Logo des Repositoriums

P084 - ISTA 2006 - Information Systems Technolopgy and its Applications

Autor*innen mit den meisten Dokumenten  

Auflistung nach:

Neueste Veröffentlichungen

1 - 10 von 17
  • Konferenzbeitrag
    A JXTA-based music information retrieval system
    (Information Systems Technology and its Applications, 5th International Conference ISTA 2006, 2006) Jung, Hyosook; Park, Seongbin
    In this paper, we present a JXTA-based system for contents-based music information retrieval. The system finds matching melodies from a set of XML documents that encode music contents. The XML documents are stored in a native XML database and XPath query language is used to extract the information about the structure of music data. The matching algorithm utilizes the geometric hashing technique [Wo97] by analyzing geometric properties of both XML documents and music contents. The system preprocesses extracted music contents and stores the information about melody patterns in a relational database. When a user sends a query about a melody, it searches melody patterns that have similar geometric properties as the query melody.
  • Konferenzbeitrag
    Fragments for composing collaborative systems
    (Information Systems Technology and its Applications, 5th International Conference ISTA 2006, 2006) Hawryszkiewycz, I. T.; Henderson-Sellers, B.; Tran, N.
    Collaborative systems are characterized by groups or communities jointly working to accomplish some organizational goal. Members of the communities must coordinate their efforts to ensure that such goals are met. Development of collaborative systems can be facilitated by identifying common aspects of such coordination and by constructing product method fragments that can be composed into working systems. This paper uses a metamodel to provide a basis for such fragments, describing the metamodel and defining typical fragments.
  • Konferenzbeitrag
    Use of tailored process models to support ERP end-users
    (Information Systems Technology and its Applications, 5th International Conference ISTA 2006, 2006) Kristiansen, Renate; Gulla, Jon Alte; Trætteberg, Hallvard
    Modeling is essential for the success of any ERP project and early in the project a considerable amount of time and money is invested in designing and redesigning business processes. However, the models developed in this period, do not take the leap from the developers' desktops, and generally offers no support for the end-user while performing daily work. The construction of the user interface of an ERP system reflects the organizations functional areas, making the functional aspect predominant. The process aspect in a user's work is lost, and the user gets no conceptualization on how his contributions fit into the overall business processes. In this paper we suggest that tailored views of the process models developed early in the ERP project should be made available to the end-users while working with the ERP system. We show examples on models developed during an ERP implementation project at a Norwegian manufacturing company, and show how these can be tailored according to an end user's role, the current context and what instance she finds herself in.
  • Konferenzbeitrag
    Tamper protection of online clients through random checksum algorithms
    (Information Systems Technology and its Applications, 5th International Conference ISTA 2006, 2006) Grimen, Gisle; Mönch, Christian; Midtstraum, Roger
    We describe a new purely software-based, self-checking mechanism designed to prevent tampering of client programs in client/server-applications like online-games, peer-to-peer networks, or online auction systems. Our mechanism consists of randomly creating checksum algorithms at the server. The checksum algorithms are integrated into autonomous short-lived software code, called Mobile Guards, which are downloaded to a client program during its execution. The client programs are designed to be functionally dependent on the execution of a Mobile Guard. The randomly created checksum functions and the concept of Mobile Guards enable a highly dynamic protection mechanism, capable of rapidly evolving as new threats arise.
  • Konferenzbeitrag
    Semantic interoperability in the norwegian petroleum industry
    (Information Systems Technology and its Applications, 5th International Conference ISTA 2006, 2006) Gulla, Jon Atle; Tomassen, Stein L.; Strasunskas, Darijus
    The petroleum industry is a technically challenging business with high investments, complex projects and operational structures. There are numerous companies and public offices involved in the exploitation of a new oil field, and there is a high degree of specialization among them. Even though standardization has been considered important in this industry for many years, there is still very little integration across phases and disciplines. An industrially driven consortium launched the Integrated Information Platform project in 2004, in which semantic standards based on OWL and Semantic Web technologies were to be developed for the subsea petroleum industry. This paper presents the IIP project in more detail and discusses how industry-wide ontologies can support semantic interoperability and encourage more process integration.
  • Konferenzbeitrag
    A generic ontology of rational negotiation
    (Information Systems Technology and its Applications, 5th International Conference ISTA 2006, 2006) Ermolayev, Vadim; Keberle, Natalya
    The paper presents the generic conceptual framework for modeling rational negotiation processes. The central piece of the presented work is the upper-level negotiation ontology. This ontology is designed to be capable to model the arbitrary types of negotiation dialogues by providing the upper-level namespace for that. The models of the specific negotiation types refine this namespace by providing the instances of its concepts, applying additional restrictions on the properties, possibly adding new subclasses and properties. The approach to model negotiations with the Generic Negotiation Ontology (GNO) is initially evaluated by applying to contracting negotiation type. The choice of the negotiation type for the evaluation is suggested by the fact that contracting negotiations are the typical encounters among the agents taking part in the simulation of a Dynamic Engineering Design Process (DEDP). This modeling activity is performed in the frame of our PSI project1.
  • Konferenzbeitrag
    Coordinating higher education as an e-government initiative
    (Information Systems Technology and its Applications, 5th International Conference ISTA 2006, 2006) Cherednichenko, Olga; Kuklenko, Dmytro; Zlatkin, Sergiy
    Government plays a key role in providing higher education. It supplies policies and regulations, information to the society, administers funds and licensing, develops standards, etc. In the context of total e-Governing Ministries of Education of many countries initiated the creation of supporting information systems. These systems in most cases are limited to providing information resources of different kinds to the society by web-portals. Administering and coordinating functions are left out for some reasons. In this paper we discover the typical structure of higher education, different stakeholders involved in the process of providing higher education services, information and data flows. We discuss the key functions that information systems must support. And finally we propose the e-Government higher education reference model to be addressed when developing such information systems.
  • Konferenzbeitrag
    An investigation of the target environment for agile methods
    (Information Systems Technology and its Applications, 5th International Conference ISTA 2006, 2006) Strode, Diane; Tretiakov, Alexei
    The agile methods were investigated to determine the factors making up their target environment. A theoretical model of the target environment for agile methods was developed and then tested using a multi-case study. Data from nine software development projects, both agile and non-agile, was gathered from project leaders. Then a cross-case analysis of each factor in the theoretical model explored the relationship between each of the environmental factors and the extent of agile method usage. This led to a refined model of the target environment. The empirical data showed that specific environmental factors correlate with effective use of an agile method. We also report that methods are tailored for use, and that, although agile methods are distinct from ad hoc development, the extent of agile method use must be measured before conclusions from agile method studies can be considered valid.
  • Konferenzbeitrag
    A vision to construct multiple data views in peer data management systems
    (Information Systems Technology and its Applications, 5th International Conference ISTA 2006, 2006) Mohamed, Rozlina; Al-Mourad, M. Basel; Khalifa, Yasser M. A.