87 research outputs found

    A Generalized Notion of Time for Modeling Temporal Networks

    Get PDF
    Most approaches for modeling and analyzing temporal networks do not explicitly discuss the underlying notion of time. In this paper, we therefore introduce a generalized notion of time for temporal networks. Our approach also allows for considering non-deterministic time and incomplete data, two issues that are often found when analyzing data-sets extracted from online social networks, for example. In order to demonstrate the consequences of our generalized notion of time, we also discuss the implications for the computation of (shortest) temporal paths in temporal networks

    An Analysis of Three Legal Citation Networks Derived from Austrian Supreme Court Decisions

    Get PDF
    In this paper, we present a case study on the structural properties of three citations networks derived from Austrian Supreme Court decisions. In particular, we analyzed 250.984 Supreme Court decisions ranging from 1922 to 2017. As part of our case study, we analyzed the degree distributions, the structural properties of prominent court decisions, as well as changes in the frequency of legal citations over time

    An analysis of emotion-exchange motifs in multiplex networks during emergency events

    Get PDF
    In this paper, we present an analysis of the emotion-exchange patterns that arise from Twitter messages sent during emergency events. To this end, we performed a systematic structural analysis of the multiplex communication network that we derived from a data-set including more than 1.9 million tweets that have been sent during five recent shootings and terror events. In order to study the local communication structures that emerge as Twitter users directly exchange emotional messages, we propose the concept of emotion-exchangemotifs. Our findings suggest that emotion-exchange motifs which contain reciprocal edges (indicating online conversations) only emerge when users exchange messages that convey anger or fear, either in isolation or in any combination with another emotion. In contrast, the expression of sadness, disgust, surprise, as well as any positive emotion are rather characteristic for emotion-exchange motifs representing one-way communication patterns (instead of online conversations). Among other things, we also found that a higher structural similarity exists between pairs of network layers consisting of one high-arousal emotion and one low-arousal emotion, rather than pairs of network layers belonging to the same arousal dimension

    Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

    Get PDF
    Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract)Series: Working Papers on Information Systems, Information Business and Operation

    Protocol for a Systematic Literature Review on Design Decisions for UML-based DSMLs

    Get PDF
    Series: Technical Reports / Institute for Information Systems and New Medi

    A Catalog of Reusable Design Decisions for Developing UML/MOF-based Domain-specific Modeling Languages

    Get PDF
    In model-driven development (MDD), domain-specific modeling languages (DSMLs) act as a communication vehicle for aligning the requirements of domain experts with the needs of software engineers. With the rise of the UML as a de facto standard, UML/MOF-based DSMLs are now widely used for MDD. This paper documents design decisions collected from 90 UML/MOF-based DSML projects. These recurring design decisions were gained, on the one hand, by performing a systematic literature review (SLR) on the development of UML/MOF-based DSMLs. Via the SLR, we retrieved 80 related DSML projects for review. On the other hand, we collected decisions from developing ten DSML projects by ourselves. The design decisions are presented in the form of reusable decision records, with each decision record corresponding to a decision point in DSML development processes. Furthermore, we also report on frequently observed (combinations of) decision options as well as on associations between options which may occur within a single decision point or between two decision points. This collection of decision-record documents targets decision makers in DSML development (e.g., DSML engineers, software architects, domain experts).Series: Technical Reports / Institute for Information Systems and New Medi

    Modeling Support for Role-Based Delegation in Process-Aware Information Systems

    Get PDF
    In the paper, an integrated approach for the modeling and enforcement of delegation policies in process-aware information systems is presented. In particular, a delegation extension for process-related role-based access control (RBAC) models is specified. The extension is generic in the sense that it can be used to extend process-aware information systems or process modeling languages with support for processrelated RBAC delegationmodels.Moreover, the detection of delegation-related conflicts is discussed and a set of pre-defined resolution strategies for each potential conflict is provided. Thereby, the design-time and runtime consistency of corresponding RBAC delegation models can be ensured. Based on a formal metamodel, UML2 modeling support for the delegation of roles, tasks, and duties is provided. A corresponding case study evaluates the practical applicability of the approach with real-world business processes. Moreover, the approach is implemented as an extension to the BusinessActivity library and runtime engine
    • …
    corecore