Social network analysis (SNA) has attracted a lot of attention over the past years. Existing tools for SNA do not allow a user-centric analysis of the social neighborhood, i.e., the subgraph of the user's friends ...
详细信息
In service-oriented computing, software agents interact by requesting and providing services. Since providing a service incurs cost, uncooperative behavior dominates in the absence of an incentive mechanism. An econom...
详细信息
Publish/subscribe systems are used increasingly often as a communication mechanism in loosely-coupled distributed applications. With their gradual adoption in mission critical areas, it is essential that systems are s...
详细信息
Business-process-management systems are increasingly used in service-oriented architectures (SOA), coordinating activities of loosely coupled information systems, of web services, and of human actors. This often requi...
详细信息
Business-process-management systems are increasingly used in service-oriented architectures (SOA), coordinating activities of loosely coupled information systems, of web services, and of human actors. This often requires exchanging and processing sensitive, personally-identifiable information, e.g., in e-employability and e-health applications. Supporting security in such a service-oriented environment is challenging. Existing approaches focus on security in service-oriented architectures but neglect business-process specific characteristics. Motivated by a real-world business process from the e-employability domain, in this paper we collect security requirements, exploiting the specific properties and semantics of business processes. We evaluate the requirements with respect to the state of the art of suitable security mechanisms and identify possible solutions as well as remaining gaps. We see this article as an important prerequisite for the design and implementation of advanced security mechanisms for business processes.
In service-oriented computing, software agents interact by requesting and providing services. Since providing a service incurs cost, uncooperative behavior dominates in the absence of an incentive mechanism. An econom...
详细信息
In service-oriented computing, software agents interact by requesting and providing services. Since providing a service incurs cost, uncooperative behavior dominates in the absence of an incentive mechanism. An economic model that describes interactions between individuals is the Helping Game. There, pairs of requester and provider are randomly matched. In various real-world applications in turn, several providers offer similar services, and requesters have a choice of providers. The rationale behind strategic provider selection is to choose the provider that is most likely to perform the task as desired. The results from existing studies of the Helping Game are not directly applicable to settings with provider selection. To analyze how strategic provider selection affects the efficiency of enterprise systems, we have designed and carried out an experimental study. Our results show that cooperative participants receive significantly more requests than uncooperative ones, making cooperation expensive. We conclude that system designers must incentivize requesters to balance their tasks between providers.
Experience with the parallelization of an index generator for desktop search is presented. Several configurations of the index generator are compared on three different Intel platforms with 4, 8, and 32 cores. The opt...
详细信息
ISBN:
(纸本)9783642243219
Experience with the parallelization of an index generator for desktop search is presented. Several configurations of the index generator are compared on three different Intel platforms with 4, 8, and 32 cores. The optimal configurations for these platforms are not intuitive and are markedly different for the three platforms. For finding the optimal configuration, detailed measurements and experimentation were necessary. Several recommendations for parallel software design are derived from this study.
Social network analysis (SNA) has attracted a lot of attention over the past years. Existing tools for SNA do not allow a user-centric analysis of the social neighborhood, i.e., the subgraph of the user's friends ...
详细信息
Social network analysis (SNA) has attracted a lot of attention over the past years. Existing tools for SNA do not allow a user-centric analysis of the social neighborhood, i.e., the subgraph of the user's friends and friends of a friend. In this paper, we introduce SONAR, an open source Web application for user-centric SNA. Its extensible architecture and flexible data model allows developers to embed SONAR directly into social networking websites. A performance evaluation shows that our application scales well with the number of users and adds only minimal overhead to the SNA algorithms.
In the recent past, there have been frequent reports on privacy violations by service providers on the Web. The providers are overstrained with the legal implications of processing personal data. data-protection autho...
详细信息
In the recent past, there have been frequent reports on privacy violations by service providers on the Web. The providers are overstrained with the legal implications of processing personal data. data-protection authorities in turn are overburdened with the enforcement of the regulations. Users themselves typically cannot identify those violations, due to missing expertise in data-protection law. In this paper we propose and evaluate CAPE (Collaborative Access to Privacy Enhancement), an approach that makes data-protection law accessible to all parties involved in the processing of personal information. To this end, we transform legal expertise on data protection into intuitive questions that anyone can answer. CAPE is 'Web 2.0', in the sense that individuals answer the questions they can, and they benefit from the answers of others. To identify violations, we compare the answers to answer patterns defined apriori that indicate a violation. The main innovation is the combination of Web 2.0 functionality with the structured approach (sequences of closed questions in particular) lawyers use to identify violations. In extensive user studies, we show that users can identify 81% of those violations legal experts find. Further, individuals answer our questions with a high degree of agreement, independent from their background knowledge.
Assessing numerous models from students in written exams or homework is an exhausting *** present an approach for a fair and transparent assessment of the completeness of models according to a natural language domain ...
详细信息
ISBN:
(纸本)9783642016479
Assessing numerous models from students in written exams or homework is an exhausting *** present an approach for a fair and transparent assessment of the completeness of models according to a natural language domain description. The assessment is based on checklists generated by the tool Sumo. Sumo directly works on an annotated version of the original exam text, so no 'gold standard' is needed.
暂无评论