2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises最新文献

筛选
英文 中文
Cooperative Knowledge Discovery & Data Mining CKDD 协同知识发现与数据挖掘
Mohand Tahar Kechadi, I. Savvas
{"title":"Cooperative Knowledge Discovery & Data Mining CKDD","authors":"Mohand Tahar Kechadi, I. Savvas","doi":"10.1109/WETICE.2010.21","DOIUrl":"https://doi.org/10.1109/WETICE.2010.21","url":null,"abstract":"This report gives a brief overview of the main concerns addressed by the authors at the first international workshop on Cooperative Knowledge Discovery & Data Mining (CKDD), held at WETICE 2010. A presentation of the main topics is given and then a summary of each paper accepted by the workshop is reported.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116986520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Agent Architecture and Infrastructure for Dynamic Collaborative Learning (AICOL) 动态协作学习(AICOL)的Agent体系结构和基础结构
Godwill Vegah, U. Wajid
{"title":"Agent Architecture and Infrastructure for Dynamic Collaborative Learning (AICOL)","authors":"Godwill Vegah, U. Wajid","doi":"10.1109/WETICE.2010.9","DOIUrl":"https://doi.org/10.1109/WETICE.2010.9","url":null,"abstract":"This paper presents an agent-based system to facilitate online learning activities. The system comprises of learning support agents that collaborate and negotiate with providers of various courses based on learner preferences, applying suitable agent negotiation strategies, adapting learning plans and formalizing e-contracts based on the changing needs of the learner. The agent-based system address various issues in e-learning and provides support for effective use of learning resources, modelling learning objectives and monitoring and evaluating learner progress throughout the lifecycle of learning process.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127046503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Data Wave: Data Management and Mining 数据浪潮:数据管理和挖掘
Mohand Tahar Kechadi
{"title":"The Data Wave: Data Management and Mining","authors":"Mohand Tahar Kechadi","doi":"10.1109/WETICE.2010.56","DOIUrl":"https://doi.org/10.1109/WETICE.2010.56","url":null,"abstract":"Nowadays, massive amounts of data that are often geographically distributed and owned by different organisations are being mined. As consequence, a large mount of knowledge is being produced. This causes the problem of efficient knowledge management and mining. The main aim is to develop DM infrastructures to fully exploit the benefit of the knowledge contained in these very large data repositories. To this end, we introduced ”knowledge map” approach to represent easily and efficiently the knowledge mined in a large-scale platform such as Grid. This also facilitates the integration and coordination of local mining processes along with existing knowledge to increase the accuracy of the final models. In this paper, we discuss its advantages and its design issues.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Next Generation Cloud Computing Architecture: Enabling Real-Time Dynamism for Shared Distributed Physical Infrastructure 下一代云计算架构:实现共享分布式物理基础设施的实时动态
V. Sarathy, P. Narayan, Rao V. Mikkilineni
{"title":"Next Generation Cloud Computing Architecture: Enabling Real-Time Dynamism for Shared Distributed Physical Infrastructure","authors":"V. Sarathy, P. Narayan, Rao V. Mikkilineni","doi":"10.1109/WETICE.2010.14","DOIUrl":"https://doi.org/10.1109/WETICE.2010.14","url":null,"abstract":"Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated, managed and consumed. End-users are increasingly sensitive to the latency of services they consume. Service Developers want the Service Providers to ensure or provide the capability to dynamically allocate and manage resources in response to changing demand patterns in real-time. Ultimately, Service Providers are under pressure to architect their infrastructure to enable real-time end-to-end visibility and dynamic resource management with fine grained control to reduce total cost of ownership while also improving agility. The current approaches to enabling real-time, dynamic infrastructure are inadequate, expensive and not scalable to support consumer mass-market requirements. Over time, the server-centric infrastructure management systems have evolved to become a complex tangle of layered systems designed to automate systems administration functions that are knowledge and labor intensive. This expensive and non-real time paradigm is ill suited for a world where customers are demanding communication, collaboration and commerce at the speed of light. Thanks to hardware assisted virtualization, and the resulting decoupling of infrastructure and application management, it is now possible to provide dynamic visibility and control of services management to meet the rapidly growing demand for cloud-based services. What is needed is a rethinking of the underlying operating system and management infrastructure to accommodate the ongoing transformation of the data center from the traditional server-centric architecture model to a cloud or network-centric model. This paper proposes and describes a reference model for a network-centric datacenter infrastructure management stack that borrows and applies key concepts that have enabled dynamism, scalability, reliability and security in the telecom industry, to the computing industry. Finally, the paper will describe a proof-of-concept system that was implemented to demonstrate how dynamic resource management can be implemented to enable real-time service assurance for network centric datacenter architecture.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123624969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
Supporting the Requirements Prioritization Process Using Social Network Analysis Techniques 使用社会网络分析技术支持需求优先排序过程
P. Fitsilis, V. Gerogiannis, Leonidas G. Anthopoulos, I. Savvas
{"title":"Supporting the Requirements Prioritization Process Using Social Network Analysis Techniques","authors":"P. Fitsilis, V. Gerogiannis, Leonidas G. Anthopoulos, I. Savvas","doi":"10.1109/WETICE.2010.24","DOIUrl":"https://doi.org/10.1109/WETICE.2010.24","url":null,"abstract":"Requirements management and prioritization is a complex process that should take into account requirements value for customers, cost of implementation, available resources, requirements interdependencies, system architecture and dependencies to the code base. In this paper we present how Social Network Analysis can be used in order to improve software requirements management and the prioritization process. The presented model is based on meta-networks where basic entities are combined for representing requirements priorities, interdependencies, required knowledge, etc.. The analysis of the model is illustrated with sample data and a number of examples.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121518223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
The Importance of Corporate Forensic Readiness in the Information Security Framework 信息安全框架中企业取证准备的重要性
G. Pangalos, C. Ilioudis, I. Pagkalos
{"title":"The Importance of Corporate Forensic Readiness in the Information Security Framework","authors":"G. Pangalos, C. Ilioudis, I. Pagkalos","doi":"10.1109/WETICE.2010.57","DOIUrl":"https://doi.org/10.1109/WETICE.2010.57","url":null,"abstract":"Corporate forensics is rapidly becoming an essential component of modern business. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, it is argued in this paper that digital forensics principles need to be applied to all corporate investigatory, monitoring and auditing activities. Corporate forensics are also necessary in modern organizations in order to credibly investigate what and how it happened, what part of the security policy was breached, whether existing corporate security mechanisms are sufficient and responding promptly, help investigate the impact and costs of a security incident, help management take well documented actions, and so forth. Forensic practices are therefore departing fast from the niche of law enforcement and becoming a business function and infrastructural component. This migration poses new challenges to security professionals that must be resolved. Furthermore, protecting information and information assets solely through technical means and security procedures is also no longer sufficient in modern corporate environments, as accountability from management is also needed. Forensic readiness helps enhance the security strategy of an organization, reduce the impact of a security incident and provide management with the means to demonstrate that reasonable care has been taken to protect information resources. Forensic readiness is becoming important for modern corporate environments and a significant component of the Information Security Good Practice. In this paper we also advocate that the scope of forensics needs to be expanded in order to encompass the whole information security domain and we address a number of related issues that need further attention or must be resolved in order to take full advantage of forensic readiness in a corporate environment. The expanded scope of information security due to the inclusion of forensic readiness is expected to disturb established information security good practices. As such we challenge the concept of a generic good practice, its applicability to a specific organizational context and we investigate alternatives for adapting information security good practices to accommodate digital forensics processes.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124003677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Collaborative Migration, Coupling and Simulation of Water Resources Models through OpenMI 基于OpenMI的水资源模型协同迁移、耦合与模拟
K. Kokkinos, A. Loukas
{"title":"Collaborative Migration, Coupling and Simulation of Water Resources Models through OpenMI","authors":"K. Kokkinos, A. Loukas","doi":"10.1109/WETICE.2010.32","DOIUrl":"https://doi.org/10.1109/WETICE.2010.32","url":null,"abstract":"The present study describes the migration and coupling of a monthly conceptual rainfall runoff model named UTHBAL and a water reservoir operation model called UTHRL into the OpenMI standard. The models have been introduced by Loukas et al. [1, 2]. We have developed a collaborative decision support framework named UTH-MODELER which automates the migration of the two models into OpenMI. This framework synchronizes spatially and temporarily the two models into a collaborative simultaneous simulation. The produced software allows time series input in various formats and model extensibility. Furthermore, an optimization library for the calibration of the models has been incorporated. The experimental verification of the coupled system has been tested for the case study of the reservoir of the restored Lake Karla in Thessally Greece. The results show that the collaboration process is bounded by the time, space and optimization characteristics of the coupled models.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126400761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless Opportunistic Network Based on UWB for Preserving Environment 基于超宽带的环境保护无线机会网络
R. Giuliano, F. Mazzenga, M. Petracca, Remo Pomposini
{"title":"Wireless Opportunistic Network Based on UWB for Preserving Environment","authors":"R. Giuliano, F. Mazzenga, M. Petracca, Remo Pomposini","doi":"10.1109/WETICE.2010.36","DOIUrl":"https://doi.org/10.1109/WETICE.2010.36","url":null,"abstract":"In last years, research on developing sensing devices allows new applications for preserving the environment. A typical application foresees to collect data through sensors deployed in the desired area. We proposed to use Ultrawideband (UWB) technology to provide connectivity among sensors enabling the collecting site (the sink) to store environmental parameters. When necessary those parameters are transmitted to the remote monitoring site. The main problems of sensor network is from one side to have a large number of nodes to guarantee a high connectivity level and on the other side not to have a harmful interference on licensed primary users (PUs), with which UWBs share the same bandwidth. In this paper, we propose a deployment strategy for sensors in an open outdoor area. The methodology takes into account both connectivity and coexistence issues envisaged in the deployment phase. Results show that a certain connectivity level can be reached depending on the number of sensors in the area and on propagation conditions. Moreover, an analysis on coexistence between UWBs and PUs is performed depending on the number of PUs in the same area to be preserved and the bit rate required by the application.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125989585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security and Cloud Computing: InterCloud Identity Management Infrastructure 安全和云计算:云间身份管理基础设施
A. Celesti, F. Tusa, M. Villari, A. Puliafito
{"title":"Security and Cloud Computing: InterCloud Identity Management Infrastructure","authors":"A. Celesti, F. Tusa, M. Villari, A. Puliafito","doi":"10.1109/WETICE.2010.49","DOIUrl":"https://doi.org/10.1109/WETICE.2010.49","url":null,"abstract":"Cloud Computing is becoming one of the most important topics in the IT world. Several challenges are being raised from the adoption of this computational paradigm including security, privacy, and federation. This paper aims to introduce new concepts in cloud computing and security, focusing on heterogeneous and federated scenarios. We present a reference architecture able to address the Identity Management (IdM) problem in the InterCloud context and show how it can be successfully applied to manage the authentication needed among clouds for the federation establishment.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133876420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Towards Agent-Based 'Smart' Collaboration in Enterprise Networks 面向企业网络中基于代理的“智能”协作
A. Karageorgos, Anthony Avramouli, G. Ntalos, Christos Tjortjis, K. Vassilopoulou
{"title":"Towards Agent-Based 'Smart' Collaboration in Enterprise Networks","authors":"A. Karageorgos, Anthony Avramouli, G. Ntalos, Christos Tjortjis, K. Vassilopoulou","doi":"10.1109/WETICE.2010.11","DOIUrl":"https://doi.org/10.1109/WETICE.2010.11","url":null,"abstract":"International competition and dynamically changing customer demands lead SME’s to join dynamically formed, ‘smart’ enterprise networks aiming to increase their competitiveness and market share. Supporting such networks with decision making related to collaborations and providing adaptive user interfaces are key challenges. In this paper, we use furniture manufacturing SME’s as a case study and we provide an overview of our ongoing work on e-Furn, an agent-based system for supporting ‘smart’ collaboration in enterprise networks. We outline two main features of the proposed approach: a) assisting users in typical collaboration decisions, such as product bundling and task outsourcing, and b) providing users with dynamically adaptive user interfaces.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124180671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信