294 research outputs found

    Faculty Publications & Presentations, 2004-2005

    Get PDF

    Faculty Publications & Presentations, 2004-2005

    Get PDF

    From Method Fragments to Method Services

    Full text link
    In Method Engineering (ME) science, the key issue is the consideration of information system development methods as fragments. Numerous ME approaches have produced several definitions of method parts. Different in nature, these fragments have nevertheless some common disadvantages: lack of implementation tools, insufficient standardization effort, and so on. On the whole, the observed drawbacks are related to the shortage of usage orientation. We have proceeded to an in-depth analysis of existing method fragments within a comparison framework in order to identify their drawbacks. We suggest overcoming them by an improvement of the ?method service? concept. In this paper, the method service is defined through the service paradigm applied to a specific method fragment ? chunk. A discussion on the possibility to develop a unique representation of method fragment completes our contribution

    Method Families Concept: Application to Decision-Making Methods

    No full text
    International audienceThe role of variability in Software engineering grows increasingly as it allows developing solutions that can be easily adapted to a specific context and reusing existing knowledge. In order to deal with variability in the method engineering (ME) domain, we suggest applying the notion of method families. Method components are organized as a method family, which is configured in the given situation into a method line. In this paper, we motivate the concept of method families by comparing the existing approaches of ME. We detail then the concept of method families and illustrate it with a family of decision-making (DM) methods that we call MADISE

    Practical privacy enhancing technologies for mobile systems

    Get PDF
    Mobile computers and handheld devices can be used today to connect to services available on the Internet. One of the predominant technologies in this respect for wireless Internet connection is the IEEE 802.11 family of WLAN standards. In many countries, WLAN access can be considered ubiquitous; there is a hotspot available almost anywhere. Unfortunately, the convenience provided by wireless Internet access has many privacy tradeoffs that are not obvious to mobile computer users. In this thesis, we investigate the lack of privacy of mobile computer users, and propose practical enhancements to increase the privacy of these users. We show how explicit information related to the users' identity leaks on all layers of the protocol stack. Even before an IP address is configured, the mobile computer may have already leaked their affiliation and other details to the local network as the WLAN interface openly broadcasts the networks that the user has visited. Free services that require authentication or provide personalization, such as online social networks, instant messengers, or web stores, all leak the user's identity. All this information, and much more, is available to a local passive observer using a mobile computer. In addition to a systematic analysis of privacy leaks, we have proposed four complementary privacy protection mechanisms. The main design guidelines for the mechanisms have been deployability and the introduction of minimal changes to user experience. More specifically, we mitigate privacy problems introduced by the standard WLAN access point discovery by designing a privacy-preserving access-point discovery protocol, show how a mobility management protocol can be used to protect privacy, and how leaks on all layers of the stack can be reduced by network location awareness and protocol stack virtualization. These practical technologies can be used in designing a privacy-preserving mobile system or can be retrofitted to current systems

    Using OWL-VisMod through a decision-making process for reusing OWL ontologies

    Get PDF
    [EN] Knowledge representation (KR) can be defined as a set of ontological commitments, provided with the capabilities of performing inference. The knowledge can be represented using an ontology, which provides a shared insight into a certain domain. The use of ontologies to represent knowledge also allows interoperation among knowledge-based systems. The process of building ontologies can be tedious and sometimes exhaustive. A possible solution in order to avoid this problem would be to reuse the ontologies previously created by others. This paper describes a case study of reusability using OWL-VisMod, a tool designed for developing ontological engineering based on visual conceptual modelling for OWL ontologies. A workflow performed with OWL-VisMod is described; including a decision-making process in order to decide whether or not it could be desirable to reuse an ontology, according to the requirements of a certain project

    Faculty Publications & Presentations, 2008-2009

    Get PDF

    Faculty Publications & Presentations, 2005-2006

    Get PDF
    corecore