86 research outputs found

    WeSCo_CBR: How to Compose Web Services via Case Based Reasoning

    No full text
    International audienceDans The IEEE International Symposium on Service-Oriented Applications, Integration and Collaboration held with the IEEE International Conference on e-Business Engineering (ICEBE 2006). 24-26 October 2006, in Shanghai, China., IEEE Computer Society ed. . pp. 618-622

    WeSCo_CBR: How to Compose Web Services via Case Based Reasoning

    No full text
    International audienceDans The IEEE International Symposium on Service-Oriented Applications, Integration and Collaboration held with the IEEE International Conference on e-Business Engineering (ICEBE 2006). 24-26 October 2006, in Shanghai, China., IEEE Computer Society ed. . pp. 618-622

    Analysis of RFID adoption in China

    Get PDF
    Radio-frequency identification (RFID) is an emerging technology for automatic data capturing, enabling real time information visibility. It promises great potentials in many industries to improve logistics operational efficiency, to help reduce inventory, and to automate asset/item track and trace, etc. The RFID adoption in China is a highly concerned topic as China has become a world manufacturing center. In this paper, we have presented an overview for China's current RFID adoption status. Based on Rogers's DOI theory, a methodology is developed for analyzing RFID adoption in China. With this methodology, China's RFID adoption status is identified, and ways to speed up the rate of adoption are also suggested. © 2007 IEEE.published_or_final_versio

    Faktor penambahbaikan kriteria kebolehgunaan bagi portal kerajaan Malaysia

    Get PDF
    Penggunaan internet menjadi trend baru pengguna untuk memperoleh maklumat dan pengetahuan terutamanya perkhidmatan dari agensi kerajaan. Justeru, pembangun portal perlu memberi fokus ke atas kualiti antara muka portal bagi memasti interaksi pengguna yang lancar dan fleksibel. Isu kebolehgunaan yang timbul semasa pembangunan dapat menjejas fungsi antara muka portal yang disedia. Ketidakpatuhan kepada garis panduan kebolehgunaan semasa pembangunan, rujukan yang kompleks dan tidak merangkumi kriteria kebolehgunaan sebenar menjadi punca kepada kegagalan menghasil antara muka yang boleh guna. Satu model pengukuhan kriteria kebolehgunaan dibangun sebagai langkah penambahbaikan dan garis panduan sedia ada yang dikuat kuasa diteliti bagi mengatasi isu kebolehgunaan ini. Hasil daripada penambahbaikan mengenal pasti tujuh kriteria kebolehgunaan baharu; Fungsi dan Kesesuaian, Sokongan dan Panduan, Ralat dan Pemulihan, Kawalan dan Kestabilan, Perisian dan Perkakasan, Proses Reka Bentuk dan Penilaian serta Kerahsiaan. Kriteria ini tidak disenarai sebagai kriteria wajib patuh oleh agensi penguatkuasa dan ianya dijangka mampu mempengaruhi reka bentuk kebolehgunaan portal sektor awam

    Ontology based software engineering - software engineering 2.0

    Get PDF
    This paper describes the use of ontologies in different aspects of software engineering. This use of ontologies varies from support for software developers at multiple sites to the use of an ontology to provide semantics in different categories ofsoftware, particularly on the web. The world's first and only software engineering ontology and a project management ontology in conjunction with a domain ontology are used to provide support for software development that is taking place at multiple sites. Ontologies are used to provide semantics to deal with heterogeneity in the representation of multiple information sources, enable the selection and composition of web services and grid resources, provide the shared knowledge base for multiagent systems, provide semantics and structure for trust and reputation systems and privacy based systems and codification of shared knawledge within different domains in business, science, manufacturing, engineering and utilities. They, therefore, bring a new paradigm to software engineering through the use of semantics as a central mechanism which will revolutionize the way software is developed and consumed in the future leading to the development of software as a service bringing about the dawn of software engineering 2.0

    Veröffentlichungen und Vorträge 2006 der Mitglieder der Fakultät für Informatik

    Get PDF

    An enhancement of toe model by investigating the influential factors of cloud adoption security objectives

    Get PDF
    Cloud computing (CC) is a future technological trend for technological infrastructure development. And it is growing strongly as the backbone of industrial future technological infrastructure. As CC service has a lot to offer, it also has some major downside that clients cannot ignore. For CC service adoption, the potential candidates are SMEs but due to lack of resources, experience, expertise and low financial structure scenario CC can be most helpful. CC faces a major issue in term of cloud security, an organization doesn’t understand the cloud security factors in the organization and data owner doubts about their data. In the research paper, an investigation on the cloud security objectives to find out the influential factors for cloud adoption in SMEs by proposing an enhancement of Technology-Organization- Environment (TOE) model with some positive influential factor like cloud security, relative advantages, cost saving, availability, SLA, capability, top management, organizational readiness, IS knowledge, malicious insiders, government regulatory support, competitive pressure, size and type. Some negative influencing factors like technological readiness, cloud trust and lack of standards in cloud security. Data were collected by questionnaires from a selected IT company based on SaaS and public cloud. Case study method has been used for validating the enhance TOE model. The IBM Statistics SPSS v22 tool was used for data analysis. The results of data analysis support the enhancement as well as all the proposed hypotheses. In summary, the results of the analysis show that all the enhancement factors were found to have a significant cloud security influence on adoption of cloud computing for SMEs

    A document based traceability model for test management

    Get PDF
    Software testing has became more complicated in the emergence of distributed network, real-time environment, third party software enablers and the need to test system at multiple integration levels. These scenarios have created more concern over the quality of software testing. The quality of software has been deteriorating due to inefficient and ineffective testing activities. One of the main flaws is due to ineffective use of test management to manage software documentations. In documentations, it is difficult to detect and trace bugs in some related documents of which traceability is the major concern. Currently, various studies have been conducted on test management, however very few have focused on document traceability in particular to support the error propagation with respect to documentation. The objective of this thesis is to develop a new traceability model that integrates software engineering documents to support test management. The artefacts refer to requirements, design, source code, test description and test result. The proposed model managed to tackle software traceability in both forward and backward propagations by implementing multi-bidirectional pointer. This platform enabled the test manager to navigate and capture a set of related artefacts to support test management process. A new prototype was developed to facilitate observation of software traceability on all related artefacts across the entire documentation lifecycle. The proposed model was then applied to a case study of a finished software development project with a complete set of software documents called the On-Board Automobile (OBA). The proposed model was evaluated qualitatively and quantitatively using the feature analysis, precision and recall, and expert validation. The evaluation results proved that the proposed model and its prototype were justified and significant to support test management

    A Survey on Legal Question Answering Systems

    Full text link
    Many legal professionals think that the explosion of information about local, regional, national, and international legislation makes their practice more costly, time-consuming, and even error-prone. The two main reasons for this are that most legislation is usually unstructured, and the tremendous amount and pace with which laws are released causes information overload in their daily tasks. In the case of the legal domain, the research community agrees that a system allowing to generate automatic responses to legal questions could substantially impact many practical implications in daily activities. The degree of usefulness is such that even a semi-automatic solution could significantly help to reduce the workload to be faced. This is mainly because a Question Answering system could be able to automatically process a massive amount of legal resources to answer a question or doubt in seconds, which means that it could save resources in the form of effort, money, and time to many professionals in the legal sector. In this work, we quantitatively and qualitatively survey the solutions that currently exist to meet this challenge.Comment: 57 pages, 1 figure, 10 table

    The role of strategy in the evolution and innovation of information systems: A simulation experiment

    Get PDF
    The potential of Radio Frequency Identification (RFID) for increasing supply chain efficiency has been repeatedly stressed by practitioners and researchers alike. The cross-company usage of RFID applications can only work if the collaborating companies agree on the syntax and semantic used. EPCglobal, an international industry consortium, has specified a stack of specifications that enable a standardized identifier to be stored on the RFID tag and all object related data to be kept on the network. Such a standardized concept does not yet exist to store object related data on RFID tags. To minimize the coordination effort as well as the emerging interoperability or integration problems and, therefore, also guarantee wide-spread adoption of the data-on-tag approach, it is advisable to build on existing standards for the storage of data on RFID tags. In this paper, we recommend applying the ISO 13584 standard for parts libraries (PLIB). We conceptualize how to use ISO 13584 to store data on RFID tags and use a case study on a kitchen furniture manufacturer, which uses RFID tagged components in a cross-company application with its suppliers, to develop a scenario for the storage of data on RFID tags
    • …
    corecore