{"title":"Agent-Based Computing for Enterprise Collaboration: Agents and Services Interoperability Track Report - ACEC 2011","authors":"F. Bergenti, M. Blake, Giacomo Cabri, U. Wajid","doi":"10.1109/WETICE.2011.62","DOIUrl":"https://doi.org/10.1109/WETICE.2011.62","url":null,"abstract":"The 9th edition of the \"Agent-based Computing for Enterprise Collaboration\" track at WETICE 2011 focuses on the areas of agent-based services and agent-based solutions for dynamic collaborations. The purpose of this track is to bring together researches in the fields of software agents as they relate to the context of enterprise collaboration. This report briefly discusses the content of the papers presented in the track by respective authors.","PeriodicalId":274311,"journal":{"name":"2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127307456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Infrastructure Network Vulnerability","authors":"D. Kamissoko, Pascale Zaraté, François Pérès","doi":"10.1109/WETICE.2011.56","DOIUrl":"https://doi.org/10.1109/WETICE.2011.56","url":null,"abstract":"The work presented in this paper aims to propose a methodology of analyzing infrastructure network vulnerability in the field of prevention or reduction of the natural disaster consequences. After a state of the art on vulnerability models in the academic literature, the various vulnerability factors are classified and discussed. Eventually, a general model of vulnerability analysis including societal parameters is presented.","PeriodicalId":274311,"journal":{"name":"2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130633644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Development of a Digital Meteorological Model for Simulating Future Air Traffic Management Automation","authors":"J. Grado, Carmen Salguero Tascon","doi":"10.1109/WETICE.2011.40","DOIUrl":"https://doi.org/10.1109/WETICE.2011.40","url":null,"abstract":"Aviation Meteorology plays an essential role for the Air Traffic Management (ATM) automation. The availability of accurate estimates of atmosphere properties would largely increase safety and efficiency of air traffic operations. The work presented here looks forward to a net-centric serviceoriented ATM system architecture where available data, airground connectivity and modern computational resources and techniques are taken advantage of to attain a 4D predictive model of atmospheric properties specifically designed for real-time support to air vehicle operations in highly dense terminal manoeuvring areas. The effort, conducted as part of the ATLANTIDA project, consists of the development of a digital meteo model (DMET) that combines atmospheric data from several sources into a 4D predictive scenario that is made available to subscribers through periodic updates. Atmospheric data sources include forecasts from global and mesoscale weather models as well as live observations provided by ground stations and aircraft in the scene. The model produced consists of a 4D grid of pressure, temperature and wind data fields valid over an airspace cube of about 150 × 150 × 20 km, within a time interval of 2.5 hours. On top of this model, minimum time, minimum consumption and other interesting trajectories are simulated and shown, all being processed remotely in a supercomputing centre.","PeriodicalId":274311,"journal":{"name":"2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"200 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noura Faci, Hanane Abdeldjelil, Z. Maamar, D. Benslimane
{"title":"Using Diversity to Design and Deploy Fault Tolerant Web Services","authors":"Noura Faci, Hanane Abdeldjelil, Z. Maamar, D. Benslimane","doi":"10.1109/WETICE.2011.53","DOIUrl":"https://doi.org/10.1109/WETICE.2011.53","url":null,"abstract":"Any software component for instance Web services is prone to unexpected failures. To guarantee business process continuity despite these failures, component replication is usually put forward as a solution to make these components fault tolerant. In this paper we illustrate the limitations of replication and suggests diversity as an alternative solution. In the context of Web services diversity stems from the semantic similarity of functionalities of Web services. Building upon this similarity, a diversity group consisting of semantically similar Web services is built and then controlled using different execution models. Each model defines how the Web services in the diversity group collaborate and step in when one of them fails to ensure operation continuity. An architecture showing the use of diversity to design and deploy fault tolerant Web services is presented in this paper.","PeriodicalId":274311,"journal":{"name":"2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124761748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting the Small-World Effect for Resource Finding in P2P Grids/Clouds","authors":"F. Messina, G. Pappalardo, C. Santoro","doi":"10.1109/WETICE.2011.22","DOIUrl":"https://doi.org/10.1109/WETICE.2011.22","url":null,"abstract":"This paper presents a resource finding and allocation scheme for Grid-/Cloud-computing systems, called SWHYGRA (Small-World HYperspace-based Grid Resource Allocation). It models the overall system using a decentralized peer-to-peer approach organizing the nodes in an overlay network featuring specific convenient properties. SWHYGRA intends to exploit the small-world effect, by employing an algorithm aimed at building an overlay network whose structure mimics the small-world model. Such networks feature a high clustering degree coupled with a very low average path length, both being key characteristics for the SW-HYGRA approach. The former allows nodes with similar resource availability to be clustered; together with the latter, it permits a resource finding algorithm to reach a target node in a fast and efficient way.","PeriodicalId":274311,"journal":{"name":"2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130250808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingcheng Zhang, Allan Hyunh, Qinzhong Ye, Shaofang Gong
{"title":"Culturebee - A Fully Wireless Monitoring and Control System for Protecting Cultural Heritage","authors":"Jingcheng Zhang, Allan Hyunh, Qinzhong Ye, Shaofang Gong","doi":"10.1109/WETICE.2011.43","DOIUrl":"https://doi.org/10.1109/WETICE.2011.43","url":null,"abstract":"This paper presents a component based wireless monitoring and control system. The system is introduced from both the system architecture and function point of view. The paper begins with the introduction of the component design and the communication interaction between them. The system is composed by three components, the wireless sensor network, the local server and the main server. Wireless sensor networks are deployed in different locations for remote monitoring and control purpose. The monitoring results and control commands are synchronized between the main server and wireless sensor networks via local servers. The test results of the battery life time calculation and remote monitoring field test results are presented in the end of the paper.","PeriodicalId":274311,"journal":{"name":"2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134148077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Filippo Cuttone, M. Bandieramonte, A. Stefano, G. Morana
{"title":"Managing Dependability in Distributed Applications","authors":"Filippo Cuttone, M. Bandieramonte, A. Stefano, G. Morana","doi":"10.1109/WETICE.2011.25","DOIUrl":"https://doi.org/10.1109/WETICE.2011.25","url":null,"abstract":"This short paper introduces a strategy for improving the dependability of distributed applications. This strategy, that can be used in cloud systems for supporting both scheduling and resources allocation policies, exploits the knowledge about the interactions between the components of a distributed application for identifying a near-optimal deployment of those components on the distributed resources.","PeriodicalId":274311,"journal":{"name":"2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Use of Mobile Devices in Critical Incidents Response: A Microworld Approach","authors":"C. Sapateiro, Antonio Ferreira, P. Antunes","doi":"10.1109/WETICE.2011.58","DOIUrl":"https://doi.org/10.1109/WETICE.2011.58","url":null,"abstract":"In this work we approach the study of team situation awareness based upon a holistic perspective that integrates the shared and distributed nature of the construct. We studied team situation awareness in the context of critical incidents response management, as it constitutes a valuable asset and yet is continuously challenged by the very nature of the context. We applied a micro world approach as a compromise between controlled laboratory experiments and field studies. Relying on this approach, we studied the impact of mobile applications in the teams' performance and situation awareness, using a helpdesk as an application domain. The obtained results do not indicate a fundamental breakthrough regarding the usage of mobile applications in such contexts. Nevertheless, they provide valuable insights about the team dynamics, situation awareness and communication patterns.","PeriodicalId":274311,"journal":{"name":"2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134644959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Soft Real-Time Simulation in a Hybrid Environment for Cyber-Physical Security Experiments","authors":"B. Genge, C. Siaterlis","doi":"10.1109/WETICE.2011.48","DOIUrl":"https://doi.org/10.1109/WETICE.2011.48","url":null,"abstract":"The study of complex systems, either physical or cyber, could be carried out by experimenting with real systems, software simulators or emulators. This paper presents an innovative framework for an experimentation environment that incorporates both physical and cyber systems. The proposed approach uses soft real-time simulation for physical processes (based on Simulink) and an emulation test bed (based on Emulab) for ICT components. The paper also presents two coupling algorithms that couple the simulation time to the system time, in order to achieve soft real-time simulation on a multitasking OS. The main difference between the two algorithms is the size of the critical section that enables concurrent access to a shared resource between emulated and simulated environments. The experimental results show that resource sharing between the two environments is a major concern and future algorithms should also consider a proper analysis of critical sections.","PeriodicalId":274311,"journal":{"name":"2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Representational Bias in Process Mining","authors":"Wil M.P. van der Aalst","doi":"10.1109/WETICE.2011.64","DOIUrl":"https://doi.org/10.1109/WETICE.2011.64","url":null,"abstract":"Process mining serves a bridge between data mining and business process modeling. The goal is to extract process related knowledge from event data stored in information systems. One of the most challenging process mining tasks is process discovery, i.e., the automatic construction of process models from raw event logs. Today there are dozens of process discovery techniques generating process models using different notations (Petri nets, EPCs, BPMN, heuristic nets, etc.). This paper focuses on the representational bias used by these techniques. We will show that the choice of target model is very important for the discovery process itself. The representational bias should not be driven by the desired graphical representation but by the characteristics of the underlying processes and process discovery techniques. Therefore, we analyze the role of the representational bias in process mining.","PeriodicalId":274311,"journal":{"name":"2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130994655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}