Sérgio Manuel Serra da Cruz, L. Manhães, Macario Costa, Jorge Juan Zavaleta Gavidia
{"title":"Analysing E-Business Applications with Business Provenance","authors":"Sérgio Manuel Serra da Cruz, L. Manhães, Macario Costa, Jorge Juan Zavaleta Gavidia","doi":"10.5220/0003967902970300","DOIUrl":"https://doi.org/10.5220/0003967902970300","url":null,"abstract":"Business Provenance provides important documentation that is an essential to increase the trustworthiness and traceability of end-to-end business operations. This paper presents two data marts that allows multidimensional analysis of business provenance metadata collected from a real e-business scenario. Provenance was collected with the aid of an architecture named BizProv. We conclude the paper with the identification of the challenges that will drive future research of BizProv.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134011471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a Conceptual Framework to Structure an IT Organization using an Ontology Engineering Methodology","authors":"Nelson Gama, L. Ostrowski, M. Silva","doi":"10.5220/0004068501740179","DOIUrl":"https://doi.org/10.5220/0004068501740179","url":null,"abstract":"Organizations are struggling to adopt practices that allow the best results trying to achieve alignment between IT and an organization’s concepts and dimensions, pursuing efficiency and effectiveness. Therefore, the structure of an IT organization is fundamental. However, despite the recognized importance of IT organizational structure and the efforts made in the development of disparate perspectives and relationships, no relevant references about its structure are found, and the existent ones are far from satisfactory. There is neither a single framework nor one relating to what we consider to be relevant or clearly dominant. This paper proposes the use of ontology engineering methodology to identify and enumerate concepts and develop a conceptual framework in order to structure and establish a relationship among concepts within an IT organization, which will allow the definition of an IT organization.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fabrizio d'Amore, L. Laura, L. Luciani, Fabio Pagliarini
{"title":"Planning, Designing and Evaluating Multiple eGovernment Interventions","authors":"Fabrizio d'Amore, L. Laura, L. Luciani, Fabio Pagliarini","doi":"10.5220/0004071300850092","DOIUrl":"https://doi.org/10.5220/0004071300850092","url":null,"abstract":"We consider the scenario where an organ of a public administration, which we refer as the decisionmaker , is requested to plan one or more interventions in some framework related to the Information Society or the eGovernment set of actions. We propose a methodology to support the decisionmaker in orienting, planning, and evaluating multiple (partially overlapping) interventions. In particular, we address two main problems: first, how to decide the structure of the interventions and how to determine the relevant parameters involved; second, how to set up a scoring system for comparing single interventions and its extension to the case of multiple interventions. The methodology unexpectedly shows that i is not always the case that the best outcome is the one obtained by the best projects . We formally model the problem and discuss its computational complexity. Our approach is also effective in process of selecting, from a set of submitted proposals, the ones to be funded.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"33 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128733162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Paths of Business Model Evolution - Findings from Business Model Patents","authors":"Woori Han, B. Song, Yongtae Park","doi":"10.5220/0004065401970200","DOIUrl":"https://doi.org/10.5220/0004065401970200","url":null,"abstract":"All firms have business models (BMs) and they continuously modify their BMs to adjust to dynamic environment. The objective of this paper is to find paths of technology based BM evolution by investigating BM patents which are representative data source of technical BMs. The paper begins by reviewing the BM and BM patents, and provides a description and justification of the proposed evolutionary paths of BM ‒ major (origination, transplant, mutation) and minor (variation, alternation, addition or subtraction) evolutionary stream. The paper concludes by highlighting the key findings and drawing limitation and","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124843427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Dimensioning for Delay Differentiation Services in Regular Plans for Mobile Clients","authors":"J. Tsiligaridis","doi":"10.5220/0004119500690074","DOIUrl":"https://doi.org/10.5220/0004119500690074","url":null,"abstract":"The broadcast problem including the plan design is considered. The data are inserted and numbered into customized size relations at a predefined order. The server ability to create a full, regular Broadcast Plan (RBP) with single and multiple channels after some data transformations is examined. The Basic Regular Algorithm (BRA) prepares an RBP and enables users to catch their items while avoiding wasting energy by their devices. In the case of multiple channels a dynamic grouping solution is proposed, called the Partition Value Algorithm with Less Dimension (PVALD), under a multiplicity constraint. In order to provide an RBP under relative delays a Dimensioning Algorithm (DA) is developed. The DA, with the criterion of ratio, offers the differentiation of service. This last property, in addition to the self-monitoring, and selforganizing, can be offered by servers today providing also channel availability and lower energy consumption by using a smaller, number of channels, of equal bandwidth. Simulation results are provided.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andreas Holzinger, Michael Geier, Panagiotis Germanakos
{"title":"On the Development of Smart Adaptive User Interfaces for Mobile e-Business Applications - Towards Enhancing User Experience - Some Lessons Learned","authors":"Andreas Holzinger, Michael Geier, Panagiotis Germanakos","doi":"10.5220/0004067002050214","DOIUrl":"https://doi.org/10.5220/0004067002050214","url":null,"abstract":"Mobile end users usually work in complex and hectic environments, consequently for mobile e-Business applications the design and development of context aware, smart, adaptive user interfaces is getting more and more important. The main goal is to make the user interface so simple that the end users can concentrate on their tasks – not on the handling of the application, the main challenge is its adaptation to the context. A possible solution is smart adaptation. Consequently, developers need to know the limits of both context and systems and must be aware of mobile end users different interaction. In this paper, we follow the hypothesis that simple user interfaces enhance performance and we report about some lessons learned during the design, development and evaluation of a smart, adaptive user interface for an e-Business application.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133845295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison Study of Some Collaborative Tools Use in Virtual Teams","authors":"Cosmina Carmen Aldea, A. Draghici","doi":"10.5220/0004067203010304","DOIUrl":"https://doi.org/10.5220/0004067203010304","url":null,"abstract":"This article describes the connectivity and networking of virtual team members (based on the reference review and some structured interview organized with members of virtual project teams) and new perspectives in virtual teams’ collaboration, to underline the actual trends and to identify their future development. Introduction of new communication tools with multiple options and functionalities that better support collaborative work and learning processes will also, facilitate the integration of new members, the communication and working processes and they will increase trust between members of virtual teams. The tools used for communication and real time research-work will increase competitiveness, too by optimizing the resources dedicated to different projects, teams and management systems. There are software tools that facilitate communication, collaboration and coordination of virtual teams. Choosing the right software has to consider the specific virtual teams’ needs and requirements. The best frame is one in which the characteristics are well defined so that they cover all aspects of collaborative activities and overall project","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125369799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel-encoded and SVD-assisted MIMO Multimode Transmission Schemes with Iterative Detection","authors":"S. Aust, A. Ahrens, S. Lochmann","doi":"10.5220/0004018203530360","DOIUrl":"https://doi.org/10.5220/0004018203530360","url":null,"abstract":"In this contribution a coherent (2× 2) MIMO (multiple input multiple output) transmission with iterative detection over a measured multimode fiber channel at 1325 nm as well as at 1570 nm operating wavelength is studied. For the channel measurements a fibre length of 1 ,4 km were chosen. Extrinsic information transfer (EXIT) charts are used for analyzing and optimizing the convergence behaviour of the iterative demapping and decoding. Our results show that in order to achieve the best bit-error rate, not necessarily all MIMO layers have to be activated.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131564369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local Governments and Cloud Computing Security","authors":"Inita Kindzule, Edzus Zeiris, M. Ziema","doi":"10.5220/0004129102840288","DOIUrl":"https://doi.org/10.5220/0004129102840288","url":null,"abstract":"The Cloud computing solution has enormous potential to provide companies, industries and economy in general with remarkable benefits but there are certain challenges that have to be taken into account when choosing this solution. The purpose of this paper is to provide results of research about local governments’ Cloud computing security, assisting them in making appropriate risk-based security decisions about how to securely embrace Cloud computing. To ensure that managing information of system-related security risks is consistent with the organization’s mission/business objectives, and that information security requirements, including necessary security controls, are integrated into the organization’s enterprise architecture and system development life cycle processes.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"30 21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124697387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hash Algorithms for 8051-based Sensornodes","authors":"Manuel Koschuch, Matthias Hudler, Michael Krüger","doi":"10.5220/0004062400650068","DOIUrl":"https://doi.org/10.5220/0004062400650068","url":null,"abstract":"Wireless Sensors Networks are still an emerging technology. Their special architecture allows for unique applications that would be impossible, or at least very difficult, to implement using other technologies. But the wireless data transmission between the single nodes poses new challenges from a security point of view: the single messages have to be secured against eavesdropping and manipulation, as well as the individual nodes have to be secured against capture and extraction of their secret key. Cryptographic hash functions are an integral part of most cryptographic network protocols, whether they are used for signatures or message integrity. In this position paper, we describe a preliminary performance evaluation of three very different hash-functions on a Texas Instruments CC2530 sensor node, based on an 8051 microcontroller: Tiger, representing a hash designed for 64-bit architectures, the current standard SHA-1, and Grøstl, a SHA-3 finalist. Our preliminary results indicate that even without any major optimizations hash algorithms that were clearly not designed to run on constrained devices can be adapted to these environments with quite acceptable results, thereby giving designers of sensor network security protocols new implementation options.","PeriodicalId":194465,"journal":{"name":"DCNET/ICE-B/OPTICS","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124440512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}