{"title":"Role Framework to Support Collaborative Virtual Prototyping of System of Systems","authors":"J. Schneider, J. Champeau, Loïc Lagadec, E. Senn","doi":"10.1109/WETICE.2015.37","DOIUrl":"https://doi.org/10.1109/WETICE.2015.37","url":null,"abstract":"The concept of System of Systems (SoS) has become a key to handle the complexity of large scale systems designed in domains such as aerospace or defense. Virtual prototyping, by providing modelling and execution, increases the success of the SoS. Large scale systems involve heterogeneous modelling and execution formalism. Typical approaches based on types fail in offering the needed dynamicity to answer the virtual prototyping requirements. In order to bridge the existing gap between system models and execution tools, we suggest an approach based on roles and parser combinatory. Roles provide a dynamic coupling between modelling and execution allowing independent evolution of modelling and execution. Parser combinatory ease the integration of new modelling formalisms. This approach has been validated on a seafloor observatory project and lead to the implementation of a framework in Smalltalk.","PeriodicalId":256616,"journal":{"name":"2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126638239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering EU's Countries According to I. Th. Mazi's Systemic Geopolitical Theory Using K-Means and MPI","authors":"I. Savvas, Alekos Stogiannos, I. Mazis","doi":"10.1109/WETICE.2015.24","DOIUrl":"https://doi.org/10.1109/WETICE.2015.24","url":null,"abstract":"As a geographical method of analyzing power redistribution, Systemic Geopolitical Analysis (according to Ioannis Th. Mazis theoretical basis) proposes a multi-dimensional, interdisciplinary research pattern, which embraces economic, cultural, political and defensive facts. The amount of data produced combining these attributes is extremely large and complex. One of the solutions to explore and analyze this data is clustering it and one of the most popular and useful techniques in order to group data within appropriate sets is k-means algorithm which clusters data according to its characteristics. The main disadvantage is its computational complexity which makes the technique very difficult to apply on big and dynamic data sets. In this study, a parallel version of k-means is used in order to cluster the European Union countries according to their attributes and the results obtained prove the importance of this research.","PeriodicalId":256616,"journal":{"name":"2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133424994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Hoffmann, Christoph Brand, Steffen Heinzl
{"title":"Towards an Architecture for End-to-End-Encrypted File Synchronization Systems","authors":"Christian Hoffmann, Christoph Brand, Steffen Heinzl","doi":"10.1109/WETICE.2015.30","DOIUrl":"https://doi.org/10.1109/WETICE.2015.30","url":null,"abstract":"Users often utilize Dropbox and similar services to store their data in a cloud. They protect their data through encryption services offered by the cloud provider. But how reasonable is such a protection? The cloud provider is usually able to (at least theoretically) read the encrypted data, since he is the one holding the encryption keys. And even if you trust a cloud provider, what happens if the cloud provider is acquired by another company? Do you also trust the acquiring company? Global surveillance has become a daily issue, outlined by disclosures of files from the United States National Security Agency (NSA). To keep one's data protected from unauthorized access, a user optimally needs to trust as few other parties as possible. We should aim for a future, in which users are able to protect their data without having to trust the cloud provider who stores their data. This can be achieved by using strong, auditable client-side encryption. This paper presents a first step towards this goal. Starting from a basic requirement -- the principle of least privilege -- requirements are derived that again result in an architecture to build end-to-end-encrypted file synchronization systems. The resulting architecture's practical applicability is shown by a concrete implementation.","PeriodicalId":256616,"journal":{"name":"2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126964684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive Application Area Networks: A New Paradigm for Distributed Computing and Intelligent Service Orchestration","authors":"Rao V. Mikkilineni, G. Morana, D. Zito","doi":"10.1109/WETICE.2015.42","DOIUrl":"https://doi.org/10.1109/WETICE.2015.42","url":null,"abstract":"Distributed systems are dynamic systems where software and hardware together deliver information processing services to allow modelling, interaction, reasoning, analysis and control of the external environment. The intent of the distributed computation is to execute computational workflows using computing resources. The software contains the algorithms that specify the tasks while the hardware provides the required resources to execute the algorithms. The initial structure is defined by the association of software with hardware and the dynamic structure is defined by their temporal evolution. The meta-knowledge of the intent of the algorithm, the association of specific algorithm to a specific device, their temporal evolution and exception handling when the computation deviates from the intent is outside the software and hardware design and is expressed in non-functional requirements. In this paper, we describe an architecture to capture the meta-knowledge in meta-containers and enforce the intent of the computation while the computation is in progress.","PeriodicalId":256616,"journal":{"name":"2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"645 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120861397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MADYNE 2015 Track Report: Management of Dynamic Networked Enterprises","authors":"Nawal Guermouche, S. Tazi","doi":"10.1109/WETICE.2015.53","DOIUrl":"https://doi.org/10.1109/WETICE.2015.53","url":null,"abstract":"The fourth track of MADYNE continues to look after models of relationship between enterprises seen from business process management perspective. This track aims to promote concepts, solutions, and approaches for automating dynamic management, interoperability and integration of networked collaborative enterprise applications. Several models and technologies are being developed and deployed to consolidate system integration of networked collaborative enterprises which evolve in dynamic environments. The selected papers present reviews and analysis of existing and ongoing solutions for the challenging problem of management of dynamic enterprises.","PeriodicalId":256616,"journal":{"name":"2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121243693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing Web Resource Compositions","authors":"Mahdi Bennara, Y. Amghar, M. Mrissa","doi":"10.1109/WETICE.2015.46","DOIUrl":"https://doi.org/10.1109/WETICE.2015.46","url":null,"abstract":"Nowadays, the use of RESTful Web services promotes stateless service interaction and decentralized hypermedia-driven discovery and composition. However, there is a need for models and tools to drive user interaction as well as description, discovery and composition of RESTful services. In this paper, we provide a solution to help users manage, share and discover workflows of RESTful Web services. We annotate RESTful Web services with semantic information, and introduce the notion of composition directory as a Web resource that assists a user in sharing, managing and discovering workflows. Users' composition directories form a decentralized repository of service workflows connected by hypermedia links. We illustrate the benefits of our approach with a typical scenario and show that the breadth-first search algorithm efficiently answers users' goals by crawling through composition directories and exploiting semantic annotations through a series of experiments.","PeriodicalId":256616,"journal":{"name":"2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"728 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122930529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding the Effect of Multiple Factors on a Parallel File System's Performance","authors":"E. C. Inacio, L. Pilla, M. Dantas","doi":"10.1109/WETICE.2015.21","DOIUrl":"https://doi.org/10.1109/WETICE.2015.21","url":null,"abstract":"This research work presents an investigation of the impact of a wide range of factors on the performance of parallel file systems (PFSs). It is the result of an extensive test campaign with three distinct computing platforms and value variations for eleven factors that advance the understanding of PFSs' behaviour under different conditions. Our main contributions are the characterization of effects not fully explained or misunderstood in the literature previously. First, we demonstrate that no significant performance variation (≈ 6%) is observed when choosing one among four TCP congestion-avoidance algorithms. Second, we detail the effect of the page cache of I/O nodes on a PFS's write throughput and how it relates to other factors.","PeriodicalId":256616,"journal":{"name":"2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131306128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Rebai, Hatem Hadj Kacem, M. Karaa, S. Hernández, A. Kacem
{"title":"CDLVT: A Formal Verification Tool of Non-functional Properties for WS-CDL Specification","authors":"S. Rebai, Hatem Hadj Kacem, M. Karaa, S. Hernández, A. Kacem","doi":"10.1109/WETICE.2015.14","DOIUrl":"https://doi.org/10.1109/WETICE.2015.14","url":null,"abstract":"Service-oriented architectures (SOA) are hugely adopted. Within the SOA, service composition is fundamental. The design of composing service-based applications is mainly carried out throughout two composition techniques namely choreography and orchestration. Although these two composition models are different in nature, they are complementary. Choreography presents an abstract description of protocols. It offers a top view of the management rules which govern the interactions between the services involved in a decentralized application. On the other hand, orchestration provides details of the executable process at single peers which are necessary for the implementation of choreography. In this context, one open research problem, is the correct transformation of choreography specifications to orchestration specifications since orchestration provides more details to choreography specification. The choreography transformation has been the subject of several research works. Nevertheless, the existing works have considered that the choreography, on which their transformations are based, is correct by default. So, it is crucial to implement a checking process oriented to identify eventual incompatibilities that may arise. For this purpose, we present a formal verification approach based on the SPIN model-checker. The approach automatically transforms WS-CDL choreography specifications to Promela code for verification purposes. We verify non-functional properties that are expressed with linear temporal logic.","PeriodicalId":256616,"journal":{"name":"2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131181692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Provisioning Algorithm for Dynamic Workflows in the Cloud","authors":"Fairouz Fakhfakh, Hatem Hadj Kacem, A. Kacem","doi":"10.1109/WETICE.2015.16","DOIUrl":"https://doi.org/10.1109/WETICE.2015.16","url":null,"abstract":"Workflow applications are an enabling technology for coordinating the activities of an enterprise. The resources provisioning for these applications is one of the most difficult challenges in the cloud. It consists in making an appropriate decision when mapping tasks to resources while satisfying QoS requirements. Current resources provisioning approaches in the cloud consider only static workflows and ignore the need to change workflow instances at runtime. This functionality is an essential requirement to deal with unusual situations and evolutions. In this paper, we propose a novel resources provisioning approach which considers the dynamic changes of workflows. The proposed approach introduces an algorithm which determines the assignment of tasks to the appropriate cloud resources. After that, we extend it in order to support the dynamic changes of workflows. Our algorithm is evaluated using CloudSim simulator. The experimental results which we present illustrate the efficiency of our approach in term of financial execution cost.","PeriodicalId":256616,"journal":{"name":"2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132653538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Equivalence-Based Selection of Best-Fit Models to Support Wiki Design","authors":"G. D. Ruvo, A. Santone","doi":"10.1109/WETICE.2015.19","DOIUrl":"https://doi.org/10.1109/WETICE.2015.19","url":null,"abstract":"A wiki is a collaborative Web site whose content can be edited by anyone who has the access. Wikis are becoming a new work tool in enterprises and are widely spreading every-where. Indeed, it is important to consider the design and evolution of a wiki. We present a methodology to help wiki designers, engineers and domain experts. In practice, from the wikis we derive formal models, which are successively used to perform equivalence checking. More precisely, in order to design a wiki p we propose a methodology for the selection of the best-fit wiki model q, among a set of candidate ones. For best fit we mean that p and q have a similar structure. To handle the complexity of finding all possible candidates processes q, a heuristic function can be used to filter the set of significant candidates, and to speed up the search of a successful one, which is the main contribution of the paper. Eventually, the elected model may be exploited to start the design process.","PeriodicalId":256616,"journal":{"name":"2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133734618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}