Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140662
Hossein Monem, Ab Razak Che Hussin, R. Sharifian, Habib Shaterzadeh
Customer Relationship Management (CRM) related issues, during three consecutive years, were in the top nine lists of most concern for the hospitals' chief executive officers in the USA and furthermore, Information Technology (IT) projects' failure rate in the organizations were quite high. To deal with such problems Success Factors (CSF) from different perspectives such as management, staff, patient and software were reviewed in previous healthcare's literatures. In this paper, software and patient factors deeply were focused and added to the Egg model and a five perspective map was created. Implementation success factors map depicts inadequate study on patient's trust and perception and software's customization, complexity, usability, privacy and usefulness. Chief Information Officers (CIO) and Chief Executive Officers (CEO) of hospitals and hospital's CRM system vendors can use proposed factors' map for more successful implementations. It should be noted that this result is part of a PhD research and further investigation is required to test these factors in term of practical usage in heath care environment.
{"title":"CRM software implementation factors in hospital: Software & patient perspectives","authors":"Hossein Monem, Ab Razak Che Hussin, R. Sharifian, Habib Shaterzadeh","doi":"10.1109/MYSEC.2011.6140662","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140662","url":null,"abstract":"Customer Relationship Management (CRM) related issues, during three consecutive years, were in the top nine lists of most concern for the hospitals' chief executive officers in the USA and furthermore, Information Technology (IT) projects' failure rate in the organizations were quite high. To deal with such problems Success Factors (CSF) from different perspectives such as management, staff, patient and software were reviewed in previous healthcare's literatures. In this paper, software and patient factors deeply were focused and added to the Egg model and a five perspective map was created. Implementation success factors map depicts inadequate study on patient's trust and perception and software's customization, complexity, usability, privacy and usefulness. Chief Information Officers (CIO) and Chief Executive Officers (CEO) of hospitals and hospital's CRM system vendors can use proposed factors' map for more successful implementations. It should be noted that this result is part of a PhD research and further investigation is required to test these factors in term of practical usage in heath care environment.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115186224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140712
Al-Fahim Mubarak Ali, S. Sulaiman, Sharifah Mashita Syed-Mohamad
Maintainability is an important attribute when developing software. One of the factors that negatively affect maintainability of software is cloning. Cloning is identical copies of the same instances or fragments. Code cloning happens due to rapid changes when programmers perform clone instances and copy-paste technique. Although copy and paste is widely used in code reusability approach, it significantly increases maintenance cost. Current code clone research focuses in detection and analysis of code clones in order to help software developers to identify code clones in a source code and reuse the source code in order to decrease the maintenance cost. Necessary measures needed in order to reduce issues caused by cloning during implementation. Therefore, there is a need in exploring problems and possibilities associated in code cloning. This paper proposes an enhancement of a generic pipeline model for code clone detection. With the support of a tool, we implement and apply the proposed approach.
{"title":"An enhanced generic pipeline model for code clone detection","authors":"Al-Fahim Mubarak Ali, S. Sulaiman, Sharifah Mashita Syed-Mohamad","doi":"10.1109/MYSEC.2011.6140712","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140712","url":null,"abstract":"Maintainability is an important attribute when developing software. One of the factors that negatively affect maintainability of software is cloning. Cloning is identical copies of the same instances or fragments. Code cloning happens due to rapid changes when programmers perform clone instances and copy-paste technique. Although copy and paste is widely used in code reusability approach, it significantly increases maintenance cost. Current code clone research focuses in detection and analysis of code clones in order to help software developers to identify code clones in a source code and reuse the source code in order to decrease the maintenance cost. Necessary measures needed in order to reduce issues caused by cloning during implementation. Therefore, there is a need in exploring problems and possibilities associated in code cloning. This paper proposes an enhancement of a generic pipeline model for code clone detection. With the support of a tool, we implement and apply the proposed approach.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121933378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140639
N. Minhas, Shahla Majeed, Ziaul Qayyum, Muhammad Aasem
The nature of software requirements is very much subjective and multi-faceted. The level of complexity increases along-with the volume, especially when the requirements are in natural language. In the primary phase of requirements engineering, it is mostly desirable to transform these user written requirements into more understandable form. Organizing the requirements in different groups may support further activities much easier than direct working. In this paper, we present a classifier that sufficiently transforms natural language written requirements into corresponding groups. The organization of these groups depends upon the inter-keywords association i.e., hierarchy of keywords. The classifier works best when requirements have been written using relative vocabulary i.e., controlled vocabulary. The overall structure of this technique is composed on three main components: 1) Repository: of keywords and their relationships as source data, 2) Mapping: Finding words in the requirements document with keywords of repository, and 3) Presentation: presenting classified (grouped) requirements in more meaningful ways.
{"title":"Controlled vocabulary based software requirements classification","authors":"N. Minhas, Shahla Majeed, Ziaul Qayyum, Muhammad Aasem","doi":"10.1109/MYSEC.2011.6140639","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140639","url":null,"abstract":"The nature of software requirements is very much subjective and multi-faceted. The level of complexity increases along-with the volume, especially when the requirements are in natural language. In the primary phase of requirements engineering, it is mostly desirable to transform these user written requirements into more understandable form. Organizing the requirements in different groups may support further activities much easier than direct working. In this paper, we present a classifier that sufficiently transforms natural language written requirements into corresponding groups. The organization of these groups depends upon the inter-keywords association i.e., hierarchy of keywords. The classifier works best when requirements have been written using relative vocabulary i.e., controlled vocabulary. The overall structure of this technique is composed on three main components: 1) Repository: of keywords and their relationships as source data, 2) Mapping: Finding words in the requirements document with keywords of repository, and 3) Presentation: presenting classified (grouped) requirements in more meaningful ways.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126340124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140656
Muthukkaruppan Annamalai, M. M. Rosli
Semantic network is a promising technological platform that uses the internet and intranet, and related software technologies to explicitly integrate disparate applications in linked organisations such as enterprises. A primary element of the semantic network is ontology. The adoption of semantic network in enterprises is impeded by the lack of enduring methodologies for engineering reliable ontologies to support the evolving enterprise applications on the envisaged meaning-laden network. Consequently, the paper recognises the systematic and disciplined approach of Software Engineering (SE) as relevant course for Enterprise-strength Ontology Engineering (EsOE), and sets out to reflect EsOE in the light of SE. It identifies the common ground among the contemporary SE models, and suggests exploiting these commonalities to serve as a basis for EsOE. Following the idea of maturity models, the proposed high-level methodology is structured into three levels of realisation, each described by a process, namely, Engineering, Project-focus and Organisation-focus processes.
{"title":"Software engineering approach to enterprise-strength ontology engineering","authors":"Muthukkaruppan Annamalai, M. M. Rosli","doi":"10.1109/MYSEC.2011.6140656","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140656","url":null,"abstract":"Semantic network is a promising technological platform that uses the internet and intranet, and related software technologies to explicitly integrate disparate applications in linked organisations such as enterprises. A primary element of the semantic network is ontology. The adoption of semantic network in enterprises is impeded by the lack of enduring methodologies for engineering reliable ontologies to support the evolving enterprise applications on the envisaged meaning-laden network. Consequently, the paper recognises the systematic and disciplined approach of Software Engineering (SE) as relevant course for Enterprise-strength Ontology Engineering (EsOE), and sets out to reflect EsOE in the light of SE. It identifies the common ground among the contemporary SE models, and suggests exploiting these commonalities to serve as a basis for EsOE. Following the idea of maturity models, the proposed high-level methodology is structured into three levels of realisation, each described by a process, namely, Engineering, Project-focus and Organisation-focus processes.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114338924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140719
M. Azeem, S. Khan
Offshore software development outsourcing (OSDO) is an emerging business approach adopted by many software development organizations in developed countries. Developing software at offshore locations has many benefits including access to large labor pool, low development cost and round-the-clock development. However, inspite of these benefits OSDO presents a variety of challenges to the software development organizations including temporal, geographical and intercultural differences. Intercultural differences cause many problems to vendors in OSDO relationships. This research seeks to identify the potential intercultural challenges faced by vendors in OSDO relationships by reviewing the literature in a systematic way. We have developed a systematic literature review (SLR) protocol, and are in the process of implementing the protocol. SLR is based on a structured protocol, and is therefore, different from ordinary literature review. SLR provides in-depth and more thorough results than ordinary literature review. The expected outcomes of this review will be the identification of intercultural challenges or barriers faced by vendor organisations in the establishment and maintenance of OSDO relationships.
{"title":"Intercultural challenges in offshore software development outsourcing relationships: A systematic literature review protocol","authors":"M. Azeem, S. Khan","doi":"10.1109/MYSEC.2011.6140719","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140719","url":null,"abstract":"Offshore software development outsourcing (OSDO) is an emerging business approach adopted by many software development organizations in developed countries. Developing software at offshore locations has many benefits including access to large labor pool, low development cost and round-the-clock development. However, inspite of these benefits OSDO presents a variety of challenges to the software development organizations including temporal, geographical and intercultural differences. Intercultural differences cause many problems to vendors in OSDO relationships. This research seeks to identify the potential intercultural challenges faced by vendors in OSDO relationships by reviewing the literature in a systematic way. We have developed a systematic literature review (SLR) protocol, and are in the process of implementing the protocol. SLR is based on a structured protocol, and is therefore, different from ordinary literature review. SLR provides in-depth and more thorough results than ordinary literature review. The expected outcomes of this review will be the identification of intercultural challenges or barriers faced by vendor organisations in the establishment and maintenance of OSDO relationships.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125370612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140663
Siti Nor Asikin Kamalzaman, S. Sulaiman, Sharifah Mashita Syed-Mohamad
Nowadays, a lot of development of Web applications use prototyping approach such as throw-away prototyping and evolutionary prototyping. In order to fulfill the users' requirements, developers need to communicate with the users, therefore prototyping is widely used in software development to assist these developers. As we develop Web application and release them as a number of versions or releases of prototype, it constantly requires changes to evolve and meet users' specific requirements. Thus, prototyping approach may cause more maintenance cost to be incurred due to scope creep during software development. In addition, it provides the challenges to a maintenance team who is mostly not the actual development team, to manage and track maintenance process of such Web applications. This paper proposes a user-centered technique for managing and tracking modification requests in a Web application. We anticipate that the proposed technique can assist maintainers to manage and track modification of a Web application in more effective and efficient manner by capturing, classifying and validating the enhancement requests, problem report and modification requests directly from the users during the prototyping process itself. This in turn will avoid unexpected modification requests once we release the Web application and to allow the tracing of both enhancement and problem report during prototyping and modification requests and problem report during maintenance.
{"title":"User-centered technique for managing and tracking modification requests in prototype-based web applications","authors":"Siti Nor Asikin Kamalzaman, S. Sulaiman, Sharifah Mashita Syed-Mohamad","doi":"10.1109/MYSEC.2011.6140663","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140663","url":null,"abstract":"Nowadays, a lot of development of Web applications use prototyping approach such as throw-away prototyping and evolutionary prototyping. In order to fulfill the users' requirements, developers need to communicate with the users, therefore prototyping is widely used in software development to assist these developers. As we develop Web application and release them as a number of versions or releases of prototype, it constantly requires changes to evolve and meet users' specific requirements. Thus, prototyping approach may cause more maintenance cost to be incurred due to scope creep during software development. In addition, it provides the challenges to a maintenance team who is mostly not the actual development team, to manage and track maintenance process of such Web applications. This paper proposes a user-centered technique for managing and tracking modification requests in a Web application. We anticipate that the proposed technique can assist maintainers to manage and track modification of a Web application in more effective and efficient manner by capturing, classifying and validating the enhancement requests, problem report and modification requests directly from the users during the prototyping process itself. This in turn will avoid unexpected modification requests once we release the Web application and to allow the tracing of both enhancement and problem report during prototyping and modification requests and problem report during maintenance.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131286244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140699
Ali MohammadAliZadeh Ghazijahani, R. Atan
Communication among software and hardware engineers plays an important and significant role in successful completion of projects in the environments that hardware and software engineers cooperate to develop common products. In these environments communication is inevitable because both hardware and software engineers need to be aware of each other's main challenges and concerns with respect to the common project. The need for this communication is perceived to be even more in developing hardware-software interfaces and also in clarification of types and formats of the data that will be transferred between hardware and software components. In this paper, three different notations are proposed to help software and hardware engineers communicate each other in written and document-based way. By using these notations which are understandable by hardware and software engineers, the requirements relating to the data types and data formats will be depicted in uniform, detailed and accurate forms of documents. These notations that will be drawn by either hardware or software engineers in requirements phase, will describe the type and format of any interaction data at any size.
{"title":"Data format notations for technical communication among hardware and software engineers","authors":"Ali MohammadAliZadeh Ghazijahani, R. Atan","doi":"10.1109/MYSEC.2011.6140699","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140699","url":null,"abstract":"Communication among software and hardware engineers plays an important and significant role in successful completion of projects in the environments that hardware and software engineers cooperate to develop common products. In these environments communication is inevitable because both hardware and software engineers need to be aware of each other's main challenges and concerns with respect to the common project. The need for this communication is perceived to be even more in developing hardware-software interfaces and also in clarification of types and formats of the data that will be transferred between hardware and software components. In this paper, three different notations are proposed to help software and hardware engineers communicate each other in written and document-based way. By using these notations which are understandable by hardware and software engineers, the requirements relating to the data types and data formats will be depicted in uniform, detailed and accurate forms of documents. These notations that will be drawn by either hardware or software engineers in requirements phase, will describe the type and format of any interaction data at any size.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128201843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140687
Sabrina Ahmad, A. Muda, N. A. Muda, Zahriah Othman
This paper presents an approach to estimate the savings from implementing negotiation in requirements elicitation process. The aim of implementing negotiation is to minimize the possibility of introducing defects during the creation of requirements and to decrease later effort required to fix requirements defects. An empirical evaluation study is adopted through a role play experiment to evaluate the benefit of exercising negotiation. The net-gain and the return-on-investment show positive value which suggest that negotiation activities worth an investment. Based on the return-on-investment of 197 percent in average, this paper suggests that negotiation is a useful prevention activity to inhibit defects from occurring during the creation of requirements.
{"title":"An approach to estimate the savings from negotiation based on cost-benefit analysis model","authors":"Sabrina Ahmad, A. Muda, N. A. Muda, Zahriah Othman","doi":"10.1109/MYSEC.2011.6140687","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140687","url":null,"abstract":"This paper presents an approach to estimate the savings from implementing negotiation in requirements elicitation process. The aim of implementing negotiation is to minimize the possibility of introducing defects during the creation of requirements and to decrease later effort required to fix requirements defects. An empirical evaluation study is adopted through a role play experiment to evaluate the benefit of exercising negotiation. The net-gain and the return-on-investment show positive value which suggest that negotiation activities worth an investment. Based on the return-on-investment of 197 percent in average, this paper suggests that negotiation is a useful prevention activity to inhibit defects from occurring during the creation of requirements.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140701
I. Idris, A. Selamat
Artificial immune system creates techniques that aim at developing immune based models. This was done by distinguishing self from non-self. Mathematical analysis exposed the computation and experimental description of the method and how it is applied to spam detection. This paper looked at evaluation and accuracy in spam detection within the negative selection algorithm. Preliminary result or classifier of self and non-self was carefully studied against mistake of assumption during email classification whereby an email was recognized as a spam and deleted or non-spam and accepted carelessly. This process is called false positive and false negative. Given a threshold, the accuracy increase with increased threshold to determine best performance of the spam detector. Also an improvement of the false positive rate was determined for better spam detector.
{"title":"Negative selection algorithm in artificial immune system for spam detection","authors":"I. Idris, A. Selamat","doi":"10.1109/MYSEC.2011.6140701","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140701","url":null,"abstract":"Artificial immune system creates techniques that aim at developing immune based models. This was done by distinguishing self from non-self. Mathematical analysis exposed the computation and experimental description of the method and how it is applied to spam detection. This paper looked at evaluation and accuracy in spam detection within the negative selection algorithm. Preliminary result or classifier of self and non-self was carefully studied against mistake of assumption during email classification whereby an email was recognized as a spam and deleted or non-spam and accepted carelessly. This process is called false positive and false negative. Given a threshold, the accuracy increase with increased threshold to determine best performance of the spam detector. Also an improvement of the false positive rate was determined for better spam detector.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128536434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/MYSEC.2011.6140711
M. Elfaki, H. Ibrahim, A. Mamat, M. Othman
With the dramatic explosion of the real time mobile application, mobile computing is undergoing a transition from a data communication infrastructure to a global information utility. Wireless phones, PDAs, laptop, and high-end workstation can be viewed as appliances that need to be plug-in to this utility for accessing the information. However, due to mobile limited resources, such as insufficient wireless bandwidth, disconnection and client's mobility, collaborative cache management faces vast challenges. One of these challenges is that all requests are processed in the same manner, as well as these requests are forwarded from hop to hop along the way towards the main database server while the requested data items are missed locally. However, these forward data requests might cause delay and increase the number of hops to serve the requests. This paper aims to study the resource management problem to support differentiated collaborative caching and content distribution services. We focus on the preferential of data exchange among neighbor's nodes to support priority-based caching services. Thus, the collaborative neighbors caching increased, and the cache hit within the system is increased indirectly while most of the requests are answered from the neighbor nodes collaboration instead of relying much on the main database server. The proposed model demonstrates its ability to provide quantifiable service differentiation in terms of increasing the percentage of answering the data item requests locally, with minimal efficiency penalties compared to existence collaborative caching models.
{"title":"Service differentiation for collaborative caching query process in mobile database","authors":"M. Elfaki, H. Ibrahim, A. Mamat, M. Othman","doi":"10.1109/MYSEC.2011.6140711","DOIUrl":"https://doi.org/10.1109/MYSEC.2011.6140711","url":null,"abstract":"With the dramatic explosion of the real time mobile application, mobile computing is undergoing a transition from a data communication infrastructure to a global information utility. Wireless phones, PDAs, laptop, and high-end workstation can be viewed as appliances that need to be plug-in to this utility for accessing the information. However, due to mobile limited resources, such as insufficient wireless bandwidth, disconnection and client's mobility, collaborative cache management faces vast challenges. One of these challenges is that all requests are processed in the same manner, as well as these requests are forwarded from hop to hop along the way towards the main database server while the requested data items are missed locally. However, these forward data requests might cause delay and increase the number of hops to serve the requests. This paper aims to study the resource management problem to support differentiated collaborative caching and content distribution services. We focus on the preferential of data exchange among neighbor's nodes to support priority-based caching services. Thus, the collaborative neighbors caching increased, and the cache hit within the system is increased indirectly while most of the requests are answered from the neighbor nodes collaboration instead of relying much on the main database server. The proposed model demonstrates its ability to provide quantifiable service differentiation in terms of increasing the percentage of answering the data item requests locally, with minimal efficiency penalties compared to existence collaborative caching models.","PeriodicalId":137714,"journal":{"name":"2011 Malaysian Conference in Software Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124278180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}