The paper presents a predictive models management system called DeVisa that offers online services such as: scoring, model composition, model comparison, search and statistics. For the purpose of interaction between the consumer applications and the DeVisa system a XML-based language called PMQL is defined. The paper focuses on the scoring service as an online knowledge provider, analyzes the challenges in achieving this objective and the solutions that were found. From a technological perspective DeVisa uses a native XML database system for storing the predictive models expressed in PMML and an XQuery library for processing the models. All the functionality is provided via Web Services.
{"title":"Knowledge as a Service. An Online Scoring Engine Architecture","authors":"D. Gorea","doi":"10.1109/ICCGI.2008.27","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.27","url":null,"abstract":"The paper presents a predictive models management system called DeVisa that offers online services such as: scoring, model composition, model comparison, search and statistics. For the purpose of interaction between the consumer applications and the DeVisa system a XML-based language called PMQL is defined. The paper focuses on the scoring service as an online knowledge provider, analyzes the challenges in achieving this objective and the solutions that were found. From a technological perspective DeVisa uses a native XML database system for storing the predictive models expressed in PMML and an XQuery library for processing the models. All the functionality is provided via Web Services.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An innovative framework for the management of server services at various sites across a communication network is presented. It consists of a better organization of queries' plan and data allocation to server, considering the group and query mobility along with the dependency of servers. Nowadays servers' ability to work semi autonomously, in regards to the decision of the appropriate query plan and the provision of the effective data location, plays a significant role to the query and network performance. Our objective is to minimize the communication and execution cost of the query plan for the dependent servers (when the query can not be completed in the starting servers) servers having query and group mobility. Data Mining methods are applied to reduce the dependent servers' external queries. A set of direct executing methods for starting the query server enforces the semi-autonomous server process. Simulation results are provided.
{"title":"Semi-autonomous Servers in Wireless Cellular Networks","authors":"J. Tsiligaridis","doi":"10.1109/ICCGI.2008.18","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.18","url":null,"abstract":"An innovative framework for the management of server services at various sites across a communication network is presented. It consists of a better organization of queries' plan and data allocation to server, considering the group and query mobility along with the dependency of servers. Nowadays servers' ability to work semi autonomously, in regards to the decision of the appropriate query plan and the provision of the effective data location, plays a significant role to the query and network performance. Our objective is to minimize the communication and execution cost of the query plan for the dependent servers (when the query can not be completed in the starting servers) servers having query and group mobility. Data Mining methods are applied to reduce the dependent servers' external queries. A set of direct executing methods for starting the query server enforces the semi-autonomous server process. Simulation results are provided.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115468731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduced concept of modularity business process. High modular business processes have properties of encapsulation and plug-and-play, which make business process more flexible and responsible to environment change. We also proposed a mechanism model of business process modularity and hypothesizes based on modular system theory and transaction cost economics. Diversity of customer demand and supplier specialization will lead to modular design of business process. Physical assets specificity, human assets specificity and procedure assets specificity of business process will decrease the attractiveness of modularity business process. Empirical results support these hypothesizes.
{"title":"An Empirical Study of Flexible Business Process Based on Modularity System Theory","authors":"Fang Ding, Liu Jie","doi":"10.1109/ICCGI.2008.35","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.35","url":null,"abstract":"This paper introduced concept of modularity business process. High modular business processes have properties of encapsulation and plug-and-play, which make business process more flexible and responsible to environment change. We also proposed a mechanism model of business process modularity and hypothesizes based on modular system theory and transaction cost economics. Diversity of customer demand and supplier specialization will lead to modular design of business process. Physical assets specificity, human assets specificity and procedure assets specificity of business process will decrease the attractiveness of modularity business process. Empirical results support these hypothesizes.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125553343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this document a model and tool named MECRAD, based among others, upon the following standards: ISO/IEC 9126 and 14598, SQUARE Project, IEEE1061 and SUMI is presented. It is a model for the technical evaluation of Rapid Applications Development (RAD) tools in visual environment. It is directed to organizations, companies and final users that need to select, in an effective and easily way, the most appropriate software to develop their applications. A guideline for the concrete instrumentation of the model, such as ranking, presentation and documentation procedures, is giving.. Cases of study were developed and the results are given (Visual Studio.Net, Net Beans, and Eclipse).
{"title":"MECRAD: Model and Tool for the Technical Quality Evaluation of Software Products in Visual Environment","authors":"L.S.V. Perez, A. Tornés, E. Riverón","doi":"10.1109/ICCGI.2008.50","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.50","url":null,"abstract":"In this document a model and tool named MECRAD, based among others, upon the following standards: ISO/IEC 9126 and 14598, SQUARE Project, IEEE1061 and SUMI is presented. It is a model for the technical evaluation of Rapid Applications Development (RAD) tools in visual environment. It is directed to organizations, companies and final users that need to select, in an effective and easily way, the most appropriate software to develop their applications. A guideline for the concrete instrumentation of the model, such as ranking, presentation and documentation procedures, is giving.. Cases of study were developed and the results are given (Visual Studio.Net, Net Beans, and Eclipse).","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122072385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Still, requirements and software design are often confused with one another. We provide a new (partial) explanation for this phenomenon, based on the insight that representations of concepts related to requirements and software design, respectively, may sometimes look very similar. This does not mean, however, that the requirements and design concepts are the same. So, we should distinguish requirements from their representations and, analogously, software design from its representation. Then it is easier to clearly distinguish requirements and software design as well.
{"title":"Requirements vs. Software Design: An Explanation Based on the Distinction between Concepts and Their Representations","authors":"H. Kaindl, D. Svetinovic","doi":"10.1109/ICCGI.2008.12","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.12","url":null,"abstract":"Still, requirements and software design are often confused with one another. We provide a new (partial) explanation for this phenomenon, based on the insight that representations of concepts related to requirements and software design, respectively, may sometimes look very similar. This does not mean, however, that the requirements and design concepts are the same. So, we should distinguish requirements from their representations and, analogously, software design from its representation. Then it is easier to clearly distinguish requirements and software design as well.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117095418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During the project we were working on physical conflicts occurred in a multiagent system. In order to resolve the problem many different conflict resolution strategies were examined and many proposed solutions found. In this paper we explore conflicts as well as their causes and possible solutions. Based upon this research we implemented a centralized solution and added a reactive agent in the database in order to avoid conflict situations and efficiently allocate a set of resources.
{"title":"Resolving Physical Conflicts in Multiagent Systems","authors":"K. Rabuzin, M. Malekovic, M. Cubrilo","doi":"10.1109/ICCGI.2008.51","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.51","url":null,"abstract":"During the project we were working on physical conflicts occurred in a multiagent system. In order to resolve the problem many different conflict resolution strategies were examined and many proposed solutions found. In this paper we explore conflicts as well as their causes and possible solutions. Based upon this research we implemented a centralized solution and added a reactive agent in the database in order to avoid conflict situations and efficiently allocate a set of resources.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128172749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In view of inevitable redundancies in local data sources in heterogeneous information integration systems, a multi-copy join optimization method (MuCoJo for short) based on a genetic algorithm is proposed. MuCoJo can choose appropriate redundant copies of the tables to participate a joint query and optimizes the join order of it. By using the redundant copies, MuCoJo enlarges the search space so that the concurrent executions of different local sources can be best used. Meanwhile, MuCoJo could take advantage of redundancies features in such systems and get faster joint query response time. Experimental results show the computational efficiency of the MuCoJo and its necessity in information integration system. Moreover, during the population initialization, controlling invalid solutions can reduce the search space effectively at the cost of initialization time consuming.
{"title":"A Multi-copy Join Optimization of Information Integration Systems Based on a Genetic Algorithm","authors":"Liying Fang, Pu Wang, Jianzhuo Yan","doi":"10.1109/ICCGI.2008.20","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.20","url":null,"abstract":"In view of inevitable redundancies in local data sources in heterogeneous information integration systems, a multi-copy join optimization method (MuCoJo for short) based on a genetic algorithm is proposed. MuCoJo can choose appropriate redundant copies of the tables to participate a joint query and optimizes the join order of it. By using the redundant copies, MuCoJo enlarges the search space so that the concurrent executions of different local sources can be best used. Meanwhile, MuCoJo could take advantage of redundancies features in such systems and get faster joint query response time. Experimental results show the computational efficiency of the MuCoJo and its necessity in information integration system. Moreover, during the population initialization, controlling invalid solutions can reduce the search space effectively at the cost of initialization time consuming.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128290904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hartle, Daniel Schumann, Arsene Botchak, Erik Tews, M. Mühlhäuser
Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and the function of its components that are not format-compliant is a step towards understanding the delivery mechanism of an exploit and fixing the vulnerable application. This paper demonstrates the use of bitstream segment graphs for describing the structure of exploits on the example of the TIFF Jailbreak exploit for the Apple iPhone and iPod Touch with firmware 1.1.1.
{"title":"Describing Data Format Exploits Using Bitstream Segment Graphs","authors":"M. Hartle, Daniel Schumann, Arsene Botchak, Erik Tews, M. Mühlhäuser","doi":"10.1109/ICCGI.2008.21","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.21","url":null,"abstract":"Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and the function of its components that are not format-compliant is a step towards understanding the delivery mechanism of an exploit and fixing the vulnerable application. This paper demonstrates the use of bitstream segment graphs for describing the structure of exploits on the example of the TIFF Jailbreak exploit for the Apple iPhone and iPod Touch with firmware 1.1.1.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131120189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a classification problem, the most difficult decision is to choose the artificial neural network (ANN) architecture that offers the best results. In this paper we present a method that permits to quickly evaluate the degree of overlapping between classes. Once we know this degree, we can easily choose the appropriate ANN architecture.
{"title":"A SOM Based Method for Classes Overlap Degree Evaluation","authors":"I. Lemeni, N. Tepus","doi":"10.1109/ICCGI.2008.55","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.55","url":null,"abstract":"In a classification problem, the most difficult decision is to choose the artificial neural network (ANN) architecture that offers the best results. In this paper we present a method that permits to quickly evaluate the degree of overlapping between classes. Once we know this degree, we can easily choose the appropriate ANN architecture.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133126855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An effective coordination mechanism is central to building large distributed systems. Overcoming limitations of a coordination language can be a major challenge for developers of distributed systems. This paper presents a novel coordination mechanism based on code mobility. In this mechanism coordination is realised by exchanging pieces of mobile code between coordinated entities. This approach overcomes constrains of a statically defined coordination language by allowing coordinated entities to dynamically redefine coordination rules and use all the power of a programming language to express such rules. This helps to implement sophisticated and efficient data retrieval and processing algorithms and also reduce network traffic. The paper also discusses a non-language based coordination framework specially developed to support coordination based on mobile code and a pragmatic solution to the problem of protecting hosts from potentially harmful mobile code. A proof of concept implementation demonstrates the feasibility and applicability of the proposal.
{"title":"Mobile Code for Coordination","authors":"A. Iliasov","doi":"10.1109/ICCGI.2008.54","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.54","url":null,"abstract":"An effective coordination mechanism is central to building large distributed systems. Overcoming limitations of a coordination language can be a major challenge for developers of distributed systems. This paper presents a novel coordination mechanism based on code mobility. In this mechanism coordination is realised by exchanging pieces of mobile code between coordinated entities. This approach overcomes constrains of a statically defined coordination language by allowing coordinated entities to dynamically redefine coordination rules and use all the power of a programming language to express such rules. This helps to implement sophisticated and efficient data retrieval and processing algorithms and also reduce network traffic. The paper also discusses a non-language based coordination framework specially developed to support coordination based on mobile code and a pragmatic solution to the problem of protecting hosts from potentially harmful mobile code. A proof of concept implementation demonstrates the feasibility and applicability of the proposal.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134221017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}