Salma Najar, M. Kirsch-Pinheiro, B. L. Grand, C. Souveyet
{"title":"A user-centric vision of service-oriented Pervasive Information Systems","authors":"Salma Najar, M. Kirsch-Pinheiro, B. L. Grand, C. Souveyet","doi":"10.1109/RCIS.2014.6861060","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861060","url":null,"abstract":"Information Systems (IS) have massively adopted service orientation by exposing their functionalities as services. With the evolution of mobile technologies (smartphones, 3G/4G networks, etc.), such systems are now confronted with a new pervasive environment for which they were not originally designed. Indeed, pervasive environments are characterized by their heterogeneity and dynamicity due to their evolving context and their need for transparency. None of these features are particularly considered in traditional IS designed for stable and controlled office environments. In our new vision for service-oriented Pervasive Information Systems (PIS), the user becomes the center of these systems. This paper presents a user-centric service-oriented vision for PIS based on a context-aware intentional approach, which considers the user intention and the context in which this intention arises as a guiding principle for service description, discovery, prediction and recommendation.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124568328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A tool to improve requirements review in collaborative software development platforms","authors":"Z. Azmeh, I. Mirbel, Laila El Jiani","doi":"10.1109/RCIS.2014.6861057","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861057","url":null,"abstract":"The Web has given rise to several platforms serving the purpose of collaborative software development. Thanks to these environments, it is possible for anyone to suggest new requirements for a software under development. A lot of requirements are thus proposed by stakeholders and it becomes difficult, after a while, for the persons in charge of the software under development to take advantage of this large set of requirements. In this context, our aim was to propose an approach to automatically group similar requirements together in order to improve the prioritization process. As requirements expressed on collaborative software development platforms are usually very short and their content not very structured, we proposed to exploit relationships between stakeholders and past requirements to break the whole set of new requirements into meaningful categories. In this paper, we present a tool which aim is to help decision makers to review a large set of requirements newly posted on a collaborative software development platform by identifying relevant groups of stakeholders depending on their past participation. This tool relies on (i) semantic web languages to annotate and reason on the data extracted from the platform and (ii) formal concept analysis to classify stakeholders as well as requirements into lattices which can then be exploited as road maps to examine newly posted requirements.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115894982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From tweet to graph: Social network analysis for semantic information extraction","authors":"Rocío Abascal-Mena, R. Lema, F. Sèdes","doi":"10.1109/RCIS.2014.6861047","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861047","url":null,"abstract":"This paper represents a study along the cutting edge of the current analysis of online social network in relation with the contents communicated among users. Twitter data is carefully selected around a fixed hash-tag in order to study the specified content in relation with other contents that users bring to connection. A separate network of hash-tags related (in tweets) is constructed for different days; the networks are analyzed within advanced Gephi package, providing several measures -degree, betweenness centrality, communities, as well as the longest path, by which the evolution of communication around specified concepts is quantified. Our study is absolutely in the current trend of analysis of online social networks that, going beyond mere topology, reveals relevant linguistic and social categories and their dynamics.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126271675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FASMM: Fast and Accessible Software Migration Method","authors":"Louis Forite, Charlotte Hug","doi":"10.1109/RCIS.2014.6861070","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861070","url":null,"abstract":"With the fast changes of development technologies, organizations often need to migrate their software from a source to a target technology that could comprise a shift in programming paradigm. This operation is not easy and requires precision and structuring. However, in small companies, due to lack of resources (workforce, time, budget...) the migration phase is frequently quickly done and not necessarily in an optimized way: functionalities are not implemented properly, the new architecture is loose and knowledge gained during the migration is not capitalized. This paper presents a method to guide developers in the migration of software functionalities based on model driven engineering techniques and allows capitalizing knowledge as transformation rules, to enable their reuse in future migration projects. This method was built from a case study in a French company that produces software training and support for critical applications.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126000125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diana Marosin, D. Linden, Sérgio Dinis teixeira de Sousa
{"title":"A collaborative risk management framework for enterprise architecture","authors":"Diana Marosin, D. Linden, Sérgio Dinis teixeira de Sousa","doi":"10.1109/RCIS.2014.6861045","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861045","url":null,"abstract":"The occurrence of risks in an enterprise can result in differences between business goals and their realization. Risk management is a central activity in the design of an enterprise: risk assessments supports the identifications of problems that expose the enterprise to risk, while risk treatment plans are drivers for enterprise engineering. Risk treatment plans are typically created in isolation, and often informal. We deal with this problem by developing a collaborative risk management framework, that involves all levels of an organization in conducting risk assessments and formalizing the treatment plans. We propose procedures to perform an integrated risk analysis, as well as metrics to deal with the collaborative aspect of risk management.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"78 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131258196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of non-functional requirements in a service-oriented and model-driven approach","authors":"Abdelhadi Bouain, A. E. Fazziki, M. Sadgal","doi":"10.1109/RCIS.2014.6861058","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861058","url":null,"abstract":"To face the problems of scalability and complexity of information systems (IS), conceptual models must be able to understand the requirements needed for its development. Beyond the consideration of functional requirements, other more critical requirements have emerged: Non-functional requirements to reflect complex situations that occur in the real world. In this work, we introduce an approach for the integration of non-functional requirements in the conception of information systems. The proposed approach is an approach based on service-oriented architectures (SOA), model driven architecture (MDA), and automatic transformations of models.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130500021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Oriol, Oscar Franco-Bedoya, Xavier Franch, Jordi Marco
{"title":"Assessing open source communities' health using Service Oriented Computing concepts","authors":"M. Oriol, Oscar Franco-Bedoya, Xavier Franch, Jordi Marco","doi":"10.1109/RCIS.2014.6861064","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861064","url":null,"abstract":"The quality of Open Source Software products is directly related to its community's health. To date, health analysis is made accessing available data repositories or using software management tools that are often too static or ad hoc. To address this issue, we propose to adopt principles and methods from the Service Oriented Computing field. Particularly, we propose to adapt the concepts of quality service and service level agreement, and propose to reuse the existing body of knowledge and techniques from SOC monitoring. To demonstrate the feasibility of the approach, we use a service monitoring framework called SALMonOSS as a proof of concept to realize the implementation of the proposal.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132358059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction of an outranking method in the Cloud computing research and Selection System based on the Skyline","authors":"Manar Abourezq, A. Idrissi","doi":"10.1109/RCIS.2014.6861067","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861067","url":null,"abstract":"In this paper, we present an improvement of the Cloud Service Research and Selection System (CSRSS) which allows Cloud users to search through Cloud services in the database and find the ones that match their requirements. The CSRSS is based on the Skyline and showed some promising first results. We consider that the research and selection of a Cloud service among a set of Cloud services is a choice problem. So, in this work, we thought of using outranking methods in order to better refine the results. Our work's main contribution is conceiving an Agent that uses both the Skyline and an outranking method to determine which Cloud services meet best the users' requirements. Empirical results show that our method is effective and very promising.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122396560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent systems for users' automated guidance","authors":"E. Kushnareva","doi":"10.1109/RCIS.2014.6861082","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861082","url":null,"abstract":"Future developments for case management must evolve from the current systems based on rigid, workflow based processes into context-aware, agile dynamic structures. We propose to combine a declarative approach for process design and the use of formal methods to enable a set of automated techniques for process analysis and validation based on model checking and theorem proving. Thus, they improve the level of automated user support allowing maximum run time flexibility. This paper defines a roadmap for a PhD research, aiming at developing the automated guidance provided by intelligent systems. The main idea is to explore formal methods and formal concept analysis to build a new approach for knowledge-intensive process modeling, simulation and analysis. In this paper, we consider the example of an intelligent city operation center.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124901921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal approach for managing firewall misconfigurations","authors":"Amina Saâdaoui, Nihel Ben Youssef, A. Bouhoula","doi":"10.1109/RCIS.2014.6861044","DOIUrl":"https://doi.org/10.1109/RCIS.2014.6861044","url":null,"abstract":"Firewalls are essential components in network security solutions. They implement a network security policy which represents the highest level requirements for controlling the resource accesses. The effectiveness of security protection provided by a firewall mainly depends on the quality of the configuration implemented in it. Unfortunately, different conflicts between filtering rules may occur which make the network vulnerable to attacks. Manual management of this problem can be overwhelming and potentially inaccurate. Therefore, there is a need of automated methods to analyze, detect and correct misconfigurations. Prior solutions have been proposed but we note their drawbacks are threefold: First, common approaches deal only with pairwise filtering rules. In such a way, some other classes of configuration anomalies could be uncharted. Second, syntactic anomalies could be intentional (i.e., not perforce misconfigurations). This substantial distinction is not often highlighted. Third, although anomalies resolution is a tedious and error prone task, it is generally given to the network administrator. We present, in this paper, a formal approach whose contributions are the following: Detecting new classes of anomalies, bringing out real misconfigurations and finally, proposing automatic resolution method by considering the security policy. We prove the soundness of our method and demonstrate its applicability and scalability by the use of a Satisfiabilty Solver. The first results we obtained are very promising.","PeriodicalId":288073,"journal":{"name":"2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS)","volume":"49 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123254959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}