Aspect-Oriented Programming (AOP) aims to address the scattering and tangling of cross-cutting concerns in a system. Many aspect mining techniques are proposed based on the concepts that concerns crosscut other modules of a system. Most of these researches targeted on a single version during the development of a software system. However, it is also possible that the difference between versions during the development of a software system may also be a source of aspects. In this paper, we propose to discover aspect candidates through the analysis of a series of versions of a software system. A supporting tool, AMTV (Aspect-Mining Tool among Versions), is also developed based on the fan-in metric to identify aspect candidates across multiple versions of a software system. An experiment of applying the proposed approach is conducted to a software system JHot Draw, and the results show that eight kinds of aspect candidates may appear during the development of a software system. At last, several advices are given to programmers as a reference for dealing with aspects while developing a software system using aspect-oriented development paradigm.
{"title":"Discovering Aspects through Analyzing Code Changes in Software Development Histories","authors":"Cheng-Zhe Li, Kuo-Hsun Hsu, Guan-Yu Chen","doi":"10.1109/ICEBE.2015.58","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.58","url":null,"abstract":"Aspect-Oriented Programming (AOP) aims to address the scattering and tangling of cross-cutting concerns in a system. Many aspect mining techniques are proposed based on the concepts that concerns crosscut other modules of a system. Most of these researches targeted on a single version during the development of a software system. However, it is also possible that the difference between versions during the development of a software system may also be a source of aspects. In this paper, we propose to discover aspect candidates through the analysis of a series of versions of a software system. A supporting tool, AMTV (Aspect-Mining Tool among Versions), is also developed based on the fan-in metric to identify aspect candidates across multiple versions of a software system. An experiment of applying the proposed approach is conducted to a software system JHot Draw, and the results show that eight kinds of aspect candidates may appear during the development of a software system. At last, several advices are given to programmers as a reference for dealing with aspects while developing a software system using aspect-oriented development paradigm.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114974700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Bian, Yinsheng Li, Jianping Shen, Hao Chen, Zhou Fang
Nowadays, the demand for travel personality and intelligence is growing with each passing day. In this paper, the authors have designed a cloud-services-oriented personal travel application called "Cloud Travel" which used in mobile phones. The "Cloud Travel" is a highly personalized travel arrangement and auxiliary tool with distributed computing technology, it recommends travel services published by trusted provider to customers. For a particular user, our application uses personal information gained from the transaction process or other ways to establish the model for users. Our application also models travel services, then by comparing user model and travel service model, the "Cloud Travel" can recommends appropriate travel services to users. In our application, a user has three different roles called customer (user can buy some travel services), supplier (user can publish some travel services) and operator (users can combine some of the travel services to formation a new travel package).
{"title":"A Cloud-Services-Oriented Personal Travel Application","authors":"J. Bian, Yinsheng Li, Jianping Shen, Hao Chen, Zhou Fang","doi":"10.1109/ICEBE.2015.16","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.16","url":null,"abstract":"Nowadays, the demand for travel personality and intelligence is growing with each passing day. In this paper, the authors have designed a cloud-services-oriented personal travel application called \"Cloud Travel\" which used in mobile phones. The \"Cloud Travel\" is a highly personalized travel arrangement and auxiliary tool with distributed computing technology, it recommends travel services published by trusted provider to customers. For a particular user, our application uses personal information gained from the transaction process or other ways to establish the model for users. Our application also models travel services, then by comparing user model and travel service model, the \"Cloud Travel\" can recommends appropriate travel services to users. In our application, a user has three different roles called customer (user can buy some travel services), supplier (user can publish some travel services) and operator (users can combine some of the travel services to formation a new travel package).","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121391908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the growth of the number of Web services published over Internet, identifying composite services by taking into account both functional and non-functional requirements of end users has become a real challenge that needs to be addressed. This challenge is aggravated in the case of situations requiring adaptation to user context. To overcome these challenges, we propose a solution that enables a certain flexibility and adaptability without having to deal with composition from scratch at runtime. Our approach consists in generating automatically a composition schema at the abstract service level. The design-time components of our solution are OWL-S abstract services that are used within the composition process for deriving different composition possibilities and for reducing the difficulty of the tasks of discovery and selection of the actual Web services. This mechanism relies also on a specification of user requirements structured as intentions graph.
{"title":"A Semantic Driven Approach for an Automated Composition Based on Abstract Services","authors":"Emna Fki, S. Tazi, M. Jmaiel","doi":"10.1109/ICEBE.2015.32","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.32","url":null,"abstract":"With the growth of the number of Web services published over Internet, identifying composite services by taking into account both functional and non-functional requirements of end users has become a real challenge that needs to be addressed. This challenge is aggravated in the case of situations requiring adaptation to user context. To overcome these challenges, we propose a solution that enables a certain flexibility and adaptability without having to deal with composition from scratch at runtime. Our approach consists in generating automatically a composition schema at the abstract service level. The design-time components of our solution are OWL-S abstract services that are used within the composition process for deriving different composition possibilities and for reducing the difficulty of the tasks of discovery and selection of the actual Web services. This mechanism relies also on a specification of user requirements structured as intentions graph.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper relies on the statistical data in China's telecommunications industry for nearly 10 years. It selects 10 objective indexes such as "basic telecom business income" to evaluate the development of the telecommunication industry, and uses principal component analysis, one of the commonly used multivariate comprehensive evaluation method, to excavate internal relations of 10 industry indexes, and establish the "communication industry comprehensive evaluation index" based evaluation model. Through specific case studies, we can draw the conclusion that there are enormous regional differences in the development of communication industry and different areas are mainly influenced by different factors.
{"title":"A Comprehensive Evaluation Study of China's Telecommunication Industry Based on Approach of Principal Component Analysis","authors":"Zhensheng Wei, Z. Fang, Jinglun Liu","doi":"10.1109/ICEBE.2015.57","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.57","url":null,"abstract":"The paper relies on the statistical data in China's telecommunications industry for nearly 10 years. It selects 10 objective indexes such as \"basic telecom business income\" to evaluate the development of the telecommunication industry, and uses principal component analysis, one of the commonly used multivariate comprehensive evaluation method, to excavate internal relations of 10 industry indexes, and establish the \"communication industry comprehensive evaluation index\" based evaluation model. Through specific case studies, we can draw the conclusion that there are enormous regional differences in the development of communication industry and different areas are mainly influenced by different factors.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127882321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In e-marketplace, semantic document exchange is a methodology of providing exchangeable semantic documents, which ensures document writer, writer's computer, reader's computer and document reader to share a same understanding in meaning on any exchanged document, that is, a semantic document is exchangeable across any heterogeneous contexts. Existing methodologies for semantic document exchange, in general, can be categorized in three tracks such as document standardization, ontology engineering, and collaborative document engineering. This paper explores challenging trends and issues for semantic document exchange in e-business.
{"title":"Semantic Document Exchange for E-Business: Trends and Issues","authors":"Guangyi Xiao, J. Guo, Zhiguo Gong, Renfa Li","doi":"10.1109/ICEBE.2015.33","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.33","url":null,"abstract":"In e-marketplace, semantic document exchange is a methodology of providing exchangeable semantic documents, which ensures document writer, writer's computer, reader's computer and document reader to share a same understanding in meaning on any exchanged document, that is, a semantic document is exchangeable across any heterogeneous contexts. Existing methodologies for semantic document exchange, in general, can be categorized in three tracks such as document standardization, ontology engineering, and collaborative document engineering. This paper explores challenging trends and issues for semantic document exchange in e-business.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122183425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service Level Agreement (SLA) in cloud service provides quality and responsibility for both Datacenter providers and customers. If a customer's required task is processed delayed then penalty of SLA violation are generated due to this shortage of resource allocation. The virtual machines (VMs) in lower utilization host or over utilization host will be migrated to the suitable hosts in an attempt to reduce delays in task processing and avoid SLA violation. Control chart is applied for monitoring the host performance form utilization perspective. We propose a mechanism to evaluate resource reallocation and identify which of these VMs can match an appropriate host based on economic of the cost and SLA violation penalty. The proposed approach is applied on a case study in which tasks are submitted sequentially by the constant schedule interval and cloud resource allocation is constantly gets evaluated.
{"title":"Resource Reallocation Based on SLA Requirement in Cloud Environment","authors":"Jen-Hsiang Chen, Chen-Fang Tsai, Shin-Li Lu, Fahmida Abedin","doi":"10.1109/ICEBE.2015.70","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.70","url":null,"abstract":"Service Level Agreement (SLA) in cloud service provides quality and responsibility for both Datacenter providers and customers. If a customer's required task is processed delayed then penalty of SLA violation are generated due to this shortage of resource allocation. The virtual machines (VMs) in lower utilization host or over utilization host will be migrated to the suitable hosts in an attempt to reduce delays in task processing and avoid SLA violation. Control chart is applied for monitoring the host performance form utilization perspective. We propose a mechanism to evaluate resource reallocation and identify which of these VMs can match an appropriate host based on economic of the cost and SLA violation penalty. The proposed approach is applied on a case study in which tasks are submitted sequentially by the constant schedule interval and cloud resource allocation is constantly gets evaluated.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133852277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When a customer uses a service, he might change his initial requirement due to subjective reasons that could not be predicated by service providers. If this happened, service providers need to adjust the current service solution to adapt the new requirement with the objective of minimizing the change amplitude and cost. Placing this problem into AI-planning based service composition (PSC) scenario, we present two approaches called global re-planning algorithms (RP) and local reinforcement algorithm (LR). RP constructs a virtual requirement according to the composite service's current execution state and the changed expectation, and invokes PSC algorithm to look for a new solution. A price-rewritten mechanism is used as a heuristic during the re-planning to preferentially reuse those services existing in current solution. In terms of six basic types of requirement changes, LR attempts to make minor repairs to the current composite service to adapt to the new requirement and minimize the change amplitude of the solution. In the experiments, the efficiency, variation cost and amplitude of RP and LR are compared, and how the performance metrics are affected by other factors is preliminarily validated.
{"title":"Responding to Subjective Changes of Customer Requirements in Dynamic Service Execution Environment","authors":"Nan Jing, Zhongjie Wang, Xiaofei Xu","doi":"10.1109/ICEBE.2015.29","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.29","url":null,"abstract":"When a customer uses a service, he might change his initial requirement due to subjective reasons that could not be predicated by service providers. If this happened, service providers need to adjust the current service solution to adapt the new requirement with the objective of minimizing the change amplitude and cost. Placing this problem into AI-planning based service composition (PSC) scenario, we present two approaches called global re-planning algorithms (RP) and local reinforcement algorithm (LR). RP constructs a virtual requirement according to the composite service's current execution state and the changed expectation, and invokes PSC algorithm to look for a new solution. A price-rewritten mechanism is used as a heuristic during the re-planning to preferentially reuse those services existing in current solution. In terms of six basic types of requirement changes, LR attempts to make minor repairs to the current composite service to adapt to the new requirement and minimize the change amplitude of the solution. In the experiments, the efficiency, variation cost and amplitude of RP and LR are compared, and how the performance metrics are affected by other factors is preliminarily validated.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114588879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things (IoT) has been developing rapidly in the past few years. In IoT, an enormous number of smart devices are connected to the network, where communication and interaction occurs extensively among end users, smart devices and Internet services. Due to the great diversity of devices, broader scope of interactions and other characteristics of IoT, current IdM model for Internet needs to be extended and improved. The objective of this article is to analyze the main features of IoT and key issues of the IdM for IoT, and then present an IdM framework for IoT, which consists of three parts: the standard information model, user-centric architecture and multi-channel authentication.
{"title":"An Identity Management Framework for Internet of Things","authors":"Ju Chen, Yi Liu, Y. Chai","doi":"10.1109/ICEBE.2015.67","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.67","url":null,"abstract":"The Internet of Things (IoT) has been developing rapidly in the past few years. In IoT, an enormous number of smart devices are connected to the network, where communication and interaction occurs extensively among end users, smart devices and Internet services. Due to the great diversity of devices, broader scope of interactions and other characteristics of IoT, current IdM model for Internet needs to be extended and improved. The objective of this article is to analyze the main features of IoT and key issues of the IdM for IoT, and then present an IdM framework for IoT, which consists of three parts: the standard information model, user-centric architecture and multi-channel authentication.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115078265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Complex product development faces huge amount of components with complex structure and dynamic changes in product lifecycle, which is a key challenge in mass customization. This paper addresses this issue by providing a product configuration solution based on bill of materials (BOM): First, conceptual objects with flexible structure and unified identifier (UID) in 2d-code form are built to represent business entities. Second, the relations among the instances of the conceptual objects are analyzed to dynamically generate BOM in different lifecycle phase, which is the product configuration view. Third, quality information monitoring and completeness check can be achieved based on BOM structure. Finally, a prototype system for aircraft manufacturing is built, which supports requirement change and quality management in the whole product lifecycle.
复杂产品开发面临着数量庞大、结构复杂的部件和产品生命周期的动态变化,这是大规模定制的关键挑战。本文通过提供基于物料清单(bill of materials, BOM)的产品配置解决方案来解决这一问题:首先,构建具有灵活结构和统一标识符(UID)的2d-code形式的概念对象来表示业务实体;其次,分析概念对象实例之间的关系,动态生成不同生命周期阶段的BOM,即产品配置视图;第三,基于BOM结构实现质量信息监控和完整性检查。最后,构建了飞机制造的原型系统,支持产品全生命周期的需求变更和质量管理。
{"title":"A Bottom-Up Approach for BOM Generation and Its Application in Mass Customization","authors":"Tian Chen, Hongming Cai, Boyi Xu, Fenglin Bu","doi":"10.1109/ICEBE.2015.65","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.65","url":null,"abstract":"Complex product development faces huge amount of components with complex structure and dynamic changes in product lifecycle, which is a key challenge in mass customization. This paper addresses this issue by providing a product configuration solution based on bill of materials (BOM): First, conceptual objects with flexible structure and unified identifier (UID) in 2d-code form are built to represent business entities. Second, the relations among the instances of the conceptual objects are analyzed to dynamically generate BOM in different lifecycle phase, which is the product configuration view. Third, quality information monitoring and completeness check can be achieved based on BOM structure. Finally, a prototype system for aircraft manufacturing is built, which supports requirement change and quality management in the whole product lifecycle.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123587928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cross-border e-commerce is a newly arising and burgeoning model of cross-border trade. This paper qualitatively analyzes the reasons of cross-border e-commerce's emerging based on transaction costs theory. First, we introduce cross-border e-commerce and describe the supply chains of B2C and B2B2C cross-border e-commerce models. Then we give an overview of the development of transaction costs theory and analyze the composition of transaction costs from four different perspectives. Finally, we compare the transaction costs of three main cross-border e-commerce models to traditional cross-border trade based on the work above and draw a conclusion that the decrease of transaction costs is a fundamental cause of its development.
{"title":"Qualitative Analysis of Cross-Border E-Commerce Based on Transaction Costs Theory","authors":"Li Wang, Y. Chai, Yi Liu, Yang Xu","doi":"10.1109/ICEBE.2015.36","DOIUrl":"https://doi.org/10.1109/ICEBE.2015.36","url":null,"abstract":"Cross-border e-commerce is a newly arising and burgeoning model of cross-border trade. This paper qualitatively analyzes the reasons of cross-border e-commerce's emerging based on transaction costs theory. First, we introduce cross-border e-commerce and describe the supply chains of B2C and B2B2C cross-border e-commerce models. Then we give an overview of the development of transaction costs theory and analyze the composition of transaction costs from four different perspectives. Finally, we compare the transaction costs of three main cross-border e-commerce models to traditional cross-border trade based on the work above and draw a conclusion that the decrease of transaction costs is a fundamental cause of its development.","PeriodicalId":153535,"journal":{"name":"2015 IEEE 12th International Conference on e-Business Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130401865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}