{"title":"An energy-based model to optimize cluster visualization","authors":"T. Dkaki, J. Mothe","doi":"10.1109/RCIS.2014.6861028","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861028","url":null,"abstract":"Graphs are mathematical structures that provide natural means for complex-data representation. Graphs capture the structure and thus help modeling a wide range of complex real-life data in various domains. Moreover graphs are especially suitable for information visualization. Indeed the intuitive visual-abstraction (dots and lines) they provide is intimately associated with graphs. Visualization paves the way to interactive exploratory data-analysis and to important goals such as identifying groups and subgroups among data and helping to understand how these groups interact with each other. In this paper, we present a graph drawing approach that helps to better appreciate the cluster structure in data and the interactions that may exist between clusters. In this work, we assume that the clusters are already extracted and focus rather on the visualization aspects. We propose an energy-based model for graph drawing that produces an esthetic drawing that ensures each cluster will occupy a separate zone within the visualization layout. This method emphasizes the inter-groups interactions and still shows the inter-nodes interactions. The drawing areas assigned to the clusters can be user-specified (prefixed areas) or automatically crafted (free areas). The approach we suggest also enables handling geographically-based clustering. In the case of free areas, we illustrate the use of our drawing method through an example. In the case of prefixed areas, we first use an example from citation networks and then use another example to compare the results of our method to those of the divide and conquer approach. In the latter case, we show that while the two methods successfully point out the cluster structure our method better visualize the global structure.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132686763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach to process mining: Intentional process models discovery","authors":"G. Khodabandelou, Charlotte Hug, C. Salinesi","doi":"10.1109/RCIS.2014.6861040","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861040","url":null,"abstract":"So far, process mining techniques have suggested to model processes in terms of tasks that occur during the enactment of a process. However, research on method engineering and guidance has illustrated that many issues, such as lack of flexibility or adaptation, are solved more effectively when intentions are explicitly specified. This paper presents a novel approach of process mining, called Map Miner Method (MMM). This method is designed to automate the construction of intentional process models from process logs. MMM uses Hidden Markov Models to model the relationship between users' activities logs and the strategies to fulfill their intentions. The method also includes two specific algorithms developed to infer users' intentions and construct intentional process model (Map) respectively. MMM can construct Map process models with different levels of abstraction (fine-grained and coarse-grained process models) with respect to the Map metamodel formalism (i.e., metamodel that specifies intentions and strategies of process actors). This paper presents all steps toward the construction of Map process models topology. The entire method is applied on a large-scale case study (Eclipse UDC) to mine the associated intentional process. The likelihood of the obtained process model shows a satisfying efficiency for the proposed method.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133269840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Link formation in a telecommunication network","authors":"Erick Stattner","doi":"10.1109/RCIS.2014.6861065","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861065","url":null,"abstract":"Traditional network generation models aim to replicate global structural properties observed on various real-world networks (power law degree distribution, short average distance, community structure, etc.) through synthetic link formation mechanisms such as triadic closure or preferential attachment. Nowadays the large amount of data available allows to study more precisely the link formation processes and to compare the models to real situations. In this work, we analyse the communication activities of the users of a mobile telephony operator for studying the link formation process. The communications emitted and received by users are strong indicators for understanding the underlying mechanisms of the link formation process and highlighting how user attributes correlate with the formation process in such a network. In a first study conducted at a global level we show that the traditional mechanisms commonly used in network generation models are not the main link formation mechanisms involved in this network. In a second study, we analyse more precisely the link formation process by searching for correlations between some user attributes and the formation of the new links. These results provide valuable guidelines to the design of more realistic generation models taking into account network structure and node attributes.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129541330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an agile feature composition for a large scale software product lines","authors":"Ikram Dehmouch","doi":"10.1109/RCIS.2014.6861086","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861086","url":null,"abstract":"Modern applications tend to be cross-industry and to cover simultaneously different domains. Feature models need then to be composed in order to build domains with much larger scopes. Many approaches have been proposed by researchers to address this composition issue. Though, an overview of these compositional approaches shows that there are several areas for improvement especially in terms of automation tool support and agility. Our proposal in this doctoral paper is to discuss the feasibility of bringing the agility and the dynamism of software oriented computing techniques to the feature models composition relevant to different domains throughout a mashing up of their cooperating services.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"10 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123804054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward variability management to tailor high dimensional index implementations","authors":"V. Köppen, Martin Schäler, R. Schröter","doi":"10.1109/RCIS.2014.6861069","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861069","url":null,"abstract":"The increasing amount of complex data requires a solution to store and query these data efficiently. One possibility to speed-up various query types is the application of high dimensional index structures. In prior work, we introduced QuEval as platform to evaluate these indexes for user-defined use cases. Our design allows to easily extend QuEval with new index structure implementations. However, based on our experiences, we encountered severe challenges by tailoring index structure implementations to specific use cases. In particular, we face challenges to manage several similar implementation variants of the same index. In this paper, we consequently show benefits and drawbacks that emphasize the necessity to tailor index structure implementations with the help of a short evaluation study. Finally, we outline approaches for adequate variability management to address the aforementioned drawbacks.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business models alignment with reuse approach","authors":"M. Radgui, R. Saidi, S. Mouline","doi":"10.1109/RCIS.2014.6861042","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861042","url":null,"abstract":"This article addresses the design of Information System (IS) within a vision including business process and business service concepts. Indeed, the concept of business service has quickly become more important in the context of information systems engineering. It is proposed as a new paradigm that promotes the reuse of conceptual units in order to improve the flexibility and efficiency of the business processes of the company. To do this, we propose a model of business service that encapsulate an elementary business unit accompanied by an assembly approach to allow the reuse of the business service for the design of business processes.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115385910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a co-evolution model for software product lines based on cladistics","authors":"Anissa Benlarabi","doi":"10.1109/RCIS.2014.6861084","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861084","url":null,"abstract":"The evolution of a software product line is more challenging than the evolution of a single product, because its artifacts depend on many products. If a change is not well studied, it can break the integrity of the reference architecture of the software product line and all the derived products. Hence, when dealing with evolution, the understanding of change and its impact must be the most important activity. Biology is the science which studied evolution the most. Therefore it was necessary for us to understand evolution in biology in order to handle evolution in software product lines. This paper presents our approach to deal with change understanding in software product line using co-evolution analysis which was used in biology to understand how organisms influence each other during their evolution over time. Similarly to biological co-evolution, the co-evolution of artifacts of a software product line consists on analyzing how the evolution of an artifact influences the evolution of the others. The input data used in our approach are extracted from the history of changes that happened to each version of the software product. Our objective is to establish a co-evolution model for software product lines using Cladistics classification which illustrates the evolution of a population through an evolutionary tree.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116489435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining bipartite graphs to improve semantic pedophile activity detection","authors":"Raphaël Fournier-S’niehotta, Maximilien Danisch","doi":"10.1109/RCIS.2014.6861035","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861035","url":null,"abstract":"Peer-to-peer (P2P) networks are popular to exchange large volumes of data through the Internet. Pedophile activity is a very important topic for our society and some works have recently attempted to gauge the extent of pedophile exchanges on P2P networks. A key issue is to obtain an efficient detection tool, which may decide if a sequence of keywords is related to the topic or not. We propose to use social network analysis in a large dataset from a P2P network to improve a state-of-the-art filter for pedophile queries. We obtain queries and thus combinations of words which are not tagged by the filter but should be. We also perform some experiments to explore if the original four categories of paedophile queries were to be found by topological measures only.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116543893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How can imitation counterbalance innovation? An ABM Bass model for competing products","authors":"P. Collard, Wilfried Segretier","doi":"10.1109/RCIS.2014.6861087","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861087","url":null,"abstract":"The general context of this paper is the Bass model which presented a theory of the adoption of new products. We propose an agent based modelling to allow to model the respective grow of competing products. We assume that there is competition for the same market among two trademarks: each one has its own rate of spontaneous innovation and its own rate of imitation. This paper deals with the relative weight of these competing behaviours on the global dynamics; in particular, we ask the question of the equivalence between mass media influence and word-of-mouth effect.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129436391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christina Manteli, B. V. D. Hooff, H. Vliet, Wilco van Duinkerken
{"title":"Overcoming challenges in global software development: The role of brokers","authors":"Christina Manteli, B. V. D. Hooff, H. Vliet, Wilco van Duinkerken","doi":"10.1109/RCIS.2014.6861027","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861027","url":null,"abstract":"A common collaboration structure in global software development (GSD) is clustering, wherein people tend to be closer to others with whom they share common characteristics. Clusters often create barriers in communication, coordination and expertise awareness between remote teams, restraining the development of transactive memory (TM). In order to overcome such barriers, the role of brokers has emerged. In this paper, we examine the role of brokers as facilitators in the development of transactive memory. We use social network theory to analyze the collaboration of an EU-funded project, where development teams come from different partners and different locations. Our results suggest that task-based clusters emerge and that project members who coordinate activities as well as those who contribute to the code development act as brokers. Our empirical evaluation shows that clustering has a negative effect on TM and that brokers can moderate that effect.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129567307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}