By Topic

Internet and Web Applications and Services, 2008. ICIW '08. Third International Conference on

Date 8-13 June 2008

Filter Results

Displaying Results 1 - 25 of 125
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (47 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (9 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (68 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (256 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): xv - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (169 KB)  
    Freely Available from IEEE
  • Committees

    Page(s): xvii - xxv
    Save to Project icon | Request Permissions | PDF file iconPDF (118 KB)  
    Freely Available from IEEE
  • Flow Diagram Based Formulation for Protecting Patent and Trade Secret in Information Systems

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (173 KB) |  | HTML iconHTML  

    In this paper, we propose a flow diagram based formulation of the conditions on protecting patent and trade secret in information systems by interpreting legal concepts in engineering manner as a reference to researchers and practitioners. First, we propose the condition on patenting the novel combination of prior disclosed computer programs. Second, we propose the condition on proper specification of the parameter setting components as patentable computer programs. Finally, we propose the condition on protecting the numerical parametric values as trade secret in patentable parameter setting components. We also show the case study for its feasibility check of our formulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracing Mobile Attackers in Wireless Ad-Hoc Network

    Page(s): 7 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (204 KB) |  | HTML iconHTML  

    In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environment, IP traceback methods are deployed to determine the origin of attacking packets. With the increase in bandwidth of wireless networks, attackers may choose this medium from which to launch attacks. However, tracing the attackers in wireless networks is more difficult since intermediate nodes may move or attackers may change their location to hide themselves. Thus, conventional traceback schemes for wired networks cannot apply directly to the wireless network infrastructure because the intermediate routers could be compromised by an adversary. Therefore, we propose a flexible and lightweight traceback scheme to determine the source of attacking packets in a mobile ad-hoc environment. We will demonstrate our method's ability to track the movement of an attacker and recognize attack traffic launched by the same attacker from different locations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • File-Sharing versus Gift-Giving: A Theoretical Approach

    Page(s): 13 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (221 KB) |  | HTML iconHTML  

    Many investigations have tried to depict the character of music file-sharing, identifying it with gift-giving, without explaining the connection but what kind of gift-giving procedure it is. It is believed that this identification is rather simplistic and in order to show the identity of both activities a comparison between them is reported, presenting a threefold categorization of differences in terms of product properties, procedure, and motives. It results that file-sharing is not gift-giving and that digital music has mostly the characteristics of a socially redistributed public good. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ethical-Legal Challenges in User-Centric AmI Services

    Page(s): 19 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (262 KB) |  | HTML iconHTML  

    Mobile devices are increasingly evolving into tools to orientate in and interact with the environment, thus introducing a user-centric approach to ambient intelligence. The MINAmI project aims at creating core technologies for these kinds of ambient intelligence services. In this paper we assess five scenarios that demonstrate forthcoming MINAml-based devices. A brief legal and ethical analysis of the scenarios is conducted, which reveals various conflicting interests. The paper concludes with some thoughts on drafting ethical guidelines for ambient intelligence applications, as the nature and the needs of such applications are intrinsically different from the ones ethical guidelines have been dealing with earlier. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Domain Model for eParticipation

    Page(s): 25 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    The introduction of information and communication technologies (ICTs) in the field of public participation led to the emergence of electronic participation (eparticipation). The area of eparticipation is currently a rapidly evolving one. Although, a few eparticipation-related frameworks have been developed they actually aimed to address specific purposes. As a result, there is no work aiming to model the whole eparticipation domain. In this paper, a first attempt to model the domain of eparticipation is presented. For this purpose, we identify and describe the most significant aspects that characterize the eparticipation domain according to the relevant literature. In addition, we define a domain model in order to formally describe these aspects and the relationships between them. This model is illustrated using a set of Unified Modeling Language (UML) package and class diagrams. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences in Online Teaching and Learning

    Page(s): 31 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (353 KB) |  | HTML iconHTML  

    To support schools in teaching computer science, we have started the Informatik@School project. In this project, which is meanwhile funded by "Oberfrankenstiftung", we communicate computer science content to beginners and matured students. As the number of participating students is very large in comparison to the number of advisors and big distances have to be bridged, we separated students into two groups. Students from schools located not far from our university are taught in common face-to-face lessons, while far-off students get taught the same content in online lessons. In this paper we want to present the project, its preconditions and the didactical and content based concepts. We will introduce a web based technical environment which fulfills these issues and facilitates realization of afore mentioned online courses. Finally, we present lessons learned from this project and draw conclusions especially concerning the technical platform which consists of hardware and software used. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Employing Bayes Classifier for Improving Learner's Proficiency

    Page(s): 38 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    Improving learner's proficiency is a continuous issue in e-Learning systems. This paper presents a solution for advising the learner regarding the resources he should access and study in order to obtain a required proficiency level. The solution uses a Naive Bayes as classification algorithm with input data represented by learner's performed activities. The performed activities are logged and used as training and testing data. The obtained classifier is used for new students and provides them with necessary information regarding what resources need to access and study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Filtering for a Collaborative Learning Environment: A Multiagent Approach

    Page(s): 43 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (319 KB) |  | HTML iconHTML  

    A multiagent filtering information system is proposed in this paper. The agents improve the teaching-learning process in a computer-based learning environment by means of information filtering. The system is developed using the PASSI agent development methodology. Furthermore, the paper describes agents specification and implementations for NetClass.. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • U-Training. A Framework to Create Ubiquitous Training Portals for Higher Education Teachers

    Page(s): 49 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (260 KB) |  | HTML iconHTML  

    This project outlines some teacher training strategies using the information and communication technologies (ICTs) to contribute to sustainable higher educational training programmes and their role in the shift towards ubiquitous training environments. The Corporate E-Learning Centre (CELC), at Anahuac Mexico Sur University, has made some efforts to implement different approaches for training teachers in ICTs. The first approach consisted of training teachers in the collaborative learning strategy using the technology tools of a learning management system. The second approach consisted of personalised training in a controlled space and with specific tools for teachers courses. This second approach was concluded with the creation of a laboratory called CEIC lab, which has an ergonomic-didactic layout. The third approach is described in this project and unites the experiences and results of the previous two approaches. This third approach called u-training combines instructional design, e-commerce, marketing, ICTs, a metric control programme and a reward management programme to create a ubiquitous training portal so that teacher training can be available anywhere and anytime. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences with Virtual Environments in the EHEA

    Page(s): 54 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (254 KB) |  | HTML iconHTML  

    Recent adaptations of educational curricula to the European Higher Education Area (EHEA) enabled many education professionals to adopt new teaching methodologies into their daily practice. Although the transmission of the main theoretic and practical concepts of the subject in question must remain the main focus, the improvement of students' general skills claims for special attention not only in the EHEA but also with a view to business requirements. Besides, the mobility of teachers and students among European universities has increased notably, which is a very positive experience for both communities. In this regard, new educational alternatives have to be found for this purpose, not only to provide the possibility of studying a subject abroad, but also to improve cross-curricular capabilities. It is also a reality to be taken into account that an increasing number of students are already working in the industry while following up their studies. E-learning environments are the perfect answer to these requirements, where a varied range of activities and methodologies can be used for allowing to follow the subject virtually as well as promote general cross-curricular skills such as addressing an audience, team work and preparing documentation. In this sense this paper describes the author's experiences with e-learning environments in the situations described above, which have been carried out with positive results: students have improved their general cross- curricular skills and were able to follow the subject from outside the university campus. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • eduWEAVER: Integrated Design, Development and Deployment of eLearning Scenarios

    Page(s): 60 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (306 KB) |  | HTML iconHTML  

    The trend towards more didactics in eLearning and the increased usage of new media makes the design and development of courses increasingly complex. Only parts of the eLearning development process are supported by IT. As an effect, this may lead to a lower quality in eLearning material and courses, which in turn makes the possibility of participating in eLearning courses a rather unattractive option. In aiming to achieve a higher quality for eLearning-based courses, we introduce a conceptual model - the course creation model - that serves as a guideline for designing, realizing, and evaluating eLearning processes. This model is applied with eduWEAVER, a Web application that integrates design, development, and deployment of eLearning scenarios. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependence Maps: A Methodology for Subject Planning and Learning Assessment in Virtual Learning Environments

    Page(s): 66 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (346 KB) |  | HTML iconHTML  

    The use of virtual learning environments is more and more common as a support tool for classroom activities. In this case the objective of these environments is to provide pedagogic tools and methodologies to enhance the teaching-learning process. The main objective of this paper is to present the Dependence Map, a pedagogical tool that allows the teacher to plan a subject of study and its evaluation, based on educational aims, not on programmatic contents. Furthermore, this work presents a methodology, in which the Dependence Map is inserted, that includes the use of modern pedagogic theories. Also, the proposed methodology is being implemented in a software module under development, in order to be inserted in a VLE. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Integrated Tools for Model-Based Analysis of Service Compositions

    Page(s): 72 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (454 KB) |  | HTML iconHTML  

    Developing service compositions, using multiple standards and implementation techniques, typically involves specifying service characteristics in different languages and tools. Examples are defining service composition behaviour, in the form of the business process execution language for Web services (WS-BPEL) and a global service choreography policy, in the form of the Web service choreography description language (WS-CDL). Whilst there have been a number of model-based analysis tools reported, there is a lack of integration with development environments to support analysis of these different service artifacts. In this paper we present a short history of some of the analysis tools reported, discuss an appropriate criteria of accessible integrated development with analysis features and provide an example approach, called "service engineer" using our tools and integration work. The approach is supported by an integrated service tool-chain development environment known as the SENSORIA development environment. The aim is to provide an accessible, rigorous approach to analysing service compositions but with a simple, clearly defined interface in an integrated development environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Use of AOP and MDA in Web Service Development

    Page(s): 78 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (284 KB) |  | HTML iconHTML  

    Model-driven architecture (MDA) is introduced to shorten the software development time, produce better quality of code and promote the reuse of software artifacts. On the other hand, aspect-oriented programming (AOP) is motivated by the need to create decoupled systems, which are easier to maintain. As a result, it can be argued that adopting AOP and MDA side-by-side will provide advantages from both sets of techniques. However, adapting a new technology often entails extra cost and effort, including cost associated with training and support for the software tool. Therefore, it is crucial to evaluate the usefulness of applying such techniques. This paper presents a quantitative approach to evaluate the use of MDA and AOP in service-oriented environments. We shall start by presenting an outline of a method of implementation and maintenance of Web services, based on both MDA and AOP. Then, with the help of a case study we shall evaluate the advantages and disadvantages of applying the method, achieved by comparing two implementations of a prototype University Administration system; the first implementation is based on ad-hoc methods of Web service development, whereas the second implementation is carried out by applying MDA and AOP. We shall use various metrics to report on the maintainability, performance, percentage of generated and reused code resulting from the use of MDA and AOP. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Episodes and Workflow Integration: A Use Case in LD-CAST

    Page(s): 84 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (307 KB) |  | HTML iconHTML  

    The integration of the business and technical views allows domain experts from the business view to take control over the whole process of service delivery (including the generation of the executable workflows) to the end users. The integration approach of business and technical views presented in this paper is supported by semi-automatic generation of ontology from the modeled business episodes. This approach is evaluated and presented through the use case example from the LD-CAST project (FP6-ICT-26919). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Different Approaches to Semantic Web Service Composition

    Page(s): 90 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1310 KB) |  | HTML iconHTML  

    Semantic web service composition is about finding services from a repository that are able to accomplish a specified task if executed. The task is defined in a form of a composition request which contains a set of available input parameters and a set of wanted output parameters. Instead of the parameter values, concepts from an ontology describing their semantics are passed to the composition engine. The parameters of the services in the repository the composer works on are semantically annotated in the same way as the parameters in the request. The composer then finds a sequence of services, called a composition. If the input parameters given in the request are provided, the services of this sequence can subsequently be executed and will finally produce the wanted output parameters. In this paper, three different approaches to semantic web service composition are formally defined and compared with each other: an uninformed search in form of an IDDFS algorithm, a greedy informed search based on heuristic functions, and a multi- objective genetic algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach for Service Capabilities Representation Based on Statistical Study on WSDL

    Page(s): 97 - 102
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (568 KB) |  | HTML iconHTML  

    Web services (WS) are becoming more and more popular nowadays and service-oriented architecture (SOA) have been widely used in the construction of information systems. But most of the SOA applications are not brand new and usually evolved from legacy systems. Our research group is building a service identification framework used for the SOA reengineering of existing large-scale information applications. Service capabilities have become an important issue we care about which are the actions performed or the information delivered by a service. But the semantic description for service capabilities has not been fully addressed in the current approach. In this paper, we analyze the contributions and limitations of current approach. In order to find the practical features of existing web services, we conducted a statistical study on more than four hundred WSDL documents collected from XMethods.net, Amazon and Google. Then we propose a new approach for Semantic Web Services description. Service capabilities are represented by informative entities and standard actions are specified for each informative entity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Generation of Ruler-Based User Interfaces of Web Applications

    Page(s): 103 - 108
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (6083 KB) |  | HTML iconHTML  

    Development and maintenance of complex web interfaces containing hundreds of input fields typically causes huge development effort. Changing the layout or adding input fields to complex user interfaces are especially tedious tasks are, because these changes affect the alignment of many other interface elements. To reduce this effort, we developed a ruler guide-based approach that combines the efficiency of automatic generation of complex user interfaces from an XML-based specification with the flexibility of a manually layouted user interface. First experiences with a proof-of-concept implementation show that the effort needed for development and maintenance can be significantly reduced. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.