernici
{"title":"IMEXT: A method and system to extract geolocated images from Tweets — Analysis of a case study","authors":"C. Francalanci, Paolo Guglielmino, Matteo Montalcini, Gabriele Scalia, B. Pernici","doi":"10.1109/RCIS.2017.7956563","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956563","url":null,"abstract":"Extracting useful information from social networks raises several challenges that still represent open research issues. In this paper we focus on the problem of extracting geolocated images from Tweets to support emergency response. A Tweet analysis process is discussed, focusing on the selection of posts, their geolocation based on their text content, and the subsequent analysis of the images linked by geolocated tweets. A prototype system has been built and tested on a case study based on the Tweets posted in the two days after the earthquake that occurred in Central Italy in August 2016. Results indicate that focusing on images linked by geolocated tweets represents a good criterion to identify useful information that can aid emergency response.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122136210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Integration of a multidimensional schema from different social media to analyze customers'opinions 整合来自不同社交媒体的多维图式,分析客户意见
Imen Moalla, Ahlem Nabli, Mohamed Hammami
{"title":"Integration of a multidimensional schema from different social media to analyze customers'opinions","authors":"Imen Moalla, Ahlem Nabli, Mohamed Hammami","doi":"10.1109/RCIS.2017.7956564","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956564","url":null,"abstract":"The increasing role of social media has pushed the scientific community to invest in them and take advantage of their information. Furthermore, the diffusion of social media has a very significant impact on several areas, such as marketing (customer's opinion analysis), terrorism, politics, etc. They affect a very wide audience, such as students, teenagers and companies. In fact, Facebook, Twitter and YouTube platforms play an increasingly important role for companie's to analysis customers generated content and also the information about their competitors. The transformation of data from social media into new knowledge for decision makers is a challenging task nowadays. In this context, several businesses have worked on these media to get extra information about their customers. Thus, the need for a data warehouse has become an emergency for the storage and management of data from social media. However, most of research studies have worked on only one social medium. Specifically, in this paper, we are interested in the design of multidimensional schema of data warehouse for opinion analysis. Firstly, we focuse on the design of the data mart from each social medium. Secondly, we present the data mapping between the multidimensional concepts of data mart determined from different social media. Thirdly, we are interested in the schema integration of several data mart schemes. Our goal is to achieve a generic data warehouse schema, including the most popular social media in order to analyze customers'opinions.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117188986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Demonstrating Named Data Networking integration into DataTweet IoT Architecture 演示将命名数据网络集成到DataTweet物联网架构中
S. K. Datta, C. Bonnet
{"title":"Demonstrating Named Data Networking integration into DataTweet IoT Architecture","authors":"S. K. Datta, C. Bonnet","doi":"10.1109/RCIS.2017.7956575","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956575","url":null,"abstract":"Content Centric Networking (CCN) is an important aspect of the Future Internet Architecture. CCN investigates the evolution from current host-centric network architecture of IP to data centric networking architecture. This paper aims at demonstrating the integration of Named Data Networking (NDN) mechanism, an instantiation of CCN, in previously developed DataTweet Internet of Things (IoT) architecture. The main accomplishment is in achieving and demonstrating interworking between the NDN and IoT paradigms. We briefly describe the identified challenges, their solutions and a real prototype showcasing the integration of NDN into the DataTweet IoT Architecture. Early results about performance evaluation and future works are outlined.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129876897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Context-based web service discovery framework with QoS considerations 考虑QoS的基于上下文的web服务发现框架
Sara Samir, A. Sarhan, Alsayed Algergawy
{"title":"Context-based web service discovery framework with QoS considerations","authors":"Sara Samir, A. Sarhan, Alsayed Algergawy","doi":"10.1109/RCIS.2017.7956531","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956531","url":null,"abstract":"Hiking a relevant web service in the current environment full of various options is similar to looking for a needle in a haystack. The best possible web service is the one that completely fulfills the required functions while satisfying the QoS requested by a user. In this paper, we introduce a new context-based solution based on QoS (Quality of Service) exploiting both functional and non-functional user's requirements and providing the user ability to control and proceed the discovery of web services, i.e. the main aim of this work is to locate the appropriate web service correspondence with the context of the user. To this end, we present a two-stage web service discovery framework. The first stage is a functional matching approach that assesses the similarity across given sets of web services and provides relevant services according to the functional requirements of the user. After that and based on non-functional requirements representing the user's contexts and contexts of relevant services produced from the first stage, we compute the similarity degree between the contextual information of both of them. Based on the computed similarity, we return a set of recommended services that fulfill both functional and non-functional requirements according to user needs. To validate the proposed approach, a real dataset is used and the results show that our proposed approach can accurately provide services that a user needs.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122679510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cultural exploration of attack vector preferences for self-identified attackers 对自我识别的攻击者的攻击向量偏好的文化探索
C. Sample, Jennifer Cowley, Steve E. Hutchinson
{"title":"Cultural exploration of attack vector preferences for self-identified attackers","authors":"C. Sample, Jennifer Cowley, Steve E. Hutchinson","doi":"10.1109/RCIS.2017.7956551","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956551","url":null,"abstract":"The examination of digital events through the prism of a quantitatively represented cultural framework allows for a new perspective on existing cyber security issues and events. When the cultural framework is applied to a large set of data, simple statistical analysis can be applied, allowing the researchers to quantify, characterize, and model specific aspects of human behavior.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124191569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信