Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549289
Amira Dhouib, Abdelwaheb Trabelsi, C. Kolski, M. Neji
The evaluation of interactive adaptive systems is the source of many difficulties for novice evaluators as well as for expert ones. Issues arise in the need to identify the appropriate evaluation methods to be used for a given evaluation context. This paper proposes an approach for the choice of evaluation methods for interactive adaptive systems with regard to their suitability depending on specific evaluation contexts. A multicriteria decision making approach, namely the Analytic Hierarchy Process, is proposed for the selection methodology. The approach is based on a pair-wise comparison of a number of criteria that affect the choice of the appropriate evaluation methods. Four user-centred evaluation methods in conjunction with the layered evaluation for interactive adaptive systems are presented in the cases studies. These methods are: user-as-wizard, heuristic evaluation, focus group, and user test. The proposed approach is flexible in the sense that it can be used in the case of different evaluation methods. The results depend on the evaluation context where the methods will be used. Hence, we illustrate the proposed approach in the case of two evaluation contexts.
{"title":"An approach for the selection of evaluation methods for interactive adaptive systems using analytic hierarchy process","authors":"Amira Dhouib, Abdelwaheb Trabelsi, C. Kolski, M. Neji","doi":"10.1109/RCIS.2016.7549289","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549289","url":null,"abstract":"The evaluation of interactive adaptive systems is the source of many difficulties for novice evaluators as well as for expert ones. Issues arise in the need to identify the appropriate evaluation methods to be used for a given evaluation context. This paper proposes an approach for the choice of evaluation methods for interactive adaptive systems with regard to their suitability depending on specific evaluation contexts. A multicriteria decision making approach, namely the Analytic Hierarchy Process, is proposed for the selection methodology. The approach is based on a pair-wise comparison of a number of criteria that affect the choice of the appropriate evaluation methods. Four user-centred evaluation methods in conjunction with the layered evaluation for interactive adaptive systems are presented in the cases studies. These methods are: user-as-wizard, heuristic evaluation, focus group, and user test. The proposed approach is flexible in the sense that it can be used in the case of different evaluation methods. The results depend on the evaluation context where the methods will be used. Hence, we illustrate the proposed approach in the case of two evaluation contexts.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549292
Souad Benomrane, Zied Sellami, Mounir Ben Ayed
In a changing environment, it is necessary to update the ontology to new knowledge and user needs. However, ontology evolution is still a time-consuming and complex task. In this paper we propose an extended approach of an earlier work in ontology evolution based on an adaptive multi-agent system (AMAS). In fact, we seek to personalize the results proposed by the AMAS to the ontologist-feedback. First, we enhance the agents with an adaptive behavior enabling them to react to the ontologist's feedback. The ontologist gives his/her action (elementary and composite changes) towards the AMAS proposals. He/She can also add new terms and concepts. Then, the AMAS reacts and self-organizes to produce an updated ontology with new proposals. This process is repeated until a satisfactory state of the ontology is obtained. The experiments prove that the adaptive skills we added to agents help them to detect the uselessness of some proposals, to avoid the useless and wrong ones and to propose others.
{"title":"Evolving ontologies using an adaptive multi-agent system based on ontologist-feedback","authors":"Souad Benomrane, Zied Sellami, Mounir Ben Ayed","doi":"10.1109/RCIS.2016.7549292","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549292","url":null,"abstract":"In a changing environment, it is necessary to update the ontology to new knowledge and user needs. However, ontology evolution is still a time-consuming and complex task. In this paper we propose an extended approach of an earlier work in ontology evolution based on an adaptive multi-agent system (AMAS). In fact, we seek to personalize the results proposed by the AMAS to the ontologist-feedback. First, we enhance the agents with an adaptive behavior enabling them to react to the ontologist's feedback. The ontologist gives his/her action (elementary and composite changes) towards the AMAS proposals. He/She can also add new terms and concepts. Then, the AMAS reacts and self-organizes to produce an updated ontology with new proposals. This process is repeated until a satisfactory state of the ontology is obtained. The experiments prove that the adaptive skills we added to agents help them to detect the uselessness of some proposals, to avoid the useless and wrong ones and to propose others.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121884532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549298
A. Fonteles, S. Bouveret, J. Gensel
Spatial Crowdsourcing Platforms (SCP) are systems that act as brokers that help people requesting location dependent tasks to find suitable workforce to accomplish it. This kind of system has been source of much interest for both academy and industry. However, little has been done to define a crowdsourcing platform and its technical details precisely. Furthermore, much of the research works on this subject have focused specifically on crowdsensing platforms, a special case of SCP. There is also a need to contrast what has been proposed, so far, in this matter with real world SCPs in order to refine and validate the current state of the art results. In this paper, we discuss a list of requirements for SCPs. This list has been identified and validated by an analysis of scientific related works and several commercial SCPs. Based on this list, we also propose a generic architecture for SCPs that is meant to help the understanding of SCPs and the design of better spatial crowdsourcing solutions.
{"title":"A generic architecture for spatial crowdsourcing","authors":"A. Fonteles, S. Bouveret, J. Gensel","doi":"10.1109/RCIS.2016.7549298","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549298","url":null,"abstract":"Spatial Crowdsourcing Platforms (SCP) are systems that act as brokers that help people requesting location dependent tasks to find suitable workforce to accomplish it. This kind of system has been source of much interest for both academy and industry. However, little has been done to define a crowdsourcing platform and its technical details precisely. Furthermore, much of the research works on this subject have focused specifically on crowdsensing platforms, a special case of SCP. There is also a need to contrast what has been proposed, so far, in this matter with real world SCPs in order to refine and validate the current state of the art results. In this paper, we discuss a list of requirements for SCPs. This list has been identified and validated by an analysis of scientific related works and several commercial SCPs. Based on this list, we also propose a generic architecture for SCPs that is meant to help the understanding of SCPs and the design of better spatial crowdsourcing solutions.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114736450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549315
Sahar Abdelhedi, R. Bourguiba, Jaouhar Mouine, M. Baklouti
Population aging has become a worldwide problem. Falls are considered as the first source of disabilities among elderly people. Fall detection algorithms are the key to distinguish a fall from daily activities, automatically alert when a fall occurred and significantly decrease the time of rescue when the monitored patient falls down. The algorithm presented in this paper uses tri-axial accelerometer outputs to discriminate between falls and daily activities. It is mainly based on a two-thresholds approach and inactivity posture recognition after falling. The algorithm showed prominent results compared to existing works and will be improved and implemented on a Zynq board for future applications.
{"title":"Development of a two-threshold-based fall detection algorithm for elderly health monitoring","authors":"Sahar Abdelhedi, R. Bourguiba, Jaouhar Mouine, M. Baklouti","doi":"10.1109/RCIS.2016.7549315","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549315","url":null,"abstract":"Population aging has become a worldwide problem. Falls are considered as the first source of disabilities among elderly people. Fall detection algorithms are the key to distinguish a fall from daily activities, automatically alert when a fall occurred and significantly decrease the time of rescue when the monitored patient falls down. The algorithm presented in this paper uses tri-axial accelerometer outputs to discriminate between falls and daily activities. It is mainly based on a two-thresholds approach and inactivity posture recognition after falling. The algorithm showed prominent results compared to existing works and will be improved and implemented on a Zynq board for future applications.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122376094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549312
A. Shahri, M. Hosseini, Malik Almaliki, Keith Phalp, Jacqui Taylor, Raian Ali
Software-based motivation refers to the use of technology to enhance the engagement and efficiency of people in performing tasks and following a certain behaviour. Instances of such paradigm include gamification, persuasive technology and entertainment computing. Despite its potential, an ad-hoc introduction of software-based motivation to a business environment may lead to detrimental effects such as creating pressure and tension, and also reducing quality and authenticity. Hence, we advocate the need for a systematic engineering process to develop software solutions for motivation requirements. One of the challenges is in the high diversity in users' perception and acceptance of motivation strategies and their software-based incarnations. In this paper, we propose the use of personas as an intermediate step which increases efficiency in the engineering process for both engineers and users. We conduct an empirical research and identify elements which describe people with regard to their perception and preferences towards software-based motivational techniques and create a set of exemplary personas to aid the engineering process. We also present guidelines and challenges related to using persona-based engineering methods for software-based motivation.
{"title":"Engineering software-based motivation: A persona-based approach","authors":"A. Shahri, M. Hosseini, Malik Almaliki, Keith Phalp, Jacqui Taylor, Raian Ali","doi":"10.1109/RCIS.2016.7549312","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549312","url":null,"abstract":"Software-based motivation refers to the use of technology to enhance the engagement and efficiency of people in performing tasks and following a certain behaviour. Instances of such paradigm include gamification, persuasive technology and entertainment computing. Despite its potential, an ad-hoc introduction of software-based motivation to a business environment may lead to detrimental effects such as creating pressure and tension, and also reducing quality and authenticity. Hence, we advocate the need for a systematic engineering process to develop software solutions for motivation requirements. One of the challenges is in the high diversity in users' perception and acceptance of motivation strategies and their software-based incarnations. In this paper, we propose the use of personas as an intermediate step which increases efficiency in the engineering process for both engineers and users. We conduct an empirical research and identify elements which describe people with regard to their perception and preferences towards software-based motivational techniques and create a set of exemplary personas to aid the engineering process. We also present guidelines and challenges related to using persona-based engineering methods for software-based motivation.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128658554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549317
A. Derradji, A. Front, C. Verdier, Vincent Bouzon
A health care protocol for a chronic disease contains a set of actions that describe how the patient should treat his/her disease outside the hospital. The patient and possibly his healthcare team should follow the protocol in order to control the evolution of the chronic disease. The main problems are that (i) the patient can't interact and integrate in the protocol the expertise he acquired during his daily life with the disease and (ii) the health care team doesn't know how the protocol is concretely followed. Our main contribution in this paper is an approach for integrating the patient's expertise knowledge expressed in textual or verbal form, and representing this expertise with an ontological paradigm.
{"title":"An ontology for unexpected events and actions in chronic patient home care protocol","authors":"A. Derradji, A. Front, C. Verdier, Vincent Bouzon","doi":"10.1109/RCIS.2016.7549317","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549317","url":null,"abstract":"A health care protocol for a chronic disease contains a set of actions that describe how the patient should treat his/her disease outside the hospital. The patient and possibly his healthcare team should follow the protocol in order to control the evolution of the chronic disease. The main problems are that (i) the patient can't interact and integrate in the protocol the expertise he acquired during his daily life with the disease and (ii) the health care team doesn't know how the protocol is concretely followed. Our main contribution in this paper is an approach for integrating the patient's expertise knowledge expressed in textual or verbal form, and representing this expertise with an ontological paradigm.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128978404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549367
Nicolas Dugué, Jean-Charles Lamirel, Pascal Cuxac
We introduce Diachronic'Explorer, a toolbox to produce and visualize diachronic results, which is based on a new complete theoretic framework that we detail. This toolbox, which is dedicated to run diachronic algorithms from clustering results, allows also to explore the complex results at all the granularity levels through a web application.
{"title":"Diachronic'Explorer: Keep track of your clusters","authors":"Nicolas Dugué, Jean-Charles Lamirel, Pascal Cuxac","doi":"10.1109/RCIS.2016.7549367","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549367","url":null,"abstract":"We introduce Diachronic'Explorer, a toolbox to produce and visualize diachronic results, which is based on a new complete theoretic framework that we detail. This toolbox, which is dedicated to run diachronic algorithms from clustering results, allows also to explore the complex results at all the granularity levels through a web application.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125588540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549303
Tong Li, E. Paja, J. Mylopoulos, Jennifer Horkoff, Kristian Beckers
Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough attack analysis needs to consider strategic (social and organizational) aspects of the involved people and organizations, as well as technical aspects affecting software systems and the physical infrastructure, requiring a large amount of security knowledge which is difficult to acquire. In this paper, we propose a systematic approach to efficiently leverage a comprehensive attack knowledge repository (CAPEC) in order to identify realistic and detailed attack behaviors, avoiding severe repercussions of security breaches. In particular, we propose a systematic method to model CAPEC attack patterns, which has been applied to 102 patterns, in order to semi-automatically select and apply such patterns. Using the CAPEC patterns as part of a systematic and tool-supported process, we can efficiently operationalize attack strategies and identify realistic alternative attacks on an STS. We validate our proposal by performing a case study on a smart grid scenario.
{"title":"Security attack analysis using attack patterns","authors":"Tong Li, E. Paja, J. Mylopoulos, Jennifer Horkoff, Kristian Beckers","doi":"10.1109/RCIS.2016.7549303","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549303","url":null,"abstract":"Discovering potential attacks on a system is an essential step in engineering secure systems, as the identified attacks will determine essential security requirements. The prevalence of Socio-Technical Systems (STSs) makes attack analysis particularly challenging. These systems are composed of people and organizations, their software systems, as well as physical infrastructures. As such, a thorough attack analysis needs to consider strategic (social and organizational) aspects of the involved people and organizations, as well as technical aspects affecting software systems and the physical infrastructure, requiring a large amount of security knowledge which is difficult to acquire. In this paper, we propose a systematic approach to efficiently leverage a comprehensive attack knowledge repository (CAPEC) in order to identify realistic and detailed attack behaviors, avoiding severe repercussions of security breaches. In particular, we propose a systematic method to model CAPEC attack patterns, which has been applied to 102 patterns, in order to semi-automatically select and apply such patterns. Using the CAPEC patterns as part of a systematic and tool-supported process, we can efficiently operationalize attack strategies and identify realistic alternative attacks on an STS. We validate our proposal by performing a case study on a smart grid scenario.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124013662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549361
Y. Hagos, Monica J. Garfield, Salehu Anteneh
Information Systems (IS) implementation in higher education is a large investment. Such investments are expected to bring increased efficiency and effectiveness, as well as better quality services to stakeholders. E-learning is one of the recent trends and major technological advancements in Information Technology (IT), reshaping the mode of delivery of education in universities. To effectively and efficiently evaluate the success of an e-learning system, success measurement factors must be identified and measured for any university that implements e-learning systems. This study explores and develops measurement factors model for e-learning systems success in Ethiopian higher Level Education Institutes (EHEIs). Both qualitative and quantitative research methodologies are used to perform the study. The study is based on the Information System Success (ISS) model and extends the model to investigate e-learning systems success measurement factors in developing countries such as Ethiopia. Our literature search did not find any study that examines the complete IS success model in order to identify measurement factors of e-learning systems success in Ethiopia that should be of value to higher learning institutions' management, e-learning systems designers and providers, and instructors when planning and implementing e-learning projects.
{"title":"Measurement factors model for e-learning systems success","authors":"Y. Hagos, Monica J. Garfield, Salehu Anteneh","doi":"10.1109/RCIS.2016.7549361","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549361","url":null,"abstract":"Information Systems (IS) implementation in higher education is a large investment. Such investments are expected to bring increased efficiency and effectiveness, as well as better quality services to stakeholders. E-learning is one of the recent trends and major technological advancements in Information Technology (IT), reshaping the mode of delivery of education in universities. To effectively and efficiently evaluate the success of an e-learning system, success measurement factors must be identified and measured for any university that implements e-learning systems. This study explores and develops measurement factors model for e-learning systems success in Ethiopian higher Level Education Institutes (EHEIs). Both qualitative and quantitative research methodologies are used to perform the study. The study is based on the Information System Success (ISS) model and extends the model to investigate e-learning systems success measurement factors in developing countries such as Ethiopia. Our literature search did not find any study that examines the complete IS success model in order to identify measurement factors of e-learning systems success in Ethiopia that should be of value to higher learning institutions' management, e-learning systems designers and providers, and instructors when planning and implementing e-learning projects.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126399249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-01DOI: 10.1109/RCIS.2016.7549343
Gwendal Daniel, G. Sunyé, Jordi Cabot
While Model Driven Engineering is gaining more industrial interest, scalability issues when managing large models have become a major problem in current modeling frameworks. Scalable model persistence has been achieved by using NoSQL backends for model storage, but existing modeling framework APIs have not evolved accordingly, limiting NoSQL query performance benefits. In this paper we present the Mogwaï, a scalable and efficient model query framework based on a direct translation of OCL queries to Gremlin, a query language supported by several NoSQL databases. Generated Gremlin expressions are computed inside the database itself, bypassing limitations of existing framework APIs and improving overall performance, as confirmed by our experimental results showing an improvement of execution time up to a factor of 20 and a reduction of the memory overhead up to a factor of 75 for large models.
{"title":"Mogwaï: A framework to handle complex queries on large models","authors":"Gwendal Daniel, G. Sunyé, Jordi Cabot","doi":"10.1109/RCIS.2016.7549343","DOIUrl":"https://doi.org/10.1109/RCIS.2016.7549343","url":null,"abstract":"While Model Driven Engineering is gaining more industrial interest, scalability issues when managing large models have become a major problem in current modeling frameworks. Scalable model persistence has been achieved by using NoSQL backends for model storage, but existing modeling framework APIs have not evolved accordingly, limiting NoSQL query performance benefits. In this paper we present the Mogwaï, a scalable and efficient model query framework based on a direct translation of OCL queries to Gremlin, a query language supported by several NoSQL databases. Generated Gremlin expressions are computed inside the database itself, bypassing limitations of existing framework APIs and improving overall performance, as confirmed by our experimental results showing an improvement of execution time up to a factor of 20 and a reduction of the memory overhead up to a factor of 75 for large models.","PeriodicalId":344289,"journal":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132047649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}