Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549338
Jérémy Bascans, M. Chevalier, Patrice Gennero, C. Soulé-Dupuy
Organizational memory is a space where various information circulating in a company are capitalized. From the users' point of view, an organizational memory, which can be seen as an information system component, is very important since it stores the “shared knowledge” of the organization. But, at the same time, the cost of this knowledge is relatively high since users' participation, i.e. to integrate/maintain... the memory is important. The aim of our work is to model an organizational memory through a heterogeneous network on which is based an automatic information integration process to assist users in this task while limiting their effort. We developed a prototype and evaluated through an experiment its ability to integrate new information into an organizational memory based on the proposed model.
{"title":"Organizational memory: A model based on a heterogeneous network and an automatic information integration process","authors":"Jérémy Bascans, M. Chevalier, Patrice Gennero, C. Soulé-Dupuy","doi":"10.1109/RCIS.2016.7549338","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549338","url":null,"abstract":"Organizational memory is a space where various information circulating in a company are capitalized. From the users' point of view, an organizational memory, which can be seen as an information system component, is very important since it stores the “shared knowledge” of the organization. But, at the same time, the cost of this knowledge is relatively high since users' participation, i.e. to integrate/maintain... the memory is important. The aim of our work is to model an organizational memory through a heterogeneous network on which is based an automatic information integration process to assist users in this task while limiting their effort. We developed a prototype and evaluated through an experiment its ability to integrate new information into an organizational memory based on the proposed model.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130063938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549286
N. Huynh, M. Frappier, Herman Pooda, A. Mammar, Régine Laleau
This paper presents SGAC(Solution de Gestion Automatisée du Consentement, automatised consent management solution), a new healthcare access control model and its support tool, that manages patient wishes regarding access to their electronic health record (EHR). The development of this model has been achieved in the scope of a project with the Sherbrooke University Hospital, and thus has been adapted to take into account laws and regulations applicable in Québec and Canada, as they set bounds to patient wishes: under strictly defined contexts, patient consent can be overridden to protect his/her life. Moreover, since patient wishes and laws can be in conflict, SGAC provides a mechanism to address this problem. Besides, laws do not cover all cases where consent should be overridden to ensure patient safety. To this end, we define a formal model of SGAC which allows for property verification, making it possible to detect these cases. A performance comparison with XACML (WSO2/Balana) is presented and demonstrates the superior performances of SGAC.
{"title":"SGAC: A patient-centered access control method","authors":"N. Huynh, M. Frappier, Herman Pooda, A. Mammar, Régine Laleau","doi":"10.1109/RCIS.2016.7549286","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549286","url":null,"abstract":"This paper presents SGAC(Solution de Gestion Automatisée du Consentement, automatised consent management solution), a new healthcare access control model and its support tool, that manages patient wishes regarding access to their electronic health record (EHR). The development of this model has been achieved in the scope of a project with the Sherbrooke University Hospital, and thus has been adapted to take into account laws and regulations applicable in Québec and Canada, as they set bounds to patient wishes: under strictly defined contexts, patient consent can be overridden to protect his/her life. Moreover, since patient wishes and laws can be in conflict, SGAC provides a mechanism to address this problem. Besides, laws do not cover all cases where consent should be overridden to ensure patient safety. To this end, we define a formal model of SGAC which allows for property verification, making it possible to detect these cases. A performance comparison with XACML (WSO2/Balana) is presented and demonstrates the superior performances of SGAC.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129015795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549356
Elena V. Epure, Jon Espen Ingvaldsen, R. Deneckère, C. Salinesi
The strategic transition of media organizations to personalized information delivery has urged the need for richer methods to analyze the customers. Though useful in supporting the creation of recommender strategies, the current data mining techniques create complex models requiring often an understanding of techniques in order to interpret the results. This situation together with the recommender technologies deluge and the particularities of the news industry pose challenges to the news organization in making decisions about the most suitable strategy. Therefore, we propose process mining as a high-level, end-to-end solution to provide insights into the consumers' behavior and content dynamics. Specifically, we explore if it allows news organizations to analyze independently and effectively their data in order to support them in defining recommender strategies. The solution was implemented in a case study with the third largest news provider in Norway and yielded preliminary positive results. To our knowledge, this is the first attempt to apply a process mining methodology and adapt the techniques to support media industry with the recommender strategies.
{"title":"Process mining for recommender strategies support in news media","authors":"Elena V. Epure, Jon Espen Ingvaldsen, R. Deneckère, C. Salinesi","doi":"10.1109/RCIS.2016.7549356","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549356","url":null,"abstract":"The strategic transition of media organizations to personalized information delivery has urged the need for richer methods to analyze the customers. Though useful in supporting the creation of recommender strategies, the current data mining techniques create complex models requiring often an understanding of techniques in order to interpret the results. This situation together with the recommender technologies deluge and the particularities of the news industry pose challenges to the news organization in making decisions about the most suitable strategy. Therefore, we propose process mining as a high-level, end-to-end solution to provide insights into the consumers' behavior and content dynamics. Specifically, we explore if it allows news organizations to analyze independently and effectively their data in order to support them in defining recommender strategies. The solution was implemented in a case study with the third largest news provider in Norway and yielded preliminary positive results. To our knowledge, this is the first attempt to apply a process mining methodology and adapt the techniques to support media industry with the recommender strategies.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116935585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549294
Mouna Abdelkefi, I. Kallel
The new Information, communication, and mobile technologies empower the users to learn anywhere and anytime. They also need conversational systems that could be aware of their mobile context in order to adjust it dynamically. The actual research field is focusing on adaptive conversational systems, especially in the case of Mobile-learning. This paper presents a comparative study of some related works. Then, it proposes an M-learning architecture based on hybrid cooperative agents (mobile, conversational, cognitive), with the possibility integrating Multi-Language ontology for the development of a Conversational Agent (CA) speaking Multi-Language especially Arabic language. A prototype of text-to-speech mobile agent (MobiSpeech) is presented and discussed. MobiSpeech is intended for mobile users, and provide all services to read any text and any text file extension for the user while considering the existing context-awareness.
{"title":"Conversational agent for mobile-learning: A review and a proposal of a multilanguage text-to-speech agent, “MobiSpeech”","authors":"Mouna Abdelkefi, I. Kallel","doi":"10.1109/RCIS.2016.7549294","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549294","url":null,"abstract":"The new Information, communication, and mobile technologies empower the users to learn anywhere and anytime. They also need conversational systems that could be aware of their mobile context in order to adjust it dynamically. The actual research field is focusing on adaptive conversational systems, especially in the case of Mobile-learning. This paper presents a comparative study of some related works. Then, it proposes an M-learning architecture based on hybrid cooperative agents (mobile, conversational, cognitive), with the possibility integrating Multi-Language ontology for the development of a Conversational Agent (CA) speaking Multi-Language especially Arabic language. A prototype of text-to-speech mobile agent (MobiSpeech) is presented and discussed. MobiSpeech is intended for mobile users, and provide all services to read any text and any text file extension for the user while considering the existing context-awareness.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115509677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549299
Yves Wautelet, Samedi Heng, Manuel Kolp, I. Mirbel, S. Poelmans
Requirements representation in agile methods is often done on the basis of User Stories (US) which are short sentences relating a WHO, WHAT and (possibly) WHY dimension. They are by nature very operational and simple to understand thus very efficient. Previous research allowed to build a unified model for US templates associating semantics to a set of keywords based on templates collected over the web and scientific literature. Since the semantic associated to these keywords is mostly issued of the i* framework we overview in this paper how to build a custom rationale diagram on the basis of a US set tagged using that unified template. The rationale diagram is strictly speaking not an i* strategic rationale diagram but uses parts of its constructs and visual notation to build various trees of relating US elements in a single project. Indeed, the benefits of editing such a rationale diagram is to identify depending US, identifying EPIC ones and group them around common Themes. The paper shows the feasibility of building the rationale diagram, then points to the use of these consistent sets of US for iteration content planning. To ensure the US set and the rationale diagram constitute a consistent and not concurrent whole, an integrated Computer-Aided Software Engineering (CASE) tool supports the approach.
{"title":"Building a rationale diagram for evaluating user story sets","authors":"Yves Wautelet, Samedi Heng, Manuel Kolp, I. Mirbel, S. Poelmans","doi":"10.1109/RCIS.2016.7549299","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549299","url":null,"abstract":"Requirements representation in agile methods is often done on the basis of User Stories (US) which are short sentences relating a WHO, WHAT and (possibly) WHY dimension. They are by nature very operational and simple to understand thus very efficient. Previous research allowed to build a unified model for US templates associating semantics to a set of keywords based on templates collected over the web and scientific literature. Since the semantic associated to these keywords is mostly issued of the i* framework we overview in this paper how to build a custom rationale diagram on the basis of a US set tagged using that unified template. The rationale diagram is strictly speaking not an i* strategic rationale diagram but uses parts of its constructs and visual notation to build various trees of relating US elements in a single project. Indeed, the benefits of editing such a rationale diagram is to identify depending US, identifying EPIC ones and group them around common Themes. The paper shows the feasibility of building the rationale diagram, then points to the use of these consistent sets of US for iteration content planning. To ensure the US set and the rationale diagram constitute a consistent and not concurrent whole, an integrated Computer-Aided Software Engineering (CASE) tool supports the approach.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116682737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549325
Sirinya On-at, A. Quirin, A. Péninou, Nadine Baptiste-Jessel, Marie-Françoise Canut, F. Sèdes
Incorporating user interests evolution over time is a crucial problem in user profiling. We particularly focus on social profiling process that uses information shared on user social network to extract his/her interests. In this work, we apply our existing time-aware social profiling method on Twitter. The aim of this study is to measure the effectiveness of our approach on this kind of social network platform, which has different characteristics from those of other social networking sites. Although the improvement compared to the time-agnostic baseline method is still low, the experiments using a parametric study showed us the benefit of applying a time-aware social profiling process on Twitter. We also found that our method performs well on sparse networks and that the information dynamic influences more the quality of our proposed time-aware method than the relationships dynamic while building the social profile on Twitter. This observation will lead us to a more complex study to find out meaningful factors to incorporate user interests evolution on social profiling process in such a network.
{"title":"Taking into account the evolution of users social profile: Experiments on Twitter and some learned lessons","authors":"Sirinya On-at, A. Quirin, A. Péninou, Nadine Baptiste-Jessel, Marie-Françoise Canut, F. Sèdes","doi":"10.1109/RCIS.2016.7549325","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549325","url":null,"abstract":"Incorporating user interests evolution over time is a crucial problem in user profiling. We particularly focus on social profiling process that uses information shared on user social network to extract his/her interests. In this work, we apply our existing time-aware social profiling method on Twitter. The aim of this study is to measure the effectiveness of our approach on this kind of social network platform, which has different characteristics from those of other social networking sites. Although the improvement compared to the time-agnostic baseline method is still low, the experiments using a parametric study showed us the benefit of applying a time-aware social profiling process on Twitter. We also found that our method performs well on sparse networks and that the information dynamic influences more the quality of our proposed time-aware method than the relationships dynamic while building the social profile on Twitter. This observation will lead us to a more complex study to find out meaningful factors to incorporate user interests evolution on social profiling process in such a network.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549290
A. Knyazeva, O. Kolobov, I. Turchanovsky
The record linkage problem in application to a bibliographic and authority data is considered. The problem is common in the situation of merging data from several libraries. The two approaches based on empirical analysis of data are tested. Both of them involve an indirect information about a person. The proposed variant of the decision tree method allows us to deal with inconsistent bibliographic data and to use particular rules one by one for improving of record linkage quality. The study was performed on data of several Russian libraries. The data we deal with are in RUSMARC format which is a variant of UNIMARC popular in Russia.
{"title":"An example of empirical approach for bibliographic record linkage","authors":"A. Knyazeva, O. Kolobov, I. Turchanovsky","doi":"10.1109/RCIS.2016.7549290","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549290","url":null,"abstract":"The record linkage problem in application to a bibliographic and authority data is considered. The problem is common in the situation of merging data from several libraries. The two approaches based on empirical analysis of data are tested. Both of them involve an indirect information about a person. The proposed variant of the decision tree method allows us to deal with inconsistent bibliographic data and to use particular rules one by one for improving of record linkage quality. The study was performed on data of several Russian libraries. The data we deal with are in RUSMARC format which is a variant of UNIMARC popular in Russia.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129308996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549310
Chahrazed Bouhini, M. Géry, C. Largeron
Personalized Information Retrieval (PIR) exploits the user's data in order to refine the retrieval, like for instance when users with different backgrounds may express different information needs with the same query. However, this additional source of information is not supported by the classical Information Retrieval (IR) process. In order to overcome this limit, we propose to generate the user profile out from his profile and social data. Then, we introduce several Personalized Information Retrieval models which integrate this profile at the querying step, allowing to personalize the search results. We study several combinations of the initial user's query with his profile. Furthermore, we present a PIR test collection that we built from the social bookmarking network Delicious, in order to evaluate our PIR models. Our experiments showed that the PIR models improve the retrieval results.
{"title":"Personalized information retrieval models integrating the user's profile","authors":"Chahrazed Bouhini, M. Géry, C. Largeron","doi":"10.1109/RCIS.2016.7549310","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549310","url":null,"abstract":"Personalized Information Retrieval (PIR) exploits the user's data in order to refine the retrieval, like for instance when users with different backgrounds may express different information needs with the same query. However, this additional source of information is not supported by the classical Information Retrieval (IR) process. In order to overcome this limit, we propose to generate the user profile out from his profile and social data. Then, we introduce several Personalized Information Retrieval models which integrate this profile at the querying step, allowing to personalize the search results. We study several combinations of the initial user's query with his profile. Furthermore, we present a PIR test collection that we built from the social bookmarking network Delicious, in order to evaluate our PIR models. Our experiments showed that the PIR models improve the retrieval results.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129525682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549301
Jukka Ruohonen, S. Hyrynsalmi, V. Leppänen
A software defect that exposes a software system to a cyber security attack is known as a software vulnerability. A software security exploit is an engineered software solution that successfully exploits the vulnerability. Exploits are used to break into computer systems, but exploits are currently used also for security testing, security analytics, intrusion detection, consultation, and other legitimate and legal purposes. A well-established market emerged in the 2000s for software vulnerabilities. The current market segments populated by small and medium-sized companies exhibit signals that may eventually lead to a similar industrialization of software exploits. To these ends and against these industry trends, this paper observes the first online market place for trading exploits between buyers and sellers. The paper adopts three different perspectives to study the case. The paper (a) portrays the studied exploit market place against the historical background in the software security industry. A qualitative assessment is made to (b) evaluate the case against the common characteristics of traditional online market places. The qualitative observations are used in the quantitative part (c) for predicting the price of exploits with partial least squares regression. The results show that (i) the case is unique from a historical perspective, although (ii) the online market place characteristics are familiar. The regression estimates also indicate that (iii) the pricing of exploits is only partially dependent on such factors as the targeted platform, the date of disclosure of the exploited vulnerability, and the quality assurance service provided by the market place provider. The results allow to contemplate (iv) practical means for enhancing the market place.
{"title":"Trading exploits online: A preliminary case study","authors":"Jukka Ruohonen, S. Hyrynsalmi, V. Leppänen","doi":"10.1109/RCIS.2016.7549301","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549301","url":null,"abstract":"A software defect that exposes a software system to a cyber security attack is known as a software vulnerability. A software security exploit is an engineered software solution that successfully exploits the vulnerability. Exploits are used to break into computer systems, but exploits are currently used also for security testing, security analytics, intrusion detection, consultation, and other legitimate and legal purposes. A well-established market emerged in the 2000s for software vulnerabilities. The current market segments populated by small and medium-sized companies exhibit signals that may eventually lead to a similar industrialization of software exploits. To these ends and against these industry trends, this paper observes the first online market place for trading exploits between buyers and sellers. The paper adopts three different perspectives to study the case. The paper (a) portrays the studied exploit market place against the historical background in the software security industry. A qualitative assessment is made to (b) evaluate the case against the common characteristics of traditional online market places. The qualitative observations are used in the quantitative part (c) for predicting the price of exploits with partial least squares regression. The results show that (i) the case is unique from a historical perspective, although (ii) the online market place characteristics are familiar. The regression estimates also indicate that (iii) the pricing of exploits is only partially dependent on such factors as the targeted platform, the date of disclosure of the exploited vulnerability, and the quality assurance service provided by the market place provider. The results allow to contemplate (iv) practical means for enhancing the market place.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549344
Magalí González, L. Cernuzzi, Nathalie Aquino, Ó. Pastor
This study presents the Architecture Specific Model (ASM) defined by the MoWebA approach to improve the development of web applications for different architectures. MoWebA is a model-driven approach to web applications development. The article presents a general overview of MoWebA, including the methodological aspects related to its modeling and transformation processes, the process of defining the ASM, and an example of an ASM model. We finally present a preliminary validation experience and its main results. The experience was structured according to the proposal of Runeson et al. for case studies.
{"title":"Developing web applications for different architectures: The MoWebA approach","authors":"Magalí González, L. Cernuzzi, Nathalie Aquino, Ó. Pastor","doi":"10.1109/RCIS.2016.7549344","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549344","url":null,"abstract":"This study presents the Architecture Specific Model (ASM) defined by the MoWebA approach to improve the development of web applications for different architectures. MoWebA is a model-driven approach to web applications development. The article presents a general overview of MoWebA, including the methodological aspects related to its modeling and transformation processes, the process of defining the ASM, and an example of an ASM model. We finally present a preliminary validation experience and its main results. The experience was structured according to the proposal of Runeson et al. for case studies.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115918074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}