首页 > 最新文献

2020 IEEE International Conference on Software Architecture Companion (ICSA-C)最新文献

英文 中文
ICSA-C 2020 TOC
Pub Date : 2020-03-01 DOI: 10.1109/icsa-c50368.2020.00004
Pablo Oliveira Antonino
{"title":"ICSA-C 2020 TOC","authors":"Pablo Oliveira Antonino","doi":"10.1109/icsa-c50368.2020.00004","DOIUrl":"https://doi.org/10.1109/icsa-c50368.2020.00004","url":null,"abstract":"","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129845073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Organizational IT Security in Mobile Software Ecosystems Literature 移动软件生态系统中的组织IT安全研究
Pub Date : 2020-03-01 DOI: 10.1109/ICSA-C50368.2020.00047
Caio Steglich, Azriel Majdenbaum, S. Marczak, R. Santos
Information security is a key topic for most organizations. With the digital revolution, smartphones have become popular not only for personal use but also within organizations where many employees use them for business purposes. As smartphones are increasingly present in organizations, it is necessary to understand what recommendations the literature provides for the safe use of such devices, helping organizations to protect themselves from threats. ISO 27000 is a well-known standard for information security in a business context. It provides a set of controls that must be observed to ensure more secure organizational information. Therefore, the goal of this study is to identify which controls presented in ISO 27000, more specifically ISO 27001, are present in the Mobile Software Ecosystem (MSECO) literature. To do so, we conducted a systematic mapping review supplemented by a snowballing process to identify studies in the field of MSECO that have addressed any subject that is present in ISO 27001. We found that 34 out of the 114 ISO 27001 controls are covered by the MSECO literature. Also, some of the ISO sections (e.g., Asset Management) have not yet been explored in the MSECO literature. Our results can inspire future and further studies on the topic of MSECO information security.
信息安全是大多数组织的一个关键主题。随着数字革命的到来,智能手机不仅在个人使用中变得流行,而且在许多员工将其用于商业目的的组织中也变得流行。随着智能手机越来越多地出现在组织中,有必要了解文献中提供的安全使用此类设备的建议,帮助组织保护自己免受威胁。ISO 27000是一个众所周知的商业环境中的信息安全标准。它提供了一组必须遵守的控制,以确保更安全的组织信息。因此,本研究的目的是确定ISO 27000,更具体地说是ISO 27001中提出的哪些控制存在于移动软件生态系统(MSECO)文献中。为此,我们进行了系统的制图审查,辅以滚雪球式的过程,以确定MSECO领域中涉及ISO 27001中存在的任何主题的研究。我们发现114项ISO 27001控制措施中有34项被MSECO文献所涵盖。此外,一些ISO部分(例如,资产管理)还没有在MSECO文献中进行探讨。我们的研究结果可以启发未来和进一步研究MSECO信息安全的主题。
{"title":"A Study on Organizational IT Security in Mobile Software Ecosystems Literature","authors":"Caio Steglich, Azriel Majdenbaum, S. Marczak, R. Santos","doi":"10.1109/ICSA-C50368.2020.00047","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00047","url":null,"abstract":"Information security is a key topic for most organizations. With the digital revolution, smartphones have become popular not only for personal use but also within organizations where many employees use them for business purposes. As smartphones are increasingly present in organizations, it is necessary to understand what recommendations the literature provides for the safe use of such devices, helping organizations to protect themselves from threats. ISO 27000 is a well-known standard for information security in a business context. It provides a set of controls that must be observed to ensure more secure organizational information. Therefore, the goal of this study is to identify which controls presented in ISO 27000, more specifically ISO 27001, are present in the Mobile Software Ecosystem (MSECO) literature. To do so, we conducted a systematic mapping review supplemented by a snowballing process to identify studies in the field of MSECO that have addressed any subject that is present in ISO 27001. We found that 34 out of the 114 ISO 27001 controls are covered by the MSECO literature. Also, some of the ISO sections (e.g., Asset Management) have not yet been explored in the MSECO literature. Our results can inspire future and further studies on the topic of MSECO information security.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132242781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICSA-C 2020 Committees ICSA-C 2020委员会
Pub Date : 2020-03-01 DOI: 10.1109/icsa-c50368.2020.00006
{"title":"ICSA-C 2020 Committees","authors":"","doi":"10.1109/icsa-c50368.2020.00006","DOIUrl":"https://doi.org/10.1109/icsa-c50368.2020.00006","url":null,"abstract":"","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"26 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114116265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graphical and Collaborative Annotation Support for Semantic Web Services 语义Web服务的图形和协作注释支持
Pub Date : 2020-03-01 DOI: 10.1109/ICSA-C50368.2020.00044
Matheus de L. Calache, C. D. Farias
Web services have become increasingly important for software development. In order to facilitate the search, composition, and reuse of web services, their descriptions can be semantically annotated using definitions provided by an ontology, thus creating the so-called semantic web services. A semantic web service is developed according to different approaches and standards recommended by W3C, such as OWL-S, SAWSDL, and WSMO-Lite. A limited number of tools are available to support the development of semantic annotations using SAWSDL, such as Radiant, Iridescent, and EasyWSDL. However, these tools support the annotation process at a low abstraction level, therefore requiring from users an extensive technical knowledge on XML/WSDL, among other technologies. The semantic annotation task could be facilitated if the semantic annotation process were carried at a higher abstraction level using graphical notations. Additionally, the semantic annotation could also benefit from a collaborative approach. Different people from different backgrounds could individually contribute with the semantic web services creation, regardless of their geographic locations. In that sense, this paper presents a visual notation to represent the main elements of a WSDL 2.0 especification focused on the semantic annotation using SAWSDL. The paper also describes a graphical collaborative semantic annotation support tool.
Web服务对于软件开发已经变得越来越重要。为了促进web服务的搜索、组合和重用,可以使用本体提供的定义对其描述进行语义注释,从而创建所谓的语义web服务。语义web服务是根据W3C推荐的不同方法和标准开发的,例如OWL-S、SAWSDL和WSMO-Lite。支持使用SAWSDL开发语义注释的工具数量有限,例如Radiant、Iridescent和EasyWSDL。然而,这些工具在较低的抽象级别上支持注释过程,因此需要用户对XML/WSDL以及其他技术具有广泛的技术知识。如果使用图形符号在更高的抽象级别上进行语义注释过程,则可以简化语义注释任务。此外,语义注释还可以从协作方法中获益。来自不同背景的不同的人可以单独为语义web服务的创建做出贡献,而不考虑他们的地理位置。从这个意义上讲,本文提出了一种可视化的符号来表示WSDL 2.0规范的主要元素,重点关注使用SAWSDL的语义注释。本文还介绍了一个图形协同语义标注支持工具。
{"title":"Graphical and Collaborative Annotation Support for Semantic Web Services","authors":"Matheus de L. Calache, C. D. Farias","doi":"10.1109/ICSA-C50368.2020.00044","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00044","url":null,"abstract":"Web services have become increasingly important for software development. In order to facilitate the search, composition, and reuse of web services, their descriptions can be semantically annotated using definitions provided by an ontology, thus creating the so-called semantic web services. A semantic web service is developed according to different approaches and standards recommended by W3C, such as OWL-S, SAWSDL, and WSMO-Lite. A limited number of tools are available to support the development of semantic annotations using SAWSDL, such as Radiant, Iridescent, and EasyWSDL. However, these tools support the annotation process at a low abstraction level, therefore requiring from users an extensive technical knowledge on XML/WSDL, among other technologies. The semantic annotation task could be facilitated if the semantic annotation process were carried at a higher abstraction level using graphical notations. Additionally, the semantic annotation could also benefit from a collaborative approach. Different people from different backgrounds could individually contribute with the semantic web services creation, regardless of their geographic locations. In that sense, this paper presents a visual notation to represent the main elements of a WSDL 2.0 especification focused on the semantic annotation using SAWSDL. The paper also describes a graphical collaborative semantic annotation support tool.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain SklCoin:迈向可扩展的权益证明和基于集体签名的共识协议,以实现区块链的强一致性
Pub Date : 2020-03-01 DOI: 10.1109/ICSA-C50368.2020.00034
Z. Jaroucheh, B. Ghaleb, W. Buchanan
The proof-of-work consensus protocol suffers from two main limitations: waste of energy and offering only probabilistic guarantees about the status of the blockchain. This paper introduces SklCoin, a new Byzantine consensus protocol and its corresponding software architecture. This protocol leverages two ideas: 1) the proof-of-stake concept to dynamically form stakeproportionate consensus groups that represent block miners (stakeholders), and 2) scalable collective signing to efficiently commit transactions irreversibly. SklCoin has immediate finality characteristic where all miners instantly agree on the validity of blocks. In addition, SklCoin supports high transaction rate because of its fast miner election mechanism.
工作量证明共识协议有两个主要限制:浪费能源和只提供关于区块链状态的概率保证。本文介绍了一种新的拜占庭共识协议SklCoin及其相应的软件架构。该协议利用了两个思想:1)权益证明概念,以动态地形成代表区块矿工(利益相关者)的利益比例共识组,以及2)可扩展的集体签名,以有效地提交不可逆转的交易。SklCoin具有即时终结性特征,即所有矿工立即就区块的有效性达成一致。此外,由于其快速的矿工选举机制,SklCoin支持高交易率。
{"title":"SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain","authors":"Z. Jaroucheh, B. Ghaleb, W. Buchanan","doi":"10.1109/ICSA-C50368.2020.00034","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00034","url":null,"abstract":"The proof-of-work consensus protocol suffers from two main limitations: waste of energy and offering only probabilistic guarantees about the status of the blockchain. This paper introduces SklCoin, a new Byzantine consensus protocol and its corresponding software architecture. This protocol leverages two ideas: 1) the proof-of-stake concept to dynamically form stakeproportionate consensus groups that represent block miners (stakeholders), and 2) scalable collective signing to efficiently commit transactions irreversibly. SklCoin has immediate finality characteristic where all miners instantly agree on the validity of blocks. In addition, SklCoin supports high transaction rate because of its fast miner election mechanism.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128150855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semi-automatic Architectural Suggestions for the Functional Safety of Cooperative Driving Systems 协同驾驶系统功能安全的半自动架构建议
Pub Date : 2020-03-01 DOI: 10.1109/ICSA-C50368.2020.00018
Sangeeth Kochanthara, Niels Rood, L. Cleophas, Y. Dajsuren, M. Brand
In cooperative driving, vehicles coordinate their actions as part of a system. Cooperative driving capabilities in vehicles are achieved by means of software, making this software safety critical. The current safety standard for vehicles, ISO 26262, is designed for individual vehicles and their software architecture, but not for cooperative driving settings. Moreover, the guidelines from the standard can only be used for generating safety goals and checking adherence to them. The standard’s guidelines do not cover mechanisms to meet the unmet safety goals or provide designers with available architecture choices.This paper presents an extension of the ISO 26262 standard from a single vehicle setting to a cooperative vehicle setting. We also show that the use of safety tactics and design patterns, which enable designers to be aware of possible design choices, can seamlessly be integrated into the ISO 26262 process. The resulting methodology enables designers to make informed choices and cover safety goals. Our case study on the software architecture of a real-life cooperative driving prototype shows that the proposed approach can provide new insights about its safety and mechanisms to improve it.
在协同驾驶中,车辆作为系统的一部分协调它们的行动。车辆的协同驾驶能力是通过软件实现的,这使得软件的安全性至关重要。目前的车辆安全标准ISO 26262是为单个车辆及其软件架构设计的,而不是为协同驾驶设置设计的。此外,来自标准的指导方针只能用于产生安全目标并检查对它们的遵守情况。该标准的指导方针不包括满足未满足的安全目标的机制,也不为设计人员提供可用的架构选择。本文提出了ISO 26262标准的扩展,从单一车辆设置到合作车辆设置。我们还展示了安全策略和设计模式的使用,使设计师能够意识到可能的设计选择,可以无缝地集成到ISO 26262过程中。由此产生的方法使设计师能够做出明智的选择,并涵盖安全目标。我们对现实生活中的协作驾驶原型软件架构的案例研究表明,所提出的方法可以为其安全性和改进机制提供新的见解。
{"title":"Semi-automatic Architectural Suggestions for the Functional Safety of Cooperative Driving Systems","authors":"Sangeeth Kochanthara, Niels Rood, L. Cleophas, Y. Dajsuren, M. Brand","doi":"10.1109/ICSA-C50368.2020.00018","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00018","url":null,"abstract":"In cooperative driving, vehicles coordinate their actions as part of a system. Cooperative driving capabilities in vehicles are achieved by means of software, making this software safety critical. The current safety standard for vehicles, ISO 26262, is designed for individual vehicles and their software architecture, but not for cooperative driving settings. Moreover, the guidelines from the standard can only be used for generating safety goals and checking adherence to them. The standard’s guidelines do not cover mechanisms to meet the unmet safety goals or provide designers with available architecture choices.This paper presents an extension of the ISO 26262 standard from a single vehicle setting to a cooperative vehicle setting. We also show that the use of safety tactics and design patterns, which enable designers to be aware of possible design choices, can seamlessly be integrated into the ISO 26262 process. The resulting methodology enables designers to make informed choices and cover safety goals. Our case study on the software architecture of a real-life cooperative driving prototype shows that the proposed approach can provide new insights about its safety and mechanisms to improve it.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122534169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Microservice Decomposition via Static and Dynamic Analysis of the Monolith 基于单体静态和动态分析的微服务分解
Pub Date : 2020-03-01 DOI: 10.1109/ICSA-C50368.2020.00011
Alexander Krause, C. Zirkelbach, W. Hasselbring, S. Lenga, Dan Kröger
Migrating monolithic software systems into microservices requires the application of decomposition techniques to find and select appropriate service boundaries. These techniques are often based on domain knowledge, static code analysis, and non-functional requirements such as maintainability.In this paper, we present our experience with an approach that extends static analysis with dynamic analysis of a legacy software system’s runtime behavior, including the live trace visualization to support the decomposition into microservices. Overall, our approach combines established analysis techniques for microservice decomposition, such as the bounded context pattern of domain-driven design, and enriches the collected information via dynamic software visualization to identify appropriate microservice boundaries.In collaboration with the German IT service provider adesso SE, we applied our approach to their real-word, legacy lottery application $invert {FOCUS}$ to identify good microservice decompositions for this layered monolithic Enterprise Java system.
将单片软件系统迁移到微服务需要应用分解技术来查找和选择适当的服务边界。这些技术通常基于领域知识、静态代码分析和非功能需求(如可维护性)。在本文中,我们介绍了我们使用一种方法的经验,该方法通过对遗留软件系统运行时行为的动态分析来扩展静态分析,包括支持分解为微服务的实时跟踪可视化。总体而言,我们的方法结合了微服务分解的现有分析技术,如领域驱动设计的有界上下文模式,并通过动态软件可视化丰富收集的信息,以识别适当的微服务边界。在与德国IT服务提供商adesso SE的合作中,我们将我们的方法应用到他们的实时遗留彩票应用程序$ In vert {FOCUS}$中,为这个分层的单片企业Java系统识别良好的微服务分解。
{"title":"Microservice Decomposition via Static and Dynamic Analysis of the Monolith","authors":"Alexander Krause, C. Zirkelbach, W. Hasselbring, S. Lenga, Dan Kröger","doi":"10.1109/ICSA-C50368.2020.00011","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00011","url":null,"abstract":"Migrating monolithic software systems into microservices requires the application of decomposition techniques to find and select appropriate service boundaries. These techniques are often based on domain knowledge, static code analysis, and non-functional requirements such as maintainability.In this paper, we present our experience with an approach that extends static analysis with dynamic analysis of a legacy software system’s runtime behavior, including the live trace visualization to support the decomposition into microservices. Overall, our approach combines established analysis techniques for microservice decomposition, such as the bounded context pattern of domain-driven design, and enriches the collected information via dynamic software visualization to identify appropriate microservice boundaries.In collaboration with the German IT service provider adesso SE, we applied our approach to their real-word, legacy lottery application $invert {FOCUS}$ to identify good microservice decompositions for this layered monolithic Enterprise Java system.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133037330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Data Mining for Hospital Morbidity Forecasting 医院发病率预测的数据挖掘
Pub Date : 2020-03-01 DOI: 10.1109/ICSA-C50368.2020.00037
L. Vianna, R. Wazlawick
Growing demand for hospital healthcare services has brought significant challenges for their managers. Variables with high uncertainty degree, such as the number of patients and the duration of their treatments, hinders the planning processes and make it difficult to properly comply with the established strategies. Controlling and identifying factors that affect the hospital management process depends on health database analysis. Therefore, it is important to consider the possibility of prospecting useful knowledge from the stored data. The objective of this research is to evaluate the hospital morbidity prediction through different data mining methods on ambulatory and hospital procedure records obtained from Brazilian public health databases. The research method consists of performing a predictive data mining by applying supervised learning algorithms on a regression problem. The highest Pearson correlation coefficient individually obtained in the three-month prediction time interval, through the data mining method that applied random forest associated with an attribute selection algorithm on the disease group of the ICD10 chapter XVI (Certain Conditions originating in the Perinatal Period), was 0.9682. Different results were achieved depending on the method applied, the group of diseases analyzed, and the proposed prediction time interval, which led to the conclusion that data mining on ambulatory and hospital records allowed the prediction of hospital morbidity. The hospital morbidity predictions obtained can minimize the undesired effect of the demand randomness for health services in the decision-making process.
对医院医疗服务日益增长的需求给医院管理者带来了巨大的挑战。患者数量、治疗时间等不确定程度较高的变量阻碍了规划过程,使制定的策略难以正确执行。控制和识别影响医院管理过程的因素依赖于健康数据库分析。因此,考虑从存储的数据中寻找有用知识的可能性是很重要的。本研究的目的是通过不同的数据挖掘方法来评估从巴西公共卫生数据库中获得的门诊和医院程序记录的医院发病率预测。该研究方法是通过对回归问题应用监督学习算法进行预测数据挖掘。采用随机森林关联属性选择算法的数据挖掘方法对ICD10第十六章(起源于围产期的某些条件)疾病组进行预测,在三个月的预测时间间隔内,单个Pearson相关系数最高为0.9682。根据所采用的方法、分析的疾病组和提出的预测时间间隔,得出了不同的结果,从而得出结论,对门诊和医院记录的数据挖掘可以预测医院发病率。所获得的医院发病率预测可以最大限度地减少决策过程中卫生服务需求随机性的不良影响。
{"title":"Data Mining for Hospital Morbidity Forecasting","authors":"L. Vianna, R. Wazlawick","doi":"10.1109/ICSA-C50368.2020.00037","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00037","url":null,"abstract":"Growing demand for hospital healthcare services has brought significant challenges for their managers. Variables with high uncertainty degree, such as the number of patients and the duration of their treatments, hinders the planning processes and make it difficult to properly comply with the established strategies. Controlling and identifying factors that affect the hospital management process depends on health database analysis. Therefore, it is important to consider the possibility of prospecting useful knowledge from the stored data. The objective of this research is to evaluate the hospital morbidity prediction through different data mining methods on ambulatory and hospital procedure records obtained from Brazilian public health databases. The research method consists of performing a predictive data mining by applying supervised learning algorithms on a regression problem. The highest Pearson correlation coefficient individually obtained in the three-month prediction time interval, through the data mining method that applied random forest associated with an attribute selection algorithm on the disease group of the ICD10 chapter XVI (Certain Conditions originating in the Perinatal Period), was 0.9682. Different results were achieved depending on the method applied, the group of diseases analyzed, and the proposed prediction time interval, which led to the conclusion that data mining on ambulatory and hospital records allowed the prediction of hospital morbidity. The hospital morbidity predictions obtained can minimize the undesired effect of the demand randomness for health services in the decision-making process.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117340062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reference Architecture for Trust-Based Digital Ecosystems 基于信任的数字生态系统参考架构
Pub Date : 2020-03-01 DOI: 10.1109/ICSA-C50368.2020.00051
Emilia Cioroaica, Stanislav Chren, Barbora Buhnova, T. Kuhn, D. Dimitrov
Formation of digital ecosystems enables a multitude of actors like organisations, users and developers to achieve different goals in cooperations. The achievement of operational, tactical and strategic goals of involved actors relies on trustworthy cooperation of systems that operate in open environments and might meet for the first time at runtime. Thus the evaluation of a potential collaborator’s trustworthiness also needs to be performed at runtime.In this paper, we enhance our work on trust prediction in digital ecosystems, based on digital twins evaluation, with a supporting reference architecture that enables the creation of such a digital twin for automatic computation of trust.
数字生态系统的形成使组织、用户和开发人员等众多参与者能够在合作中实现不同的目标。参与参与者的操作、战术和战略目标的实现依赖于在开放环境中运行的系统的可信合作,并且可能在运行时首次相遇。因此,对潜在合作者的可信度的评估也需要在运行时执行。在本文中,我们基于数字孪生评估加强了我们在数字生态系统中信任预测的工作,并提供了一个支持参考架构,该架构能够创建这样一个用于自动计算信任的数字孪生。
{"title":"Reference Architecture for Trust-Based Digital Ecosystems","authors":"Emilia Cioroaica, Stanislav Chren, Barbora Buhnova, T. Kuhn, D. Dimitrov","doi":"10.1109/ICSA-C50368.2020.00051","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00051","url":null,"abstract":"Formation of digital ecosystems enables a multitude of actors like organisations, users and developers to achieve different goals in cooperations. The achievement of operational, tactical and strategic goals of involved actors relies on trustworthy cooperation of systems that operate in open environments and might meet for the first time at runtime. Thus the evaluation of a potential collaborator’s trustworthiness also needs to be performed at runtime.In this paper, we enhance our work on trust prediction in digital ecosystems, based on digital twins evaluation, with a supporting reference architecture that enables the creation of such a digital twin for automatic computation of trust.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126921216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Toolbox for Realtime Timeseries Anomaly Detection 实时时间序列异常检测工具箱
Pub Date : 2020-03-01 DOI: 10.1109/ICSA-C50368.2020.00053
Markus böbel, I. Gerostathopoulos, T. Bures
Software architecture practice relies more and more on data-driven decision-making. Data-driven decisions are taken either by humans or by software agents via analyzing streams of timeseries data coming from different running systems. Since the quality of sensed data influences the analysis and subsequent decision-making, detecting data anomalies is an important and necessary part of any data analysis and data intelligence pipeline (such as those typically found in smart and self-adaptive systems). Although a number of data science libraries exist for timeseries anomaly detection, it is both time consuming and hard to plug realtime anomaly detection functionality in existing pipelines. The problem lies with the boilerplate code that needs to be provided for common tasks such as data ingestion, data transformation and preprocessing, invoking of model re-training when needed, and persisting of identified anomalies so that they can be acted upon or further analysed. In response, we created a toolbox for realtime anomaly detection that automates the above common tasks and modularizes the anomaly detection process in a number of clearly defined components. This serves as a plug-in solution for architecting and development of smart systems that have to adapt their behavior at runtime. In this paper, we describe the microservice architecture used by our toolbox and explain how to deploy it for obtaining an out-of-the-box solution for realtime anomaly detection out of ready-to-use components. We also provide an initial assessment of its performance.
软件架构实践越来越依赖于数据驱动的决策。数据驱动的决策要么由人类做出,要么由软件代理通过分析来自不同运行系统的时间序列数据流做出。由于感测数据的质量影响分析和随后的决策,因此检测数据异常是任何数据分析和数据智能管道(例如智能和自适应系统中的典型管道)的重要和必要部分。尽管存在许多用于时间序列异常检测的数据科学库,但在现有管道中插入实时异常检测功能既耗时又困难。问题在于需要为常见任务提供的样板代码,例如数据摄取、数据转换和预处理、在需要时调用模型重新训练,以及持久化已识别的异常,以便对它们进行操作或进一步分析。作为回应,我们创建了一个用于实时异常检测的工具箱,该工具箱将上述常见任务自动化,并将异常检测过程模块化在许多明确定义的组件中。这可以作为一个插件解决方案,用于构建和开发必须在运行时调整其行为的智能系统。在本文中,我们描述了我们的工具箱使用的微服务架构,并解释了如何部署它,以便从现成的组件中获得实时异常检测的开箱即用解决方案。我们还提供了对其性能的初步评估。
{"title":"A Toolbox for Realtime Timeseries Anomaly Detection","authors":"Markus böbel, I. Gerostathopoulos, T. Bures","doi":"10.1109/ICSA-C50368.2020.00053","DOIUrl":"https://doi.org/10.1109/ICSA-C50368.2020.00053","url":null,"abstract":"Software architecture practice relies more and more on data-driven decision-making. Data-driven decisions are taken either by humans or by software agents via analyzing streams of timeseries data coming from different running systems. Since the quality of sensed data influences the analysis and subsequent decision-making, detecting data anomalies is an important and necessary part of any data analysis and data intelligence pipeline (such as those typically found in smart and self-adaptive systems). Although a number of data science libraries exist for timeseries anomaly detection, it is both time consuming and hard to plug realtime anomaly detection functionality in existing pipelines. The problem lies with the boilerplate code that needs to be provided for common tasks such as data ingestion, data transformation and preprocessing, invoking of model re-training when needed, and persisting of identified anomalies so that they can be acted upon or further analysed. In response, we created a toolbox for realtime anomaly detection that automates the above common tasks and modularizes the anomaly detection process in a number of clearly defined components. This serves as a plug-in solution for architecting and development of smart systems that have to adapt their behavior at runtime. In this paper, we describe the microservice architecture used by our toolbox and explain how to deploy it for obtaining an out-of-the-box solution for realtime anomaly detection out of ready-to-use components. We also provide an initial assessment of its performance.","PeriodicalId":202587,"journal":{"name":"2020 IEEE International Conference on Software Architecture Companion (ICSA-C)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124057085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 IEEE International Conference on Software Architecture Companion (ICSA-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1