By Topic

e-Technologies, 2008 International MCETECH Conference on

Date 23-25 Jan. 2008

Filter Results

Displaying Results 1 - 25 of 41
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (243 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Message du Président du Congrès

    Publication Year: 2008, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (158 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Conference Chair

    Publication Year: 2008, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (180 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Co-chairs

    Publication Year: 2008, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (146 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2008, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Toward an Integrated User Requirements Notation Framework and Tool forBusiness Process Management

    Publication Year: 2008, Page(s):3 - 15
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1484 KB) | HTML iconHTML

    A number of recent initiatives in both academia and industry have sought to achieve improvements in e- businesses through the utilization of Business Process Management (BPM) methodologies and tools. However there are still some inadequacies that need to be addressed when it comes to achieving alignment between business goals and business processes. The User Requirements Notation (URN) has some un... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling the Interaction of Distributed Systems as Protocols

    Publication Year: 2008, Page(s):16 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    In descriptions of loosely coupled process-like interactions of computational systems and especially in the literature on electronic business processes, the protocol notion is often used only informally. However, its complete expressive power becomes effective only with a precise formalization. Based on Holzmann's protocol concept, a formal protocol definition is introduced, providing an inductive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human Workflows via Document-Driven Process Choreography

    Publication Year: 2008, Page(s):25 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (706 KB) | HTML iconHTML

    Workflows are ubiquitous in enterprise applications from manufacturing industry to healthcare industry. A human workflow is a dynamic set of tasks performed by human participants to reach a shared goal. Commitments among participants can be used to model the workflow and coordinate their execution of it. These commitments can be captured by role-based orchestrations in a Microsoft workflow impleme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Adaptability Support in Collaborative Business Processes

    Publication Year: 2008, Page(s):34 - 45
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (643 KB) | HTML iconHTML

    Service-oriented architecture (SOA) brings new perspectives not only to software architecture but also to enterprise business processes. SOA promotes the use of loosely coupled services to automate business processes. The automation of business processes raises several challenges for enterprises. One of those challenges relates to the maintenance of business processes, more precisely how to facili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Modeling for Security Behavior Analysis of Computer Systems

    Publication Year: 2008, Page(s):49 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    This paper proposes a formal framework aimed at specifying and verifying computer systems security behavior. In this approach, systems and their interactions are modeled through processes with a new dedicated calculus inspired from the ambient calculus. We demonstrate how, given a network security policy implementation, our dedicated calculus allows to verify that the specification offers or not s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model of Trusted Data Collection for Knowledge Discovery in B2B Networks

    Publication Year: 2008, Page(s):60 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    With widespread use of the Internet, data is often shared between organizations in B2B networks. Knowledge discovery that integrates data across all sources in a B2B network would be useful to provide a complete view of how the overall network is performing in meeting the needs of consumers. To enable this, business agreements must be in place as well as consumer consent and access controls to ens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymous Credentials for Privacy-Preserving E-learning

    Publication Year: 2008, Page(s):70 - 80
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (579 KB) | HTML iconHTML

    E-learning systems have made considerable progress within the last few years. Nonetheless, the issue of learner privacy has been practically ignored. Existing E-learning standards offer some provisions for privacy and the security of E-learning systems offers some privacy protection, but remains unsatisfactory on several levels. On the other hand, privacy preserving solutions that are appropriate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding and Countering Insider Threats in Software Development

    Publication Year: 2008, Page(s):81 - 90
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    E-commerce and e-government depend on trustworthy software platforms. Unfortunately, barely a week goes by without the discovery of a "critical" software vulnerability that would give a remote party complete access to a large number of network-attached computers. Considering the rising financial incentives and the immeasurable strategic importance of such vulnerabilities, one should assume that th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategies for Cross-Organizational Service Composition

    Publication Year: 2008, Page(s):93 - 103
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (587 KB) | HTML iconHTML

    The automation of cross-organizational business processes bears great potential for companies to extend their market reach, save time, cut costs and respond to customer queries more agilely. However, technological support for the efficient organization of providing and consuming services across corporate boundaries is still not mature enough to allow for a large-scale adoption particularly among s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signature-Based Composition of Web Services

    Publication Year: 2008, Page(s):104 - 115
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    The Web services family of standards promotes the interoperability of heterogeneous distributed systems by separating the definition of a service from, 1) its implementation language, 2) its internal data representation, and 3) the communication protocol used to access it. The UDDI standard addresses aspects related to the publication and querying of enterprise business services, but the kind of r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure Semantics in a SOA Environment

    Publication Year: 2008, Page(s):116 - 121
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    In a Service-Oriented Architecture (SOA), services publish descriptions to permit their composition into larger services. There are however serious gaps in the semantics of such service descriptions and these hinder the adoption of SOAs in mission-critical applications. This paper identifies some of these lacunae and proposes a foundation for resolving one of them - service failure. The technique ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of the Pervaho Middleware for Mobile Context-Aware Applications

    Publication Year: 2008, Page(s):125 - 135
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB) | HTML iconHTML

    Context-aware applications offer a great potential for the future of mobile computing. In order to be developed in an optimal way, such applications need appropriate middleware services. This paper introduces Pervaho, an integrated middleware aimed specifically for supporting the development and testing of mobile context-aware applications. To illustrate the use of Pervaho, we walk through the dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contextualized Linguistic Matching for Heterogeneous Data Source Integration

    Publication Year: 2008, Page(s):136 - 147
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    As one can expect, members of a common market are likely to work in quite different domains and use different kinds of schemas to describe their own business data. An ideal world would allow such heterogeneous data to be integrated into some (concrete or virtual) business data repository. It seems illusory to think that all members joining a common marketplace can directly provide data adhering to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommendation Quality Evolution Based on Neighbors Discrimination

    Publication Year: 2008, Page(s):148 - 153
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB) | HTML iconHTML

    An "automated recommender system" plays an essential role in e-commerce applications. Such systems try to recommend items (movies, music, books, news, etc.) which the user should be interested in. The spectrum of proposed recommendation algorithms are based on information including content of the items, ratings of the users, and demographic information about the users. These systems hold the promi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology Learning from Text Using Relational Concept Analysis

    Publication Year: 2008, Page(s):154 - 163
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1628 KB) | HTML iconHTML

    We propose an approach for semi-automated construction of ontologies from text whose core component is a relational concept analysis (RCA) framework which extends formal concept analysis (FCA), a lattice-theory paradigm for discovering abstractions within objects x attributes tables, to the processing of several sorts of individuals described both by own properties and inter-individual links. As a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.