Software and Data Technolgoies -

Software and Data Technolgoies (eBook)

Third International Conference, ICSOFT 2008, Porto, Portugal, July 22-24, 2008
eBook Download: PDF
2009 | 1. Auflage
XII, 242 Seiten
Springer-Verlag
978-3-642-05201-9 (ISBN)
Systemvoraussetzungen
59,92 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book contains the best papers of the third International Conference on Software and Data Technologies, ICSOFT 2008, held in Porto, Portugal in July 2008. The purpose of ICSOFT 2008 was to bring together researchers, engineers and practitioners interested in information technology and software development. The conference tracks were: software engineering, information systems and data management, programming languages, distributed and parallel systems, and knowledge engineering.

Preface 5
Organization 6
Table of Contents 10
Invited Speakers 10
User Defined Geo-referenced Information 12
Introduction 12
Hovering Information 13
Overview of the Hovering Information Concept 14
Analysis of the Hovering Information Concept 15
End-to-End QoS-Predictions’ Information Service 16
Basic Assumptions 17
Overview of the Concept and Service 17
Conclusions 18
References 19
Part I: Programming Languages 10
Extending the SSCLI to Support Dynamic Inheritance 20
Introduction 20
Background 22
Type Systems of Dynamically Typed Languages 22
Runtime Performance of Dynamically Typed Languages 22
Structural Reflection 23
$/Large{/textrevscr}{/small/textsc{Rotor}}$ 23
The Object Model of $/Large{/textrevscr}{/small/textsc{Rotor}}$ 24
Dynamic Inheritance 25
Design 25
Class-Based Model 26
Prototype-BasedModel 28
Implementation 29
The $setSuper$ Primitive Interface 29
Instance Manipulation 30
Class Manipulation 30
Current State of the Implementation 31
Conclusions 31
References 32
Scala Roles: Reusable Object Collaborations in a Library 34
Introduction 34
Objects and Roles 36
Compound Objects with Dynamic Proxies 37
Object Identity 39
Collaborations with Nested Types 40
Scala Roles in Action 41
Persons and Their Roles 42
Composite Design Pattern 43
Related Work 45
Conclusions 45
References 46
Part II: Software Engineering 10
Common Criteria Based Security Scenario Verification 48
Introduction 48
Scenario Language 49
Outline 49
Scenario Example 50
Verification of Scenarios 51
Rule 51
Evaluation 53
Rule Based on Common Criteria 54
Discussion 56
Related Works 56
Conclusions 57
References 57
A Software Infrastructure for User–Guided Quality–of–Service Tradeoffs 59
Introduction 59
Architectural Baseline 61
Quality–of–Service Tradeoffs 63
Evaluation of Usability 65
Coordinating Resource Usage 67
Evaluation 68
Adaptive Applications 69
Evaluation 69
Related Work 70
Conclusions 71
References 71
On the Multiplicity Semantics of the Extend Relationship in Use Case Models 73
Introduction 73
The Evolution of the Extend Relationship 74
The Interpretation of the Extension Point Concept 77
Discussion 81
Related Work 83
Conclusions and Future Work 84
References 85
Secure Mobile Phone Access to Remote Personal Computers: A Case Study 87
Introduction 87
Background 88
Security Issues 89
Proposed Security Model 90
Improving the Design 91
Implementation 93
Discussion 94
User Study 95
Related Work 97
Conclusions 98
References 99
Part III: Distributed and Parallel Systems 10
Understanding and Evaluating Replication in Service Oriented Multi-tier Architectures 102
Introduction 102
Replication in SOA 103
Basic Architecture 103
Replication 104
Replication Strategies 105
Categorization 105
Example Algorithm 108
Simulation 109
Simulation Architecture 109
Execution 111
Parameters 112
Selected Results 113
Related Work 114
Conclusions 114
References 115
Applying Optimal Stopping for Optimizing Queries to External Semantic Web Resources 116
Introduction 116
Performance and Scalability 117
The Search Test Stop Model 119
Preconditions 120
The Discrete Search Test Stop Model 120
Method 121
Cost Functions 121
Utility Distributions 121
Application 122
Evaluation 124
Performance 125
Web Services 126
Outlook and Conclusions 128
References 128
An Efficient Pipelined Parallel Join Algorithm on Heterogeneous Distributed Architectures 130
Introduction 130
Limitations of Parallel Execution Strategies in Multi-join Queries 131
Sequential Parallel Execution 132
Parallel Synchronous Execution 132
Segmented Right-Deep Execution 133
Full Parallel Execution 134
Parallelism in Multi-join Queries Using PDFA-Join Algorithm 134
Detailed Algorithm 135
Discussion 141
Conclusions 143
References 143
Part IV: Information Systems and Data Management 11
Declarative Business Process Modelling and the Generation of ERP Systems 145
Introduction 145
An Introduction to REA 147
An Object-Z Model 148
The REA Meta-model 148
The Runtime Model 150
A Domain Specific Language 151
Language Implementation 153
Automated Generation of Applications 154
Summary 156
References 157
Single Vector Large Data Cardinality Structure to Handle Compressed Database in a Distributed Environment 158
Introduction 158
Related Work 159
Existing HIBASE Compression Technique 160
Proposed Single Vector Large Data Cardinality (SVLDCS) Structure 161
Searching Technique 164
Explanation of the Searching Technique of (SVLDCS) Structure 165
Searching Time Analysis of SVLDC Structure 166
The Analysis of Storage Capacity of SVLDC Structure 166
Analytical Analysis of Storage Capacity Using Different Methods 167
Conclusions 169
References 170
Relaxed Approaches for Correct DB-Replication with SI Replicas 172
Introduction 172
Multiversion Histories 174
Generalized Snapshot Isolation 175
The Deferred Update Technique 177
1–Copy–GSI Schedules 180
Relaxing Assumptions 181
Conclusions 184
References 185
Measuring the Usability of Augmented Reality e-Learning Systems: A User–Centered Evaluation Approach 186
Introduction 186
Related Work 187
Evaluation Method and Procedure 189
Equipment 189
Participants and Tasks 190
Method and Procedure 190
Evaluation Results and Comparison 191
Answers to the Questionnaire 191
Most Mentioned Positive and Negative Aspects 192
Measures of Effectiveness and Efficiency 194
Conclusions and Future Work 195
References 196
Supporting the Process Assessment through a Flexible Software Environment 198
Introduction 198
State of the Art 199
EvalTOOL 201
Process Model Management 203
Application and Evaluation Model 203
EvalTOOL Application Example 205
EvalTOOL as Support to COMPETISOFT 207
Conclusions and Future Work 209
References 210
Part V: Knowledge Engineering 11
Increasing Data Set Incompleteness May Improve Rule Set Quality 211
Introduction 211
Blocks of Attribute-Value Pairs 213
Definability 215
Lower and Upper Approximations 215
LERS and LEM2 218
LEM2 218
LERS Classification System 219
Experiments 220
Conclusions 225
References 226
Anomaly Detection Using Behavioral Approaches 228
Introduction 228
Behavioral Approaches for Intrusion Detection 229
Why Standard Classification Rules Are Ineffective for Detecting Novel Attacks 230
Enhancing Bayesian Classification for Anomaly Detection 231
Using Zero Probabilities as Abnormal Evidence 232
Using Likelihood of Rare Attacks as Abnormal Evidence 233
Enhancing Decision Trees for Anomaly Detection 234
Decision Tree Classifiers 234
Decision Tree Adaptations for Anomaly Detection 234
Experimental Studies 237
Training and Testing Data Sets 237
Experiments on Standard/Enhanced Bayesian Classification Rule 238
Conclusions 239
References 240
Author Index 242

Erscheint lt. Verlag 1.1.2009
Sprache englisch
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Software Entwicklung
Informatik Theorie / Studium Kryptologie
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Naturwissenschaften
Schlagworte augmented reality • E-Learning • geo referenced • GIS • information system • Knowledge Engineering • Process Modelling • programming • QoS • Remote Access • reusable software • security • Software engineering • SSCLI
ISBN-10 3-642-05201-0 / 3642052010
ISBN-13 978-3-642-05201-9 / 9783642052019
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,9 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Datenschutz und Sicherheit in Daten- und KI-Projekten

von Katharine Jarmul

eBook Download (2024)
O'Reilly Verlag
49,90