{"title":"Using ontologies for coordination in loose Inter-Organizational Workflow","authors":"L. Bouzguenda, R. Bouaziz, E. Andonoff","doi":"10.1109/RCIS.2008.4632100","DOIUrl":"https://doi.org/10.1109/RCIS.2008.4632100","url":null,"abstract":"This paper shows how it is possible to use ontologies to deal with coordination of workflow processes in loose inter-organizational workflow (IOW). The aim of IOW is to support the cooperation between distributed and heterogeneous business processes running in different autonomous organizations to reach a common goal, corresponding to a value-added service. Loose IOW refers to occasional cooperation, free of structural constraints, where the involved partners (organizations) and their number are not pre defined but rather dynamically selected at run-time. Coordination in loose IOW raises two specific problems, which are: (i) partners finding able to realize a workflow service (i.e. a service implementing a workflow process), and (ii) negotiation of workflow services between partners. This paper shows how two specific components introduced to deal with partners finding and negotiation between them use ontologies for automatically discovering workflow services and choosing protocols to negotiate workflow services.","PeriodicalId":416272,"journal":{"name":"2008 Second International Conference on Research Challenges in Information Science","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123537597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality of conceptual schemas an experimental comparison","authors":"J. Akoka, I. Comyn-Wattiau, S. Cherfi","doi":"10.1109/RCIS.2008.4632108","DOIUrl":"https://doi.org/10.1109/RCIS.2008.4632108","url":null,"abstract":"Frequently the behaviour of an information system is functionally correct, but it does not meet some quality criteria, such as completeness, consistency, and usability. One way to enhance the capability of an information system is to consider its conceptual model quality as well as its functional behaviour. Conceptual model quality can be defined as a set of perceivable characteristics expressed with quantifiable parameters. The aim of this empirical investigation is to evaluate the quality of different potential conceptual models of the same universe of discourse by different Information Systems (IS) stakeholders. This paper describes: a) a set of quality factors (clarity, simplicity, expressiveness, minimality) applied to different versions of entity-relationship (ER) conceptual schemas, b) an approach enabling a comprehensive comparison of the conceptual schemas, c) an experimentation leading to the evaluation of the same schemas by IS stakeholders such as designers, end-users, and students, based on a sample of about 120 observations using different statistical methods. First results indicate that there exists a strong independence between the IS stakeholders and the quality factors used. A second result reveals a significant difference between groups of respondents in their ways to perceive conceptual schemaspsila quality. Based on our experiment, we are able to identify quality factors relevant to different groups of stakeholders, depending on several dimensions, such as their professional experience, and/or their specialization degree.","PeriodicalId":416272,"journal":{"name":"2008 Second International Conference on Research Challenges in Information Science","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126403592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kadjo Tanon Lambert, S. Oumtanaga, Kone Tiemoman, Abba Brice, Pierre Tety
{"title":"Deployment of DNSSEC: Problems and outlines","authors":"Kadjo Tanon Lambert, S. Oumtanaga, Kone Tiemoman, Abba Brice, Pierre Tety","doi":"10.1109/RCIS.2008.4632124","DOIUrl":"https://doi.org/10.1109/RCIS.2008.4632124","url":null,"abstract":"The DNSSEC protocol constitutes one of the solutions of DNS architecturepsilas security. Unlike the other solutions, it represents an extension of the standard DNS. However its deployment is not without difficulty. In this work, we emphasize some problems involved in the progressive deployment of DNSSEC, with the inherent risks in the use of public key cryptography. Proposals making it possible to solve these problems are provided.","PeriodicalId":416272,"journal":{"name":"2008 Second International Conference on Research Challenges in Information Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124342640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology based knowledge modeling for System Engineering projects","authors":"Olfa Chourabi, Y. Pollet, M. Ahmed","doi":"10.1109/RCIS.2008.4632138","DOIUrl":"https://doi.org/10.1109/RCIS.2008.4632138","url":null,"abstract":"System Engineering projects are characterized by knowledge intensive processes. Creating effective Knowledge Management Systems is one of the key success factors in engineering process improvement. In this paper, we focus on the knowledge modeling issue. Our main objective is to provide a semantic description for knowledge items created and/or used in system engineering processes in order to facilitate their reuse. The framework is based on a set of layered ontologies where entities such as domain concepts, engineering processes, artefacts models, are interlinked to capture explicit as well as implicit engineering project knowledge.","PeriodicalId":416272,"journal":{"name":"2008 Second International Conference on Research Challenges in Information Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123382286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WhereRU: GPS position reporting and a personal ontology as a virtual community utility","authors":"I. Daradimos, A. Katifori, C. Vassilakis","doi":"10.1109/RCIS.2008.4632102","DOIUrl":"https://doi.org/10.1109/RCIS.2008.4632102","url":null,"abstract":"The recent progress of the World Wide Web has created new needs for information sharing in virtual communities. WhereRU is a multiuser GPS position reporting system that allows users to make their location publicly available as well as associate it with information on places, persons and events that may later also serve as reminders of the their experiences when traveling.","PeriodicalId":416272,"journal":{"name":"2008 Second International Conference on Research Challenges in Information Science","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115652069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An unsupervised skeleton based method to discover the structure of the class system","authors":"L. State, C. Cocianu, P. Vlamos","doi":"10.1109/RCIS.2008.4632105","DOIUrl":"https://doi.org/10.1109/RCIS.2008.4632105","url":null,"abstract":"The aim of the research reported in the paper was twofold: to propose a new approach in cluster analysis and to investigate its performance, when it is combined with dimensionality reduction schemes. The search process for the optimal clusters approximating the unknown classes towards getting homogenous groups, where the homogeneity is defined in terms of the dasiatypicalitypsila of components with respect to the current skeleton. Our method is described in the third section of the paper. The compression scheme was set in terms of the principal directions corresponding to the available cloud. The final section presents the results of the tests aiming the comparison between the performances of our method and the standard k-means clustering technique when they are applied to the initial space as well as to compressed data.","PeriodicalId":416272,"journal":{"name":"2008 Second International Conference on Research Challenges in Information Science","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131239449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Márcia Lucena, E. Santos, Carla Schuenemann, F. Alencar, M. Silva, J. Castro
{"title":"Towards a unified metamodel for i*","authors":"Márcia Lucena, E. Santos, Carla Schuenemann, F. Alencar, M. Silva, J. Castro","doi":"10.1109/RCIS.2008.4632112","DOIUrl":"https://doi.org/10.1109/RCIS.2008.4632112","url":null,"abstract":"i* is a framework for goal-oriented requirements modeling. This framework contains an organizational modeling language defined by actors and dependencies among them. Although i* has been widely used, it is still hard to work with it due to its diversity of variants. In this paper, we propose a unified metamodel that presents elements of two well-known variants of i*. We show how OCL restrictions can be applied this metamodel in order to generate a specific variant. In doing so, we intend to unify the efforts of i* community. This metamodel can be useful when developing generic tools for i*, as well as to reason about i* language. Moreover, it makes it easier to extend the i* language. Thus, our proposal is an attempt towards the unification on i* variants by considering similarities and differences among them.","PeriodicalId":416272,"journal":{"name":"2008 Second International Conference on Research Challenges in Information Science","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114244406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Gutiérrez, María José Escalona Cuaresma, M. Risoto, J. Torres, Arturo H. Centeno
{"title":"A case study for generating test cases from use cases","authors":"J. Gutiérrez, María José Escalona Cuaresma, M. Risoto, J. Torres, Arturo H. Centeno","doi":"10.1109/RCIS.2008.4632109","DOIUrl":"https://doi.org/10.1109/RCIS.2008.4632109","url":null,"abstract":"The verification of the correct implementation of use cases is a vital task in software development and quality assurance. Although there are many works describing how to generate test cases from use cases, there are very few case studies and empirical results of their application and effectiveness. This paper introduces a first case study that test the correct implementation of use cases in a web system and a command line system, analyses the results and exposes that generation of use cases has a successful about 80%.","PeriodicalId":416272,"journal":{"name":"2008 Second International Conference on Research Challenges in Information Science","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116071111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rapid prototyping of pattern mining problems isomorphic to boolean lattices","authors":"Frédéric Flouvat, F. D. Marchi, Jean-Marc Petit","doi":"10.1109/RCIS.2008.4632104","DOIUrl":"https://doi.org/10.1109/RCIS.2008.4632104","url":null,"abstract":"Interesting pattern mining is an important family of data mining problems with applications in many domains. In this paper, we focus on the special class of pattern mining problems known to be dasiarepresentable as setspsila. The main contribution of this paper is to take advantage of the common theoretical background of these problems from an implementation point of view by providing efficient data structures for boolean lattice representation and several implementations of well known algorithms. By the way, these problems can be implemented with only minimal effort, i.e. programmers do not have to be aware of low level code, customized data structures and algorithms being available for free. A toolkit, called iZi, has been devised and applied to several problems such as itemset mining, constraint mining in relational databases and query rewriting in data integration systems. According to our first results, the programs obtained using our toolkit offer a very good tradeoff between performances and development simplicity. Some methodological guidelines are also provided to guide the programmers both at the theoretical level and at the code level.","PeriodicalId":416272,"journal":{"name":"2008 Second International Conference on Research Challenges in Information Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Gâteau, C. Feltus, Jocelyn Aubert, Christophe Incoul
{"title":"An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504","authors":"B. Gâteau, C. Feltus, Jocelyn Aubert, Christophe Incoul","doi":"10.1109/RCIS.2008.4632091","DOIUrl":"https://doi.org/10.1109/RCIS.2008.4632091","url":null,"abstract":"The generalization of open and distributed systems and the dynamics of the environment make Information Systems (IS) and, consequently, its access rights management an increasingly complex problem. Even if support for this activity appears to be well handed by current sophisticated solutions, the definition and the exploitation of an access rights management framework appropriately adapted for a company remain challenging. This statement is explained mainly by the continuous growth of the diversity of stakeholderspsila positions and by the criticality of the resources to protect. The SIM project, which stands for ldquoSecure Identity Managementrdquo, addresses this problem. The objectives of our paper are twofold. First, to make rights management align closer to business objectives by providing an innovative approach that focuses on business goals for defining access policy. The ISO/IEC 15504 process-based assessment model has been preferred for that research. Indeed, the structured framework that it offers for the description of activities allows for the establishment of meaningful links with responsibilities concepts. Secondly, to automate the deployment of policies through the company IT infrastructurepsilas components and devices by defining a multi-agent system architecture that provides autonomy and adaptability. Free and open source components have been used for the prototyping phase.","PeriodicalId":416272,"journal":{"name":"2008 Second International Conference on Research Challenges in Information Science","volume":"416 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117304830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}