TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse

Size: px
Start display at page:

Download "TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse"

Transcription

1 TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse Junfeng Zhao 1, 2, Bing Xie 1,2, Yasha Wang 1,2, Yongjun XU 3 1 Key Laboratory of High Confidence Software Technologies, Ministry of Education, Beijing , China 2 School of Electronics Engineering and Computer Science, Peking University, China 3 Digital China Limited {zhaojf, xiebing, wangys}@sei.pku.edu.cn, xuyja@digitalchina.com Abstract Software reuse is a key technology to improve software quality and software productivity. Software resource repositories, which provide the management mechanism for software resources, are one of the infrastructures of software reuse. The existence of abundant software resources in software resource repositories provides possibility for successful software reuse. In the mean time, assuring the quality of software resources is a critical point to keep the confidence of users to reuse software resources. In this paper we present TSRR, a software resource management system that provide not only effective software resource management but also a software resource search engine on the Internet and trustworthiness management for software resources. The search engine makes TSRR acquire different types of software resources and organize these resources for better retrieval. The trustworthiness management, which includes evidence gathering, evidence trust management and trustworthiness evaluation, provides a mechanism for users to use trustworthy resources. The case study shows that TSRR can effectively help user to select software resources. 1. Introduction Software reuse is a key technology to improve software quality and software productivity. Software resource repositories, which provide the management mechanism of software resources, are one of the infrastructures of software reuse. A software resource is, broadly speaking, any cohesive collection of artifacts that solve a specific problem or set of problems encountered in the software development lifecycle. It may be any work-products from the software development lifecycle or software related activities, such as components, patterns, tools, Web Services, frameworks, solutions, documents, test cases or scripts, and so on. The existence of abundant software resources in software repositories is a key factor for successful software reuse. Currently, user submission is the main way to enrich a software resource repository. However, some users may be reluctant to submit software resources, and therefore user submission may not be a reliable way for a software resource repository to get abundant resources. So a more convenient and automatic way to collect software resources on the Internet is needed. On the other hand, existing software resource repositories lacks mechanisms of guaranteeing the quality of software resources they provide. This will impact the confidence of users to reuse software resources. Hence, it becomes important for software resource repositories to find a way to assure users that the provided software resources are trustworthy. To address these two problems and provide developers a more convenient and trustable platform for resource reuse, based on the Trustie (Trust integrated environment) platform, we have developed the Trustie Software Resource Repository (abbreviated as TSRR). TSRR provides a mechanism to describe, collect, evaluate, classify and manage trustworthiness of software resources, to support trustworthy software development. It cannot only support software reuse process but also provide a resource sharing platform among projects. In order to enrich resources in TSRR, we developed a software resource search engine on the Internet. In addition, TSRR provide mechanisms to manage trustworthy software resources and manage their evaluation information. Thus it can make developers and endusers to make full use of software resources to build their own applications with good quality. TSRR is an open system to support the whole process of software development using existing software resources. It provides web service APIs, which can support SOAbased application. The implementation of TSRR is based on JO 2 nas[1] and MySQL[2 ], so it makes TSRR an open repository to support software reuse. Moreover TSRR provides an Eclipse plug-in, which

2 can integrate with software development environment to support better software reuse and sharing. 2. Related work Besides our TSRR, there are other software resource repositories like REBOOT [3], Agora [4], CodeBroker [5], OSOR.EU [6], SourceForge.Net [7], Component-Source [8], and Download.com [9]. REBOOT (Reuse Based on Object Oriented Techniques) is a famous repository in 90 s. It aims to push the research and development of software reuse. It is comprised by a library to store components and a series of tools to support component publishing, retrieval, classification, selection and evaluation. Agora is a component search engine developed by CMU. It is designed for searching components (like JavaBeans, ActiveX, CORBA etc.) on the Internet. CodeBroker is a repository prototype to realize seamless integration between a repository and a code editing tool, and thus it can provide active inquire services. CodeBroker mainly stores Java classes to support Java related software development. The OSOR.EU project has implemented a repository and a collaborative development environment. It aims to provide a library where software, documentation and knowledge can be easily accessible according to a specific taxonomy. Component-Source, SourceForge.Net and Download.com are all commercial software resource repositories that provide business component trading through their web sites. Although all of these software resource repositories address the problem of the management of software resource, only TSRR supports the management of trustworthiness for software resources. Moreover it provides a software resource search engine on the Internet, which can make TSRR abound with different types of software resources. 3. The Framework of TSRR TSRR aims to provide a software resource management mechanism and a software resources sharing environment. It provides the following functionalities: Software resources acquisition, organization and management on the Internet. Mechanisms to describe, collect, evaluate, classify and manage software resources trustworthiness, to support trust software development. A platform and a series of APIs to support software reuse especially support SOA-based software development. Fig. 1 depicts the framework of TSRR. It has three layers: the storage layer, the function layer and the interface layer. The bottom layer is the storage layer to store information of software resources including code, services, software tools etc. It provides a series of storage security mechanisms, such as backup, recover, access control etc. The storage layer also stores the information of all kinds of evidence to evaluate the trustworthiness of software resources. The evidence can be submitted by users or some tools, such as source code analysis tools and Web Service QoS (Quality of Service) acquiring tools. Fig. 1. The framework of TSRR The middle layer is the function layer to provide the management for trustworthy software resources. The Internet software resource search engine is for a wide range search of different types of software resources and related information. Part of the results can be published to the TSRR as a software resource, the others that have a close relationship with the resources, such as documents, feedbacks etc., can be saved as evidence for trustworthiness evaluation. The publishing mechanism provides the function for publishing resource descriptions, trust evidence, resource entities etc. In order to improve retrieval accuracy, the classification module is for publishers to describe the resource accurately using keyword classification, facet classification, enumeration classification and other classification methods. The software resource retrieval mechanism

3 provides different ways to find software resources that meet user requirements. For example, it can support users to search resources using different trustworthiness criteria. The user management module is to manage all the information about users including access control information. The trustworthiness evaluation for software resources aims to give an assessment of whether the resource is trustworthy enough for users to use according to the evidence submitted by users or collected at run-time (such as Web Service QoS). The results of trustworthiness evaluation help users to select appropriate software resources. The interface layer provides different access interfaces for users to publish, retrieve, classify, evaluate and manage software resources. User cannot only access the repository via the web but also through Web Service APIs. Thus the repository can be integrated with other software development tools or platforms. 4. TSRR TSRR provides a management mechanism to support different software recourses, such as source code, web services and documents. Furthermore, it provides a software resource search engine on the Internet and trustworthy software resource management to improve the quantity and the quality of the software resources in TSRR. We present them separately in the following subsections. 4.1 Software resource search engine on the Internet In order to provide a large number of software resources for developers, we developed a software resource search engine to collect software resources. Currently, there are a great number of software resources available on the Internet. However, these resources are not well organized and managed, which makes developers spend a lot of time to acquire their desired resources. The software resource search engine can harvest, organize software resources on the Internet and make them well organized for retrieval. The framework of the software resource search engine is depicted in Fig. 2. In the resource harvesting phase, we proposed a resources harvesting mechanism which relies on both the web search engine as well as spiders that concentrate on specific sites. Based on this mechanism, many resources and related information can be obtained. We define a series of file formats to clean the redundant information. In addition to this, we build a feedback module to collect user information that could help us to extract useful information. Relied on the information obtained, we build an extensible model to describe both the resources and the related information. This model can be extended based on different scenarios. Fig2. The framework of the software resource search engine In the resource organization phase, we use a group of algorithms that can identify association relationships among different kinds of information, including the example code recommending algorithm, the similar resource discovery algorithm, the algorithm that links the resources with their developers, and the algorithm that discovers similar texts etc. we provide retrieval support to consider result ranking and to improve the precision and the recall. The example code recommending algorithm extracts related code from the obtained resources and then clusters the code based on their usage of the component and finally ranks the clustered results to provide examples for developers. The similar component discovery algorithm leverages the cooperation relationship among components and makes use of the LSA technique to calculate the similarity between two components. By doing this, we can greatly reduce the efforts for developers in acquiring desired components and improve the efficiency of software reuse. 4.2 Trustworthy software resource management Trustworthy software resource management comprises four parts: evidence model customization, evidence gathering, evidence trustworthiness management, and trustworthiness evaluation and

4 classification. Fig. 3 depicts trustworthy software resource management in TSRR. Fig3. Trustworthy software resource management in TSRR Evidence model customization is the basis for evidence gathering. It determines what is needed to collect and organize the evidence. As shown in figure 4, the model is a hierarchical model like the 9126 quality model and each node is linked with an evidence type to indicate the source of evidence. The evidence type may be user feedback, resource test data, code analysis data, or Web Service QoS, etc. Considering there may be several evidence models and each model may have the properties of the same meaning, we build synonymous relationships between evidence model properties. Thus it makes full use of evidence and avoids repeated evidence collection. The evidence gathering module collects and stores various kinds of evidence for trustworthy software resource evaluation. Fig4. Evidence model with synonymous relationship Through the establishment of trustworthy relationships between users and evidence submitters, the evidence trustworthiness management module deals with the situation that the collected evidence is false or inaccurate. If a user feels that one piece of subjective evidence (such as the user feedback) cannot be trusted, he or she can give a percentage degree to this evidence. This degree is the possibility of the evidence that can be considered in trustworthiness evaluation. It should be noted that users cannot give a degree to objective evidence like Web Service QoS. Trustworthiness evaluation and classification is the core of trustworthy software resource management. It uses gathered evidence and the user-defined expectation model to evaluate the trustworthiness of software resources. As there may be different requirements and restrictions of specific domains, the expectation model is defined by users to describe their expectation of software resources. The expectation model is also a hierarchical model to describe user requirements. We also build mapping from each user expectation model to one or more evidence model. The mapping defines two things. One thing is to define the inclusion relation between properties in user expectation and evidence models. The relation means that one user-expected property may be calculated or derived by one or more properties in an evidence model. For example, the security can be seen as the summation of availability, integrity and confidentiality. The other is to define the weight degree of each relation. The degree represents the importance that user considered. The value of the degree is between 0 and 1, and the sum total is 1. In order to provide a simple and convenient way to tell users which resource is better and trustable, we establish a software trustworthiness classification specification to classify resources. Now, we divide software into five levels (from 1 to 5, the higher means higher trustworthiness) and each resource in the repository is marked with a trustability level according to the results of trustworthiness evaluation. Considering some evidence is objective like user satisfactory, we adopt fuzzy comprehensive evaluation method to decide the trustability level of the resource. The first step is to normalize the value of every characteristic and attribute in evidence model. Then we create factor set, evaluation set and the weight set to compute the trustability level. The factor set is indicate every quality factor that the resource related, the value of each can be get from the evidence that collect by TSRR. The evaluation set is a judge set from 1 to 5 to indicate the trustability level of resource. The weight set is the weight distribution of each element in factor set that defined by domain/user expectation model. Then we can get a fuzzy matrix to compute the result and give the user recommendations on which one is proper to use.

5 By doing this, we can greatly reduce the efforts for developers in acquiring desired resources and improve the efficiency and quality of reuse. 5. Case study The scenario of the case is: A service user needs a service to look up information of a book by its ISBN. The user wants the service has trustability level 4 and the degree for availability, response time and satisfaction is 0.4, 0.4, and 0.2. TSRR has already found there are six web services have the similar function of what user required. In addition to this, TSRR has collect these services QoS data and user evolution information by evidence collection tools. Table 1 shows one of the evidence of these service and we can see their quality are different. The question is: which one should be the proper one to meet with user s needs? Table1. The information and QoS of six ISBN web services ID Service Service access address Availabi Response Satisfact Provider lity Time ion WS daehosting 840ms 92.5% _ISBN_1.com ting.com/services/isbnser vice.wso WS webservicehttp:// 75.5% 810ms 89.5% _ISBN_2 x.com com/isbn.asmx?wsdl WS booksprice % 1060ms 87.5% _ISBN_3.com om/isbnconverter.jws?w sdl WS wou.edu % 1900ms 85.5% _ISBN_4 PTER18/ISBN.asmx?WS DL WS xmlme.co % 285ms 91.5% _ISBN_5 m WSAmazonBox.asmx?w sdl WS pickabook % 368ms 93.7% _ISBN_6 co.uk co.uk/service.asmx?ws DL Using the way depicted in previous sections, we can get user expectation model and evidence model with weight relationship as figure 5. Then we can use the fuzzy comprehensive evaluation to compute the trustability level of these services. At first we use the Gaussian normalization method to normalize the evidence data. The factor set is made by the value of the evidence, that is U={Availability, Response Time, Satisfaction}. The evaluation set is V={1,2,3,4,5} and the weight set is A={0.4,0.4,0.2}. After that we get a fuzzy matrix to compute each web service s trustability level. The result we get is WS_ISBN_5 and WS_ISBN_6 are level 4, WS_ISBN_1 is level 3, the others are level 2. So we can recommend WS_ISBN_5 and WS_ISBN_6 to user. Fig5. User Expectation model and Evidence model with weight relationship 6. Conclusion This paper introduces a software resource repository to support software reuse and sharing. The repository provides publishing, retrieving, classifying, evaluating and managing functions to support trustworthy software development. Moreover, it provides an Internet search engine to find more resources to be reused. The case study shows the TSRR effectively help users to select what they want. The future work is to study an automatic way and a more accurate method to calculate the trustability level of software resources. 7. Acknowledgement This work is supported by the National Basic Research Program of China under Grant No. 2009CB320703, the High-Tech Research and Development Program of China under Grant No. 2007AA010301, 2009AA010307, the Science Fund for Creative Research Groups of China under Grant No , the National Natural Science Foundation of China under Grant No , References J. M. Morel, J. Faget, The REBOOT Environment, BULL S. A. Rue Jean JAURES, F LESCLAYES-SOUS-BIOS, France. 4. Robert C. Seacord, Scott A. Hissam, Kurt C. Wallnau: Agoro-a search engine for component, IEEE Internet Computing, November/December, 1998, pp Yunwen Ye, An Active and Adaptive Reuse Repository System, Proceedings of 34th Hawaii International Conference on System Sciences (HICSS- 34), Software Technology Track, Maui, HI, IEEE Press,

ELPUB Digital Library v2.0. Application of semantic web technologies

ELPUB Digital Library v2.0. Application of semantic web technologies ELPUB Digital Library v2.0 Application of semantic web technologies Anand BHATT a, and Bob MARTENS b a ABA-NET/Architexturez Imprints, New Delhi, India b Vienna University of Technology, Vienna, Austria

More information

Semantic Search in Portals using Ontologies

Semantic Search in Portals using Ontologies Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br

More information

Make search become the internal function of Internet

Make search become the internal function of Internet Make search become the internal function of Internet Wang Liang 1, Guo Yi-Ping 2, Fang Ming 3 1, 3 (Department of Control Science and Control Engineer, Huazhong University of Science and Technology, WuHan,

More information

Three Stages for SOA and Service Governance

Three Stages for SOA and Service Governance Three Stages for SOA and Governance Masaki Takahashi Tomonori Ishikawa (Manuscript received March 19, 2009) A service oriented architecture (SOA), which realizes flexible and efficient construction of

More information

Yannick Lallement I & Mark S. Fox 1 2

Yannick Lallement I & Mark S. Fox 1 2 From: AAAI Technical Report WS-99-01. Compilation copyright 1999, AAAI (www.aaai.org). All rights reserved. IntelliServeTM: Automating Customer Service Yannick Lallement I & Mark S. Fox 1 2 1Novator Systems

More information

A QoS-Aware Web Service Selection Based on Clustering

A QoS-Aware Web Service Selection Based on Clustering International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

An approach to grid scheduling by using Condor-G Matchmaking mechanism

An approach to grid scheduling by using Condor-G Matchmaking mechanism An approach to grid scheduling by using Condor-G Matchmaking mechanism E. Imamagic, B. Radic, D. Dobrenic University Computing Centre, University of Zagreb, Croatia {emir.imamagic, branimir.radic, dobrisa.dobrenic}@srce.hr

More information

Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs

Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs Ryosuke Tsuchiya 1, Hironori Washizaki 1, Yoshiaki Fukazawa 1, Keishi Oshima 2, and Ryota Mibe

More information

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

Open Access Research and Design for Mobile Terminal-Based on Smart Home System Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System

More information

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Semantic Concept Based Retrieval of Software Bug Report with Feedback Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop

More information

The Implementation of Wiki-based Knowledge Management Systems for Small Research Groups

The Implementation of Wiki-based Knowledge Management Systems for Small Research Groups International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM) ISSN 2150-7988 Vol.1 (2009), pp. 68 75 http://www.mirlabs.org/ijcisim The Implementation of Wiki-based

More information

Portable Cloud Services Using TOSCA

Portable Cloud Services Using TOSCA Institute of Architecture of Application Systems Portable Cloud Services Using TOSCA Tobias Binz, Gerd Breiter, Frank Leymann, and Thomas Spatzier Institute of Architecture of Application Systems, University

More information

A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS

A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS Ionela MANIU Lucian Blaga University Sibiu, Romania Faculty of Sciences mocanionela@yahoo.com George MANIU Spiru Haret University Bucharest, Romania Faculty

More information

A Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools

A Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools A Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools Bobby Hartway AEgis Technologies Group 631 Discovery Drive Huntsville, AL 35806 256-922-0802 bhartway@aegistg.com

More information

Designing and Developing Performance Measurement Software Solution

Designing and Developing Performance Measurement Software Solution Designing and Developing Performance Measurement Software Solution Bekim Fetaji, and Majlinda Fetaji Abstract The focus of the research study is the development of a software solution for performance evaluation

More information

Research on Trust Management Strategies in Cloud Computing Environment

Research on Trust Management Strategies in Cloud Computing Environment Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING

More information

White Paper. Software Development Best Practices: Enterprise Code Portal

White Paper. Software Development Best Practices: Enterprise Code Portal White Paper Software Development Best Practices: Enterprise Code Portal An Enterprise Code Portal is an inside the firewall software solution that enables enterprise software development organizations

More information

JRefleX: Towards Supporting Small Student Software Teams

JRefleX: Towards Supporting Small Student Software Teams JRefleX: Towards Supporting Small Student Software Teams Kenny Wong, Warren Blanchet, Ying Liu, Curtis Schofield, Eleni Stroulia, Zhenchang Xing Department of Computing Science University of Alberta {kenw,blanchet,yingl,schofiel,stroulia,xing}@cs.ualberta.ca

More information

Reusability of WSDL Services in Web Applications

Reusability of WSDL Services in Web Applications 599 Reusability of WSDL Services in Web Applications 1 Jaspreet Singh, 2 Sandeep Saini 1 Assistant Professor Department Of Computer Science & Engineering, Chandigarh University Gharuan, Punjab, India 2

More information

Enhancing Quality of Data using Data Mining Method

Enhancing Quality of Data using Data Mining Method JOURNAL OF COMPUTING, VOLUME 2, ISSUE 9, SEPTEMBER 2, ISSN 25-967 WWW.JOURNALOFCOMPUTING.ORG 9 Enhancing Quality of Data using Data Mining Method Fatemeh Ghorbanpour A., Mir M. Pedram, Kambiz Badie, Mohammad

More information

http://www.paper.edu.cn

http://www.paper.edu.cn 5 10 15 20 25 30 35 A platform for massive railway information data storage # SHAN Xu 1, WANG Genying 1, LIU Lin 2** (1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission

More information

A Framework of Model-Driven Web Application Testing

A Framework of Model-Driven Web Application Testing A Framework of Model-Driven Web Application Testing Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu Software Engineering Institute, School of Computer Science and Engineering, Beihang University, China

More information

Service-Oriented Software Testing Platform *

Service-Oriented Software Testing Platform * Service-Oriented Software Testing Platform * Fagui Liu 1, Chunwei Luo 1 School of Computer Science and Engineering, South China University of Technology 510640 Guangzhou, Guangdong, P.R. China fgliu@scut.edu.cn,

More information

A THREE-TIERED WEB BASED EXPLORATION AND REPORTING TOOL FOR DATA MINING

A THREE-TIERED WEB BASED EXPLORATION AND REPORTING TOOL FOR DATA MINING A THREE-TIERED WEB BASED EXPLORATION AND REPORTING TOOL FOR DATA MINING Ahmet Selman BOZKIR Hacettepe University Computer Engineering Department, Ankara, Turkey selman@cs.hacettepe.edu.tr Ebru Akcapinar

More information

IT services for analyses of various data samples

IT services for analyses of various data samples IT services for analyses of various data samples Ján Paralič, František Babič, Martin Sarnovský, Peter Butka, Cecília Havrilová, Miroslava Muchová, Michal Puheim, Martin Mikula, Gabriel Tutoky Technical

More information

Study on the Patterns of Library Resource Construction and Services in MOOC

Study on the Patterns of Library Resource Construction and Services in MOOC , pp. 85-90 http://dx.doi.org/10.14257/ijunesst.2014.7.6.08 Study on the Patterns of Library Resource Construction and Services in MOOC Sun Ji-zhou, Liao Sheng-feng (Library of Nanchang Hangkong University,

More information

Monitoring and Diagnosis of Networked Medical Hardware and Software for the Integrated Operating Room

Monitoring and Diagnosis of Networked Medical Hardware and Software for the Integrated Operating Room Monitoring and Diagnosis of Networked Medical Hardware and Software for the Integrated Operating Room Stefan Bohn, Michael Lessnau, Oliver Burgert Innovation Center Computer Assisted Surgery (ICCAS), Medical

More information

Blog Post Extraction Using Title Finding

Blog Post Extraction Using Title Finding Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School

More information

Lina khalid Ahmed Department of Software Engineering Zarqa University Amman, Jordan

Lina khalid Ahmed Department of Software Engineering Zarqa University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 1, 11-15, 2015 Role of Component Certification in CBSE Activities for Building High Quality Software Lina

More information

A Framework for the Delivery of Personalized Adaptive Content

A Framework for the Delivery of Personalized Adaptive Content A Framework for the Delivery of Personalized Adaptive Content Colm Howlin CCKF Limited Dublin, Ireland colm.howlin@cckf-it.com Danny Lynch CCKF Limited Dublin, Ireland colm.howlin@cckf-it.com Abstract

More information

Computer&Radioengineering

Computer&Radioengineering Computer&Radioengineering Computer&Radioengineering Bauhaus International Science press www. bhssci.com The Design and Research of the Monitoring System for Library Alliance Based on Cloud Computing Model

More information

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang

More information

COURSE RECOMMENDER SYSTEM IN E-LEARNING

COURSE RECOMMENDER SYSTEM IN E-LEARNING International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand

More information

A Framework for Personalized Healthcare Service Recommendation

A Framework for Personalized Healthcare Service Recommendation A Framework for Personalized Healthcare Service Recommendation Choon-oh Lee, Minkyu Lee, Dongsoo Han School of Engineering Information and Communications University (ICU) Daejeon, Korea {lcol, niklaus,

More information

Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification

Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati tnpatil2@gmail.com, ss_sherekar@rediffmail.com

More information

The Power of Classifying in SharePoint 2010

The Power of Classifying in SharePoint 2010 The Power of Classifying in SharePoint 2010 by Agnes Molnar, Microsoft SharePoint MVP October 2010 Phone: (610)-717-0413 Email: info@metavistech.com Website: www.metavistech.com Introduction As a Microsoft

More information

2.1. The Notion of Customer Relationship Management (CRM)

2.1. The Notion of Customer Relationship Management (CRM) Int. J. Innovative Ideas (IJII) www.publishtopublic.com A Review on CRM and CIS: A Service Oriented Approach A Review on CRM and CIS: A Service Oriented Approach Shadi Hajibagheri 1, *, Babak Shirazi 2,

More information

A Service Revenue-oriented Task Scheduling Model of Cloud Computing

A Service Revenue-oriented Task Scheduling Model of Cloud Computing Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,

More information

Component Based Software Engineering: A Broad Based Model is Needed

Component Based Software Engineering: A Broad Based Model is Needed Component Based Software Engineering: A Broad Based Model is Needed Allen Parrish (parrish@cs.ua.edu) Brandon Dixon (dixon@cs.ua.edu) David Hale (dhale@alston.cba.ua.edu) Department of Computer Science

More information

release 240 Exact Synergy Enterprise CRM Implementation Manual

release 240 Exact Synergy Enterprise CRM Implementation Manual release 240 Exact Synergy Enterprise CRM Implementation Manual EXACT SYNERGY ENTERPRISE CRM IMPLEMENTATION MANUAL The information provided in this manual is intended for internal use by or within the organization

More information

A SURVEY OF PERSONALIZED WEB SEARCH USING BROWSING HISTORY AND DOMAIN KNOWLEDGE

A SURVEY OF PERSONALIZED WEB SEARCH USING BROWSING HISTORY AND DOMAIN KNOWLEDGE A SURVEY OF PERSONALIZED WEB SEARCH USING BROWSING HISTORY AND DOMAIN KNOWLEDGE GOODUBAIGARI AMRULLA 1, R V S ANIL KUMAR 2,SHAIK RAHEEM JANI 3,ABDUL AHAD AFROZ 4 1 AP, Department of CSE, Farah Institute

More information

A Quality of Service Broker Based Process Model for Dynamic Web Service Composition

A Quality of Service Broker Based Process Model for Dynamic Web Service Composition Journal of Computer Science 7 (8): 1267-1274, 2011 ISSN 1549-3636 2011 Science Publications A Quality of Service Broker Based Process Model for Dynamic Web Service Composition 1 Maya Rathore and 2 Ugrasen

More information

XFlash A Web Application Design Framework with Model-Driven Methodology

XFlash A Web Application Design Framework with Model-Driven Methodology International Journal of u- and e- Service, Science and Technology 47 XFlash A Web Application Design Framework with Model-Driven Methodology Ronnie Cheung Hong Kong Polytechnic University, Hong Kong SAR,

More information

A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems

A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems Vincenzo Grassi Università di Roma Tor Vergata, Italy Raffaela Mirandola {vgrassi, mirandola}@info.uniroma2.it Abstract.

More information

Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2

Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,

More information

PERSONALIZED WEB MAP CUSTOMIZED SERVICE

PERSONALIZED WEB MAP CUSTOMIZED SERVICE CO-436 PERSONALIZED WEB MAP CUSTOMIZED SERVICE CHEN Y.(1), WU Z.(1), YE H.(2) (1) Zhengzhou Institute of Surveying and Mapping, ZHENGZHOU, CHINA ; (2) North China Institute of Water Conservancy and Hydroelectric

More information

A Framework for Data Migration between Various Types of Relational Database Management Systems

A Framework for Data Migration between Various Types of Relational Database Management Systems A Framework for Data Migration between Various Types of Relational Database Management Systems Ahlam Mohammad Al Balushi Sultanate of Oman, International Maritime College Oman ABSTRACT Data Migration is

More information

Database Construction of Real Estate Assessment Based on Big Data Liang Zhou 1,2,a, Liang Shi 3, Sijia Zhang

Database Construction of Real Estate Assessment Based on Big Data Liang Zhou 1,2,a, Liang Shi 3, Sijia Zhang 4th International Conference on Computer, Mechatronics, Control and Electronic Engineering (ICCMCEE 2015) base Construction of Real Estate Assessment Based on Big Liang Zhou 1,2,a, Liang Shi 3, Sijia Zhang

More information

Development of a generic IT service catalog as pre-arrangement for Service Level Agreements

Development of a generic IT service catalog as pre-arrangement for Service Level Agreements Development of a generic IT service catalog as pre-arrangement for Service Level Agreements Thorsten Anders Universität Hamburg, Regionales Rechenzentrum, Schlüterstraße 70, 20146 Hamburg, Germany Thorsten.Anders@rrz.uni-hamburg.de

More information

A Framework for Intelligent Online Customer Service System

A Framework for Intelligent Online Customer Service System A Framework for Intelligent Online Customer Service System Yiping WANG Yongjin ZHANG School of Business Administration, Xi an University of Technology Abstract: In a traditional customer service support

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

How To Use Neural Networks In Data Mining

How To Use Neural Networks In Data Mining International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and

More information

A Symptom Extraction and Classification Method for Self-Management

A Symptom Extraction and Classification Method for Self-Management LANOMS 2005-4th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation

More information

Design and Implementation of IaaS platform based on tool migration Wei Ding

Design and Implementation of IaaS platform based on tool migration Wei Ding 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Design and Implementation of IaaS platform based on tool migration Wei Ding State Key Laboratory

More information

CLOUD COMPUTING AN EFFICIENT WAY TO PROVIDE FOR IT SERVICE IN IRAN METEOROLOGICAL ORGANIZATION

CLOUD COMPUTING AN EFFICIENT WAY TO PROVIDE FOR IT SERVICE IN IRAN METEOROLOGICAL ORGANIZATION CLOUD COMPUTING AN EFFICIENT WAY TO PROVIDE FOR IT SERVICE IN IRAN METEOROLOGICAL ORGANIZATION Sedigheh Mohammadesmail and *Roghayyeh Masoumpour Amirabadi Department of Library and Information Science,

More information

Demonstration of Runtime Model Based Management of Diverse Cloud Resources

Demonstration of Runtime Model Based Management of Diverse Cloud Resources Demonstration of Runtime Model Based Management of Diverse Cloud Resources Xiaodong Zhang,2, Xing Chen,2, Ying Zhang *,2, Yihan Wu,2, Gang Huang,2, Qiang Lin 3 Key Laboratory of High Confidence Software

More information

zen Platform technical white paper

zen Platform technical white paper zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant

More information

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course , pp.291-298 http://dx.doi.org/10.14257/ijmue.2015.10.9.30 The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course Xiaoyu Chen 1 and Lifang Qiao

More information

A Scalability Model for Managing Distributed-organized Internet Services

A Scalability Model for Managing Distributed-organized Internet Services A Scalability Model for Managing Distributed-organized Internet Services TSUN-YU HSIAO, KO-HSU SU, SHYAN-MING YUAN Department of Computer Science, National Chiao-Tung University. No. 1001, Ta Hsueh Road,

More information

A Knowledge Management Framework Using Business Intelligence Solutions

A Knowledge Management Framework Using Business Intelligence Solutions www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For

More information

Experiments in Web Page Classification for Semantic Web

Experiments in Web Page Classification for Semantic Web Experiments in Web Page Classification for Semantic Web Asad Satti, Nick Cercone, Vlado Kešelj Faculty of Computer Science, Dalhousie University E-mail: {rashid,nick,vlado}@cs.dal.ca Abstract We address

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

Requirements engineering

Requirements engineering Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and

More information

Cloud deployment model and cost analysis in Multicloud

Cloud deployment model and cost analysis in Multicloud IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud

More information

Mission-Critical Database with Real-Time Search for Big Data

Mission-Critical Database with Real-Time Search for Big Data Mission-Critical Database with Real-Time Search for Big Data February 17, 2012 Slide 1 Overview About MarkLogic Why MarkLogic Case Studies Technology and Features Slide 2 About MarkLogic 10 years in business

More information

Semantic Knowledge Management System. Paripati Lohith Kumar. School of Information Technology

Semantic Knowledge Management System. Paripati Lohith Kumar. School of Information Technology Semantic Knowledge Management System Paripati Lohith Kumar School of Information Technology Vellore Institute of Technology University, Vellore, India. plohithkumar@hotmail.com Abstract The scholarly activities

More information

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence

More information

WebSphere Business Modeler

WebSphere Business Modeler Discovering the Value of SOA WebSphere Process Integration WebSphere Business Modeler Workshop SOA on your terms and our expertise Soudabeh Javadi Consulting Technical Sales Support WebSphere Process Integration

More information

Impact of Service Oriented Architecture on ERP Implementations in Technical Education

Impact of Service Oriented Architecture on ERP Implementations in Technical Education Impact of Service Oriented Architecture on ERP Implementations in Technical Education Swati Verma Department of Computer Science & Engg, B.T. Kumaon Institute of Technology, Dwarahat, 263653, India. E-mail:

More information

RESEARCH OF DECISION SUPPORT SYSTEM (DSS) FOR GREENHOUSE BASED ON DATA MINING

RESEARCH OF DECISION SUPPORT SYSTEM (DSS) FOR GREENHOUSE BASED ON DATA MINING RESEARCH OF DECISION SUPPORT SYSTEM (DSS) FOR GREENHOUSE BASED ON DATA MINING Cheng Wang 1, Lili Wang 2,*, Ping Dong 2, Xiaojun Qiao 1 1 National Engineering Research Center for Information Technology

More information

E-learning and Student Management System: toward an integrated and consistent learning process

E-learning and Student Management System: toward an integrated and consistent learning process E-learning and Student Management System: toward an integrated and consistent learning process Matteo Bertazzo 1, Franca Fiumana 2 1 CINECA, Information and Knowledge Management Services Department, via

More information

Metadata Quality Control for Content Migration: The Metadata Migration Project at the University of Houston Libraries

Metadata Quality Control for Content Migration: The Metadata Migration Project at the University of Houston Libraries Metadata Quality Control for Content Migration: The Metadata Migration Project at the University of Houston Libraries Andrew Weidner University of Houston, USA ajweidner@uh.edu Annie Wu University of Houston,

More information

Client Overview. Engagement Situation. Key Requirements

Client Overview. Engagement Situation. Key Requirements Client Overview Our client is a global leader in mobile and digital advertising technology. Their unified monetization platform combines an ad server and a real-time bidding ad exchange to help publishers

More information

Data Analysis in E-Learning System of Gunadarma University by Using Knime

Data Analysis in E-Learning System of Gunadarma University by Using Knime Data Analysis in E-Learning System of Gunadarma University by Using Knime Dian Kusuma Ningtyas tyaz tyaz tyaz@student.gunadarma.ac.id Prasetiyo prasetiyo@student.gunadarma.ac.id Farah Virnawati virtha

More information

SEMANTIC-BASED AUTHORING OF TECHNICAL DOCUMENTATION

SEMANTIC-BASED AUTHORING OF TECHNICAL DOCUMENTATION SEMANTIC-BASED AUTHORING OF TECHNICAL DOCUMENTATION R Setchi, Cardiff University, UK, Setchi@cf.ac.uk N Lagos, Cardiff University, UK, LagosN@cf.ac.uk ABSTRACT Authoring of technical documentation is a

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

White Paper 6 Steps to Enhance Performance of Critical Systems

White Paper 6 Steps to Enhance Performance of Critical Systems White Paper 6 Steps to Enhance Performance of Critical Systems Despite the fact that enterprise IT departments have invested heavily in dynamic testing tools to verify and validate application performance

More information

C2C: An Automated Deployment Framework for Distributed Applications on Multi-Clouds

C2C: An Automated Deployment Framework for Distributed Applications on Multi-Clouds C2C: An Automated Deployment Framework for Distributed Applications on Multi-Clouds Flora Karniavoura, Antonis Papaioannou, and Kostas Magoutis Institute of Computer Science (ICS) Foundation for Research

More information

Spend Enrichment: Making better decisions starts with accurate data

Spend Enrichment: Making better decisions starts with accurate data IBM Software Industry Solutions Industry/Product Identifier Spend Enrichment: Making better decisions starts with accurate data Spend Enrichment: Making better decisions starts with accurate data Contents

More information

SPATIAL DATA CLASSIFICATION AND DATA MINING

SPATIAL DATA CLASSIFICATION AND DATA MINING , pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal

More information

A Work Breakdown Structure for Implementing and Costing an ERP Project

A Work Breakdown Structure for Implementing and Costing an ERP Project 94 Aisha Momoh, Decision Engineering Centre, Cranfield University, Bedford, UK,a.momoh@cranfield.ac.uk Rajkumar Roy, Decision Engineering Centre, Cranfield University, Bedford, UK, r.roy@cranfield.ac.uk

More information

K@ A collaborative platform for knowledge management

K@ A collaborative platform for knowledge management White Paper K@ A collaborative platform for knowledge management Quinary SpA www.quinary.com via Pietrasanta 14 20141 Milano Italia t +39 02 3090 1500 f +39 02 3090 1501 Copyright 2004 Quinary SpA Index

More information

Getting started with a data quality program

Getting started with a data quality program IBM Software White Paper Information Management Getting started with a data quality program 2 Getting started with a data quality program The data quality challenge Organizations depend on quality data

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

Proceedings of the 6th Educators Symposium: Software Modeling in Education at MODELS 2010 (EduSymp 2010)

Proceedings of the 6th Educators Symposium: Software Modeling in Education at MODELS 2010 (EduSymp 2010) Electronic Communications of the EASST Volume 34 (2010) Proceedings of the 6th Educators Symposium: Software Modeling in Education at MODELS 2010 (EduSymp 2010) Position Paper: m2n A Tool for Translating

More information

Virtualization s Evolution

Virtualization s Evolution Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department

More information

SAP HANA Cloud Platform

SAP HANA Cloud Platform SAP HANA Cloud Platform SAP Forum 2015 César Martín 12 de marzo de 2015 SAP HANA Cloud Platform Build, extend, and run next-generation applications on SAP HANA in the cloud The in-memory cloud platform-as-a-service

More information

Extend the value of your core business systems.

Extend the value of your core business systems. Legacy systems renovation to SOA September 2006 Extend the value of your core business systems. Transforming legacy applications into an SOA framework Page 2 Contents 2 Unshackling your core business systems

More information

An empirical study of messaging systems and migration to service-oriented architecture

An empirical study of messaging systems and migration to service-oriented architecture An empirical study of messaging systems and migration to service-oriented architecture Raouf Alomainy and Wei Li Computer Science Department, University of Alabama in Huntsville, Huntsville, AL 35899 {ralomain,

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] NEMICO: Mining network data through cloud-based data mining techniques Original Citation: Baralis E.; Cagliero L.; Cerquitelli T.; Chiusano

More information

MULTI AGENT-BASED DISTRIBUTED DATA MINING

MULTI AGENT-BASED DISTRIBUTED DATA MINING MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:

More information

Cloud Storage-based Intelligent Document Archiving for the Management of Big Data

Cloud Storage-based Intelligent Document Archiving for the Management of Big Data Cloud Storage-based Intelligent Document Archiving for the Management of Big Data Keedong Yoo Dept. of Management Information Systems Dankook University Cheonan, Republic of Korea Abstract : The cloud

More information

10426: Large Scale Project Accounting Data Migration in E-Business Suite

10426: Large Scale Project Accounting Data Migration in E-Business Suite 10426: Large Scale Project Accounting Data Migration in E-Business Suite Objective of this Paper Large engineering, procurement and construction firms leveraging Oracle Project Accounting cannot withstand

More information

Investigating Role of Service Knowledge Management System in Integration of ITIL V3 and EA

Investigating Role of Service Knowledge Management System in Integration of ITIL V3 and EA Investigating Role of Service Knowledge Management System in Integration of ITIL V3 and EA Akbar Nabiollahi, Rose Alinda Alias, Shamsul Sahibuddin Faculty of Computer Science and Information System Universiti

More information

HELP DESK SYSTEMS. Using CaseBased Reasoning

HELP DESK SYSTEMS. Using CaseBased Reasoning HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind

More information

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen

More information

A Method of Caption Detection in News Video

A Method of Caption Detection in News Video 3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.

More information

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM. DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,

More information