Filipe / Aalst / Cordeiro | Web Information Systems and Technologies | E-Book | www2.sack.de
E-Book

E-Book, Englisch, Band 8, 353 Seiten

Reihe: Lecture Notes in Business Information Processing

Filipe / Aalst / Cordeiro Web Information Systems and Technologies

Third International Conference, WEBIST 2007, Barcelona, Spain, March 3-6, 2007, Revised Selected Papers
2008
ISBN: 978-3-540-68262-2
Verlag: Springer Berlin Heidelberg
Format: PDF
Kopierschutz: 1 - PDF Watermark

Third International Conference, WEBIST 2007, Barcelona, Spain, March 3-6, 2007, Revised Selected Papers

E-Book, Englisch, Band 8, 353 Seiten

Reihe: Lecture Notes in Business Information Processing

ISBN: 978-3-540-68262-2
Verlag: Springer Berlin Heidelberg
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book constitutes the thoroughly refereed post-conference proceedings of the 3rd Interntaional Conference on Web Information Systems and Technologies, held in Barcelona, Spain, in March 2007. The 23 papers presented in this book were carefully reviewed and selected from 367 submissions. Their extended and revised versions are published in this book together with 2 invited lectures.The contributions cover topics on internet technology, Web interfaces and applications, society, e-business and e-government, and e-learning.

Filipe / Aalst / Cordeiro Web Information Systems and Technologies jetzt bestellen!

Weitere Infos & Material


1;Preface;5
2;Organization;6
3;Table of Contents;10
4;Invited Papers;13
4.1;Programming Support and Governance for Process-Oriented Software Autonomy;14
4.1.1;Introduction;14
4.1.2;Business Process Runtime Requirements for Self-governance;16
4.1.3;Implementation of Autonomic Management;17
4.1.3.1;A Simple Example;19
4.1.4;A Case Study;22
4.1.4.1;Architectural Autonomy;22
4.1.4.2;Behavioural Autonomy;24
4.1.5;Evaluation;24
4.1.5.1;Adaptation Scenario;25
4.1.5.2;Introducing Neptune to the PetShop/Pet Store;25
4.1.5.3;Results;26
4.1.6;Conclusions;28
4.1.7;References;28
4.2;Representing and Validating Digital Business Processes;30
4.2.1;Introduction;30
4.2.2;Rule-Based Business Modeling;31
4.2.3;Logical Models for BR Languages;33
4.2.4;BR vs. Semantic Web-Style Knowledge Representation;35
4.2.5;Combining DL and Horn Rules;38
4.2.6;An Example of Hybrid Reasoning;39
4.2.6.1;Hybrid Reasoning;40
4.2.7;Related Work;41
4.2.8;Conclusions;42
4.2.9;References;42
5;Part I Internet Technology;44
5.1;Semi-automated Content Zoning of Spam Emails;45
5.1.1;Introduction;45
5.1.2;Content Zoning;47
5.1.2.1;Annotated Regions in Texts;47
5.1.2.2;Identification of Spam Emails;48
5.1.3;The COZO Explorer;49
5.1.3.1;A Spam Thesaurus;49
5.1.3.2;The Graphical User Interface;50
5.1.4;Selected Results;50
5.1.4.1;Zoning Pharmaceutical Spam Emails;50
5.1.4.2;Zoning Financial Spam Emails;51
5.1.4.3;Automated Image Sorting;52
5.1.5;Conclusions;53
5.1.6;References;53
5.2;Security and Business Risks from Early Design of Web-Based Systems;55
5.2.1;Introduction;55
5.2.2;Related Work;57
5.2.3;Security Risk Analysis;57
5.2.3.1;Preliminaries;57
5.2.3.2;Methodology;58
5.2.4;A Case Study;61
5.2.4.1;Web Application Design;61
5.2.4.2;Estimating Security Risks;63
5.2.5;Business Risk Analysis;66
5.2.6;Concluding Remarks;68
5.2.7;References;68
5.3;Designing Decentralized Service Compositions: Challenges and Solutions;70
5.3.1;Introduction;70
5.3.2;Background;71
5.3.3;Formal Considerations;72
5.3.4;Deriving Cooperating Processes;74
5.3.4.1;Dealing with the Consistency of Derived Processes;74
5.3.4.2;Putting the Deriving Operation into Practice;75
5.3.4.3;Wiring with Postset Activities;76
5.3.4.4;Wiring with Preset Activities;78
5.3.5;Conclusions;80
5.3.6;References;80
5.4;Grid Infrastructure Architecture: A Modular Approach from CoreGRID;82
5.4.1;Introduction;82
5.4.2;Functional Components of a Framework Architecture;84
5.4.2.1;Workflow Analyzer;85
5.4.2.2;Checkpointing;86
5.4.2.3;User and Account Management;87
5.4.2.4;ResourceMonitoring;88
5.4.3;Integration between Functional Components;89
5.4.4;Comparison with Other Works;91
5.4.5;Conclusions;92
5.4.6;References;93
5.5;The Privacy Advocate: Assertion of Privacy by Personalised Contracts;95
5.5.1;Introduction;95
5.5.2;Related Work;96
5.5.3;Negotiation Extensions;97
5.5.3.1;Requirements and Facultative Requests;97
5.5.3.2;Permissions and Prohibitions;98
5.5.3.3;Privacy Contracts;98
5.5.4;Privacy Advocate;98
5.5.4.1;Negotiation Process;99
5.5.4.2;Policy Evaluation;100
5.5.4.3;Protocol Issues;103
5.5.5;Implementation;103
5.5.5.1;Mobile PrivAd Client;103
5.5.5.2;PrivAd Server;104
5.5.5.3;Digital Signature;104
5.5.5.4;Negotiation Strategies;104
5.5.6;Summary and Outlook;106
5.5.7;References;106
5.6;Efficient Queries on XML Data through Partitioning;108
5.6.1;Introduction;108
5.6.2;Related Work;109
5.6.3;XPathBasics;110
5.6.4;Our Partitioning Method;111
5.6.5;Implementation Options;113
5.6.5.1;Relational Implementation;113
5.6.5.2;Native Implementation;114
5.6.6;Experimental Results;115
5.6.6.1;Relational Implementation;115
5.6.6.2;Native Implementation;116
5.6.7;Conclusions;117
5.6.8;References;118
5.7;Contract Based Behavior Model for Services Coordination;119
5.7.1;Introduction;119
5.7.2;Coordination Model with Transactional Behavior Properties;121
5.7.2.1;Service;122
5.7.2.2;Orchestration;122
5.7.2.3;Activity;123
5.7.3;Transactional Behavior Model;124
5.7.3.1;Contract;125
5.7.3.2;Atomicity Contracts;127
5.7.4;Defining Transactional Behavior for an e-Commerce Application;128
5.7.4.1;Activities;129
5.7.4.2;Contracts;129
5.7.5;Model Extensibility;130
5.7.6;Related Works;130
5.7.7;Conclusions and Future Work;131
5.7.8;References;132
5.8;Transparent Admission Control and Scheduling of e-Commerce Web Services;134
5.8.1;Introduction;134
5.8.2;Services and Load;135
5.8.3;TPC-APP;138
5.8.4;Experiments;139
5.8.5;Evaluation;140
5.8.5.1;Job-Size Estimation;140
5.8.5.2;Admission Control and Scheduling;140
5.8.6;Related Work;143
5.8.7;Conclusions;144
5.8.8;Future Work;145
5.8.8.1;Document-Style;145
5.8.8.2;Composite Services;145
5.8.8.3;Service-Level Agreements (SLA);145
5.8.9;References;145
6;Part II Web Interfaces and Applications;147
6.1;Life Cases: A Kernel Element for Web Information Systems Engineering;148
6.1.1;Introduction;148
6.1.2;Related Work;149
6.1.3;Facets of Intention;150
6.1.4;LifeCases;153
6.1.4.1;The Concept of Life Case;155
6.1.4.2;Life Case Development;156
6.1.4.3;Semi-formal Representation of Life Cases;158
6.1.5;Transforming Life Cases to Requirements;160
6.1.5.1;Mapping Life Cases to Business Use Cases;160
6.1.5.2;The Algebra for Life Cases;161
6.1.5.3;Mapping Life Cases to Requirements;164
6.1.6;Conclusions;164
6.1.7;References;164
6.2;Finding Virtual Neighbors in 3D Blog with 3D Viewpoint Similarity;166
6.2.1;Introduction;166
6.2.2;The 3D Blog System;168
6.2.2.1;Features;168
6.2.2.2;Writing 3D Blog Entries;169
6.2.2.3;Reading 3D Blog;170
6.2.3;Finding Similar Entries;170
6.2.3.1;Finding Similar Entries: A Scenario;172
6.2.4;Automatic Playback of 3D Blog Entries;172
6.2.5;Discussion;176
6.2.6;Conclusions;176
6.2.7;References;177
6.3;Model Driven Formal Development of Digital Libraries;178
6.3.1;Introduction;178
6.3.2;VisMODLE, a DSVL for Digital Libraries;179
6.3.3;Model Driven Approach to Digital Libraries;182
6.3.4;Simulation of DL Models;184
6.3.5;Analysis of DL Models;187
6.3.6;Related Work;191
6.3.7;Conclusions;191
6.3.8;References;192
6.4;Predicting the Influence of Emerging Information and Communication Technologies on Home Life;193
6.4.1;Introduction;193
6.4.1.1;The Evolution of the Personalised Communication in the Home Network;194
6.4.1.2;The Assessing Environment;194
6.4.2;The Acceptance Model;195
6.4.3;Method;197
6.4.3.1;Measurement Scales;197
6.4.3.2;The Home Services Evaluated;198
6.4.3.3;The Users Profile;199
6.4.3.4;Set-Up of the Test Bed;200
6.4.3.5;The Tasks;201
6.4.3.6;The Data Analysis;202
6.4.4;Results;202
6.4.4.1;Descriptive Statistics;202
6.4.4.2;Correlation;204
6.4.4.3;Regression Models;206
6.4.5;Conclusions;207
6.4.6;References;208
6.5;RDF Collections;210
6.5.1;Introduction;210
6.5.2;RDF;211
6.5.3;Container Data Types;211
6.5.4;Formalizing RDF;214
6.5.4.1;Named RDF Graphs;216
6.5.5;Semantics;217
6.5.6;Graph Entailments;219
6.5.7;Conclusions;220
6.5.8;References;221
6.6;Logging and Analyzing User’s Interactions in Web Portals;222
6.6.1;Introduction;222
6.6.2;Background;224
6.6.3;The System;225
6.6.3.1;Log4p: The Logging Framework;225
6.6.3.2;The Log Analyzer;227
6.6.4;Related Work, Uses and Applications;231
6.6.4.1;Integrating Web Metrics;231
6.6.4.2;Portal Design;232
6.6.4.3;Personalization of the Portal;232
6.6.4.4;Portal and Portlet Usability;232
6.6.4.5;Logging and Analyzing Learner Behavior in On-Line Testing;233
6.6.5;Conclusions;235
6.6.6;References;236
6.7;A Semantics-Based Automatic Web Content Adaptation Framework for Mobile Devices;239
6.7.1;Introduction;239
6.7.2;Related Work;240
6.7.3;System Architecture;241
6.7.4;Semantics Extractor;243
6.7.5;Jena Inference System;244
6.7.6;Transcoder;246
6.7.7;System Implementation;246
6.7.8;Conclusions;250
6.7.9;References;250
7;Part III Society, e-Business and e-Government;252
7.1;Summarizing Online Customer Reviews Automatically Based on Topical Structure;253
7.1.1;Introduction;253
7.1.2;Related Work of Automatic Text Summarization;255
7.1.3;Summarization Based on Topical Structure;255
7.1.3.1;Pre-processing;256
7.1.3.2;Topic Identification;257
7.1.3.3;Candidate Sentence Extraction;258
7.1.3.4;Post-processing and Final Presentation;258
7.1.4;Evaluation of Summarization Results;259
7.1.4.1;Experimental Data Sets and Parameter Setting;259
7.1.4.2;Intrinsic Evaluation and Extrinsic Evaluation;260
7.1.4.3;Evaluation Results;261
7.1.5;Conclusions;262
7.1.6;References;263
7.2;The Structure of Web-Based Information Systems Satisfaction: An Application of Confirmatory Factor Analysis;265
7.2.1;Introduction;265
7.2.2;Theoretical Background;266
7.2.3;Factor Structure for WIS Satisfaction;267
7.2.4;Competing Models for WIS Satisfaction;268
7.2.5;Research Method;271
7.2.5.1;Data Collection;271
7.2.5.2;Measurement;272
7.2.5.3;Data Analytical Approach;272
7.2.5.4;Criteria for Comparing Model-Data Fit;273
7.2.6;Results;273
7.2.6.1;Checking for Multivariate Normality;273
7.2.6.2;Model Estimation;274
7.2.6.3;Goodness-of-Fit;274
7.2.6.4;Psychometric Properties;276
7.2.7;Discussion and Conclusions;277
7.2.7.1;Managerial Implications;277
7.2.7.2;Research Implications;278
7.2.7.3;Future Research;279
7.2.8;References;280
8;Part IV e-Learning;282
8.1;Introducing Communities to e-Learning;283
8.1.1;Introduction;283
8.1.2;Online Communities;285
8.1.3;Community in e-Learning;286
8.1.4;CLEV-R;287
8.1.4.1;Awareness;287
8.1.4.2;Communication;288
8.1.4.3;Collaboration;290
8.1.5;Mobile CLEV-R;290
8.1.6;Evaluation;291
8.1.6.1;Usability Results;292
8.1.6.2;Social Aspects;293
8.1.6.3;Additional Issues;294
8.1.7;Conclusions;295
8.1.8;References;296
8.2;Evaluating an Online Module on Copyright Law and Intellectual Property;298
8.2.1;Levels of Cognitive Reasoning;298
8.2.2;Learning and Knowledge Retention in e-Settings;299
8.2.3;The Context of the Study;300
8.2.4;Online Module;302
8.2.4.1;Procedure;302
8.2.4.2;Course Content;302
8.2.4.3;Course-End Test;303
8.2.4.4;Evaluation Strategies;304
8.2.5;Findings;304
8.2.5.1;Learning of Knowledge;305
8.2.5.2;Retention of Knowledge;305
8.2.6;Discussion;306
8.2.7;Conclusions;308
8.2.8;References;308
8.3;Using Games-Based Learning to Teach Software Engineering;310
8.3.1;Introduction;310
8.3.2;Previous Research;310
8.3.3;The Software Engineering Game;313
8.3.3.1;High-Level Objectives;314
8.3.3.2;Game Play;315
8.3.3.3;Game Design;317
8.3.4;Conclusions;318
8.3.5;References;318
8.4;Agility in Serious Games Development with Distributed Teams: A Case Study;320
8.4.1;Introduction;320
8.4.1.1;The PRIME Project;321
8.4.1.2;Stakeholders;321
8.4.2;Game Development;323
8.4.3;PRIME Development Methodology;325
8.4.3.1;Overview;325
8.4.3.2;Developer/End-User Partnerships;327
8.4.3.3;Working Groups;328
8.4.3.4;Development Status Overview;329
8.4.4;Conclusions;330
8.4.5;References;331
8.5;Improving the Flexibility of Learning Environments: Developing Applications for Wired and Wireless Use;333
8.5.1;Introduction;333
8.5.2;Mobility and Flexibility for Learning: The New Paradigm?;334
8.5.3;Designing for Fixed and Wireless Devices;337
8.5.3.1;Brief Summary of Current Evaluation Data;341
8.5.4;The Future;342
8.5.5;References;342
8.6;Evaluating an e-Learning Experience Based on the Sakai Environment;344
8.6.1;Introduction;344
8.6.2;Description of Sakai;345
8.6.3;The e-Learning Experience;346
8.6.3.1;Teaching Context;346
8.6.3.2;Online Learning Method;346
8.6.3.3;Implementation Details;348
8.6.4;The Experience Evaluation;349
8.6.5;Conclusions;352
8.6.6;References;352
9;Author Index;353



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.