Despite considerable research on ontologies for representing requirements models (and metamodels), little progress has been made in using ontologies to represent non-functional requirements. Non-functional requirements define the overall qualities of the resulting system. Because they are restrictions on system services, non-functional requirements are often of critical importance, and functional requirements may need to be sacrificed to meet them. However, because of their diverse nature, non-functional requirements are often expressed in non-standard domain-specific ways. This paper describes a nonfunctional requirements ontology that can be used to structure and express constraints as part of quality of service specification. The approach is illustrated using a small case-study.
{"title":"A Domain-Independent Ontology for Non-Functional Requirements","authors":"G. Dobson, S. Hall, G. Kotonya","doi":"10.1109/ICEBE.2007.76","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.76","url":null,"abstract":"Despite considerable research on ontologies for representing requirements models (and metamodels), little progress has been made in using ontologies to represent non-functional requirements. Non-functional requirements define the overall qualities of the resulting system. Because they are restrictions on system services, non-functional requirements are often of critical importance, and functional requirements may need to be sacrificed to meet them. However, because of their diverse nature, non-functional requirements are often expressed in non-standard domain-specific ways. This paper describes a nonfunctional requirements ontology that can be used to structure and express constraints as part of quality of service specification. The approach is illustrated using a small case-study.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"131 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130779795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Business agility usually requires dynamic business process management. For example, business process outsourcing (BPO), often needs partition an existing BPEL- described business process into a number of sub-processes, which can be run at different business partners' in a decentralized way. However, how to effectively partition BPEL processes is still a challenging issue. In this paper, we propose a data flow optimization based BPEL process partitioning approach. Firstly, the messages used in the BPEL processes are transformed into asynchronously transmitted variables. Then, the transformed BPEL process is represented as a parallel flow graph (PFG), and is optimized through data flow analysis. Finally, the business process is partitioned based on the optimized PFG. Experimental results have demonstrated that the workload of message transmission and the response time are all effectively reduced.
{"title":"A Data Flow Optimization Based Approach for BPEL Processes Partition","authors":"Yanlong Zhai, H. Su, Shouyi Zhan","doi":"10.1109/ICEBE.2007.47","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.47","url":null,"abstract":"Business agility usually requires dynamic business process management. For example, business process outsourcing (BPO), often needs partition an existing BPEL- described business process into a number of sub-processes, which can be run at different business partners' in a decentralized way. However, how to effectively partition BPEL processes is still a challenging issue. In this paper, we propose a data flow optimization based BPEL process partitioning approach. Firstly, the messages used in the BPEL processes are transformed into asynchronously transmitted variables. Then, the transformed BPEL process is represented as a parallel flow graph (PFG), and is optimized through data flow analysis. Finally, the business process is partitioned based on the optimized PFG. Experimental results have demonstrated that the workload of message transmission and the response time are all effectively reduced.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115144842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Radio-frequency identification (RFID) is an emerging technology for automatic data capturing, enabling real time information visibility. It promises great potentials in many industries to improve logistics operational efficiency, to help reduce inventory, and to automate asset/item track and trace, etc. The RFID adoption in China is a highly concerned topic as China has become a world manufacturing center. In this paper, we have presented an overview for China's current RFID adoption status. Based on Rogers's DOI theory, a methodology is developed for analyzing RFID adoption in China. With this methodology, China's RFID adoption status is identified, and ways to speed up the rate of adoption are also suggested.
{"title":"Analysis of RFID Adoption in China","authors":"Zongwei Luo, Zhining Tan, Zhicheng Ni, B. Yen","doi":"10.1109/ICEBE.2007.35","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.35","url":null,"abstract":"Radio-frequency identification (RFID) is an emerging technology for automatic data capturing, enabling real time information visibility. It promises great potentials in many industries to improve logistics operational efficiency, to help reduce inventory, and to automate asset/item track and trace, etc. The RFID adoption in China is a highly concerned topic as China has become a world manufacturing center. In this paper, we have presented an overview for China's current RFID adoption status. Based on Rogers's DOI theory, a methodology is developed for analyzing RFID adoption in China. With this methodology, China's RFID adoption status is identified, and ways to speed up the rate of adoption are also suggested.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming to overcome the mismatch between coarse grain of Web service's functions and fine grain of current Web service requirements with inputs and outputs as functional requirements, a three layer task oriented Web service requirement framework is proposed. The top the is task layer which defines the tasks and their relationships, the middle is the method layer which represents multiple implementations of the primitive task, and the low is the operation layer which represents the abstract features of typical operations that a method owns. The task oriented Web service requirement framework proposed well matches the coarse grain feature of Web service's functions and provides a more natural way to express the service requirements.
{"title":"Task Oriented Web Service Requirement Framework","authors":"Yu Cheng, Hexin Lv, Ji Gao, Huamao Gu","doi":"10.1109/ICEBE.2007.24","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.24","url":null,"abstract":"Aiming to overcome the mismatch between coarse grain of Web service's functions and fine grain of current Web service requirements with inputs and outputs as functional requirements, a three layer task oriented Web service requirement framework is proposed. The top the is task layer which defines the tasks and their relationships, the middle is the method layer which represents multiple implementations of the primitive task, and the low is the operation layer which represents the abstract features of typical operations that a method owns. The task oriented Web service requirement framework proposed well matches the coarse grain feature of Web service's functions and provides a more natural way to express the service requirements.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research conducted to identify factors that affect e-commerce adoption among people of United Arab Emirates. The focus of this research is to discover at what extent security and privacy factors contribute to the adoption of e-commerce. This study has been designed to explore why online shopping is growing so fast among some users, and so slowly among others. 2051 questionnaires were distributed by using different media such as email and Internet to the subjects and received back only 21% questionnaires from respondents. The result shows that all of the independent variables played important roles in determining the adoption of e-commerce and created a gap between users who are adopting e-commerce and those who have not. The finding also shows that there are two significant factors, making an impact on the adoption of e-commerce, which are the user's educational background and their understanding of security features implemented by the vendors.
{"title":"A Case Study: Adoption of Information Technology in E-Business of United Arab Emirates","authors":"Fahim Akhter","doi":"10.1109/ICEBE.2007.29","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.29","url":null,"abstract":"This research conducted to identify factors that affect e-commerce adoption among people of United Arab Emirates. The focus of this research is to discover at what extent security and privacy factors contribute to the adoption of e-commerce. This study has been designed to explore why online shopping is growing so fast among some users, and so slowly among others. 2051 questionnaires were distributed by using different media such as email and Internet to the subjects and received back only 21% questionnaires from respondents. The result shows that all of the independent variables played important roles in determining the adoption of e-commerce and created a gap between users who are adopting e-commerce and those who have not. The finding also shows that there are two significant factors, making an impact on the adoption of e-commerce, which are the user's educational background and their understanding of security features implemented by the vendors.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124938900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peer-to-Peer based Web service discovery systems have shown the high scalability and availability provided by high connectivity and dynamic accommodation. However, a serious difficulty in concurrent designing of such unauthoritative and decentralized controlled systems is how to deal with the privacy concerns and policy enforcement in such systems which may contain a considerable ratio of dishonest and unavailable peers. We present a privacy protection method implementing authorization model in the broker peers' platform with the supporting of Web service description composition algorithms and discovery protocols especially designed for privacy policy enforcement in P2P environments. We exploit the statistical stability of a large number of peers and analyze the quantitative result of privacy policies being betrayed and obeyed, as well as how to leverage the privacy assurance and availability to desired levels by adjusting the parameters of composition algorithms.
{"title":"A Privacy Protection Method for P2P-based Web Service Discovery","authors":"Kuien Liu, Qing Wang, Jun-su Han, Hu Wu","doi":"10.1109/ICEBE.2007.113","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.113","url":null,"abstract":"Peer-to-Peer based Web service discovery systems have shown the high scalability and availability provided by high connectivity and dynamic accommodation. However, a serious difficulty in concurrent designing of such unauthoritative and decentralized controlled systems is how to deal with the privacy concerns and policy enforcement in such systems which may contain a considerable ratio of dishonest and unavailable peers. We present a privacy protection method implementing authorization model in the broker peers' platform with the supporting of Web service description composition algorithms and discovery protocols especially designed for privacy policy enforcement in P2P environments. We exploit the statistical stability of a large number of peers and analyze the quantitative result of privacy policies being betrayed and obeyed, as well as how to leverage the privacy assurance and availability to desired levels by adjusting the parameters of composition algorithms.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129178394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since computationally intensive applications may often require more resources than a single computing machine can provide in one administrative domain, bolstering resource co-allocation is essential for realizing the grid vision. Given that resource providers and consumers may have different requirements and performance goals, successfully obtaining commitments through concurrent negotiations with multiple resource providers to simultaneously access several resources is a very challenging task for consumers. The novel contribution of this work is devising a concurrent mechanism that (i) coordinates multiple one-to-many concurrent negotiations between a consumer and multiple resource providers, and (ii) manages (de-)commitment for consumers during the one-to-many negotiation in grid co-allocation. In this work, a utility-oriented coordination strategy and three classes of commitment strategies for concurrent negotiation are presented. A series of simulations were carried out in a variety of settings and favorable results show that the strategies (both commitment strategies and the coordination strategy) outperformed existing models in terms of utility, negotiation speed, and success rate.
{"title":"A Concurrent G-Negotiation Mechanism for Grid Resource Co-allocation","authors":"B. Shi, K. Sim","doi":"10.1109/ICEBE.2007.68","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.68","url":null,"abstract":"Since computationally intensive applications may often require more resources than a single computing machine can provide in one administrative domain, bolstering resource co-allocation is essential for realizing the grid vision. Given that resource providers and consumers may have different requirements and performance goals, successfully obtaining commitments through concurrent negotiations with multiple resource providers to simultaneously access several resources is a very challenging task for consumers. The novel contribution of this work is devising a concurrent mechanism that (i) coordinates multiple one-to-many concurrent negotiations between a consumer and multiple resource providers, and (ii) manages (de-)commitment for consumers during the one-to-many negotiation in grid co-allocation. In this work, a utility-oriented coordination strategy and three classes of commitment strategies for concurrent negotiation are presented. A series of simulations were carried out in a variety of settings and favorable results show that the strategies (both commitment strategies and the coordination strategy) outperformed existing models in terms of utility, negotiation speed, and success rate.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116247780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fang Zhiyuan, Zhan Jingchun, Wang Lei, Zhou Yu, Mou Minghui
Along with the development of wireless technology and especially 3G's throw into commercial, the bandwidth of mobile devices will reach 2 Mbps which makes it possible to publish Webpage to mobile devices and personal digital assistant. However, mobile devices is restricted by display terminal and storage capability. So this paper attempts to implement a commerce topic faced P2P search engine system for mobile devices using WAP protocol: MCTSE. MCTSE is built on the operating system of RedHat Linux AS3 Update4: it builds the topic characteristic keywords set using extendable iterative select keyword (EISK) algorithm, and based on the set, it collects commerce topic information and builds layered content indexed by Internet commerce topic crawler and the voluntary publish of mobile user. A commerce topic search is implemented by mobile user to send query keywords. Results of simulation proved that under ideal conditions the system's average responding time is less than 70 ms and precision is above 85% when there are no more than 3000 simultaneous searching queries, and so the completeness and feasibility of the system's design is proved.
随着无线技术的发展,特别是3G的投入商用,移动设备的带宽将达到2mbps,这使得向移动设备发布网页和个人数字助理成为可能。然而,移动设备受到显示终端和存储能力的限制。因此,本文试图利用WAP协议实现一个面向移动设备的面向商业主题的P2P搜索引擎系统:MCTSE。MCTSE建立在RedHat Linux AS3 Update4操作系统上,使用可扩展迭代选择关键字(EISK)算法构建主题特征关键字集,并在此基础上收集商业主题信息,构建由互联网商业主题爬虫索引和移动用户自愿发布的分层内容。商务主题搜索是由移动用户发送查询关键字实现的。仿真结果表明,在理想条件下,当同时查询不超过3000个时,系统的平均响应时间小于70 ms,精度在85%以上,从而证明了系统设计的完整性和可行性。
{"title":"MCTSE: A Commerce Topic Faced P2P Search Engine for Mobile Devices","authors":"Fang Zhiyuan, Zhan Jingchun, Wang Lei, Zhou Yu, Mou Minghui","doi":"10.1109/ICEBE.2007.73","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.73","url":null,"abstract":"Along with the development of wireless technology and especially 3G's throw into commercial, the bandwidth of mobile devices will reach 2 Mbps which makes it possible to publish Webpage to mobile devices and personal digital assistant. However, mobile devices is restricted by display terminal and storage capability. So this paper attempts to implement a commerce topic faced P2P search engine system for mobile devices using WAP protocol: MCTSE. MCTSE is built on the operating system of RedHat Linux AS3 Update4: it builds the topic characteristic keywords set using extendable iterative select keyword (EISK) algorithm, and based on the set, it collects commerce topic information and builds layered content indexed by Internet commerce topic crawler and the voluntary publish of mobile user. A commerce topic search is implemented by mobile user to send query keywords. Results of simulation proved that under ideal conditions the system's average responding time is less than 70 ms and precision is above 85% when there are no more than 3000 simultaneous searching queries, and so the completeness and feasibility of the system's design is proved.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128875900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a KPI (key performance indicator) modeling environment, coined Mozart, where modelers can use formal models to explicitly define the services of KPI and their relationships which are depicted by KPI net. Mozart provides us with methods for mining and modeling KPIs and supports smooth model transformation for generating monitoring applications based on a model driven approach. It also provides us with methods of service composition for KPI applications. We showed how it works with an example scenario of automobile data and found that "mpg" is most strongly influenced by four KPIs. The result showed which KPIs should be focused for human monitoring, and it can be an initial model for monitoring applications.
{"title":"A Tool Framework for KPI Application Development","authors":"M. Abe, J. Jeng, Yinggang Li","doi":"10.1109/ICEBE.2007.88","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.88","url":null,"abstract":"This paper describes a KPI (key performance indicator) modeling environment, coined Mozart, where modelers can use formal models to explicitly define the services of KPI and their relationships which are depicted by KPI net. Mozart provides us with methods for mining and modeling KPIs and supports smooth model transformation for generating monitoring applications based on a model driven approach. It also provides us with methods of service composition for KPI applications. We showed how it works with an example scenario of automobile data and found that \"mpg\" is most strongly influenced by four KPIs. The result showed which KPIs should be focused for human monitoring, and it can be an initial model for monitoring applications.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123789373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the proliferation of the Internet, Chinese enterprises are all adopting technologies to build their Web sites. In this paper, the purpose is to measure the usability of these B2C e-commerce Web site. Five B2C e-commerce Web sites in China are evaluated, based on a comprehensive set of usability guidelines developed by Microsoft. The weights of each category and subcategory are assessed first by 350 users who are asked to assume the role of consumers. Then the usability grades of each category to each of the five chosen Web sites are rated. The conclusions under the statistic data analysis not only touch upon the rating of Web sites, but also highlights the strengths and weaknesses of each Web site. The evaluation of consumers with respect to the categories has also been included and some interesting finds are offered for researchers, Web site designers, and e-commerce users.
{"title":"Measuring Website Usability of Chinese Enterprise with a Heuristic Procedure","authors":"Chang Jinling, Guan Huan","doi":"10.1109/ICEBE.2007.57","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.57","url":null,"abstract":"With the proliferation of the Internet, Chinese enterprises are all adopting technologies to build their Web sites. In this paper, the purpose is to measure the usability of these B2C e-commerce Web site. Five B2C e-commerce Web sites in China are evaluated, based on a comprehensive set of usability guidelines developed by Microsoft. The weights of each category and subcategory are assessed first by 350 users who are asked to assume the role of consumers. Then the usability grades of each category to each of the five chosen Web sites are rated. The conclusions under the statistic data analysis not only touch upon the rating of Web sites, but also highlights the strengths and weaknesses of each Web site. The evaluation of consumers with respect to the categories has also been included and some interesting finds are offered for researchers, Web site designers, and e-commerce users.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125960759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}