Software and Data Technolgoies - Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008

von: José Cordeiro, Boris Shishkov, Alpesh Kumar Ranchordas, Markus Helfert (Eds.)

Springer-Verlag, 2009

ISBN: 9783642052019 , 242 Seiten

Format: PDF, OL

Kopierschutz: Wasserzeichen

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Online-Lesen für: Windows PC,Mac OSX,Linux

Preis: 59,92 EUR

Mehr zum Inhalt

Software and Data Technolgoies - Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008


 

Preface

5

Organization

6

Table of Contents

10

Invited Speakers

10

User Defined Geo-referenced Information

12

Introduction

12

Hovering Information

13

Overview of the Hovering Information Concept

14

Analysis of the Hovering Information Concept

15

End-to-End QoS-Predictions’ Information Service

16

Basic Assumptions

17

Overview of the Concept and Service

17

Conclusions

18

References

19

Part I: Programming Languages

10

Extending the SSCLI to Support Dynamic Inheritance

20

Introduction

20

Background

22

Type Systems of Dynamically Typed Languages

22

Runtime Performance of Dynamically Typed Languages

22

Structural Reflection

23

$\Large{\textrevscr}{\small\textsc{Rotor}}$

23

The Object Model of $\Large{\textrevscr}{\small\textsc{Rotor}}$

24

Dynamic Inheritance

25

Design

25

Class-Based Model

26

Prototype-BasedModel

28

Implementation

29

The $setSuper$ Primitive Interface

29

Instance Manipulation

30

Class Manipulation

30

Current State of the Implementation

31

Conclusions

31

References

32

Scala Roles: Reusable Object Collaborations in a Library

34

Introduction

34

Objects and Roles

36

Compound Objects with Dynamic Proxies

37

Object Identity

39

Collaborations with Nested Types

40

Scala Roles in Action

41

Persons and Their Roles

42

Composite Design Pattern

43

Related Work

45

Conclusions

45

References

46

Part II: Software Engineering

10

Common Criteria Based Security Scenario Verification

48

Introduction

48

Scenario Language

49

Outline

49

Scenario Example

50

Verification of Scenarios

51

Rule

51

Evaluation

53

Rule Based on Common Criteria

54

Discussion

56

Related Works

56

Conclusions

57

References

57

A Software Infrastructure for User–Guided Quality–of–Service Tradeoffs

59

Introduction

59

Architectural Baseline

61

Quality–of–Service Tradeoffs

63

Evaluation of Usability

65

Coordinating Resource Usage

67

Evaluation

68

Adaptive Applications

69

Evaluation

69

Related Work

70

Conclusions

71

References

71

On the Multiplicity Semantics of the Extend Relationship in Use Case Models

73

Introduction

73

The Evolution of the Extend Relationship

74

The Interpretation of the Extension Point Concept

77

Discussion

81

Related Work

83

Conclusions and Future Work

84

References

85

Secure Mobile Phone Access to Remote Personal Computers: A Case Study

87

Introduction

87

Background

88

Security Issues

89

Proposed Security Model

90

Improving the Design

91

Implementation

93

Discussion

94

User Study

95

Related Work

97

Conclusions

98

References

99

Part III: Distributed and Parallel Systems

10

Understanding and Evaluating Replication in Service Oriented Multi-tier Architectures

102

Introduction

102

Replication in SOA

103

Basic Architecture

103

Replication

104

Replication Strategies

105

Categorization

105

Example Algorithm

108

Simulation

109

Simulation Architecture

109

Execution

111

Parameters

112

Selected Results

113

Related Work

114

Conclusions

114

References

115

Applying Optimal Stopping for Optimizing Queries to External Semantic Web Resources

116

Introduction

116

Performance and Scalability

117

The Search Test Stop Model

119

Preconditions

120

The Discrete Search Test Stop Model

120

Method

121

Cost Functions

121

Utility Distributions

121

Application

122

Evaluation

124

Performance

125

Web Services

126

Outlook and Conclusions

128

References

128

An Efficient Pipelined Parallel Join Algorithm on Heterogeneous Distributed Architectures

130

Introduction

130

Limitations of Parallel Execution Strategies in Multi-join Queries

131

Sequential Parallel Execution

132

Parallel Synchronous Execution

132

Segmented Right-Deep Execution

133

Full Parallel Execution

134

Parallelism in Multi-join Queries Using PDFA-Join Algorithm

134

Detailed Algorithm

135

Discussion

141

Conclusions

143

References

143

Part IV: Information Systems and Data Management

11

Declarative Business Process Modelling and the Generation of ERP Systems

145

Introduction

145

An Introduction to REA

147

An Object-Z Model

148

The REA Meta-model

148

The Runtime Model

150

A Domain Specific Language

151

Language Implementation

153

Automated Generation of Applications

154

Summary

156

References

157

Single Vector Large Data Cardinality Structure to Handle Compressed Database in a Distributed Environment

158

Introduction

158

Related Work

159

Existing HIBASE Compression Technique

160

Proposed Single Vector Large Data Cardinality (SVLDCS) Structure

161

Searching Technique

164

Explanation of the Searching Technique of (SVLDCS) Structure

165

Searching Time Analysis of SVLDC Structure

166

The Analysis of Storage Capacity of SVLDC Structure

166

Analytical Analysis of Storage Capacity Using Different Methods

167

Conclusions

169

References

170

Relaxed Approaches for Correct DB-Replication with SI Replicas

172

Introduction

172

Multiversion Histories

174

Generalized Snapshot Isolation

175

The Deferred Update Technique

177

1–Copy–GSI Schedules

180

Relaxing Assumptions

181

Conclusions

184

References

185

Measuring the Usability of Augmented Reality e-Learning Systems: A User–Centered Evaluation Approach

186

Introduction

186

Related Work

187

Evaluation Method and Procedure

189

Equipment

189

Participants and Tasks

190

Method and Procedure

190

Evaluation Results and Comparison

191

Answers to the Questionnaire

191

Most Mentioned Positive and Negative Aspects

192

Measures of Effectiveness and Efficiency

194

Conclusions and Future Work

195

References

196

Supporting the Process Assessment through a Flexible Software Environment

198

Introduction

198

State of the Art

199

EvalTOOL

201

Process Model Management

203

Application and Evaluation Model

203

EvalTOOL Application Example

205

EvalTOOL as Support to COMPETISOFT

207

Conclusions and Future Work

209

References

210

Part V: Knowledge Engineering

11

Increasing Data Set Incompleteness May Improve Rule Set Quality

211

Introduction

211

Blocks of Attribute-Value Pairs

213

Definability

215

Lower and Upper Approximations

215

LERS and LEM2

218

LEM2

218

LERS Classification System

219

Experiments

220

Conclusions

225

References

226

Anomaly Detection Using Behavioral Approaches

228

Introduction

228

Behavioral Approaches for Intrusion Detection

229

Why Standard Classification Rules Are Ineffective for Detecting Novel Attacks

230

Enhancing Bayesian Classification for Anomaly Detection

231

Using Zero Probabilities as Abnormal Evidence

232

Using Likelihood of Rare Attacks as Abnormal Evidence

233

Enhancing Decision Trees for Anomaly Detection

234

Decision Tree Classifiers

234

Decision Tree Adaptations for Anomaly Detection

234

Experimental Studies

237

Training and Testing Data Sets

237

Experiments on Standard/Enhanced Bayesian Classification Rule

238

Conclusions

239

References

240

Author Index

242