Pub Date : 2001-10-08DOI: 10.1109/CMPSAC.2001.960672
C. P. Leguízamo, S. Kato, K. Hirai, K. Mori
Due to the advancement in the Information Technology, different kind of companies with heterogeneous needs have had the necessity to cooperate among them to get more benefit in a continuous changing market. That is heterogeneous e-business. In order to cope with such kind of e-business, a platform which can effectively realize heterogeneous needs, real time, flexibility and fault-tolerance is needed. This paper focuses on the database field that is indispensable for the e-business. Thus, it proposes Autonomous Decentralized Database System, which is composed of two techniques. In the first one, the concept of Allowable Volume (AV) is introduced, while in the second one, a Mobile Agent (MA) that adjusts the AV of each site is shown. Since the MA is always moving among the sites, and each site can always negotiate AV with the MA autonomously, the system can realize assurance. Furthermore, the effectiveness of the proposed system is shown by simulation.
{"title":"Autonomous decentralized database system for assurance in heterogeneous e-business","authors":"C. P. Leguízamo, S. Kato, K. Hirai, K. Mori","doi":"10.1109/CMPSAC.2001.960672","DOIUrl":"https://doi.org/10.1109/CMPSAC.2001.960672","url":null,"abstract":"Due to the advancement in the Information Technology, different kind of companies with heterogeneous needs have had the necessity to cooperate among them to get more benefit in a continuous changing market. That is heterogeneous e-business. In order to cope with such kind of e-business, a platform which can effectively realize heterogeneous needs, real time, flexibility and fault-tolerance is needed. This paper focuses on the database field that is indispensable for the e-business. Thus, it proposes Autonomous Decentralized Database System, which is composed of two techniques. In the first one, the concept of Allowable Volume (AV) is introduced, while in the second one, a Mobile Agent (MA) that adjusts the AV of each site is shown. Since the MA is always moving among the sites, and each site can always negotiate AV with the MA autonomously, the system can realize assurance. Furthermore, the effectiveness of the proposed system is shown by simulation.","PeriodicalId":269568,"journal":{"name":"25th Annual International Computer Software and Applications Conference. COMPSAC 2001","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125138970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-08DOI: 10.1109/CMPSAC.2001.960674
K. Renaud, T. V. Dyk
Developers of e-commerce applications are often unrealistic about how their Web site is going to be used, and about possible outcomes during site usage. The most commonly considered outcomes of a user's visit to a site are firstly that the visit culminates in a sale, and secondly that the user leaves the site without buying anything - perhaps to return later. In the second case, sites often "remember" any accumulated items so that a shopper can return at a later stage to resume shopping. In this paper, we consider certain disruptions, such as breakdowns, problems caused by human errors and interruptions, which could affect the outcome of the e-commerce shopping experience. These events have definite and possibly long-lasting effects on users, and applications should therefore be developed to cater for these eventualities so as to enhance the usability of the site and encourage further usage. We develop a model for analysing e-commerce application usage and, using this model, propose an evaluation strategy for determining whether an e-commerce site is resistant to such factors. The proposed evaluation mechanism is applied to three sites to arrive at what we call a "disruption-resistance score".
{"title":"Tailoring e-commerce sites to ease recovery after disruptions","authors":"K. Renaud, T. V. Dyk","doi":"10.1109/CMPSAC.2001.960674","DOIUrl":"https://doi.org/10.1109/CMPSAC.2001.960674","url":null,"abstract":"Developers of e-commerce applications are often unrealistic about how their Web site is going to be used, and about possible outcomes during site usage. The most commonly considered outcomes of a user's visit to a site are firstly that the visit culminates in a sale, and secondly that the user leaves the site without buying anything - perhaps to return later. In the second case, sites often \"remember\" any accumulated items so that a shopper can return at a later stage to resume shopping. In this paper, we consider certain disruptions, such as breakdowns, problems caused by human errors and interruptions, which could affect the outcome of the e-commerce shopping experience. These events have definite and possibly long-lasting effects on users, and applications should therefore be developed to cater for these eventualities so as to enhance the usability of the site and encourage further usage. We develop a model for analysing e-commerce application usage and, using this model, propose an evaluation strategy for determining whether an e-commerce site is resistant to such factors. The proposed evaluation mechanism is applied to three sites to arrive at what we call a \"disruption-resistance score\".","PeriodicalId":269568,"journal":{"name":"25th Annual International Computer Software and Applications Conference. COMPSAC 2001","volume":"48 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133754788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-08DOI: 10.1109/CMPSAC.2001.960626
S. Yau, F. Karim
Ubiquitous computing represents the next wave of distributed computing, which focus on integrating computers with various wearable, mobile, and sensor devices, thus making computing and communication essentially transparent to the users. This type of environments mainly consists of myriad of embedded computing nodes interacting in transparent fashion to provide different services to the users. In addition to being resource-constrained, applications in these environments are context-sensitive and often operate in mobile ad hoc networks. Although different types of context-sensitive applications with diverse focus have been developed for ubiquitous computing environments, no general methods are available for developing application software for the above environments. In this paper, the development of context-sensitive distributed software for ubiquitous computing environments is presented.
{"title":"Context-sensitive distributed software development for ubiquitous computing environments","authors":"S. Yau, F. Karim","doi":"10.1109/CMPSAC.2001.960626","DOIUrl":"https://doi.org/10.1109/CMPSAC.2001.960626","url":null,"abstract":"Ubiquitous computing represents the next wave of distributed computing, which focus on integrating computers with various wearable, mobile, and sensor devices, thus making computing and communication essentially transparent to the users. This type of environments mainly consists of myriad of embedded computing nodes interacting in transparent fashion to provide different services to the users. In addition to being resource-constrained, applications in these environments are context-sensitive and often operate in mobile ad hoc networks. Although different types of context-sensitive applications with diverse focus have been developed for ubiquitous computing environments, no general methods are available for developing application software for the above environments. In this paper, the development of context-sensitive distributed software for ubiquitous computing environments is presented.","PeriodicalId":269568,"journal":{"name":"25th Annual International Computer Software and Applications Conference. COMPSAC 2001","volume":"174 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131475970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-08DOI: 10.1109/CMPSAC.2001.960653
T. Fujii, Y. Kambayashi
A novel system, Project Data Warehouse, for the measurement of changes in development artifacts based on data warehouse technology is reported. The new system is based on an architecture that is extendable to store various kinds of UML based development artifacts and flexible to apply the various types of measurements to quantify the changes in those artifacts. Also, it provides multi-dimensional analysis of the measurement results. An application result of Project Data Warehouse to the development artifacts of a commercial development project is also reported.
{"title":"An application of data warehouse technology to the measurement system for UML based artifacts","authors":"T. Fujii, Y. Kambayashi","doi":"10.1109/CMPSAC.2001.960653","DOIUrl":"https://doi.org/10.1109/CMPSAC.2001.960653","url":null,"abstract":"A novel system, Project Data Warehouse, for the measurement of changes in development artifacts based on data warehouse technology is reported. The new system is based on an architecture that is extendable to store various kinds of UML based development artifacts and flexible to apply the various types of measurements to quantify the changes in those artifacts. Also, it provides multi-dimensional analysis of the measurement results. An application result of Project Data Warehouse to the development artifacts of a commercial development project is also reported.","PeriodicalId":269568,"journal":{"name":"25th Annual International Computer Software and Applications Conference. COMPSAC 2001","volume":"361 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-08DOI: 10.1109/CMPSAC.2001.960632
Dickson K. W. Chiu, K. Karlapalem, Qing Li
E-services refer to services provided via the Internet. To provide value-added and composite e-services, we need an information system that can coordinate API-based, interactive web-based and human agents, internal and external to an organization. We present an environment to model and enact composite e-services as workflows, by extending our ADOME-WFMS (Advanced Object Modeling Environment-Workflow Management System) to E-ADOME, which supports composing new e-services and effective management of agents for enacting e-service.
{"title":"E-ADOME: enacting composite E-services in an advanced workflow environment","authors":"Dickson K. W. Chiu, K. Karlapalem, Qing Li","doi":"10.1109/CMPSAC.2001.960632","DOIUrl":"https://doi.org/10.1109/CMPSAC.2001.960632","url":null,"abstract":"E-services refer to services provided via the Internet. To provide value-added and composite e-services, we need an information system that can coordinate API-based, interactive web-based and human agents, internal and external to an organization. We present an environment to model and enact composite e-services as workflows, by extending our ADOME-WFMS (Advanced Object Modeling Environment-Workflow Management System) to E-ADOME, which supports composing new e-services and effective management of agents for enacting e-service.","PeriodicalId":269568,"journal":{"name":"25th Annual International Computer Software and Applications Conference. COMPSAC 2001","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115918202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-08DOI: 10.1109/CMPSAC.2001.960662
Yiyu Yao, N. Zhong
Targeted marketing typically involves the identification of customers or products having potential market values. We propose a linear model for solving this problem by drawing and extending results from information retrieval. It is assumed that each object is represented by values of a finite set of attributes. A market value function, which is a linear combination of utility functions on attribute values, is used to rank objects. Several methods are examined for mining market value functions. The main advantage of the model is that one can rank objects. of interest according to their market values, instead of classifying the objects. The theoretical results reported in this paper establish a basis on which further studies and experimental evaluation can be carried out.
{"title":"Mining market value functions for targeted marketing","authors":"Yiyu Yao, N. Zhong","doi":"10.1109/CMPSAC.2001.960662","DOIUrl":"https://doi.org/10.1109/CMPSAC.2001.960662","url":null,"abstract":"Targeted marketing typically involves the identification of customers or products having potential market values. We propose a linear model for solving this problem by drawing and extending results from information retrieval. It is assumed that each object is represented by values of a finite set of attributes. A market value function, which is a linear combination of utility functions on attribute values, is used to rank objects. Several methods are examined for mining market value functions. The main advantage of the model is that one can rank objects. of interest according to their market values, instead of classifying the objects. The theoretical results reported in this paper establish a basis on which further studies and experimental evaluation can be carried out.","PeriodicalId":269568,"journal":{"name":"25th Annual International Computer Software and Applications Conference. COMPSAC 2001","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114805346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-08DOI: 10.1109/CMPSAC.2001.960644
A. Kaplan, John Bubba, J. Wileden
Exu is a new approach to automated support for safe, transparent and lightweight interoperability in multilanguage software systems. The approach is safe because it enforces appropriate type compatibility across language boundaries. It is transparent since it shields software developers from the details inherent in low-level language-based interoperability mechanisms. It is lightweight for developers because it eliminates tedious and error-prone coding (e.g., JNI) and lightweight at run-time since it does not unnecessarily incur the performance overhead of distributed, IDL-based approaches. The Exu approach exploits and extends the object-oriented concept of meta-object, encapsulating interoperability implementation in meta-classes so that developers can produce interoperating code by simply using meta-inheritance. An example application of Exu to the development of Java/C++ (i.e., multilanguage) programs illustrates the safety and transparency advantages of the approach. Comparing the performance of the Java/C++ programs produced by Exu to the same set of programs developed using IDL-based approaches provides preliminary evidence of the performance advantages of Exu.
{"title":"The Exu approach to safe, transparent and lightweight interoperability","authors":"A. Kaplan, John Bubba, J. Wileden","doi":"10.1109/CMPSAC.2001.960644","DOIUrl":"https://doi.org/10.1109/CMPSAC.2001.960644","url":null,"abstract":"Exu is a new approach to automated support for safe, transparent and lightweight interoperability in multilanguage software systems. The approach is safe because it enforces appropriate type compatibility across language boundaries. It is transparent since it shields software developers from the details inherent in low-level language-based interoperability mechanisms. It is lightweight for developers because it eliminates tedious and error-prone coding (e.g., JNI) and lightweight at run-time since it does not unnecessarily incur the performance overhead of distributed, IDL-based approaches. The Exu approach exploits and extends the object-oriented concept of meta-object, encapsulating interoperability implementation in meta-classes so that developers can produce interoperating code by simply using meta-inheritance. An example application of Exu to the development of Java/C++ (i.e., multilanguage) programs illustrates the safety and transparency advantages of the approach. Comparing the performance of the Java/C++ programs produced by Exu to the same set of programs developed using IDL-based approaches provides preliminary evidence of the performance advantages of Exu.","PeriodicalId":269568,"journal":{"name":"25th Annual International Computer Software and Applications Conference. COMPSAC 2001","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127623417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-08DOI: 10.1109/CMPSAC.2001.960596
B. Thompson
An evaluation of the current state of developments in the field of software engineering (SE) professionalism is presented including the effect of ACM withdrawing from the IEEE-CS/ACM Software Engineering Coordinating Committee (SWECC). An examination is made of two of the projects initiated by SWECC: that defining the Software Engineering Code of Ethics and Professional Practice and that providing a Guide to a Software Engineering Body of Knowledge. The successes and problems associated with each are highlighted. Details are presented of a project supported by the International Federation of Information Processing, concerned with the harmonisation of professional standards, which could now be very relevant to re-establishing progress on the road to a SE profession. Efforts undertaken to promote this work to the SE community are also reported. Finally overall conclusions and recommendations are given that could improve the situation in the future.
{"title":"A long and winding road (Progress on the road to a software engineering profession)","authors":"B. Thompson","doi":"10.1109/CMPSAC.2001.960596","DOIUrl":"https://doi.org/10.1109/CMPSAC.2001.960596","url":null,"abstract":"An evaluation of the current state of developments in the field of software engineering (SE) professionalism is presented including the effect of ACM withdrawing from the IEEE-CS/ACM Software Engineering Coordinating Committee (SWECC). An examination is made of two of the projects initiated by SWECC: that defining the Software Engineering Code of Ethics and Professional Practice and that providing a Guide to a Software Engineering Body of Knowledge. The successes and problems associated with each are highlighted. Details are presented of a project supported by the International Federation of Information Processing, concerned with the harmonisation of professional standards, which could now be very relevant to re-establishing progress on the road to a SE profession. Efforts undertaken to promote this work to the SE community are also reported. Finally overall conclusions and recommendations are given that could improve the situation in the future.","PeriodicalId":269568,"journal":{"name":"25th Annual International Computer Software and Applications Conference. COMPSAC 2001","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114421627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-08DOI: 10.1109/CMPSAC.2001.960599
P. Roose
There is an increasing demand from firms to evolve their applications to be more co-operative. The problem is to realise this migration and to maintain the quality of existing applications which are reliable due to previously encountered difficulties We will propose a method based on an organisation of dynamic workgroups (their composition can evolve with time) composed of components. The method is entirely derivable (after a formal verification) into rules integrated into a cooperative architecture allowing the cooperation. In order to propose an operational method, the last stage will propose to obtain rules derived from a specification language associated to the method Our approach allows the provision of cooperation thanks to the application re-engineering without modifying any existing component.
{"title":"ELKAR: a component based re-engineering methodology to provide cooperation","authors":"P. Roose","doi":"10.1109/CMPSAC.2001.960599","DOIUrl":"https://doi.org/10.1109/CMPSAC.2001.960599","url":null,"abstract":"There is an increasing demand from firms to evolve their applications to be more co-operative. The problem is to realise this migration and to maintain the quality of existing applications which are reliable due to previously encountered difficulties We will propose a method based on an organisation of dynamic workgroups (their composition can evolve with time) composed of components. The method is entirely derivable (after a formal verification) into rules integrated into a cooperative architecture allowing the cooperation. In order to propose an operational method, the last stage will propose to obtain rules derived from a specification language associated to the method Our approach allows the provision of cooperation thanks to the application re-engineering without modifying any existing component.","PeriodicalId":269568,"journal":{"name":"25th Annual International Computer Software and Applications Conference. COMPSAC 2001","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129255647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-10-08DOI: 10.1109/CMPSAC.2001.960657
B. M. Subraya, S. Subrahmanya, J. Suresh, C. Ravi
As web applications become more complex, performance testing of these applications acquires greater significance and criticality. Performance is essentially determined by the load on the site at peak time under varying conditions. Typically, performance testing is conducted in a simulated environment using tools. However, performance as perceived by the user is most critical since the user is the ultimate judge for the success of the web site. Although the complexity of web sites makes it difficult to draw a common denominator for user perception and designer viewpoint, it is necessary to modulate user perceptions to aid robust web site design. This paper proposes a new model, PePPeR, which enforces incorporation of user perceptions in the design process. Using this model, the designer can consider the projected perceptions during performance testing without diluting application reliability. The model is substantiated through a detailed case study with empirical results.
{"title":"PePPeR: a new model to bridge the gap between user and designer perceptions","authors":"B. M. Subraya, S. Subrahmanya, J. Suresh, C. Ravi","doi":"10.1109/CMPSAC.2001.960657","DOIUrl":"https://doi.org/10.1109/CMPSAC.2001.960657","url":null,"abstract":"As web applications become more complex, performance testing of these applications acquires greater significance and criticality. Performance is essentially determined by the load on the site at peak time under varying conditions. Typically, performance testing is conducted in a simulated environment using tools. However, performance as perceived by the user is most critical since the user is the ultimate judge for the success of the web site. Although the complexity of web sites makes it difficult to draw a common denominator for user perception and designer viewpoint, it is necessary to modulate user perceptions to aid robust web site design. This paper proposes a new model, PePPeR, which enforces incorporation of user perceptions in the design process. Using this model, the designer can consider the projected perceptions during performance testing without diluting application reliability. The model is substantiated through a detailed case study with empirical results.","PeriodicalId":269568,"journal":{"name":"25th Annual International Computer Software and Applications Conference. COMPSAC 2001","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}