1,284 results on '"Ernesto Damiani"'
Search Results
1252. Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers
- Author
-
Karl Aberer, Ernesto Damiani, and Tharam S. Dillon
- Published
- 2012
- Full Text
- View/download PDF
1253. Business System Management and Engineering - From Open Issues to Applications [partially an outcome of the International Workshop on Business System Management and Engineering, BSME 2010, Malaga, Spain, June-July 2010, in conjunction with TOOLS 2010
- Author
-
Claudio A. Ardagna, Ernesto Damiani, Leszek A. Maciaszek, Michele Missikoff, and Michael Parkin
- Published
- 2012
- Full Text
- View/download PDF
1254. Proceedings of the 6th ACM Workshop On Secure Web Services, SWS 2009, Chicago, Illinois, USA, November 13, 2009
- Author
-
Ernesto Damiani, Seth Proctor, and Anoop Singhal
- Published
- 2009
1255. New Directions in Intelligent Interactive Multimedia Systems and Services, Proceedings of the 2nd International Symposium on Intelligent Interactive Multimedia Systems and Services, KES IIMSS 2009, Mogliano Veneto, Italy, July 16-17, 2009
- Author
-
Ernesto Damiani, Jechang Jeong, Robert J. Howlett, and Lakhmi C. Jain
- Published
- 2009
- Full Text
- View/download PDF
1256. Proceedings of the 5th ACM Workshop On Secure Web Services, SWS 2008, Alexandria, VA, USA, October 31, 2008
- Author
-
Ernesto Damiani and Seth Proctor
- Published
- 2008
1257. The Open Knowlege Society. A Computer Science and Information Systems Manifesto, First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedings
- Author
-
Miltiadis D. Lytras, John M. Carroll 0001, Ernesto Damiani, Robert D. Tennyson, David E. Avison, Gottfried Vossen, and Patricia Ordóñez de Pablos
- Published
- 2008
1258. Open Source Development, Communities and Quality, IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, OSS 2008, September 7-10, 2008, Milano, Italy
- Author
-
Barbara Russo, Ernesto Damiani, Scott A. Hissam, Björn Lundell, and Giancarlo Succi
- Published
- 2008
- Full Text
- View/download PDF
1259. Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007
- Author
-
Peng Ning, Ernesto Damiani, and Seth Proctor
- Published
- 2007
1260. Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006
- Author
-
Ari Juels, Ernesto Damiani, and Alban Gabillon
- Published
- 2006
1261. Proceedings of the 2nd ACM Workshop On Secure Web Services, SWS 2005, Fairfax, VA, USA, November 11, 2005
- Author
-
Ernesto Damiani and Hiroshi Maruyama
- Published
- 2005
1262. Applied Computing 2000, Proceedings of the 2000 ACM Symposium on Applied Computing, Villa Olmo, Via Cantoni 1, 22100 Como, Italy, March 19-21, 2000. Volume 1
- Author
-
Barrett R. Bryant, Janice H. Carroll, Ernesto Damiani, Hisham Haddad, and Dave Oppenheim
- Published
- 2000
- Full Text
- View/download PDF
1263. Applied Computing 2000, Proceedings of the 2000 ACM Symposium on Applied Computing, Villa Olmo, Via Cantoni 1, 22100 Como, Italy, March 19-21, 2000. Volume 2
- Author
-
Barrett R. Bryant, Janice H. Carroll, Ernesto Damiani, Hisham Haddad, and Dave Oppenheim
- Published
- 2000
- Full Text
- View/download PDF
1264. Analytic Pattern and Tool for Analysis of a Gap of Changes in Enterprise Architectures
- Author
-
Ella Roubtsova, Richard Dijkstra, Ernesto Damiani, George Spanoudakis, Leszek Maciaszek, Department Information Science and Business Processes, and RS-Research Line Innovation (part of LIRS program)
- Subjects
Gap of Changes ,Basis (linear algebra) ,Computer science ,business.industry ,Added value ,Change analysis ,Analytic Pattern ,ArchiMate Enterprise Model ,Case of Replacing Legacy System with ERP with Best of Breed ,Software engineering ,business ,Tool for Analysis of a Gap of Changes - Abstract
Change analysis of enterprise architectures is usually done by observing differences between two enterprise architectures, As-Is and To-Be. If the As-Is and To-Be have a lot of differences, it is problematic to manually create a correct view on changes. This paper proposes a revision of a definition of the Gap of Changes and defines it as a language independent analytic pattern suitable for using in tools. The paper describes a tool built on the basis of this definition. The change analysis without the tool and with the tool output has been tested in a workshop. The added value of the tool was acknowledged by the workshop participants.
- Published
- 2019
1265. JACPoL: A Simple but Expressive JSON-based Access Control Policy Language
- Author
-
Hao Jiang, Ahmed Bouabdallah, Département Systèmes Réseaux, Cybersécurité et Droit du numérique (IMT Atlantique - SRCD), IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Objets communicants pour l'Internet du futur (OCIF), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-RÉSEAUX, TÉLÉCOMMUNICATION ET SERVICES (IRISA-D2), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Gerhard P. Hancke, Ernesto Damiani, TC 11, WG 11.2, IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-CentraleSupélec-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), and Université de Rennes (UNIV-RENNES)-CentraleSupélec
- Subjects
Semantics (computer science) ,Computer science ,computer.internet_protocol ,JSON ,Access control ,02 engineering and technology ,JavaScript ,computer.software_genre ,[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL] ,real-time access control ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,fast policy evaluation ,Implementation ,computer.programming_language ,Parsing ,Syntax (programming languages) ,business.industry ,[INFO.INFO-WB]Computer Science [cs]/Web ,lightweight policy language ,Software engineering ,business ,computer ,XML - Abstract
Part 2: Security of Data; International audience; Along with the rapid development of ICT technologies, new areas like Industry 4.0, IoT and 5G have emerged and brought out the need for protecting shared resources and services under time-critical and energy-constrained scenarios with real-time policy-based access control. The process of policy evaluation under these circumstances must be executed within an unobservable delay and strictly comply with security objectives. To achieve this, the policy language needs to be very expressive but lightweight and efficient. Many existing implementations are using XML (Extensible Markup Language) to encode policies, which is verbose, inefficient to parse, and not readable by humans. On the contrary, JSON (JavaScript Object Notation) is a lightweight, text-based and language-independent data-interchange format that is simple for humans to read and write and easy for machines to parse and generate. Several attempts have emerged to convert existing XML policies and requests into JSON, however, there are very few policy specification proposals that are based on JSON with well-defined syntax and semantics. This paper investigates these challenges, and identifies a set of key requirements for a policy language to optimize the policy evaluation performance. According to these performance requirements, we introduce JACPoL, a descriptive, scalable and expressive policy language in JSON. JACPoL by design provides a flexible and fine-grained ABAC (Attribute-based Access Control), and meanwhile it can be easily tailored to express a broad range of other access control models. This paper systematically illustrates the design and implementation of JACPoL and evaluates it in comparison with other existing policy languages. The result shows that JACPoL can be as expressive as existing ones but more simple, scalable and efficient.
- Published
- 2017
1266. How TrustZone could be bypassed: Side-Channel Attacks on a modern System-on-Chip
- Author
-
Ronan Lashermes, Axel Legay, Jean-Louis Lanet, Sébanjila Kevin Bukasa, Hélène Le Bouder, Threat Analysis and Mitigation for Information Security (TAMIS), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-LANGAGE ET GÉNIE LOGICIEL (IRISA-D4), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Rennes 1 (UR1), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Threat Analysis and Mitigation for Information Security ( TAMIS ), Institut National de Recherche en Informatique et en Automatique ( Inria ) -Institut National de Recherche en Informatique et en Automatique ( Inria ) -LANGAGE ET GÉNIE LOGICIEL ( IRISA_D4 ), Institut de Recherche en Informatique et Systèmes Aléatoires ( IRISA ), Université de Rennes 1 ( UR1 ), Université de Rennes ( UNIV-RENNES ) -Université de Rennes ( UNIV-RENNES ) -Institut National des Sciences Appliquées - Rennes ( INSA Rennes ) -Université de Bretagne Sud ( UBS ) -École normale supérieure - Rennes ( ENS Rennes ) -Institut National de Recherche en Informatique et en Automatique ( Inria ) -CentraleSupélec-Centre National de la Recherche Scientifique ( CNRS ) -IMT Atlantique Bretagne-Pays de la Loire ( IMT Atlantique ) -Université de Rennes 1 ( UR1 ), Université de Rennes ( UNIV-RENNES ) -Université de Rennes ( UNIV-RENNES ) -Institut National des Sciences Appliquées - Rennes ( INSA Rennes ) -Université de Bretagne Sud ( UBS ) -École normale supérieure - Rennes ( ENS Rennes ) -Institut National de Recherche en Informatique et en Automatique ( Inria ) -CentraleSupélec-Centre National de la Recherche Scientifique ( CNRS ) -IMT Atlantique Bretagne-Pays de la Loire ( IMT Atlantique ) -Institut de Recherche en Informatique et Systèmes Aléatoires ( IRISA ), Université de Rennes ( UNIV-RENNES ) -Université de Rennes ( UNIV-RENNES ) -Institut National des Sciences Appliquées - Rennes ( INSA Rennes ) -Université de Bretagne Sud ( UBS ) -École normale supérieure - Rennes ( ENS Rennes ) -CentraleSupélec-Centre National de la Recherche Scientifique ( CNRS ) -IMT Atlantique Bretagne-Pays de la Loire ( IMT Atlantique ), Laboratoire de Haute Sécurité (LHS - Inria), Institut National de Recherche en Informatique et en Automatique (Inria)-Direction générale de l'Armement (DGA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT), Département Systèmes Réseaux, Cybersécurité et Droit du numérique (IMT Atlantique - SRCD), Confidentialité, Intégrité, Disponibilité et Répartition (CIDRE), CentraleSupélec-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Gerhard P. Hancke, Ernesto Damiani, TC 11, WG 11.2, IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-CentraleSupélec-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), and Université de Rennes (UNIV-RENNES)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique)
- Subjects
Raspberry Pi 2 ,Exploit ,business.industry ,Computer science ,[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR] ,Side-Channel Analysis (SCA) ,02 engineering and technology ,Chip ,020202 computer hardware & architecture ,Microarchitecture ,Microcontroller ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,ARM TrustZone ,020201 artificial intelligence & image processing ,System on a chip ,[INFO]Computer Science [cs] ,[INFO.INFO-ES]Computer Science [cs]/Embedded Systems ,Smart card ,Side channel attack ,[ INFO.INFO-ES ] Computer Science [cs]/Embedded Systems ,business ,Countermeasure (computer) ,ComputingMilieux_MISCELLANEOUS - Abstract
Part 3: Trusted Execution; International audience; Side-channel attacks (SCA) exploit the reification of a computation through its physical dimensions (current consumption, EM emission, ...). Focusing on Electromagnetic analyses (EMA), such analyses have mostly been considered on low-end devices: smartcards and microcontrollers. In the wake of recent works, we propose to analyze the effects of a modern microarchitecture on the efficiency of EMA (here Correlation Power Analysis and template attacks). We show that despite the difficulty to synchronize the measurements, the speed of the targeted core and the activity of other cores on the same chip can still be accommodated. Finally, we confirm that enabling the secure mode of TrustZone (a hardware-assisted software countermeasure) has no effect whatsoever on the EMA efficiency. Therefore, critical applications in TrustZone are not more secure than in the normal world with respect to EMA, in accordance with the fact that it is not a countermeasure against physical attacks. For the best of our knowledge this is the first application of EMA against TrustZone.
- Published
- 2017
1267. A Secure and Trusted Channel Protocol for UAVs Fleets
- Author
-
Amina Cherif, Serge Chaumette, Konstantinos Markantonakis, Damien Sauveron, Raja Naeem Akram, Keith Mayes, Pierre François Bonnefoi, Royal Holloway [University of London] (RHUL), XLIM (XLIM), Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS), Laboratoire de Recherche en Informatique (LARI), Université Mouloud Mammeri [Tizi Ouzou] (UMMTO), Mathématiques & Sécurité de l'information (XLIM-MATHIS), Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS), Laboratoire de Recherche en Informatique de Sidi Bel-Abbes (LabRI-SBA), École Supérieure en Informatique 8 mai 1945 [Sidi Bel Abbés] (ESI-SBA), Laboratoire Bordelais de Recherche en Informatique (LaBRI), Université de Bordeaux (UB)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Électronique, Informatique et Radiocommunications de Bordeaux (ENSEIRB), Gerhard P. Hancke, Ernesto Damiani, TC 11, and WG 11.2
- Subjects
0209 industrial biotechnology ,Computer science ,Reliability (computer networking) ,020206 networking & telecommunications ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,02 engineering and technology ,Adversary ,Computer security ,computer.software_genre ,020901 industrial engineering & automation ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,Session (computer science) ,Communications protocol ,computer ,Protocol (object-oriented programming) ,Secure channel ,Key exchange ,Communication channel - Abstract
Part 1: Security in Emerging Systems; International audience; Fleets of UAVs will be deployed in near future in reliability and safety critical applications (e.g. for smart cities). To satisfy the stringent level of criticality, each UAV in the fleet must trust the other UAVs with which it communicates to get assurance of the trustworthiness in information received and to be sure not to disclose information to an unauthorized party. In addition, to be protected against an attacker willing to eavesdrop and/or modify the exchanged data, the communication channel needs to be secured, i.e. it has to provide confidentiality and integrity of exchanges. The work presented here is based on our previous research which concluded that it is required that each UAV includes a Secure Element (which we called ARFSSD standing for Active Radio Frequency Smart Secure Device) to withstand an adversary with a high attack potential. In this paper, we propose a secure and trusted channel protocol that satisfies the stated security and operational requirements for a UAV-to-UAV communication protocol. This protocol supports three main objectives: (1) it provides the assurance that all communicating entities can trust each other and can trust their internal (secure) software and hardware states; (2) it establishes a fair key exchange process between all communicating entities so as to provide a secure channel; (3) it is efficient for both the initial start-up of the network and when resuming a session after a cold and/or warm restart of a UAV. The proposed protocol is formally verified using CasperFDR and AVISPA.
- Published
- 2017
1268. Assisting Configurations-based Feature Model Composition: Union, Intersection and Approximate Intersection
- Author
-
Carbonnel, Jessie, Huchard, Marianne, Miralles, André, Nebut, Clémentine, Models And Reuse Engineering, Languages (MAREL), Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier (LIRMM), Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS), Territoires, Environnement, Télédétection et Information Spatiale (UMR TETIS), Centre de Coopération Internationale en Recherche Agronomique pour le Développement (Cirad)-AgroParisTech-Institut national de recherche en sciences et technologies pour l'environnement et l'agriculture (IRSTEA)-Centre National de la Recherche Scientifique (CNRS), Ernesto Damiani, George Spanoudakis, Leszek Maciaszek, and Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)
- Subjects
Feature Model ,Formal Concept Analysis ,Software Product Line ,Feature Model Composition ,Feature Model Merging ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] - Abstract
International audience; Feature Models (FMs) have been introduced in the domain of software product lines to model and represent product variability. They have become a de facto standard, based on a logical tree structure accompanied by textual cross-tree constraints. Other representations are: (product) configuration sets from concrete software product lines, logical representations, constraint programming, or conceptual structures, coming from the Formal Concept Analysis (FCA) framework. Modeling variability through FMs may consist in extracting them from configuration sets (namely, doing FM synthesis), or designing them in several steps potentially involving several teams with different concerns. FM composition is useful in this design activity as it may assist FM iterative building. In this paper, we describe an approach, based on a configuration set and focusing on two main composition semantics (union, intersection), to assist designers in FM composition. We also introduce an approximate intersection notion. FCA is used to represent, for a product family, all the FMs that have the same configuration set through a canonical form. The approach is able to take into account cross-tree constraints and FMs with different feature sets and tree structure, thus it lets the expert free of choosing a different ontological interpretation. We describe the implementation of our approach and we present a set of concrete examples.
- Published
- 2017
1269. Feature Model Composition Assisted by Formal Concept Analysis
- Author
-
Clémentine Nebut, Jessie Carbonnel, Marianne Huchard, André Miralles, Models And Reuse Engineering, Languages (MAREL), Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier (LIRMM), Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS), Territoires, Environnement, Télédétection et Information Spatiale (UMR TETIS), Centre de Coopération Internationale en Recherche Agronomique pour le Développement (Cirad)-AgroParisTech-Institut national de recherche en sciences et technologies pour l'environnement et l'agriculture (IRSTEA)-Centre National de la Recherche Scientifique (CNRS), Ernesto Damiani, George Spanoudakis, Leszek A. Maciaszek, and Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)
- Subjects
Design activities ,Programming language ,business.industry ,Computer science ,Formal Concept Analysis ,Software Product Line ,020207 software engineering ,02 engineering and technology ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,computer.software_genre ,Machine learning ,Feature model ,Software ,Feature Model ,0202 electrical engineering, electronic engineering, information engineering ,Formal concept analysis ,Constraint programming ,Feature Model Composition ,020201 artificial intelligence & image processing ,Canonical form ,Artificial intelligence ,business ,Software product line ,computer ,Merge (version control) - Abstract
International audience; In the domain of software product lines, Feature Models (FM) play a central role in variability modeling, completed by configuration collections (from concrete software product lines), logical representations, constraint programming or conceptual structures, coming from the field of Formal Concept Analysis (FCA). The development of feature models may take several forms, including their synthesis from configuration collections or their design in several steps (by several teams or with different concerns). FM composition (merge) operators are part of that design activity as they assist their iterative building. In this paper, we describe an approach, based on two main merging semantics (intersection and union), which assists designers in merging several FMs. This approach benefits from the help of FCA to represent all the FMs with the same configuration set through a canonical form. We describe the implementation of our approach and present a set of concrete examples.
- Published
- 2017
1270. ADDRESSING SELFISHNESS IN THE DESIGN OF COOPERATIVE SYSTEMS
- Author
-
LENA COTA, GUIDO, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), Distribution, Recherche d'Information et Mobilité (DRIM), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon, Università degli studi (Milan, Italie). Convegno di studi (2000, Milano), Lionel Brunie, and Ernesto Damiani
- Subjects
Architecture distribuée ,[INFO.INFO-GT]Computer Science [cs]/Computer Science and Game Theory [cs.GT] ,Informatique technology ,Configuration semi-automatique ,Informatique ,Distributed systems ,Game theory ,Théorie des jeux ,Semi-Automatic configuration - Abstract
Cooperative distributed systems, particularly peer-to-peer systems, are the basis of several mainstream Internet applications (e.g., file-sharing, media streaming) and the key enablers of new and emerging technologies, including blockchain and the Internet of Things. Essential to the success of cooperative systems is that nodes are willing to cooperate with each other by sharing part of their resources, e.g., network bandwidth, CPU capability, storage space. However, as nodes are autonomous entities, they may be tempted to behave in a selfish manner by not contributing their fair share, potentially causing system performance degradation and instability. Addressing selfish nodes is, therefore, key to building efficient and reliable cooperative systems. Yet, it is a challenging task, as current techniques for analysing selfishness and designing effective countermeasures remain manual and time-consuming, requiring multi-domain expertise. In this thesis, we aim to provide practical and conceptual tools to help system designers in dealing with selfish nodes. First, based on a comprehensive survey of existing work on selfishness, we develop a classification framework to identify and understand the most important selfish behaviours to focus on when designing a cooperative system. Second, we propose RACOON, a unifying framework for the selfishness-aware design and configuration of cooperative systems. RACOON provides a semi-automatic methodology to integrate a given system with practical and finely tuned mechanisms to meet specified resilience and performance objectives, using game theory and simulations to predict the behaviour of the system when subjected to selfish nodes. An extension of the framework (RACOON++) is also proposed to improve the accuracy, flexibility, and usability of RACOON. Finally, we propose SEINE, a framework for fast modelling and evaluation of various types of selfish behaviour in a given cooperative system. SEINE relies on a domain-specific language for describing the selfishness scenario to evaluate and provides semi-automatic support for its implementation and study in a state-of-the-art simulator.; Les systèmes distribués collaboratifs, en particulier les systèmes pair-à-pair, forment l’infrastructure sous-jacente de nombreuses applications Internet, certaines parmi les plus populaires (ex : partage de fichiers, streaming multimédia). Ils se situent également à la base d’un ensemble de technologies émergentes telles que la blockchain et l’Internet des Objets. Le succès de ces systèmes repose sur la contribution volontaire, de la part des nœuds participants, aux ressources partagées (ex : bande passante réseau, puissance de calcul, stockage de données). Or ces nœuds sont des entités autonomes qui peuvent considérer comme plus avantageux de se comporter de manière égoïste, c’est-à-dire de refuser de collaborer. De tels comportements peuvent fortement impacter les performances et la stabilité opérationnelles du système cible. Prendre en compte et prévenir les comportements égoïstes des nœuds est donc essentiel pour garantir l’efficacité et la fiabilité des systèmes coopératifs. Cependant, cela exige du développeur, en dépit de la grande quantité de techniques et d’approches proposées dans la littérature, des connaissances multisectorielles approfondies. L'objectif de cette thèse est de concevoir et étudier de nouveaux outils théoriques et pratiques pour aider les concepteurs de systèmes distribués collaboratifs à faire face à des nœuds égoïstes. La première contribution, basée sur une analyse exhaustive de la littérature sur les comportements égoïstes dans les systèmes distribués, propose un modèle de classification pour identifier et analyser les comportements égoïstes les plus importants sur lesquels il est important de se concentrer lors de la conception d'un système coopératif. Dans la deuxième contribution, nous proposons RACOON, un framework pour la conception et la configuration de systèmes coopératifs résilients aux comportements égoïstes. Outre un ensemble de mécanismes d'incitation à la coopération, RACOON fournit une méthodologie semi-automatique d’intégration et de calibration de ces mécanismes de manière à garantir le niveau de performance souhaité. RACOON s’appuie sur une analyse du système cible fondée sur la théorie des jeux et sur des simulations pour prédire l’existence de nœuds égoïstes dans le système. RACOON a été étendu en un deuxième framework, RACOON++. Plus précis, plus flexible, RACOON++ offre également une plus grande facilité d'utilisation. Une dernière contribution, SEINE, propose un framework pour la modélisation et l'analyse des différents types de comportements égoïstes dans un système coopératif. Basé sur un langage dédié, développé pour décrire les scénarios de comportement égoïstes, SEINE fournit un support semi-automatique pour la mise en œuvre et l'étude de ces scénarios dans un simulateur choisi sur la base de l’état de l’art (PeerSim).
- Published
- 2017
- Full Text
- View/download PDF
1271. Clustering Geo-tagged Tweets for Advanced Big Data Analytics
- Author
-
Luca Frigerio, Gloria Bordogna, Alfredo Cuzzocrea, Giuseppe Psaila, Calton Pu, Feoffrey Fox, and Ernesto Damiani, Bordogna, Gloria, Frigerio, Luca, Cuzzocrea, Alfredo Massimiliano, and Psaila, Giuseppe
- Subjects
Information Systems and Management ,Point of interest ,Computer science ,Big data ,Information System ,02 engineering and technology ,Intelligent Systems ,World Wide Web ,Big Data Analytics ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,Cluster analysis ,Knowledge Discovery from Geo-Located Tweets ,TRACE (psycholinguistics) ,Big Data Analytic ,Information Systems ,Computer Science Applications1707 Computer Vision and Pattern Recognition ,Knowledge Discovery from Geo-Located Tweet ,business.industry ,Intelligent System ,Intelligent decision support system ,020206 networking & telecommunications ,Open data ,TRIPS architecture ,020201 artificial intelligence & image processing ,Settore ING-INF/05 - Sistemi di Elaborazione delle Informazioni ,business - Abstract
In this paper, we introduce an original approach that exploits time stamped geo-tagged messages posted by Twitter users through their smartphones when they travel to trace their trips.An original clustering technique is presented, that groups similartrips to define tours and analyze the popular tours in relation with local geo-located territorial resources. This objective is veryrelevant for emerging big data analytics tools.Tools developed to reconstruct and mine the most popular tours of tourists within a region are described which identify, track and group tourists' trips through a knowledge-based approach exploiting time stamped geo-tagged information associated with Twitter messages sent by tourists while traveling.The collected tracks are managed and shared on the Web in compliance with OGC standards so as to be able to analyze the characteristic of localities visited by the tourists by spatial overlaying with other open data, such as maps of Points Of Interest (POIs) of distinct type. The result is an novel Interoperable framework, based on web-service technology.
- Published
- 2016
1272. Surveying the Adoption of FLOSS by Public Administration Local Organizations
- Author
-
Luigi Lavazza, Sandro Morasca, Davide Tosi, Marco Chiappa, Dipartimento di Scienze e Tecnologie Avanzate (DISTA), Università degli Studi del Piemonte Orientale - Amedeo Avogadro (UPO), Consiglio Regionale della Lombardia [Milano], Ernesto Damiani, Fulvio Frati, Dirk Riehle, Anthony I. Wasserman, TC 2, and WG 2.13
- Subjects
business.industry ,media_common.quotation_subject ,FLOSS adoption ,Open source software ,Public administration ,Public relations ,Public administrations ,State (polity) ,Italy ,Key (cryptography) ,[INFO]Computer Science [cs] ,Public Administrations, FLOSS adoption, Survey, Italy ,business ,Survey ,media_common - Abstract
Part 4: Adoption, Use, and Impact; International audience; Background. The introduction of Open Source Software technologies in the Public Administration plays a key role in the spread of Open Source Software. The state of the art in the adoption of Open Source Software solutions in the Public Administration is not very well known even in areas like Lombardy, which is Italy’s largest and most developed region.Goal. The goal of the investigation documented in this paper is to obtain a clear picture about the introduction of Open Source Software technologies in the Public Administration, the obstacles to their adoption, and the willingness of stakeholders to proceed with their introduction.Method. We carried out a qualitative and quantitative survey that was submitted to a representative part of the Public Administrations in Lombardy.Results. The analysis of the qualitative and quantitative information shows that several Public Administrations are already using Open Source Software technologies, though not in all application areas. The savings are one frequently cited incentive to the adoption of Open Source Software. However, one obstacle is the fact that a comprehensive law on software in the Public Administration has not yet been approved.Conclusions. Our analysis provides results that indicate a common understanding of incentives, obstacles, and opportunities for Open Source Software technologies in Public Administrations.
- Published
- 2015
1273. A multimedia summarizer integrating text and images
- Author
-
Vincenzo Moscato, Fabio Persia, Antonio Penta, Giancarlo Sperlì, Carlo Sansone, Francesco Gargiulo, Antonio d'Acierno, Antonio Picariello, Ernesto Damiani, Robert J. Howlett, Lakhmi C. Jain, Luigi Gallo, Giuseppe De Pietro, D’Acierno, Antonio, Gargiulo, Francesco, Moscato, Vincenzo, Penta, Antonio, Persia, Fabio, Picariello, Antonio, Sansone, Carlo, and Sperli', Giancarlo
- Subjects
Information retrieval ,Information extraction ,Multimedia ,Web summarization ,Computer science ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,Centroid ,Verb ,computer.file_format ,computer.software_genre ,Semantic similarity ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Leverage (statistics) ,RDF ,Unsupervised clustering ,Relevant information ,computer - Abstract
We present a multimedia summarizer system for retrieving relevant information from some web repositories based on the extraction of semantic descriptors of documents. In particular, semantics attached to each document textual sentences is expressed as a set of assertions in the \(\langle subject,verb,object \rangle \) shape as in the RDF data model. While, images’ semantics is captured using a set of keywords derived from high level information such as the related title, description and tags. We leverage an unsupervised clustering algorithm exploiting the notion of semantic similarity and use the centroids of clusters to determine the most significant summary sentences. At the same time, several images are attached to each cluster on the base of keywords’ term frequency. Finally, several experiments are presented and discussed.
- Published
- 2015
1274. Smart Route Planning Using Open Data and Participatory Sensing
- Author
-
Vivek Nallur, Amal Elgammal, Siobhán Clarke, Trinity College Dublin, Ernesto Damiani, Fulvio Frati, Dirk Riehle, Anthony I. Wasserman, TC 2, and WG 2.13
- Subjects
Open-source ,Engineering ,Participatory sensing ,business.industry ,Open-data ,Computer security ,computer.software_genre ,Open data ,Open source ,ComputerSystemsOrganization_MISCELLANEOUS ,Key (cryptography) ,Smart-city-routing ,[INFO]Computer Science [cs] ,Routing (electronic design automation) ,Route planning ,business ,computer ,Urban environment - Abstract
Part 3: Examples and Case Studies; International audience; Smart cities are not merely the infusion of technology into a city’s infrastructure, but also require citizens interacting with their urban environment in a smart and informed manner. Transportation is key aspect of smart cities. In this paper, we present a smart route planning open-source system; SMART-GH utilizes open data and participatory sensing, where citizens actively participate in collecting data about the city in their daily environment, e.g., noise, air pollution, etc. SMART-GH then augments the routing logic with sensor data to answer queries such as ‘return the least noisy route’. SMART-GH enables citizens to make smarter decisions about their daily commute, and subsequently improve their quality of life.
- Published
- 2015
1275. Open Source Software Ecosystems: Towards a Modelling Framework
- Author
-
Oscar Franco-Bedoya, Universitat Politècnica de Catalunya [Barcelona] (UPC), Universidad de Caldas [Manizales, Colombia], Ernesto Damiani, Fulvio Frati, Dirk Riehle, Anthony I. Wasserman, TC 2, WG 2.13, Universitat Politècnica de Catalunya. Departament de Ciències de la Computació, and Universitat Politècnica de Catalunya. inSSIDE - integrated Software, Service, Information and Data Engineering
- Subjects
Social software engineering ,Programari lliure ,Computer science ,business.industry ,Informàtica::Sistemes d'informació [Àrees temàtiques de la UPC] ,Software ecosystem ,Framework ,Modeling ,Software development ,Context (language use) ,Open source software ,computer.software_genre ,ComputingMilieux_GENERAL ,Software framework ,Software construction ,Software design ,[INFO]Computer Science [cs] ,business ,Software engineering ,Software analysis pattern ,computer ,ComputingMilieux_MISCELLANEOUS - Abstract
Part 6: OSS 2015 Ph.D. Contest; International audience; Open source software ecosystem modelling has emerged as an important research area in software engineering. Several models have been proposed to identify and analyse the complex relationships in OSS-ecosystems. However, there is a lack of formal models, methodologies, tool support, and standard notations for OSS-ecosystems. In this paper we propose a general framework for support the OSS-ecosystems modelling process. This framework will allow the representation, synthesis, analysis, evaluation, and evolution of OSS-ecosystems. Design science methodology is proposed to create several artefacts and investigating the suitability of these artefacts in the OSS-ecosystem context.
- Published
- 2015
1276. The RISCOSS platform for risk management in open source software adoption
- Author
-
Maria Carmela Annosi, O. H. Franco, Alberto Siena, Ron Ben-Jacob, Xavier Franch, Yehuda Blumenfeld, Angelo Susi, David Ameller, Ron S. Kenett, Marc Oriol, Lidia López, Fabio Mancinelli, Daniel Gross, Mirko Morandini, Universitat Politècnica de Catalunya. Departament d'Enginyeria de Serveis i Sistemes d'Informació, Universitat Politècnica de Catalunya. Departament de Ciències de la Computació, Universitat Politècnica de Catalunya. inSSIDE - integrated Software, Service, Information and Data Engineering, Universitat Politècnica de Catalunya [Barcelona] (UPC), KPA [Israel], XWiki SAS [Paris, France], Fondazione Bruno Kessler [Trento, Italy] (FBK), Ericsson Italy [Roma], Ernesto Damiani, Fulvio Frati, Dirk Riehle, Anthony I. Wasserman, TC 2, and WG 2.13
- Subjects
Engineering ,Process management ,Open platform ,OSS ,Software platform ,Programari lliure ,business.industry ,Informàtica::Enginyeria del software [Àrees temàtiques de la UPC] ,Open source software ,Open source adoption ,Continuous assessment ,Personalization ,Data model ,Risk management ,Sustainability ,[INFO]Computer Science [cs] ,Architecture ,Open source projects ,business ,Software engineering ,Open source project - Abstract
Part 4: Adoption, Use, and Impact; International audience; Managing risks related to OSS adoption is a must for organizations that need to smoothly integrate OSS-related practices in their development processes. Adequate tool support may pave the road to effective risk management and ensure the sustainability of such activity. In this paper, we present the RISCOSS platform for managing risks in OSS adoption. RISCOSS builds upon a highly configurable data model that allows customization to several types of scopes. It implements two different working modes: exploration, where the impact of decisions may be assessed before making them; and continuous assessment, where risk variables (and their possible consequences on business goals) are continuously monitored and reported to decision-makers. The blackboard-oriented architecture of the platform defines several interfaces for the identified techniques, allowing new techniques to be plugged in.
- Published
- 2015
1277. Metaheuristic based peer rewiring for semantic overlay networks
- Author
-
Yang, Yulian, Laboratoire d'InfoRmatique en Image et Systèmes d'information ( LIRIS ), Université Lumière - Lyon 2 ( UL2 ) -École Centrale de Lyon ( ECL ), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 ( UCBL ), Université de Lyon-Centre National de la Recherche Scientifique ( CNRS ) -Institut National des Sciences Appliquées de Lyon ( INSA Lyon ), Université de Lyon-Institut National des Sciences Appliquées ( INSA ) -Institut National des Sciences Appliquées ( INSA ), INSA de Lyon, Sylvie Calabretto, Ernesto Damiani, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), Università degli studi (Milan, Italie), and STAR, ABES
- Subjects
[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Reseau pair à pair ,[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Peer rewiring ,Recablage des pairs ,Local search ,Recuit simulé ,Informatique ,Simulated annealing ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Peer-To-Peer networks ,Reseau logique sématique ,Information retrieval ,Recherche d'informations ,Semantic overlay network ,Information Technology ,Recherche locale - Abstract
A Peer-to-Peer (P2P) platform is considered for collaborative Information Retrieval (IR). Each peer hosts a collection of text documents with subjects related to its owner's interests. Without a global indexing mechanism, peers locally index their documents, and provide the service to answer queries. A decentralized protocol is designed, enabling the peers to collaboratively forward queries from the initiator to the peers with relevant documents. Semantic Overlay Network (SONs) is one the state of the art solutions, where peers with semantically similar resources are clustered. IR is efficiently performed by forwarding queries to the relevant peer clusters in an informed way. SONs are built and maintained mainly via peer rewiring. Specifically, each peer periodically sends walkers to its neighborhood. The walkers walk along peer connections, aiming at discovering more similar peers to replace less similar neighbors of its initiator. The P2P network then gradually evolves from a random overlay network to a SON. Random and greedy walk can be applied individually or integrated in peer rewiring as a constant strategy during the progress of network evolution. However, the evolution of the network topology may affect their performance. For example, when peers are randomly connected with each other, random walk performs better than greedy walk for exploring similar peers. But as peer clusters gradually emerge in the network, a walker can explore more similar peers by following a greedy strategy. This thesis proposes an evolving walking strategy based on Simulated Annealing (SA), which evolves from a random walk to a greedy walk along the progress of network evolution. According to the simulation results, SA-based strategy outperforms current approaches, both in the efficiency to build a SON and the effectiveness of the subsequent IR. This thesis contains several advancements with respect to the state of the art in this field. First of all, we identify a generic peer rewiring pattern and formalize it as a three-step procedure. Our technique provides a consistent framework for peer rewiring, while allowing enough flexibility for the users/designers to specify its properties. Secondly, we formalize SON construction as a combinatorial optimization problem, with peer rewiring as its decentralized local search solution. Based on this model, we propose a novel SA-based approach to peer rewiring. Our approach is validated via an extensive experimental study on the effect of network wiring on (1) SON building and (2) IR in SONs., Nous considérons une plate-forme pair-à-pair pour la Recherche d'Information (RI) collaborative. Chaque pair héberge une collection de documents textuels qui traitent de ses sujets d'intérêt. En l'absence d'un mécanisme d'indexation global, les pairs indexent localement leurs documents et s'associent pour fournir un service distribué de réponse à des requêtes. Notre objectif est de concevoir un protocole décentralisé qui permette aux pairs de collaborer afin de transmettre une requête depuis son émetteur jusqu'aux pairs en possession de documents pertinents. Les réseaux logiques sémantiques (Semantic Overlay Networks, SON) représentent la solution de référence de l'état de l'art. Les pairs qui possèdent des ressources sémantiques similaires sont regroupés en clusters. Les opérations de RI seront alors efficaces puisqu'une requête sera transmise aux clusters de pairs qui hébergent les ressources pertinentes. La plupart des approches actuelles consistent en une reconfiguration dynamique du réseau de pairs (peer rewiring). Pour ce faire, chaque pair exécute périodiquement un algorithme de marche aléatoire ou gloutonne sur le réseau pair-à-pair afin de renouveler les pairs de son cluster. Ainsi, un réseau à la structure initialement aléatoire évolue progressivement vers un réseau logique sémantique. Jusqu'à présent, les approches existantes n'ont pas considéré que l'évolution de la topologie du réseau puisse influer sur les performances de l'algorithme de reconfiguration dynamique du réseau. Cependant, s'il est vrai que, pour une configuration initiale aléatoire des pairs, une marche aléatoire sera efficace pour découvrir les pairs similaires, lorsque des clusters commencent à émerger une approche gloutonne devient alors mieux adaptée. Ainsi, nous proposons une stratégie qui applique un algorithme de recuit simulé (Simulated Annealing, SA) afin de faire évoluer une stratégie de marche aléatoire vers une stratégie gloutonne lors de la construction du SON. Cette thèse contient plusieurs avancées concernant l'état de l'art dans ce domaine. D'abbord, nous modélisions formellement la reconfiguration dynamique d'un réseau en un SON. Nous identifions un schéma générique pour la reconfiguration d'un réseau pair-à-pair, et après le formalisons en une procédure constituée de trois étapes. Ce framework cohérent offre à ses utilisateurs de quoi le paramétrer. Ensuite, le problème de la construction d'un SON est modélisé sous la forme d'un problème d'optimisation combinatoire pour lequel les opérations de reconfiguration du réseau correspondent à la recherche décentralisée d'une solution locale. Fondée sur ce modèle, une solution concrète à base de recuit simulé est proposée. Nous menons une étude expérimentale poussée sur la construction du SON et la RI sur SONs, et validions notre approche.
- Published
- 2014
1278. Towards Evaluating an Ontology-Based Data Matching Strategy for Retrieval and Recommendation of Security Annotations for Business Process Models
- Author
-
Ioana Ciuciu, Robert Meersman, Yan Tang, Vrije Universiteit Brussel (VUB), Karl Aberer, Ernesto Damiani, Tharam Dillon, WG 2.6, TC 2, and WG 2.12
- Subjects
Matching (statistics) ,Computer science ,Process ontology ,02 engineering and technology ,Ontology (information science) ,Security policy ,semantic annotation ,business process model design ,03 medical and health sciences ,security policy ,ontology-based data matching ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Knowledge retrieval ,[INFO]Computer Science [cs] ,ontology ,030304 developmental biology ,0303 health sciences ,Information retrieval ,business.industry ,Ontology-based data integration ,knowledge retrieval ,Business process modeling ,Knowledge base ,security constraints ,business ,evaluation methodology - Abstract
International audience; In the Trusted Architecture for Securely Shared Services (TAS3) EC FP7 project we have developed a method to provide semantic support to the process modeler during the design of secure business process models. Its supporting tool, called Knowledge Annotator (KA), is using ontology-based data matching algorithms and strategy in order to infer the recommendations the best fitted to the user design intent, from a dedicated knowledge base. The paper illustrates how the strategy is used to perform the similarity (matching) check in order to retrieve the best design recommendation. We select the security and privacy domain for trust policy specification for the concept illustration. Finally, the paper discusses the evaluation of the results using the Ontology-based Data Matching Framework evaluation benchmark.
- Published
- 2011
1279. MailOfMine – Analyzing Mail Messages for Mining Artful Collaborative Processes
- Author
-
Monica Scannapieco, Massimo Mecella, Diego Zardetto, Tiziana Catarci, Claudio Di Ciccio, Università degli Studi di Roma 'La Sapienza' = Sapienza University [Rome], Istituto Nazionale di Statistica (ISTAT), ISTAT, Karl Aberer, Ernesto Damiani, Tharam Dillon, WG 2.12, TC 2, and WG 2.6
- Subjects
Computer science ,process mining ,Process mining ,Object matching ,02 engineering and technology ,Data science ,knowledge workers ,Set (abstract data type) ,email analysis ,visual representation of processes ,object matching ,declarative workflows ,artful processes ,Workflow ,Work (electrical) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,[INFO]Computer Science [cs] - Abstract
International audience; Artful processes are informal processes typically carried out by those people whose work is mental rather than physical (managers, professors, researchers, engineers, etc.), the so called “knowledge workers”. In this paper we propose the MailOfMine approach, to automatically build, on top of a collection of email messages, a set of workflow models that represent the artful processes laying behind the knowledge workers activities.
- Published
- 2011
1280. Supporting and Promoting Tourism Network Systems through ICT Applications
- Author
-
Laura Schina, Valentina Ndou, Marco De Maggio, Miltiadis Lytras, Patricia Ordóñez de Pablos, Ernesto Damiani, Lily Diaz, Ndou, Valentina, Laura, Schina, and Marco De, Maggio
- Subjects
Commerce ,Information and Communications Technology ,Business ,Tourism ,Industrial organization - Abstract
Furthermore, the authors, hope that from the assumptions and the insights of the studies reported will follow a high spread of the concept of DMSs considered as a significant contribution for developing strong innovative patterns of collaboration in Tourism Industry.
- Published
- 2011
1281. New Approaches for Managing Tourism Complexity: Implications and Insights
- Author
-
Valentina Ndou, Lytras, Miltiadis, Patricia Ordóñez de Pablos, Ernesto Damiani and Lily Diaz, and Ndou, Valentina
- Subjects
Knowledge management ,Geography ,business.industry ,business ,Tourism - Abstract
This chapter’s main objective is to provide a new conceptualization of the tourism which has major implications for management approaches, business models and strategy techniques of the sector. The objective is to try to reconcile the complexity of the environment with the managerial techniques and strategies that aim to create sustainable competitive advantage. The author will begin with a review of tourism characteristics of supply and demand side. Then they will analyze the paradigm shifts that are taking place overall in the new economy and the main challenges they bring on in the tourism context. Subsequently, they will discuss the need to realize a shift in tourism conceptualization and management in itself. The author will move their focus of analysis away from traditional, mechanical views of tourism to dynamic approaches that take into account the behavior of the overall system and help identify key leverage points of change and transformation.
- Published
- 2011
1282. An Integrated Model to Monitor and Evaluate Web 2.0 Project-based Learning
- Author
-
Giustina Secundo, Giuseppina Passiante, Francesca Grippa, Miltiadis D. Lytras Ernesto Damiani, Secundo, Giustina, Grippa, Francesca, Passiante, Giuseppina, Lytras, Miltiadis D. (ed.) et al., and M.D. Lytras et al.
- Subjects
Cooperative learning ,Knowledge management ,business.industry ,Computer science ,Educational technology ,knowledge creation ,Open learning ,social computing environment ,Web 2.0 tool ,Project-based learning ,learning monitoring and evaluation ,Synchronous learning ,Blended learning ,World Wide Web ,Professional learning community ,project-based learning ,Active learning ,business - Abstract
This paper presents an integrated model to monitor and evaluate web 2.0 project-based learning through its application in a real higher education environment. Creating communities in the classroom has been the traditional method of engaging students. The web 2.0 technologies are changing the way learning communities interact. We designed a Social Computing Environment to support a community of students coming from Morocco, Tunisia, Egypt and Jordan involved in an International Master’s Program. This study suggests that Web 2.0 tools can be integrated in a model to assess learning effectiveness in terms of Learners’ Satisfaction, Knowledge Creation and Learning Performance. Preliminary results suggest that the Social Computing Environment helped students to better collaborate with peers, tutors and company’s supervisors, and also provided an environment where the learning assessment phase could be much easier to perform.
- Published
- 2009
1283. Developing e-business capabilities to bridge the knowledge divide in Mediterranean countries
- Author
-
Gianluca Elia, Giuseppina Passiante, Giustina Secundo, Alessandro Margherita, Miltiadis D. Lytras, Patricia Ordonez de Pablos, Ernesto Damiani, David Avison, Ambjörn Naeve, David G. Horner, Secundo, Giustina, Elia, Gianluca, Margherita, Alessandro, and Passiante, Giuseppina
- Subjects
Knowledge management ,Organizational innovation ,Electronic business ,business.industry ,Bridge (interpersonal) ,Knowledge divide ,learning laboratory ,Mediterranean countries ,Structural capital ,digital divide ,E-business capabilitie ,learning in action ,business ,Digital divide ,Set (psychology) - Abstract
This paper presents the results achieved in terms of e-business capabilities developed in an International Master framed within an Euro-Medi-terranean cooperation. In particular, an e-Business Design Laboratory is here described which has been set up for designing and implementing innovative solutions to bring digital and organizational innovation in traditional and new industries. The most significant highlights of the last two editions of the Master are also reported in terms of the human, social and structural capital being generated.
- Published
- 2009
1284. Personalized Information Retrieval in a Semantic-based Learning Environment
- Author
-
Antonella Carbonaro, Rodolfo Ferrini, DION H. GOH AND SCHUBERT FOO, A. Carbonaro, R. Ferrini, and ANTONIO ZILLI ERNESTO DAMIANI PAOLO CERAVOLO ANGELO CORALLO GIANLUCA ELIA
- Subjects
personalized learning environment ,concept extraction ,Information retrieval ,Content analysis ,Computer science ,Human–computer information retrieval ,Learning environment ,Active learning ,Semantic Web ,Distance learning system ,Personalized learning environment - Abstract
Active learning is the ability of learners to carry out learning activities in such a way that they will be able to effectively and efficiently construct knowledge from information sources. Personalized and customizable access on digital materials collected from the Web according to one’s own personal requirements and interests is an example of active learning. Moreover, it is also necessary to provide techniques to locate suitable materials. In this chapter, we introduce a personalized learning environment providing intelligent support to achieve the expectations of active learning. The system exploits collaborative and semantic approaches to extract concepts from documents, and maintaining user and resources profiles based on domain ontologies. In such a way, the retrieval phase takes advantage of the common knowledge base used to extract useful knowledge and produces personalized views of the learning system.
- Published
- 2008
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.