WEBIST 2012 Abstracts


Area 1 - Internet Technology

Full Papers
Paper Nr: 20
Title:

PARALLELIZED STRUCTURAL AND VALUE XML FILTERING ON MULTICORE PROCESSORS

Authors:

Panagiotis Antonellis, Christos Makris and Georgios Pispirigos

Abstract: Information filtering systems constitute a critical component in modern information seeking applications. As the number of users grows and the information available becomes even bigger it is imperative to employ scalable and efficient representation and filtering techniques. Typically the use of XML representation entails the profile representation with the use of the XPath query language and the employment of efficient heuristic techniques for constraining the complexity of the filtering mechanism. However, most of the existing research work focuses on single-core systems, even though the multi-core processors are already widely used. In this paper we propose a parallel filtering algorithm based on the well known YFilter, which dynamically applies a work-load balancing approach to each thread to achieve the best parallelization. In addition, the proposed filtering algorithm extends YFilter to also support value-based predicates in the user profiles, thus enabling both structural and content-based XML filtering. Experimental results depict that the proposed system outperforms the previous parallel approaches to XML filtering problem.

Paper Nr: 26
Title:

DEVELOPING A CROSS-PLATFORM MOBILE SMART METER APPLICATION USING HTML5, JQUERY MOBILE AND PHONEGAP

Authors:

Alexander Zibula and Tim A. Majchrzak

Abstract: Mobile computing devices are becoming more prevalent. Mobile applications extend their scope and utility. Developing such apps introduces a problem: developers are being forced to develop their applications to target each mobile platform from scratch or to rely on Web-based solutions that do not provide a “native” look and feel. In order to investigate novel methods of multi-platform app development and to review HTML5, we built an app using several cutting-edge development frameworks. Our scenario—a smart meter tool—is an active area of research in itself. We present approaches in the field of multi-platform app development and illustrate the technological background. We provide an overview of our development process. Finally, we evaluate our app and discuss our findings in order to provide generalizable results.

Paper Nr: 70
Title:

REQUIREMENTS ELICITATION METHOD FOR DESIGNING VIRTUAL COLLABORATIVE SYSTEMS WITH COLLABORATIVE SENSEMAKING

Authors:

Alexandre Parra Carneiro da Silva and Celso Massaki Hirata

Abstract: Many approaches for requirements elicitation have been proposed to help the design of virtual collaborative systems. The design of virtual collaborative systems with collaborative sensemaking presents a challenge due to the needs of interaction of users with the system in order to process, interpret, and share information collaboratively. However, most of the design approaches fail in capturing the users’ needs, because they are not designed to capture precisely the main users’ activities interactions during the interplay between ‘collaboration’ and ‘information’ with sensemaking. Sensemaking determines the way in which people respond to certain events and allows constructing perceptions taking into account their goals, priorities and problems. This paper describes a requirement elicitation method that captures the interactions of potential users in collaborative environments with collaborative sensemaking activities. The method is based on the simulation of activities it was employed in the design of a virtual collaborative system - a collaborative puzzle – in order to illustrate its usage.

Paper Nr: 81
Title:

EXPLORING NON-TYPICAL MEMCACHE ARCHITECTURES FOR DECREASED LATENCY AND DISTRIBUTED NETWORK USAGE

Authors:

Paul Talaga and Steve Chapin

Abstract: Memcache is a distributed in-memory data store designed to reduce database load for web applications by caching frequently used data across multiple machines. In a distributed web serving environment applications rely on many network services to complete each request. While faster processors have lowered computation time and available network bandwidth has increased, signal propagation delay is a constant and will become a larger proportion of latency in the future. We explore how data-locality with Memcache can be exploited to reduce latency and minimize core network traffic. A model is developed to predict how alternate Memcache configurations would perform for specific applications followed by an evaluation using the MediaWiki opensource web application in a miniature web farm setting. Our results verified our model and we observed a 66% reduction in core network traffic and a 23% reduction in Memcache response time under certain network conditions.

Paper Nr: 104
Title:

WEB SERVICE CAPABILITY META MODEL

Authors:

Sami Bhiri, Wassim Derguech and Maciej Zaremba

Abstract: The concept of capability is a cornerstone element in service description. Nevertheless, despite its fundamental role little effort has been seen to model service capabilities. Current approaches either fail to consider capabilities as feature-based entities and confuse them with annotated invocation interfaces or fail in modelling capabilities at several abstraction levels and establishing links between them. In particular, they are not able to model and deal with concrete capabilities (i.e., capabilities that reflect real customers’ needs). In this paper, we propose a conceptual model as an RDF-schema for describing service capabilities. Our model defines capabilities as an action verb and a set of attributes and their values. It is also able to define capabilities at different levels of abstractions/concreteness and establish links between them. Most importantly, our model enables describing concrete capabilities which directly correspond to consumer needs. Our meta model is based on RDF and makes use of Linked Data to define capability attributes as well as their values.

Paper Nr: 108
Title:

VALIDATION AND VERIFICATION POLICIES FOR GOVERNANCE OF SERVICE CHOREOGRAPHIES

Authors:

Guglielmo De Angelis, Antonia Bertolino and Andrea Polini

Abstract: The Future Internet (FI) sustains the emerging vision of a software ecosystem in which pieces of software, developed, owned and run by different organizations, can be dynamically discovered and bound to each other so to readily start to interact. Nevertheless, without suitable mechanisms, paradigms and tools, this ecosystem is at risk of tending towards chaos. Indeed the take off of FI passes through the introduction of paradigms and tools permitting to establish some discipline. Choreography specifications and Governance are two different proposals which can contribute to such a vision, by permitting to define rules and functioning agreements both at the technical level and at the social (among organizations) level. In this paper we discuss such aspects and introduce a policy framework so to support a FI ecosystem in which V&V activities are controlled and perpetually run so to contribute to the quality and trustworthiness perceived by all the involved stakeholders.

Short Papers
Paper Nr: 3
Title:

TEMPORAL ASPECTS-BASED REPLACEMENT IN MEDIA OBJECT CACHES

Authors:

Hagen Höpfner, Andreas Thenn and Maximilian Schirmer

Abstract: Caching is an appropriate and well-known approach for reducing data transmissions in distributed information systems by creating and maintaining redundant data. As cache memory is limited and cached data might get outdated, it is impossible to store everything forever. If a cache is full, a replacement strategy decides on the cache entry that needs to be replaced by new data. There exist various strategies utilising different indicators for making this decision. Almost all of them do not take the content and the context of the systems’ users into account. In this paper, we present two novel cache replacement strategies called TA and aTA that utilize temporal aspects included in media objects such as websites, specified by the user, or learnt from her or his behaviour. Our evaluation results show that, in the used application scenario, TA and aTA outperform classical replacement schemes like LRU.

Paper Nr: 13
Title:

AN IMPROVED APPROACH FOR MEASURING SIMILARITY AMONG SEMANTIC WEB SERVICES

Authors:

Pedro Bispo Santos, Leandro Krug Wives and José Palazzo Moreira de Oliveira

Abstract: The current paper presents an improved approach for an ontology-based semantic Web service similarity assessment algorithm. The algorithm uses information from IOPE (Inputs, Outputs, Preconditions, Effects) categories, searching for information about the concepts located in these categories, analyzing how they are related in an ontology taxonomy. Experiments performed using a data set containing 1083 OWL-S semantic web services show that the improved approach increases the algorithm precision, decreasing the number of false positives in the retrieved results, and still having a good recall. Furthermore, this work presents the parameters that were used to achieve better precision, recall and f-measure.

Paper Nr: 16
Title:

A COMPRESSED DATA MODEL FOR A BITMAPPED XML STRUCTURE

Authors:

Mohammed Al-Badawi

Abstract: Developments on XML processing usually produce tools to formulate both the XML data storage and the associated query processor. PACD is one of such developments that stores the XML structure into a set of n×n bitmap matrices each of which encodes a specific XML structure related to an XPath axis. The amount of space and the complexity of storing uncompressed version of these matrices is large for huge XML databases; and such requirements may go beyond the HW/SW capabilities; this justify the need for the data compression model discussed in this paper.

Paper Nr: 25
Title:

FSMesh - Flexibly Securing Mashups by User Defined DOM Environment

Authors:

Yi Wang, Zhoujun Li, Tao Guo and Zhiwei Shi

Abstract: A growing trend of nowadays web sites is to combine active content (applications) from untrusted sources, as in so-called mashups, in order to provide more functionality and expressiveness. Due to the potential risk of leaking sensitive information to these third-party sources, it is urgent to provide a secure “sandbox” for playing the untrusted content and allow developers to apply flexible security policy at the same time. In this paper, we propose and implement a new safe framework to prevent untrusted applications from interfering with each other based on HTML5 technology. By creating a separated fake DOM environment in the background, developers can load untrusted content into the “sandbox” and apply their custom security policy in real window or server side when receiving script generated messages from it. The advantage is that it is very flexible as the security policy is also written in JavaScript and requires minimum learning efforts for web developers. The drawback is that it is based on element “web workers” and method “postMessage” introduced in HTML5 and can’t be run in older browsers without these supports.

Paper Nr: 75
Title:

XRX - The Implementation Process under XRX Architecture

Authors:

Cristina Nemeş, Marius Podean and Lucia Rusu

Abstract: The XRX (XForms - REST - XQuery) architecture is a three tier architecture which uses at each tier data in XML format. This offers a great advantage because data is not being transformed in different other formats in order to communicate with other layers. Using this architecture the application becomes more agile, flexible and simple because there is no need of translations like in the classical architecture. This paper describes the implementation process of an application developed under the XRX architecture using W3C standards (XHTML, XML, XPath, XQuery, XSLT, XForms), REST interfaces and a native XML database.

Paper Nr: 76
Title:

USING SEMANTIC ANNOTATIONS OF WEB SERVICES FOR ANALYZING INFORMATION DIFFUSION IN THE DEEP WEB

Authors:

Shahab Mokarizadeh, Peep Küngas and Mihhail Matskin

Abstract: Since Web services represent a fragment of the Deep Web, Web service interface descriptions reflect the content types available in the DeepWeb. Therefore semantic annotations of theseWeb service interfaces, after using them to link services to services networks, allow analysis of the structure of the DeepWeb. In this work, we investigate information diffusion, as one of highlighted Deep Web research directions, among networks of Web services. We present a model for analyzing information diffusion between both individual service providers and entire service industries. The proposed model is evaluated based on set of public Web services interface description harvested from public registries. The model indicates high potential of the proposed method in understanding the hidden structure of the Deep Web and interactions between individual service providers or service industries.

Paper Nr: 84
Title:

DISTRIBUTED XML PROCESSING OVER VARIOUS TOPOLOGIES - Pipeline and Parallel Processing Characterization

Authors:

Yoshiyuki Uratani, Hiroshi Koide, Dirceu Cavendish and Yuji Oie

Abstract: This paper characterizes distributed XML processing on networking nodes. XML documents are sent from a client node to a server node through relay nodes, which process the documents before arriving at the server. According as the node topology, the XML documents are processed in a pipelining manner or a parallel fashion. We evaluate distributed XML processing with synthetic and realistic XML documents on real and virtual environments. Characterization of well-formedness and grammar validation processing via pipelining and parallel models reveals inherent advantages of the parallel processing model.

Paper Nr: 88
Title:

XIDE: EXPANDING END-USER WEB DEVELOPMENT

Authors:

Evgenia Litvinova, Markku Laine and Petri Vuorimaa

Abstract: Most Web end-user development tools assume that users create Web applications entirely visually. However, such tools have a limited functionality and support inadequately the transition from visual editing to source code editing. In this paper, we introduce a tool, XIDE, that supports end users in creation of database-driven Web applications. The proposed tool is based on three main approaches: (1) visual composition of applications from reusable components, (2) source code editing of both applications and components, and (3) unified programming model based on markup languages.

Paper Nr: 103
Title:

E-GOVERNMENT AND POLICY SIMULATION IN INTELLIGENT VIRTUAL ENVIRONMENTS

Authors:

Fotis Aisopos, Magdalini Kardara, Philipp Senger, Roman Klinger, Athanasios Papaoikonomou, Konstantinos Tserpes, Michael Gardner and Theodora Varvarigou

Abstract: Recently, there has been an increase of interest in the social impact of virtual reality technologies, as virtual worlds experienced an increase of their popularity in various social groups (teenagers, businesses). The growing trend for people to spend more time in suchlike virtual spaces implies a demand for intelligent virtual environments, that could mimic the real world as a simulation and provide functionalities and tools for behaviour analysis and adaptation to user preferences. Within the context of e-government, this paper presents the ongoing project +Spaces, which is developing a range of virtual environment tools. The platform architecture is presented and technical challenges involved in creating intelligent virtual spaces for e-government as well as draft policies to be used in role-playing simulations are discussed.

Paper Nr: 107
Title:

A MESSAGE-PASSING MODEL FOR SERVICE ORIENTED COMPUTING

Authors:

Diana Allam, Rémi Douence, Hervé Grall, Jean-Claude Royer and Mario Südholt

Abstract: Web services can be built according to multiple service models and technologies. Although there is a clear need for a model integrating them in multiple real-world contexts, no integrated model does (yet) exist. In this paper, we introduce a model as a foundation for heterogeneous services, in particular, SOAP/WS* and RESTful services. The model abstracts away from service implementations, composes services in a truly concurrent manner and supports asynchronous message passing as well as mobility of typed channels.

Paper Nr: 110
Title:

QUALITY REQUIREMENTS FOR SERVICE CHOREOGRAPHIES

Authors:

Cesare Bartolini, Antonia Bertolino, Andrea Ciancone, Guglielmo De Angelis and Raffaela Mirandola

Abstract: The growing interest in the Service-oriented Architecture paradigm carries along an increasing popularity of choreographies, a flexible form of service composition to manage interactions within a business process. The BPMN provides and intuitive graphical notation to model choreographies, however there are aspects that BPMN choreography diagrams are unable to display, related not to what the participants must do, but to how they should do it. These non-functional requirements are usually expressed using separate, though connected, models. This paper introduces Q4BPMN, an approach that aims at improving the expressiveness of choreography diagrams by enhancing them with non-functional annotations. This way, the participants in the choreography will be eased in knowing what is expected from them, and designers can exploit the underlying formalism to support analysis and monitoring facilities.

Paper Nr: 122
Title:

TOWARDS A MULTI-USER DOCUMENT WAREHOUSE

Authors:

Kaïs Khrouf, Maha Azabou, Jamel Feki and Chantal Soulé-Dupuy

Abstract: The development of the Internet generated the increase of data volume available and, the number of documents exchanged through this network. Currently, this data is more and more used by companies for economic, strategic, scientific and technical development. Therefore, it is essential to provide efficient tools for decision makers in order to help them analyzing document contents in a simple way; i.e., as they actually analyze factual or descriptive data. In this paper, we present a meta-model of document warehouse including three major components (Structural, Semantic and User components) and we describe an approach for multidimensional analyses of the warehoused documents.

Paper Nr: 127
Title:

THE X-CREATE FRAMEWORK - A Comparison of XACML Policy Testing Strategies

Authors:

Antonia Bertolino, Said Daoudagh, Francesca Lonetti and Eda Marchetti

Abstract: The specification of access control policies with the XACML language could be an error prone process, so a testing is usually the solution for increasing the confidence on the policy itself. In this paper, we compare two methodologies for deriving test cases for policy testing, i.e. XACML requests, that are implemented in the X-CREATE tool. We consider a simple combinatorial strategy and a XML-based approach (XPT) which exploit policy values and the XACML Context Schema. A stopping criterion for the test cases generation is also provided and used for the comparison of the strategies in terms of fault detection effectiveness.

Paper Nr: 131
Title:

TOWARDS A SCALABLE AND DYNAMIC ACCESS CONTROL SYSTEM FOR WEB SERVICES

Authors:

Meriam Jemel, Nadia Ben Azzouna and Khaled Ghedira

Abstract: Web services are vulnerable to different types of security attacks. The problem of secure access to web-based applications is becoming increasingly complex. Management complexity arises because of the scalability considerations such as the large number of web services users and their invocations and the fact that the access control system should take into account the context. In this paper we describe the architecture of our TDRBAC (Trust and Dynamic Role Based Access Control) model which is implemented using agent technology. In fact, this technology fulfills several requirements of web service’s access control by providing both context awareness and scalability. In order to verify the scalability of the proposed solution, we expose some experimental results from a prototype implemented using JADE (Java Agent DEvelopment) platform. The performance tests show that our TDRBAC multi-agent based system meets the scaling requirements of large distributed services.

Paper Nr: 133
Title:

ONTOLOGY DESIGN AND MAPPING FOR BUILDING SECURE E-COMMERCE SOFTWARE

Authors:

Esmiralda Moradian and Anne Håkansson

Abstract: Developers are struggling with the challenging task of producing secure e-commerce software. Nonetheless, software insecurity remains an issue for e-commerce organisations. Software engineers are expected to pos-sess knowledge in the software engineering area, as well as, security. In addition, they are required to under-stand and correctly identify the relationships between the security concepts. However, developers commonly lack this knowledge and consequently, security is often omitted during the engineering process. To support developers to face the challenge, we use ontology based techniques for structuring and representation of security knowledge. Categorization according to the security properties of confidentiality, integrity, and availability is needed to provide a holistic view over the security requirements, assets, security threats, and security controls. Moreover, we propose mapping of different security ontologies to provide traceability. For this purpose, we use meta-agents and software agents in multi-agent system. We present a development scenario of electronic invoice presentment system, where we demonstrate how usage of ontologies in combination with multi-agent system can improve security of e-commerce software systems.

Paper Nr: 134
Title:

EFFICIENT FILTERING OF BINARY XML IN RESOURCE RESTRICTED EMBEDDED NETWORKS

Authors:

Sebastian Käbisch, Richard Kuntschke, Jörg Heuer and Harald Kosch

Abstract: Existing XML-based filter and publish-subscribe solutions are based on plain-text XML. Due to the computational overhead and memory consumption of parsing and processing textual XML, these approaches are generally not applicable to embedded devices such as microcontrollers. However, XML-based communication in embedded networks is a desirable paradigm to ease the development of applications on top of diverse heterogeneous nodes by leveraging existing XML-based development processes and tools. In this paper, we present an approach using theW3C Efficient XML Interchange (EXI) format for efficiently filtering XML data against a number of XPath subscriptions with low computational effort and memory usage. Thus, XML-based messaging can be brought to resource limited embedded devices while at the same time gaining performance compared to technologies based on plain-text XML.

Paper Nr: 143
Title:

EVALUATING SECURITY IN SOFTWARE DESIGN USING NEURAL NETWORK

Authors:

Adetunji Adebiyi, Johnnes Arreymbi and Chris Imafidion

Abstract: The last decade has seen a lot of effort been put into place to integrate security into software during software development lifecycle (SDLC) in order to build software more securely. With the increase in the number of software attacks and vulnerabilities, most of the current approaches used during design and development of software to integrate security into software during SDLC require the involvement of security experts. However, due to the knowledge gap between the security experts and the software developers, the success of integrating security into software remains a daunting task. Here we propose a tool based on Neural Network approach for evaluating software design and development by simulation and matching possible attack patterns to the design. Any positive match in the results shows vulnerability identified in the design, which can be evaluated by the software developers and the necessary steps are taken to measure and mitigate the risk involved. Therefore security will be integrated into the software as the software is being designed.

Paper Nr: 165
Title:

MASHUPS IN WEB 3.0

Authors:

Arto Salminen

Abstract: Web has developed into a platform where applications live as services. This is referred to as Web 2.0. The next version, Web 3.0, refers to using the Web in a new way in new domains. In addition to realizing semantic web, Web 3.0 includes other advantageous concepts too. This paper discusses about mashups in Web 3.0 and describes how mashups will be an integral part of it. Moreover, we will point out some remarkable technical solutions that enable new kind of mashups and speculate about the time when these mashups can be fully implemented and realized.

Paper Nr: 171
Title:

WEB BASED INTEGRATION OF MES AND OPERATIONAL BI

Authors:

Tom Hänel, Marco Pospiech and Carsten Felden

Abstract: Internet and web-based technologies increase the informal networks within and across organizations. This implies an acceleration of changing basic conditions and forces the embracement of innovative technologies to achieve flexible business processes. However, current research indicates a lack of flexibility in enterprise applications with negative effects on customer satisfaction and service orientation. Hence, the paper’s arguments build up on the hypothesis that a web service (WS) based integration approach is beneficial for a conjoint process oriented and flexible decision support oriented infrastructure. A combination of Manufacturing Execution Systems (MES) and Operational Business Intelligence (OpBI) is discussed, because both concepts are promising support of process flexibility. In result an architecture scheme demonstrates a WS oriented interaction of MES and OpBI functions. In conclusion the effort of information gathering can be reduced. The use of web-based technologies in context of operational decision making facilitates a comprehensive synchronization of business processes with flexibility-enhancing effects.

Paper Nr: 174
Title:

OPEN DATA FOR THE MASSES - Unleashing Personal Data into the Wild

Authors:

Giuseppe Ciaccio and Marina Ribaudo

Abstract: In these years the public administration is undergoing a deep transformation, driven by a greater demand for transparency and efficiency in a participative framework involving nonprofit organizations, businesses, and citizens, with the modern network infrastructures as a common medium. The Open Data movement is considered to be one of the keys of this change. In this position paper we argue that the work done so far in the Open Data field, i.e. offering massive public datasets, is just a preliminary answer. We argue that a few open standards concerning online authorization, access control, and data exportation, are emerging; these standards, if adopted by the public administration (but also business companies and any other organization), will trigger the release of a much wider and more useful wave of open data, able to sustain a new generation of helpful online personalized services, based on personal data whose ownership is given back to individual people.

Paper Nr: 176
Title:

THE CHALLENGES OF TEACHING WEB PROGRAMMING - Literature Review and Proposed Guidelines

Authors:

Stelios Xinogalos and Theodore H. Kaskalis

Abstract: The main concern of this paper is the exploration of current challenges, teaching techniques, course design methods and topics covered when attempting to teach a web programming course in technology-oriented higher education departments. The authors attempted a literature review of the subject in order to identify, compare and analyse the existing experience upon which one can establish solid guidelines towards a manageable, efficient and comprehensible course model. In the paper, the presentation of the value of teaching web programming is followed by an extensive listing of the underlying challenges. Consequently, the various teaching approaches are presented comparatively and comments are made as regards the topics covered and the tools used. The study and analysis of this gathered experience naturally leads to certain outcomes. An extensive list of questions is summed in a list view and this list aims to help educators of the field to prepare the respective structure, content, methodology and tools of a web programming course that will serve their needs in a productive way. The authors’ intention is to build upon this knowledge towards a web-based comprehensible web programming environment that will aid the process of teaching this challenging subject.

Paper Nr: 177
Title:

ENHANCING WEB SERVICE DESCRIPTIONS WITH CONTEXT FUNCTIONS

Authors:

Georgia M. Kapitsaki

Abstract: Web Service reuse is embraced both by the industry and the academia. Especially in the field of context-awareness, where Web Services are usually employed as building blocks for larger applications, the existence of adequate service descriptions is vital. The semantic Web technologies have assisted in providing richer descriptions of resources However, elaborated constructs that allow the potential user to understand the behaviour and relation of the Web Service to context information are missing. In the current paper context-related information that should form part of the service description is presented in three categories: context dependencies, context offering and context special handling. The categories are analyzed to their ingredient elements and incorporated in service descriptions as en extension to the OWL-S ontology for Web Services demonstrating the preliminary use of the proposed approach.

Paper Nr: 180
Title:

COMBINING SEMANTIC INFORMATION AND INFORMATION QUALITY ON THE ENRICHMENT OF WEB DATA INTEGRATION SYSTEMS

Authors:

Damires Souza, Bernadette Farias Lóscio and Ana Carolina Salgado

Abstract: The emergence of the Web and its permanent growth has caused a big impact on the database research community. Thereby, Database research areas have evolved in order to consider the new problems arising from the need of managing the huge volume of data available on the Web. One of such areas is Data Integration (DI), which is considered a pervasive challenge faced by applications that need to query across multiple autonomous and heterogeneous data sources. To help matters, we argue that semantic information like ontological and contextual information, combined with Information Quality (IQ) provided by IQ measures, may be employed together in order to enrich processes in DI (e.g., schema matching and query answering). In this paper, we present our ideas regarding what we mean by semantic information and IQ and why and how they may be combined in order to produce semantic knowledge to be used in Web Data Integration Systems. Furthermore, we propose a preliminary version of a metamodel, which presents a formal description of relationships between concepts associated with semantic information and IQ.

Paper Nr: 185
Title:

A COMPATIBLE IMPLEMENTATION BETWEEN IDENTITY-BASED AND CERTIFICATELESS ENCRYPTION SCHEMES

Authors:

Antigoni Polychroniadou, Kostantinos Chalkias and George Stephanides

Abstract: In this paper we put into practice the concept of compatibility and we present a classification of two IBE-related schemes, the Identity-Based Encryption (IBE) and the Certificate-Less Encryption (CLE). An innovative implementation of a compatible IBE and CLE system was developed in order to support different encryptions on-the-fly based on the user’s needs at a specific moment. Motivated from the fact that there are numerous theoretically efficient IBE-related schemes in the literature overshadowing the benefits of traditional public key encryption (PKI) schemes, they did not, in any important way implemented into practice, as the widely-used PKI. The question is why this is the case since IBE solves a number of problems associated with PKI. Therefore, the controversial issue concerning the widespread use of IBE schemes into practice and the issue of compatibility between IBE and CLE are discussed in this paper. These real problems hinder the wide use of IBE. However, it cannot be denied that IBE, which can be extended to support a plethora of encryption models, gains widespread adoption day by day as it solves problems within conventional public key schemes and it results in a simplified key management, making it much more lightweight to deploy. Based on the fact that a number of different encryption schemes stemmed from IBE, an implementation of an IBE-related compatible system is important. Our approach categorizes known concrete constructions from two IBE-related types into classes and analyzes similarities concerning public settings, used keys, protocol structures and provided model of provable security.

Posters
Paper Nr: 19
Title:

NEW APPROACHES FOR XML DATA COMPRESSION

Authors:

Márlon A. C. Teixeira, Rodrigo S. Miani, Gean D. Breda, Bruno B. Zarpelão and Leonardo S. Mendes

Abstract: Integration of information systems is essential to organizations. Therefore, it is necessary to make different technologies interoperate. Extensible Markup Language (XML) is often used for data exchange because it is self-descriptive and platform-independent. However, XML is a verbose language which may bring problems related to the size of documents. This work proposes two new approaches for XML data compression and compares our solutions with three algorithms: WAP Binary Extensible Markup Language (WBXML), Xmill and Efficient XML Interchange (EXI). The comparison is based on compression rate and compression time for files with different sizes.

Paper Nr: 24
Title:

A WCS-BASED APPROACH TO INTEGRATE SATELLITE IMAGERY DATA IN WILDFIRE SIMULATION

Authors:

António Esteves and António Pina

Abstract: This paper describes the integration of multi-dimensional data from satellite sensors in a Civil Protection application that simulates fire spread. The approach uses standard Web Coverage Services from OGC to fetch and process land cover and recently burned areas, available in the form of satellite imagery data previously captured by the MODIS sensor, to automatically generate renovated fuel maps. The proposed architecture is based on rasdaman, a domain-independent database management system (DBMS) that offers a suite of WCS services on top of the DBMS. In the current work we extended rasdaman with facilities to: (i) insert and retrieve multi-layer coverages from WCS, (ii) support new formats, such as HDF, adequate for satellite imagery and multi-layer files, and (iii) support Coordinate Reference Systems. We also demonstrate that it is feasible to use MODIS datasets to automatically compute valuable and regularly updated fuel maps, used as input of fire spread simulations. The results also show that in spite of using inexpensive general and low resolution (500m) MODIS maps, we obtained quite acceptable results when compared with the static ones, which are tailored and higher resolution (80m).

Paper Nr: 35
Title:

PROVIDING FACILITIES FOR THE USE OF TDD IN PRACTICE

Authors:

Vinícius Pereira and Antonio Francisco do Prado

Abstract: In this paper we describe an approach that provides a way to facilitate the use of TDD in the practice of Web application development, independent of the development process used. As an example, it is presented a way of integrating the functional testing (on level of acceptance) in the Scrum process. The functional tests are constructed to test the User Stories, which represent the software requirements specified in the Product Backlog according to the Scrum. The approach is divided into three stages: Tests Specification, Functional Tests Construction and Tests Driven Implementation. An example of social application illustrates the use of the proposed approach.

Paper Nr: 37
Title:

EVALUATING THE SERVICE LEVEL AGREEMENTS OF NDT UNDER WS-AGREEMENT - An Empirical Analysis

Authors:

Marcos Palacios, Laura Moreno, María José Escalona and Mercedes Ruiz

Abstract: Service-Level Agreements (SLA) is one of the well-known mechanisms to manage the services offered by a provider. In software engineering, it is usually taken as the starting point to define the collaboration between the development team and clients. More concretely, an SLA is a part of a service contract where the level of service is formally defined. In this document, both providers and clients purchase commitments that rule the working guidelines in a software project. However, despite its relevance, sometimes it is difficult or too subjective to assure that providers and clients are following SLA. This paper proposes a research approach based on the standard WS-Agreement and model-based paradigms that offers a mechanism for SLA testing and presents an initial evaluation of this approach in a Web methodology named NDT (Navigational Development Techniques). The paper refers to some practical experiences so as to evaluate the quality of the results, as well as introduces a new research line as a future work.

Paper Nr: 42
Title:

AN APPROACH TO DATA COLLECTION IN AN ONLINE SIGNATURE VERIFICATION SYSTEM

Authors:

Andreea Salinca, Sorin Mircea Rusu and Ştefan Diaconescu

Abstract: Online handwritten signature verification is one of the branches of behavioral biometry that is gaining popularity in protecting sensitive information. Our paper addresses a key issue in evaluating performances of online signature authentication systems: data collection. Acquiring a real dataset with handwritten signatures is a major step in the system verification. We will present our collecting techniques in the process of acquisition of dynamic handwritten signatures (more than 5000 genuine signatures and more than 2000 skilled forgeries have been collected from a total of 113 people) useful in the improvement of evaluation results for the authentication system.

Paper Nr: 64
Title:

AN ANALYSIS OF SOCIAL NETWORK CONNECT SERVICES

Authors:

Antonio Tapiador, Víctor Sánchez and Joaquín Salvachúa

Abstract: Social network platforms are increasingly becoming identity providers and a media for showing multiple types of activity from third-party web sites. In this article, we analyze the services provided by seven of the most popular social network platforms. Results show OAuth emerging as the authentication and authorization protocol, giving support to three types of APIs, client-side or Javascript, server-side or representational state transfer (REST) and streaming. JSON is the most popular format, but there a considerable variety of resource types and a lack of representation standard, which makes harder for the third-party developer integrating with several services.

Paper Nr: 79
Title:

MEDI-ADAPT - A Distributed Architecture for Personalized Access to Heterogeneous Semi-structured Data

Authors:

Rim Zghal Rebaï, Amel Corinne Zayani, Ikram Ammous and Abdel Majid Ben Hamadou

Abstract: The increased volume of data in digital form has led to a wide variety of syntactic and semantic data. Thus, the user may encounter several problems related to the heterogeneity, distribution and volume of returned information. As a matter of fact, systems are needed to solve part or all of these problems. In this paper we propose and illustrate a distributed architecture that enables personalized access to collections of heterogeneous and distributed semi-structured documents (XML, RDF, SMIL). This architecture is based on an extension on the reference architecture of mediation systems DARPA I3 by adding an adaptation layer, based on the reference architecture for adaptive hypermedia systems AHA!, that takes into account the user’s request, his context (profile, device, network, etc.. ) and data sources context (minimum bandwidth, necessary characteristics of the device to display data, etc.).

Paper Nr: 97
Title:

TOWARDS THE DEFINITION OF A FRAMEWORK FOR SERVICE DEVELOPMENT IN THE AGROFOOD DOMAIN - A Conceptual Model

Authors:

Donato Barbagallo, Cinzia Cappiello, Alberto Coen Porisini, Pietro Colombo, Marco Comerio, Flavio De Paoli, Chiara Francalanci and Sabrina Sicari

Abstract: This paper describes the work done in the project MoseForAgrofood (Ms4A) whose goal is to take advantage of mobile technologies to develop augmented Web services for the agrofood domain. The use of personal devices, such as smart phones and tablets, brings in specific issues such as the need to consider quality of protection, quality of services, quality of data at any stage of the service life cycle. In this paper we propose a conceptual model that aims to support the service development and provisioning addressing the above issues by managing suitable non-functional properties.

Paper Nr: 100
Title:

GETTING SERIOUS ABOUT PROVIDING MOBILE WEB SERVICE

Authors:

Marc Jansen

Abstract: The role of mobile devices as Web Service consumers is widely accepted and a large number of mobile applications already consumes Web Services in order to fullfill their task. Nevertheless, the growing number of powerful mobile devices, e.g. mobile phones, tablets, … even raise the question whether these devices can not only be used as Web Service consumers but at the same time also as Web Service providers. Therefore, this paper presents an approach that allows to deploy Web Services on mobile devices by the usage of the well-known protocols and standards, e.g. SOAP/REST and WSDL.

Paper Nr: 117
Title:

IDENTIFYING WEBPAGE SEMANTICS FOR SEARCH ENGINE OPTIMIZATION

Authors:

Themistoklis Mavridis and Andreas L. Symeonidis

Abstract: The added-value of search engines is, apparently, undoubted. Their rapid evolution over the last decade has transformed them into the most important source of information and knowledge. From the end user side, search engine success implies correct results in fast and accurate manner, while also ranking of search results on a given query has to be directly correlated to the user anticipated response. From the content providers’ side (i.e. websites), better ranking in a search engine result set implies numerous advantages like visibility, visitability, and profit. This is the main reason for the flourishing of Search Engine Optimization (SEO) techniques, which aim towards restructuring or enriching website content, so that optimal ranking of websites in relation to search engine results is feasible. SEO techniques are becoming more and more sophisticated. Given that internet marketing is extensively applied, prior quality factors prove insufficient, by themselves, to boost ranking and the improvement of the quality of website content is also introduced. Current paper discusses such a SEO mechanism. Having identified that semantic analysis was not been widely applied in the field of SEO, a semantic approach is adopted, which employs Latent Dirichlet Allocation techniques coupled with Gibbs Sampling in order to analyze the results of search engines based on given keywords. Within the context of the paper, the developed SEO mechanism LDArank is presented, which evaluates query results through state-of-the-art SEO metrics, analyzes results’ content and extracts new, optimized content.

Paper Nr: 146
Title:

ANALYSIS OF QOS PARAMETER IN AODV A DSR IN MOBILE AD HOC NETWORKS

Authors:

Liliana Enciso Quispe and Luis Mengual Galan

Abstract: Providing QoS in the context of Ad Hoc networks includes a very wide field of application from the perspective of every level of the architecture in the network. Saying It in another way, It is possible to speak about QoS when a network is capable of guaranteeing a trustworthy communication in both extremes, between any couple of the network nodes by means of an efficient Management and administration of the resources that allows a suitable differentiation of services in agreement with the characteristics and demands of every single application.The principal objective of this article is the analysis of the quality parameters of service that protocols of routering reagents such as AODV and DSR give in the Ad Hoc mobile Networks; all of this is supported by the simulator ns-2. Here were going to analyze the behavior of some other parameters like effective channel, loss of packages and latency in the protocols of routering. Were going to show you which protocol presents better characteristics of Quality of Service (QoS) in the MANET networks.

Paper Nr: 164
Title:

USING DNS FOR GLOBAL DISCOVERY OF ENVIRONMENTAL SERVICES

Authors:

Andreas Kamilaris and Andreas Pitsillides

Abstract: Embedded sensor devices are getting pervasive in our everyday lives. Due to the penetration of the Internet in the real world, sensor devices become globally addressable, while the Web of Things envisions Web presence to these devices and their services. Future abundance of Web-enabled sensors would imply the need for efficient techniques for globally discovering them. To solve this problem using the existing Internet infrastructure, we explore the exploitation of the Domain Name System (DNS) as a scalable, ubiquitous, real-time directory mechanism for embedded devices. We investigate some practical issues that could arise from such an attempt and we discuss the potential of this approach.

Area 2 - Web Interfaces and Applications

Full Papers
Paper Nr: 17
Title:

TOPIC-SPECIFIC WEB SEARCHING BASED ON A REAL-TEXT DICTIONARY

Authors:

Ari Pirkola

Abstract: The contributions of this paper are twofold. First, we present a new type of dictionary that is intended as a search assistance in topic-specific Web searching. The method to construct the dictionary is a general method that can be applied to any reasonable topic. The first implementation deals with climate change. The dictionary has the following new features compared to standard dictionaries and thesauri: (A) It contains real-text phrases (e.g. rising sea levels) in addition to the standard dictionary forms (sea-level rise). The phrases were extracted automatically from the pages dealing with climate change, and are thus known to appear in the pages discussing climate change issues when used as search terms. (B) Synonyms, i.e., different spelling, syntactic, and short form variants of the phrase are grouped together into the same entry (synonym set) using approximate string matching. (C) Each phrase is assigned an importance score (IS) which is calculated based on the frequencies of the phrase in relevant pages (i.e., pages on climate change) and non-relevant pages. Second, we investigate how effective the IS is for indicating the best phrase among synonymous phrases and for indicating effective phrases in general from the viewpoint of search results. The experimental results showed that the best phrases have higher ISs than the other phrases of a synonym set, and that the higher the IS is the better the search results are. This paper also describes the crawler used to fetch the source data for the climate change dictionary and discusses the benefits of using the dictionary in Web searching.

Paper Nr: 32
Title:

COMPARING CROSS-PLATFORM DEVELOPMENT APPROACHES FOR MOBILE APPLICATIONS

Authors:

Henning Heitkötter, Sebastian Hanschke and Tim A. Majchrzak

Abstract: While smartphones are rapidly gaining popularity, they do not (yet) rely on a standardized platform. At least five operating systems are considered important. Developing mobile applications (apps) is thus challenging. Since native development for several platforms requires extreme effort, we designed criteria to assess crossplatform development approaches. We applied our criteria to Web apps, to apps developed with PhoneGap and Titanium Mobile, and – for comparison – to natively developed apps. Particularly the two frameworks are interesting from a Web developer’s perspective since they bridge the gap between Web development and mobile information systems. Our findings are presented as reference tables. Furthermore, we generalize our results. Our criteria have proven to be viable for follow-up evaluations. With regard to the approaches, we specifically found PhoneGap viable if very close resemblance of a native look & feel can be neglected.

Paper Nr: 41
Title:

DECLUSTERING THE ITRUST SEARCH AND RETRIEVAL NETWORK TO INCREASE TRUSTWORTHINESS

Authors:

Christopher M. Badger, Louise E. Moser, P. Michael Melliar-Smith, Isai Michel Lombera and Yung-Ting Chuang

Abstract: The iTrust search and retrieval network aims to provide trustworthy access to information on theWeb by making it difficult to censor or filter information. The declustering algorithm, presented in this paper, randomizes the network in a manner that reduces the clustering, or cliquishness, of the network. This randomization also reduces the necessary amount of cooperation between nodes by ensuring that a connection to any node is short-lived and can be replaced with a connection to another node from a large pool of known peers. Thus, the declustering algorithm reduces the expectation of cooperation among peers, which represents the degree to which the nodes rely on, or act on, information provided by their peers. In general, the smaller the expectation of cooperation, the less susceptible the network is to malicious attacks. Simulation results demonstrate that the declustering algorithm succeeds in randomizing the neighbors of a node in the network and, thus, in reducing the likelihood of malicious attacks.

Paper Nr: 47
Title:

WEB INFORMATION GATHERING TASKS AND THE USER SEARCH BEHAVIOUR

Authors:

Anwar Alhenshiri, Michael Shepherd, Carolyn Watters and Jack Duffy

Abstract: The research described in this article is an attempt to characterize the kind of search behaviour users follow while gathering information on the Web. Information gathering on the Web is a task in which users collect information; possibly from different sources (pages); more likely over multiple sessions to satisfy certain requirements and goals. This process involves decision making and organization of the information gathered for the task. Information gathering tasks have been shown to be search-reliant. Therefore, identifying the kind of search behaviour users choose for this kind of task may lead to supporting Web information gathering tools as recommended in the findings of this research. The results of the user study reported in this paper indicate that the user search behaviour during Web information gathering tasks has characteristics of both orienteering and teleporting behaviours.

Paper Nr: 73
Title:

PHOTOTIMA: VISUAL EXPLORATION OF PHOTOS WITH SPATIOTEMPORAL REFERENCES

Authors:

Dinh Quyen Nguyen and Heidrun Schumann

Abstract: Nowadays, photos associated with spatiotemporal references are available widely on computers as well as on the Internet. There exist several tools for the exploration of photos with regard to their geographical and/or temporal structures. However, communicating spatial and temporal contents of photos remains a challenging task. In this paper, we follow Peuquet’s triad framework in visually combining space, time, and descriptive contents of photos to deal with that task. We address the visual exploration of spatiotemporal photos to be communicated by an integrated design of different abstraction levels in space, time, and content displaying. The tool PhotoTima is introduced for the exploration of Flickr photos in connection with their timestamps, geo-coordinates, and user-generated tags.

Paper Nr: 123
Title:

MIXED-INITIATIVE SCHEDULING OF TASKS IN USER COLLABORATION

Authors:

L. Ardissono, G. Petrone, G. Torta and M. Segnan

Abstract: This paper describes an intelligent, mixed-initiative scheduler which supports users in the organization and revision of their calendars, helping them to allocate personal and shared activities involving other collaborators. Our scheduler exploits well-known temporal reasoning techniques to suggest complete schedules, as well as to guide the user in the exploration of the possible changes to the timing of tasks, in order to enable her/him to modify the calendar in an informed way. We have integrated our scheduler into a Collaborative Task Manager service supporting the management of projects and distributed tasks.

Short Papers
Paper Nr: 28
Title:

GECCO: GERMAN CRAFTS & CRAFTSMEN ONTOLOGY - A Common Crafts Ontology

Authors:

Andrea Horch and Maximilien Kintz

Abstract: In this paper we introduce GeCCO (German Crafts&Craftsmen Ontology), an ontology to establish a common crafts classification, to be used for example in craftsmen search systems. Current standardized categorization systems, which order crafts, do not include all needed logical connections between crafts and craftsmen as well as the synonyms for a sufficient use in a search system. Actual craftsmen search systems have their own categorizations of crafts and craftsmen, but they have the same problems as the standardized systems. The crafts ontology proposed in this paper solves the mentioned problems by creating an extensible class hierarchy as well as by defining synonyms and all needed logical connections between the classes. For quality assurance the ontology was evaluated by crafts experts.

Paper Nr: 34
Title:

TOWARDS USABILITY IMPROVEMENT OF SEMANTIC WEB APPLICATIONS

Authors:

Llúcia Masip, Marta Oliva, Roberto García and Toni Granollers

Abstract: In recent years, a new revision of the Web is being proposed. It goes beyond Web 2.0 so it is called the Web 3.0.We concentrate on just one of them, the one called the Semantic Web. This proposal has been technologically developed and improved but its lack of taking off among end-users seems due to problems in the end-user interactive experience. In this paper, we explore this aspect because it is as important to improve Web 2.0 applications as improving Web 3.0 interfaces and it is as important to develop technology as emphasizing its new user interfaces. Thus, we present a usability evaluation carried out through the heuristic evaluation in eleven semantic web applications to detect common misconducts. In addition, we also assess if we can use the same heuristics for a semantic web applications and for a common Web applications.

Paper Nr: 40
Title:

SUPPORTING NEWS READING AND DISCOVERY THROUGH DIRECTED ONSITE INFORMATION SHARING

Authors:

Pia Tukkinen, Mikko Pohja, Katarina Segerståhl, Suvi Silfverberg and Petri Vuorimaa

Abstract: Sharing has become an integral part of online content discovery. In many cases, content is relevant to members of a close-knit group, rather than all Facebook friends or Twitter followers. To explore emerging practices of directed content sharing, we implemented an integrated sharing platform associated with an online newspaper that allows members of close-knit groups to share and discover articles onsite as a part of their news consumption. The application was evaluated in a field trial. Participants reported lower sharing barriers and increased sharing frequency. They perceived value in sharing and receiving personally targeted news content. Based on these outcomes, we present design recommendations for such systems. Specifically, we contribute to the design requirements of group interfaces and directed information sharing.

Paper Nr: 69
Title:

DEFINING THE INTRINSIC DATA QUALITY FOR WEB PORTALS

Authors:

Carmen Moraga, Angélica Caro, Mª Ángeles Moraga, Rodrigo Romo Muñoz and Coral Calero

Abstract: Web portals facilitate access to data on the Internet. Their use and quantity have increased, which has led to the need to satisfy user preferences in order for them to continue on the market. One competition-based strategy is to provide an adequate quality of service, and one of the key factors in this is the quality of the data provided by the Web portal. Bearing this in mind, we have defined a Data Quality (DQ) Model for Web portals. This model is composed of 42 DQ characteristics which are organized into two points of view and four DQ categories. In this paper we present work which is based on the statistical study of users’ opinions of one of the characteristics in the model – the Intrinsic DQ category. Our objective is to determine which characteristics in the Intrinsic category will be most relevant as regards the users’ gender, age range, level of studies and knowledge of computing, thus allowing us to verify that, according to the aforementioned parameters, the importance of some characteristics varies with regard to others. For example, women place more importance upon Credibility, while men view the Accessibility of the data in Web Portals as being more important.

Paper Nr: 106
Title:

WATERMARKING IMAGES USING 2D REPRESENTATIONS OF SELF-INVERTING PERMUTATIONS

Authors:

Maria Chroni, Angelos Fylakis and Stavros D. Nikolopoulos

Abstract: In this work we propose an efficient and easily implemented codec system, which we named WaterIMAGE, for watermarking images that are intended for uploading on the web and making them public online. An important fact of our system is that it suggests a way in which an integer number can be represented in a two dimensional grid and, thus, since images are two dimensional objects that representation can be efficiently marked on them. In particular, our system uses an efficient technique which is based on a 2D representation of self-inverting permutations and mainly consists of two components: the first component contains an encoding algorithm which encodes an integer w into a self-inverting permutation p∗ and a decoding algorithm which extracts the integer w from p∗, while the second component contains codec algorithms which are responsible for embedding a watermark into an image I, resulting the image Iw, and extract it from Iw. Our system incorporates important properties which allow us to successfully extract the watermark w from the image Iw even if the input image has been compressed with a lossy method and/or rotated. All the system’s algorithms have been developed and tested in JAVA programming environment.

Paper Nr: 147
Title:

DEVELOPMENT AND EVALUATION OF A COMPUTER GAME FOR TEACHING VOCABULARY TO CHILDREN WITH AUTISM

Authors:

Rafael Moreira Cunha and Simone Diniz Junqueira Barbosa

Abstract: Autism is a global development disorder that affects children's ability to communicate, to establish relationships and to respond appropriately to the environment. Within Computer Science, the area of Human-Computer Interaction (HCI) can assist in building high quality tools that can help the development of children with autism. This work aims to analyze the impact of a computer game developed exclusively to help children with autism in vocabulary acquisition. The results obtained so far show that children were able to effectively learn new words. Evidence of generalization and retention has been shown.

Paper Nr: 150
Title:

A FLEXIBLE SUPPORT OF NON CANONICAL CONCEPTS IN ONTOLOGY-BASED DATABASES

Authors:

Youness Bazhar, Yamine Aït-Ameur, Stéphane Jean and Mickaël Baron

Abstract: Several ontologies are currently defined for various domains and for a wide range of applications. As a consequence, two problems shall be addressed (1) the size of data described by ontologies is huge and (2) existing ontologies are not all similar: they can be defined with different formalisms leading to different types of ontologies (canonical, non canonical and linguistic ontologies). The first problem has been solved by using databases to store data and ontologies that define the semantics of data. However, these databases, called Ontology-Based Databases (OBDB), do not handle the second problem i.e., that different types of ontologies exist. Indeed, they usually support a given ontology formalism without providing any mean to handle ontologies defined in an other formalism. In this paper, we propose an extension of the OntoDB OBDB to support the introduction of new operators that could be exploited by its exploitation language OntoQL. Such operators can be implemented by an external program located outside the database, or could invoke a web service. We show that these operators can be used to introduce new ontology constructors in order to support a given ontology model inside OntoDB. As a running example, we consider the support of the OWL non canonical constructors which are not supported in the native OntoDB OBDB.

Paper Nr: 151
Title:

WAVELET-BASED MUSIC RECOMMENDATION

Authors:

Fabio Gasparetti, Claudio Biancalana, Alessandro Micarelli, Alfonso Miola and Giuseppe Sansonetti

Abstract: Recommender Systems provide suggestions for items (e.g., movies or songs) to be of use to a user. They must take into account information to deliver more useful (perceived) recommendations. Current music recommender takes an initial input of a song and plays music with similar characteristics, or music that other users have listened to along with the input song. Listening behaviors in terms of temporal information associated to ratings or playbacks are usually ignored. We propose a recommender that predicts the most rated songs that a given user is likely to play in the future analyzing and comparing user listening habits by means of signal processing techniques.

Paper Nr: 173
Title:

THE IMPORTANCE OF HUMAN MENTAL WORKLOAD IN WEB DESIGN

Authors:

Luca Longo, Fabio Rusconi, Lucia Noce and Stephen Barrett

Abstract: The focus of this study is the introduction of the construct of Human Mental Workload (HMW) in Web design, aimed at supporting current interaction design practices. An experiment has been conducted using the original Wikipedia and Google web-interfaces, and using two slightly different versions. Three subjective psychological mental workload assessment techniques (NASA-TLX, Workload Profile and SWAT) with a well-established assessments usability tool (SUS) have been adopted. T-tests have been performed to study the statistical significance of the original and modified web-pages, in terms of workload required by typical tasks and perceived usability. Preliminary results show that, in one ideal case, increments of usability correspond to decrements of generated workload, confirming the negative impact of the structural changes on the interface. In another case, changes are significant in terms of usability but not in terms of generated workloads, thus raising research questions and underlying the importance of Human Mental Workload in Interaction Design.

Posters
Paper Nr: 14
Title:

WEBSITE NAVIGATION: AN EXPLORATORY STUDY OF THREE NAVIGATION TOOLS FOR SIMPLE WEB TASKS

Authors:

Naureen Nizam, Carolyn Watters and Anatoliy Gruzd

Abstract: The purpose of this study is to compare how users perceive and use three navigation tools (search, menus and tag clouds) on websites to find information. Furthermore, the study compares two variations of tag clouds, one where the tags are created by a single author and the other where the tags are created by a community of authors. Using mixed methodologies, data was captured and analyzed for effectiveness, efficiency and enjoyment. The results show that overall search and tag clouds are more effective and preferred among users. Tag clouds, where the tags are created by a single author are more efficient than those created by a community of authors. The findings from this study provide recommendations for future research in improving navigation on websites.

Paper Nr: 55
Title:

INCONSISTENCY IDENTIFICATION IN DYNAMIC ONTOLOGIES BASED ON MODEL CHECKING

Authors:

Mahdi Gueffaz, Perrine Pittet, Sylvain Rampacek, Christophe Cruz and Christophe Nicolle

Abstract: The increasing use of ontologies and the cost of changes support the need to manage the evolution of ontologies. A common kind of error in ontology evolution is the logical contradiction declined as incoherences and inconsistences. In this paper, we propose a new approach to predict and identify the incoherences and inconsistences in the evolution of ontologies based on temporal logic and ontology design patterns. We implement the proposed approach using the NuSMV model checker. Based on these patterns, we propose an automated process to guide and monitor the implementation of change while ensuring the consistency of the evolved ontology.

Paper Nr: 62
Title:

APPROXIMATING USER'S INTENTION FOR SEARCH ENGINE QUERIES

Authors:

Aya Awad, Maged El-Sayed and Y. El-Sonbaty

Abstract: Documents on the internet are not organized in a way that eases search and retrieval by users using search engines. The user of the search engine is typically overwhelmed by the size of the returned result and does not normally look beyond the first few pages of result. Knowing that the majority of search engines are term-based, this information retrieval problem is caused by two issues: (1) query articulation issue; where the user is not capable of expressing his information need well, and (2) semantic gap issue where the search engine may not be able to retrieve semantically relevant documents. In this paper we introduce a solution that addresses these issues through semantic enrichment and query reformulation. Our solution approximates the user’s intention in order to return better search results. Experiments show significant enhancement in search results over traditional keyword-based search engines’ results and over selected semantic search engines.

Paper Nr: 68
Title:

AN ONTOLOGY-BASED QUESTION ANSWERING SYSTEM EXPLOITING SEARCH ENGINES’ RESULTS

Authors:

Plegas Yannis and Kafeza Evanthia

Abstract: This paper proposes a Semantic Web Application which extends search engines giving them the ability to answer natural language queries. The application builds an automatic ontology-based question-answering system from the texts of the search engine’s results. The automatic question- answering system converts the results of a traditional search engine to ontology, integrating syntactic analysis as well as the respective semantic rules. The main idea of this paper is the use of OWL Description Logic rules to model the human logic for the process of an answer in a question through the syntactic structure of the texts which contain the answer. Specifically, it is described the process for the creation of the ontology and the construction of the proper queries to the ontology for each type of question through the OWL semantic web language.

Paper Nr: 89
Title:

IWONTO – SQL BASED MAPPING FROM RELATIONAL DATABASES TO ONTOLOGIES

Authors:

Karsten Tolle and Mario Bachmann

Abstract: Ontologies are a formal representation of knowledge and semantics. With the emergence of the Semantic Web in the early 2000s, ontologies were pushed and from a theoretical point of view, many things could be solved. However, on the applicability level even finding the right tool to extract and load relational data into an existing ontology is a challenge and performing it remains a time consuming task. Based on various real case scenarios from the archaeological domain, we tried ontology-based approaches to integrate data. In those scenarios we had to deal with relational schema violating academic design principles. This complicated the situation. After an analysis of existing tools, we decided to implement our own tool to import relational data from different sources into our ontology. This paper will explain our motivation for implementing our tool called IwOnto and how it works. We decided to base it on SQL, which is known by our main target audience. Thereby we reached our design goal to avoid the necessity of learning another query language (e.g. SPARQL).

Paper Nr: 120
Title:

AN APPROACH TO MATCH AND INTEGRATE ONTOLOGY USING ONTOLOGY REPOSITORY AND RULE BASE

Authors:

Dan Wu and Anne Håkansson

Abstract: There exist a lot of ontologies that together can enrich knowledge within one or several related domains, thereby supporting the development of advanced services on the semantic web. This requires matching and integrating ontologies. This paper introduces an ontology matching process that handles the heterogeneities. The result is an intersection of the two original ontologies. An ontology repository stores the original ontologies and the matching results. A rule base is designed to integrate stored ontologies and the matching results with metadata, which is describing the interpretation of these ontologies and ontology matching results. The contribution of our approach is the semantic violation check which results in an ontology intersection that validates in the original ontologies. The metadata is applied with rules to integrate the ontologies so that the ontology and the matching results can be reused.

Paper Nr: 126
Title:

TERRITORIES OF EXPERIENCE - Urban, Social, Digital Spaces: A User-centered Perspective

Authors:

Letizia Bollini

Abstract: The paper explores the relationship between spatial, social and digital spaces in a user-centered approach according to the Lynch’s perspective on the mental construction that people living in the same urban space share an image of it. The digital territories, as the social network of the web 2.0, seem to set up similar connections and –at the same time different– as the traditional social dynamics do with the physical territory. How is the digital interaction able to reproduce significant experiences of meaning for the different user personas or –more precisely– for the social groups that in the territory live and communicate? The paper –based on an experimental research– tries to investigate and to propose metaphor or design concepts of interfaces based both on cognitive representation that people have of the urban space daily experienced according to the physical organization and on the connections that the social groups establish between themselves in the real and in the digital space in which they interact.

Paper Nr: 157
Title:

IMPROVING THE USER EXPERIENCE BY WEB TECHNOLOGIES FOR COMPLEX MULTIMEDIA SERVICES

Authors:

Tayeb Lemlouma

Abstract: In this paper we address the accessibility to advanced networking functionalities and media rendering using a new framework. The objective of proposing this new framework is to make advanced services accessible for heterogeneous and limited devices. The context of this work concerns digital homes where several multimedia services exist and their use requires complex configurations and the ability to handle advanced networking operations. This required ability is not satisfied for handheld devices that are heterogeneous in terms of software and hardware capabilities. Indeed, even advanced mobile terminals do not support, at least natively, networking operations such as the multicast, services discovery and multimedia streaming with different protocols. In order to improve the user’s experience in such environments, we focus on the Web accessibility and the adoption of the HTTP protocol that are nowadays supported by the majority of heterogeneous terminals such as mobile phones, TVs and game boxes. In order to demonstrate the feasibility and the validity of our framework we consider, as a digital home architecture, the Digital Living Network Alliance (DLNA) environment. We show that even if the existing architecture and multimedia/networking services are complexes, the proposed framework simplifies the architecture for the user and guarantees the delivery of an accessible and adapted response.

Paper Nr: 181
Title:

AUTOMATIC APPROACH FOR ONTOLOGY EVOLUTION BASED ON STABILITY EVALUATION

Authors:

Karim Kamoun and Sadok Ben Yahia

Abstract: The life time of ontology exploitation depends on the right way of making their evolution. So, in this paper, we present a new approach of ontology enrichment. According to the stability describing the cohesion between concepts, our proposal selects automatically the appropriate position for inserting new concepts to ontology.

Area 3 - Society, e-Business and e-Government

Full Papers
Paper Nr: 31
Title:

SELF-ORGANIZING MAPS - An Approach Applied to the Electronic Government

Authors:

Everton Luiz de Almeida Gago Júnior, Gean Davis Breda, Eduardo Zanoni Marques and Leonardo de Souza Mendes

Abstract: With the facilitations and results offered by automated management systems, more and more municipalities seek to eliminate physical documents by digitally storing their information. One of the direct consequences of that is the generation of a large volume of data. This paper proposes a model to support decision making based on self-organized maps. Applied to electronic government tools, this model can help identify unknown data patterns guiding the decision making process. For the accomplishment of the case study, available information from the city of Campinas, São Paulo, Brazil has been provided.

Paper Nr: 45
Title:

AN INVESTIGATION OF SOCIAL MEDIA USE IN SAUDI ARABIA

Authors:

Sanaa Askool

Abstract: Social media are new communication tools and exist in a range of forms that allow a user to connect and interact with others. Additionally, they offer a way to create a collaborative environment through participation and sharing information. Even though social media tools are widely used, it is not well understood how individuals’ concerns and motivations influence their use. This paper aims to investigate the use of social media among people in Saudi Arabia using a survey method to understand the impact of cultural restrictions on individual’s motivation, intention behaviour and their actual use in business. Based on the research results, users’ attitude and behaviour towards the use of social media are discussed.

Paper Nr: 46
Title:

WEB-BASED EMERGENCY RESPONSE COMMUNITY - Framework and Case Study on Fire Response Community

Authors:

Alexander Smirnov, Tatiana Levashova, Nikolay Shilov and Alexey Kashevnik

Abstract: The research addresses the problem of exploitation of smart space’s facilities for the organization of resources of a smart space into an emergency response community. The members of such a community and people involved in emergency are enabled to use Web-based interface for their communications and making decisions, i.e. they organise a Web-based community. The paper proposes a framework that incorporates concepts of smart space, Web-based communities, and Web-services. The framework replaces real-world resources of the smart space with their service-based representations. As a result of this replacement, the emergency response community comprises Web-services representing resources providing emergency response services. Service-oriented architecture serves to coordinate interactions of the Web-services the framework deals with. The applicability of the proposed framework is demonstrated by a simulated case study on organization of a fire response community.

Paper Nr: 85
Title:

ENHANCING THE BLENDED SHOPPING CONCEPT WITH ADDITIVE MANUFACTURING TECHNOLOGIES - Added Value for Customers, Retailers and Additive Manufacturers

Authors:

Britta Fuchs, Thomas Ritz and Henriette Stykow

Abstract: This paper starts from the idea that combining processes of eCommerce and traditional commerce (blended shopping) can bring advantages for customers and retailer. One possibility to take the emerged individualization trend on consumer markets into account is to integrate latest rapid prototyping technologies (additive manufacturing) in order to enhance the blended shopping concept. The availability of Internet can be seen as the enabler for such services. First blended shopping and rapid prototyping with its latest developments of additive manufacturing (AM) are explained. Then their impacts on the aimed individualized blended shopping concept are depicted with the help of a use case. From this use case the benefits for business and consumers are derived and additionally the framework of a needed AM-toolkit is concretized. Finally the paper closes with a future outlook on the necessity of research in the field of individualization aspects of blended shopping and web standards.

Short Papers
Paper Nr: 4
Title:

EVALUATION OF ENTERPRISE TRAINING PROGRAMS USING BUSINESS PROCESS MANAGEMENT

Authors:

Fodé Touré and Esma Aïmeur

Abstract: The investment in human capital, by means of training delivered in enterprise, became an important constituent of enterprise competitiveness strategy. Consequently business managers require from their human resources managers, training departments, or even of consultants working in the field of training, the proofs of training investment yield in terms of tangible and intangible profits. To evaluate training in enterprise, two models predominate, namely the model of Kirkpatrick and that of Phillips. In this paper, we propose an approach of training project evaluation, based on business process management. It is an approach which fills the gaps raised in the literature and ensures an alignment between training activities and business needs.

Paper Nr: 7
Title:

ANALYZING COMPLAINT INTENTIONS IN ONLINE SHOPPING - The Perspective of Justice, Technology and Trust

Authors:

Ing-Long Wu and Chu-Ying Fu

Abstract: Customers’ complaint behaviors are the key to repurchase intention in online shopping. An understanding of the behaviors can provide insight to failed service experience and in turn, effectively redress their problems. Therefore, it is important to examine the underlying drivers of complaint intentions in online shopping. Online shopping is operated in a web-based virtual store. Online shoppers are both the buyers of products and users of web-sites. Moreover, trust belief on e-vendors determines the psychological state of individual shopping behaviors. Three major concerns particularly arise in this context, individual behavior, technology use, and trust. This study thus proposed a novel research model in an integration of justice, technology use, and trust issues to examine customer satisfaction and complaint behaviors. Data were collected from an online survey with online-shopping experience. The empirical results indicated that distributive justice and interactional justice contribute significantly to customer satisfaction and complaint intentions as procedural justice does not. Technology-based features and trust belief are both important in determining the two target variables. Implications for managers and scholars are further discussed.

Paper Nr: 9
Title:

CLOUD COMPUTING ADOPTION - An Exploratory Study

Authors:

Yazan Alshamaila, Savvas Papagiannidis and Feng Li

Abstract: The growing adoption of cloud computing is changing the way business information systems are developed, scaled up, maintained and paid for. This not only applies to large organisations, but also increasingly to small and medium-sized businesses (SMEs). In particular, cloud computing promises to improve the reliability and scalability of IT systems, which allows SMEs to focus their limited resources on their core business and strategy. In the SME context, technology adoption and usage decisions are influenced by many factors. This paper attempts to conceptualize cloud computing adoption and to enhance understanding of the range of factors affecting cloud computing adoption decision making in SMEs. Based on semi-structured interviews with SMEs and service providers in the North East of England, a number of factors were examined and found to affect the adoption process. By adopting the TOE framework as a theoretical basis, it has been found that cloud computing adoption decision is influenced by different types of factors and therefore, is not exclusive to one or two dimensions e.g. technological and organisational contexts, as presented in some previous ICT adoption studies. The main factors that were identified playing a significant role in SME adoption of cloud services were: relative advantage, uncertainty, geo-restriction, compatibility, trialability, size, top management support, innovativeness, industry, market scope, supplier efforts and external computing support. These finding have important implications and great value to the research community, business practitioners, and policy makers in terms of formulating better strategies for cloud computing adoption. For service providers, using the research model in this study can assist in increasing their understanding of why some SMEs choose to adopt cloud computing services. In this study, the authors present empirical evidence from Northeast of England where limited research efforts have taken place.

Paper Nr: 18
Title:

A KNOWLEDGE SERVER FOR SUSTAINABLE AGRICULTURE - Main Computing Features

Authors:

Vincent Soulignac, Eva Lambert, Catherine Roussey, Jean-Pierre Chanet, Jean-Louis Ermine, Jean-Luc Paris and Olivier Devise

Abstract: Agriculture must evolve into a more environmentally-friendly approach, while remaining economically viable and socially interesting, which is necessary so that the process can be pursued in the long term, i.e that the process is sustainable (Brundtland, 1987). Sustainable agriculture has a systemic logic and therefore requires a strong knowledge base. In this study, we propose a knowledge management computing tool. In the first part of our article, we discuss the potential actors of the tool and their possible implications. The second part deals with its contents. In the third part, the main computing features of the tool are shown.

Paper Nr: 29
Title:

MEASURING TRUST IN ONLINE SOCIAL NETWORKS - The Effects of Network Parameters on the Level of Trust in Trust Games with Incomplete Information

Authors:

Parvaneh Afrasiabi Rad, Svante Edzen and Soren Samuelsson

Abstract: The most currently popular method for assessing trust in online social networks is Trust Game. The major studies in this area have established results formed into hypotheses for the effects of a number of network parameters on the extent to which individuals would place trust on each other. However, hypotheses for the effects of a few number of network parameters, such as Indegree, are not deducible since the restrictive game-theoretic assumptions that are imposed into the model do not let any such evidence available. To relax the game-theoretic assumptions, we develop a model for games with incomplete information, based on a game-theoretic model developed by Buskens (1998), and conduct a series of computer simulation of a model of Iterated Heterogeneous Trust Games (IHTG). We compare the results with those of Buskens’ (1998) model and introduce Link-Strength as a new network parameter to investigate. Our results show a positive effect of both Indegree and Link-strength on the level of trust in a noisy environment. In addition, we come to a conclusion that current models can be fooled by the existing noise in the context of information transmission, such as inactive users in our case.

Paper Nr: 38
Title:

AN EXTENDED ARCHITECTURE FOR ADAPTATION OF SOCIAL NAVIGATION

Authors:

Manel Mezghani, Corinne Amel Zayani, Ikram Amous and Faiez Gargouri

Abstract: Social navigation is a way for users to navigate through social information such as resources and social annotation (tags). However, due to the growth of social networks, the user could be lost. To avoid this problem of disorientation, we try to adapt the social information through a recommendation technique by providing useful information according to the user’s needs. In this paper, we present an extended architecture of social recommender system. The originality of this architecture rely on the way to combine the collective intelligence of the social network with the user’s behaviour especially his tagging behaviour.

Paper Nr: 53
Title:

WEB-BASED KNOWLEDGE NUGGETS FOR ARCHITECTURE KNOWLEDGE MANAGEMENT

Authors:

Meira Levy, Irit Hadar and Ethan Hadar

Abstract: This paper presents in-process knowledge management for technical information, managing architecture knowledge nuggets, and implemented as embedded toolbar and Web repositories façade. The façade encompasses a plug-in and approach for documenting, reviewing and communicating knowledge nuggets. The nuggets are concise representations of architecture knowledge addressing best practices, design patterns, review comments and any additional architecture concerns. The knowledge activities are embedded during the lifecycle of software product development, namely, in-process, and may foster reuse of architecture artifacts. The façade is a Web accessed system to existing and new organizational knowledge management systems, and can serve as an access point from within any existing information system (e.g., service desks). Utilizing the Web based knowledge façade reduces the time-to-value in making architecture decisions while increasing the quality of the resulted artifacts. In addition, the facade provides on-the-fly access to relevant information and best practices related to architectural design decisions during routine R&D and deployment activities.

Paper Nr: 91
Title:

BULKER - A Mediator System Grounded on Social Networks for Online Trading of Batches of Products

Authors:

Martín López-Nores, Yolanda Blanco-Fernández, José J. Pazos-Arias and Manuela I. Martín-Vicente

Abstract: We present a system that mediates between consumers and providers for the trading of batches of products on the Internet, leaning on social networks as a vehicle for the distribution of publicity and the formation of groups of interest. The system enables new means for providers to reach groups of users potentially interested in their products, reducing the burden of specifying the characteristics of the target audience of each campaign. As regards the consumers, they are offered a convenient and reliable mechanism to purchase products at a lower price, with the additional advantage of a new form of targeted, trust-based advertising. In terms of exploitation, a clear business model arises, based on obtaining a profit margin from the discounts enjoyed by those who decide to participate in the purchase of a batch of products, as well as on the optimization of the distribution logistics in the case of material assets.

Paper Nr: 99
Title:

ELECTRONIC WORD-OF-MOUTH VIA TWITTER - Customer eWOM Motivations and Intentions

Authors:

Basim Musallam and Rodrigo Magalhães

Abstract: The study aims to explore customers’ motivational factors to express their opinions in Twitter regarding company performance, products and services. Using Twitter as the main medium of the study, an electronic questionnaire has been implemented to gather data. A total of 1,192 complete valid responses have been collected from 5,011 hits on Twitter. Data were statistically analyzed to extract the strongest factors. The results show that consumers are driven by multiple motives. Concern for Other Consumers, Extraversion/Positive Self Enhancement, Venting Negative Feelings and Helping the Company are the primary factors. Furthermore, we have identified early symptoms of grouped eWOM in Twitter against and in favour of companies which carry an important message to companies regarding the need to formulate proactive strategies to deal the with upcoming trend of Twitter powers for companies. The study was carried out in Kuwait.

Paper Nr: 114
Title:

CITIZEN-SIDE HANDLING OF LIFE EVENT SERVICES

Authors:

Hélder Gomes, André Zúquete and Gonçalo Paiva Dias

Abstract: CHAPAS is a model for the provision of life event e-government services where no direct communication between service providers exists. The citizen, assisted by a personal tool (Chappie), is responsible to gather all the information required by the service he wants to apply to, possibly from services of other providers. In this paper we discuss how life event e-government services are provided in CHAPAS, from the point of view of the interactions of Chappie with services. The immediate advantage of this approach is that services do not need to directly interact with each other to provide complex life event services, thereby citizens having full control of the flow of their personal information.

Paper Nr: 124
Title:

THE PREVALENCE OF SAML WITHIN THE EUROPEAN UNION - An Empirical Study

Authors:

Bernd Zwattendorfer, Thomas Zefferer and Arne Tauber

Abstract: Various European countries have set up national eID infrastructures that allow citizens to securely authenticate at e-Government or e-Banking services. In a converging European society, interoperability between national eID solutions becomes an important issue. The EU large scale pilot STORK tackles this issue and implements an interoperability layer that connects national infrastructures. The secure, reliable, and efficient exchange of identity information is thus a key feature of the STORK interoperability layer. Several protocols exist that are basically able to implement this feature. In private sector applications, SAML is frequently used for the exchange of identity and authentication data. To verify whether this protocol has also proven itself in the public e-Government domain, a survey on existing national eID solutions based on SAML has been carried out. The survey was based on a comprehensive questionnaire that was sent out to 14 Member States of the European Union. The collected results revealed that SAML is prevalently used in most national eID solutions and hence perfectly suitable to build the basis of the STORK interoperability layer.

Paper Nr: 182
Title:

REPRESENTATION OF E-COMMERCE INTERACTIONS BY MEANS OF A GAME THEORY MODEL - Adoption of the Trust

Authors:

Cosimo Birtolo, Giuseppina Russo and Davide Ronca

Abstract: In this paper, we investigated the application of trust in an e-Commerce system. In a B2C scenario of an e-Commerce system, a game model is proposed in order to investigate the best strategies for merchants and customers. Preliminary investigation outlines the benefits of trust information in the proposed game and preliminary results, conducted on a transactional database, shows an increased value of sensitivity of provided recommendations to the customers, entailing an higher customer loyalty. Future works are aimed at validating this findings by means of a larger real dataset.

Posters
Paper Nr: 61
Title:

A SYSTEMATIC REVIEW OF E-GOVERNMENT ONTOLOGIES

Authors:

Demetrios Sarantis and Dimitris Askounis

Abstract: This paper applies the method of systematic review for identifying, extracting and analyzing the principal proposals for e-Government ontologies. The most mature proposals have been selected and compared by using a formal framework, extracting the key requirements that an integrated and unified e-Government ontology should have, and providing the first steps towards its definition. Nine e-Government ontology models were identified from a systematic review of literature. A ten point comparison framework was developed to consider the underlying concepts as well as application of the ontology models. The comparison results were then synthesised into six gaps to inform future e-Government ontology research.

Paper Nr: 65
Title:

HOW MANY STEPS - DO THEY COUNT? - Experiments on Pedometer Use

Authors:

Eija Koskivaara, Leena Haanpää, Harri Helajärjvi, Raija Laukkanen and Olli J. Heinonen

Abstract: Physical inactivity is the fourth highest risk for mortality globally. One of the main drivers for physical activity (PA) in the future could be information and communication technology (ICT) gadgets and services that support active way of living. This paper focuses on how pedometer use supports PA and the end-user experience of the device. 26 subjects took part in a five-month study. Data was collected with a semi-structured questionnaire from individuals using pedometers and reporting their daily steps. The participants increased their PA during the project and most of them wanted to continue with the more active lifestyle.

Paper Nr: 121
Title:

DIGITAL DIVIDE SURVEY ANALYSING THE “.IT” REGISTRAR MARKET

Authors:

Maurizio Martinelli, Michela Serrecchia and Irma Serrecchia

Abstract: In this paper the identification of factors contributing to the differences on Internet use (digital divide) in Italy, during recent years, was reported, focused on the analysis of the market of “Registrars” in the domain name registration field. In particular a comparison between the results of a similar study, done until December 2005, and the data of domain names registered by “Registrars” up to December 2010, was carried out. In Italy, the registration of a new Internet domain name is usually made through a service company (Registrar) accredited by the National Registry, where all data related to such registration are managed. In order to analyse the diffusion of the Internet in Italy, the number of Registrars and the number of registered domains were used as indicators. To define the factors that determine the digital divide the regression multiple model was utilized, based on the stepwise method. The dependent variable taken into consideration was the penetration rate at the regional level and the independent variables were regional economic, cultural, demographic and technological factors. Above all the regions with a low unemployment rate and with high economic values, such as added value per employee and high per capita income, are more inclined to use the network. Furthermore, the level of education resulted a decisive factor: as a matter of fact, regions with a high number of graduates, specialized in ICT fields, are more inclined to utilize the Internet technology than those that register a number of ICT graduates below the average. Finally, an interesting result was that, in Italy, a few Registrars register a higher percentage of domain names under the Country Top Level Domain ".it". The phenomenon of the registration of domain names is concentrated in the hands of a few Registrars. This aspect was significantly evidenced in 2010.

Paper Nr: 183
Title:

SUPPORTING ATTITUDES MANAGEMENT - A Component of Training and Talent

Authors:

Yasmín Hernández, Guillermo Rodríguez and Israel Paredes

Abstract: Talent, also known as human capital, has been recognized as key component of companies’ success due to its impact in every process of organizations. A component of talent is the attitude, which is generally known as a disposition of the person to act in a certain way. We have worked in modelling attitudes as a component of training and talent management. The initial version of the proposed attitudes model consists in relevant attitudes and its relationships, attitudes classification and attitudes measurement scales. To support the implantation model, a computer system in web has been developed. The attitudes model, a computer system for its implementation and the results in the process to implant the attitudes model are presented.

Area 4 - Web Intelligence

Full Papers
Paper Nr: 33
Title:

RANKING LOCATION-DEPENDENT KEYWORDS FROM MICROBLOGS

Authors:

Satoshi Ikeda, Nobuharu Kami and Takashi Yoshikawa

Abstract: The spread of microblogging services, such as Twitter, has made it possible to extract location-dependent context such as keywords specific to a geographical region, with fine granularity. The results of content analysis of microblogging services are affected by users who post excessive messages. In addition, because geographical granularity of users’ interests differs, it is preferable to support multiple levels of granularity for usability. Thus, we propose a ranking method of location-dependent keywords based on a term frequency-inverse document frequency method, which takes into account diversity of information sources and supports multiple zoom levels of geographical areas by approximation. We evaluated our ranking method with a real dataset from Twitter and showed its effectiveness. We also describe a prototype implementation of a system using our ranking method.

Paper Nr: 109
Title:

W-ENTROPY RANK - A Unified Reference for Search Engines

Authors:

Li Weigang and Zheng Jianya

Abstract: Baidu, Sogou and Google are three main utilized search engines in China reported by Chinese Internet Date Centre (CNZZ) recently. During daily search in the Internet, it is easy to find that there are significant differences among the search rank indexes such as Baidu weight, Sogou rank and PageRank. As a result, the sequence of the search lists is totally different for a same keyword. On the other hand, some valuable articles in web as blogs in ScienceNet.cn are ignored by Baidu, Sogou and others. It is impossible to unify these ranking systems to a same level due to the business models from multi-enterprises. This paper studies the difference of ranking indexes of these search engines by analyzing 4 kinds of 42 websites in China. With the analyses of the correlation among these ranking indexes, averaged and weighted indexes, W-entropy rank index using information theory is proposed as a search ranking reference. With the property analyses, this new index demonstrates the ranking reality of Chinese websites. After the publication of this main idea in our blog, Baidu and Sogou adjusted their ranking indexes of some websites, achieving a better match with W-entropy rank index.

Paper Nr: 111
Title:

WHAT IS THE RELATIONSHIP ABOUT? - Extracting Information about Relationships from Wikipedia

Authors:

Brigitte Mathiak, Victor Manuel Martínez Peña and Andias Wira-Alam

Abstract: What is the relationship between terms? Document analysis tells us that ”Crime” is close to ”Victim” and not so close to ”Banana”. While for common terms like Sun and Light the nature of the relationship is clear, the measure becomes more fuzzy when dealing with more uncommonly used terms and concepts and partial information. Semantic relatedness is typically calculated from an encyclopedia like Wikipedia, but Wikipedia contains a lot of information that is not common knowledge. So, when a computer calculates that Belarus and Ukraine are closely related, what does it mean to me as a human? In this paper, we take a look at perceived relationship and qualify it in a human-readable way. The result is a search engine, designed to take two terms and explain how they relate to each other. We evaluate this through a user study which gauges how useful this extra information is to humans when making a judgment about relationships.

Paper Nr: 112
Title:

GROWING HIERARCHICAL SELF-ORGANISING MAPS FOR ONLINE ANOMALY DETECTION BY USING NETWORK LOGS

Authors:

Mikhail Zolotukhin, Timo Hämäläinen and Antti Juvonen

Abstract: In modern networks HTTP clients request and send information using queries. Such queris are easy to manipulate to include malicious attacks which can allow attackers to corrupt a server or collect confidential information. In this study, the approach based on self-organizing maps is considered to detect such attacks. Feature matrices are obtained by applying n-gram model to extract features from HTTP requests contained in network logs. By learning on basis of these matrices, growing hierarchical self-organizing maps are constructed and by using these maps new requests received by the web-server are classified. The technique proposed allows to detect online HTTP attacks in the case of continuous updated web-applications. The algorithm proposed was tested using Logs, which were aquire acquired from a large real-life web-service and include normal and intrusive requests. As a result, almost all attacks from these logs have been detected, and the number of false alarms was very low at the same time.

Paper Nr: 113
Title:

SELF-SUPERVISED PRODUCT FEATURE EXTRACTION USING A KNOWLEDGE BASE AND VISUAL CLUES

Authors:

Rémi Ferrez, Clément de Groc and Javier Couto

Abstract: This paper presents a novel approach to extract product features from large e-commerce web sites. Starting from a small set of rendered product web pages (typically 5 to 10) and a sample of their corresponding features, the proposed method automatically produces labeled examples. Those examples are then used to induce extraction rules which are finally applied to extract new product features from unseen web pages. We have carried out an evaluation on 10 major French e-commerce web sites (roughly 1 000 web pages) and have reported promising results. Moreover, experiments have shown that our method can handle web site template changes without human intervention.

Paper Nr: 128
Title:

INFERRING WEB PAGE RELEVANCE FROM HUMAN-COMPUTER INTERACTION LOGGING

Authors:

Vincenzo Deufemia, Massimiliano Giordano, Giuseppe Polese and Genoveffa Tortora

Abstract: Quality of search engine results often do not meet user’s expectations. In this paper we propose to implicitly infer visitors feedbacks from the actions they perform while reading a web document. In particular, we propose a new model to interpret mouse cursor actions, such as scrolling, movement, text selection, while reading web documents, aiming to infer a relevance value indicating how the user found the document useful for his/her search purposes. We have implemented the proposed model through light-weight components, which can be easily installed within major web browsers as a plug-in. The components capture mouse cursor actions without spoiling user browsing activities, which enabled us to easily collect experimental data to validate the proposed model. The experimental results demonstrate that the proposed model is able to predict user feedbacks with an acceptable level of accuracy.

Short Papers
Paper Nr: 50
Title:

COMMUNITY ASSOCIATION MAP - Processing Inter-community Relationships

Authors:

Dárlinton B. Feres Carvalho, Hugo Fuks and Carlos José Pereira de Lucena

Abstract: The use of modern communication technology like the Internet brings a new perspective for the study of society. Following this paradigm shift, this paper presents a process to help in the analysis of social media available on the Internet, specially the analysis focused in the online community’s content. The process goal is to reveal the interests of users through a map of associated communities. The user membership is utilized to establish the relationship among communities. This map shows the interests of members in other communities. An example illustrates the application of the process. A discussion about the opportunities and drawbacks of the process usage is also presented.

Paper Nr: 66
Title:

SMART WEB VISIBILITY OF ORGANIZATIONS

Authors:

Augusto Klinger, José Valdeni de Lima and José Palazzo Moreira de Oliveira

Abstract: Smart Web Visibility, in this paper, is the study of measure techniques used to retrieval information about-words, expressions or terms (for example, acronyms) on the web. The visibility has straight relation with presentation order of information retrieved. We consider the Smart Web Visibility as a subfield of the We-bometrics, the same as Web Visibility is its subfield too. Our approach is based on different rankings from different search engines to evaluate the Smart Web Visibility by processing the homonymous problem before scoring. We begin with original results of search engines output, to emphasise after with methods to adding semantics to the queries. Finally, to demonstrate the viability of our ideas we employed acronyms of Brazilian universities to evaluate the smart visibility and compare with the actual situation of Brazil universities published by Webometrics Ranking. The main contribution of this work is a new way to evaluate the Web Visibility, named Smart Web Visibility, which shows how the universities are ranked by multiple search engines.

Paper Nr: 77
Title:

THE IMPACT OF SOURCE CODE NORMALIZATION ON MAIN CONTENT EXTRACTION

Authors:

Hadi Mohammadzadeh, Thomas Gottron, Franz Schweiggert and Gholamreza Nakhaeizadeh

Abstract: In this paper, we introduce AdDANAg, a language-independent approach to extract the main content of web documents. The approach combines best-of-breed techniques from recent content extraction approaches to yield better extraction results. This combination of techniques brings together two pre-processing steps, e.g. to normalize the document presentation and reduce the impact of certain syntactical structures, and four phases for the actual content extraction. We show that AdDANAg demonstrates a high performance in terms of effectiveness and efficiency and outperforms previous approaches.

Paper Nr: 93
Title:

GRANULES OF WORDS FROM FUZZY RELATIONS AND SPECTRAL CLUSTERING

Authors:

Patrícia F. Castro and Geraldo B. Xexéo

Abstract: Conventional information retrieval systems have proven ineffective in dealing with information overload. One possible solution is to incorporate some features that allow users of these systems to custom handle this information. In order to enable systems of this kind, some of the characteristics of present-day systems should be reviewed. Among other features, all documents are described with the same level of detail. We believe that the redrafting of document models is the starting point for reform of these systems. The paradigm of granular computing has proven to be very suitable for the treatment of complex problems and can produce significant results in large-scale environments such as the Web. This paper explores the granulation process of words with a view to its application in the subsequent improvement in document representation. We use fuzzy relations and spectral clustering in this process and present some result.

Paper Nr: 105
Title:

TOWARDS AN APPROACH BASED ON VERIFIABILITY ASPECTS TO HELP IN THE QUALITY EVALUATION OF TEXTUAL WEB PAGES

Authors:

Daniel Lichtnow, Leandro Krug Wives and José Palazzo Moreira de Oliveira

Abstract: This work presents an approach based on verifiability aspects to evaluate Web pages with textual content. In the work, verifiability is related to the existence of references to information sources. In this sense, we take into account that textual Web pages with references to information sources use to be better than Web pages without references to information sources. Thus, aspects related to automatically identification of verifiability indicators in textual Web pages are presented. For the given context, the results of preliminary experiments show that verifiability aspects can be useful to infer the quality of texts present on the Web addressed to Web users with little knowledge about a specific subject.

Paper Nr: 118
Title:

HYBRIDISING COLLABORATIVE FILTERING AND TRUST-AWARE RECOMMENDER SYSTEMS

Authors:

Charif Haydar, Anne Boyer and Azim Roussanaly

Abstract: Recommender systems (RS) aim to predict items that users would appreciate, over a list of items. In evaluation of recommender systems, two issues can be defined: accuracy of prediction which implies the satisfaction of the user, and coverage which implies the percentage of satisfied users. Collaborative filtering (CF) is the master approach in this domain, but still has some weaknesses especially about coverage. Trust-aware approach is today another promising approach in RS within social environments, whose prediction exceeds the quality of (CF). In this paper we propose several strategies to hybridize both approaches in order to improve prediction accuracy and coverage.

Paper Nr: 119
Title:

IMPROVING FLEXIBILITY OF WORKFLOW MANAGEMENT SYSTEMS VIA A POLICY-ENHANCED COLLABORATIVE FRAMEWORK

Authors:

Alfredo Cuzzocrea and Marco Fisichella

Abstract: Workflow Management Systems available to date present limitations concerning the flexibility of the resulting processes, which enlarge the gap between business processes models, humans and their activities. In real-world scenarios, especially when collaboration among human actors takes place, it is often the case that the tasks a process consists of appear in many subtle variants according to the actor who has to carry them out. In this paper we focus on a system which integrates Web platform for collaborative processes, COOPER, and a policy manager based on Semantic Web technologies, PROTUNE, can enhance process flexibility and variability to accommodate the needs of different process actors.

Paper Nr: 142
Title:

CONVERTING DB TO RDF WITH ADDITIONAL DEFINED RULES

Authors:

Mamdouh Farouk and Mitsuru Ishizuka

Abstract: In linked data, web resources and data are represented into RDF. The new web of linked data should be completely machine-understandable. Moreover, since the start of Linking Open Data project, more and more providers publish linked data. Therefore, converting DB into RDF is important because a large amount of web data stored in databases. This work presents an approach for converting DB to RDF with additional inference rules. The generated data contains not only RDF data that represents relational DB but also additional discovered relation based on a set of predefined rules. Moreover, this paper proposes a simple search engine, which consumes the generated data and the defined inference rules. A prototype for the proposed approach and results of experiments show the effectiveness of the proposed approach.

Paper Nr: 179
Title:

POI ENHANCED VIDEO RECOMMENDER SYSTEM USING COLLABORATION AND SOCIAL NETWORKS

Authors:

Alessandro da Silveira Dias, Leandro Krug Wives and Valter Roesler

Abstract: Every day, the number of videos available in the world increases. For instance, there is a vast amount of video websites, like Youtube and NetFlix, VOD services, as well as PVR devices that automatically record videos, 24 hours a day. Apparently this situation allows a large possibility of choice for the user, on the other hand, it creates an overload problem, i.e., a difficulty to find the correct content for the user needs. One of the ways to treat such an overload is the use of recommender systems, which filter the content in order to deliver what is most interesting to the user. This paper presents an approach that allows the annotation of points of interest on videos on the Web. Through this, users can mark their most interesting points on the videos. This information can thus be used in conjunction with the user profile and interests to provide recommendations. The differential of this paper is to show how points of interest can be used to enhance video recommender systems and how to design social networks of users with common interest points.

Posters
Paper Nr: 82
Title:

ONTOLOGY-BASED RECOMMENDER SYSTEM OF ECONOMIC ARTICLES

Authors:

David Werner, Christophe Cruz and Christophe Nicolle

Abstract: Decision makers need economical information to drive their decisions. The Company Actualis SARL is specialized in the production and distribution of a press review about French regional economic actors. This economic review represents for a client a prospecting tool on partners and competitors. To reduce the overload of useless information, the company is moving towards a customized review for each customer. Three issues appear to achieve this goal. First, how to identify the elements in the text in order to extract objects that match with the recommendation's criteria presented? Second, How to define the structure of these objects, relationships and articles in order to provide a source of knowledge usable by the extraction process to produce new knowledge from articles? The latter issue is the feedback on customer experience to identify the quality of distributed information in real-time and to improve the relevance of the recommendations. This paper presents a new type of recommendation based on the semantic description of both articles and user profile.

Paper Nr: 153
Title:

A RULE-BASED SPARQL ENDPOINT WRAPPER

Authors:

Mamdouh Farouk and Mitsuru Ishizuka

Abstract: The web of data is a web vision in which data are represented into RDF and interlinked to each other. The fast growth of linked data motivates researchers to exploit this huge amount of well-represented data in linked data cloud. Moreover, finding the implicit answers is important to enable web agent to understand deeply web data. This paper proposes a SPARQL endpoint wrapper to enable original endpoint to answer more queries and facilitate query writing for the client. The proposed wrapper uses inference rules to expand user query. A prototype for the proposed wrapper is presented to show the effectiveness of the proposed approach.

Paper Nr: 169
Title:

EMPIRICAL TEXT MINING FOR GENRE DETECTION

Authors:

Vasiliki Simaki, Sofia Stamou and Nikos Kirtsis

Abstract: In this paper, we report on a preliminary study we carried out for identifying patterns that characterize the genre type of Greek texts. In the course of our study, we address four distinct genre types, we record their observable stylistic elements and we indicate their exploitation for automatic genre-based document classi-fication. The findings of our study demonstrate that texts contain lexical features with discriminative power as far as genre is concerned, however modeling those features so that they can be explored by computer-based applications is still in early stages.

Area 5 - Mobile Information Systems

Full Papers
Paper Nr: 44
Title:

IMPROVING THE SECURITY OF SMS-BASED SERVICES USING ELECTRONIC SIGNATURES - Towards SMS-based Processing of Transactional m-Government Services

Authors:

Thomas Zefferer, Arne Tauber and Bernd Zwattendorfer

Abstract: SMS is still one of the most popular mobile communication technologies. Simplicity, cost efficiency, and low bandwidth requirements account for the SMS technology’s continuing success. Besides the private sector, also public sector organisations aim to take advantage of SMS technology’s current popularity. In numerous countries all over the world, governments and public administrations already offer citizens SMS based m-Government services. However, most of these services are rather simple and do not include security enhancing mechanisms such as cryptographic methods. This renders the use of SMS based approaches for complex transactional m-Government services with higher security requirements difficult. We tackle this issue by proposing the use of electronic signatures in SMS based services. The technical feasibility of our approach is demonstrated by means of a prototypical application. This application allows citizens to generate, electronically sign, and deliver electronic documents by sending well-defined SMS messages. The proposed method’s capability to meet given security requirements of transactional m-Government services is assessed in the course of a detailed security discussion.

Paper Nr: 95
Title:

INTEGRATING COMMUNICATION SERVICES INTO MOBILE BROWSERS

Authors:

Joachim Zeiß, Marcin Davies, Goran Lazendic, Rene Gabner and Janusz Bartecki

Abstract: This paper introduces a novel approach on how to integrate communication services into Web applications running in the browser. The solution is based on two major design decisions: To resolve the need for a business-to-business (B2B) relationship between Web provider and communication service provider, and to distribute the Model, View and Controller components of an application across different processes. Our approach helps to answer the question on how to efficiently integrate network operator’s assets into applications from over the top (OTT) players. The separation between application control by the Web page and the actual command execution by the native capabilities of the user device opens new opportunities for global reachability of telco services, easy deployment and re-deployment of applications with zero configuration need for users and developers as well as privacy protection by keeping sensitive data within the user domain, e.g. the user’s communication device.

Paper Nr: 149
Title:

LOCATION INTELLIGENCE SERVICES FOR MOBILES USING RUBY ON RAILS AND JQUERYMOBILE

Authors:

Alfio Costanzo, Alberto Faro and Concetto Spampinato

Abstract: The current applications for mobiles provide information about Location Based Services (LBS) of user interest that don't take into account the current status of the services neither they take into account the real time conditions of the traffic network or of the weather. Aim of the paper is to show how location intelligence services may be implemented by an open source solution that is able to help the activities and to support the decisions of the mobile users taking advantage from all the information collected by the sensors located on the field and from the business data stored on the disparate data stores that may be of interest of the urban/metropolitan mobility, security and logistics. Fuzzy logic and semantic web technologies are taken into account to improve the current LBS applications. A case study developed using Ruby on Rails and JQueryMobile illustrates how such a web service may work in practice.

Short Papers
Paper Nr: 92
Title:

A MOBILE CONVERSATION ASSISTANT TO ENHANCE COMMUNICATIONS FOR HEARING-IMPAIRED CHILDREN

Authors:

Toon De Pessemier, Laurens Van Acker, Emilie Van Dijck, Karin Slegers, Wout Joseph and Luc Martens

Abstract: Children and young people who are deaf or have hearing impairments do not master the spoken and written language well. Moreover, their friends and relatives do not always speak sign language. In this research, a communication aid is developed on the Google Android mobile operating system to reduce these barriers by converting text into relevant images and movies thereby clarifying the meaning of the text. Users can select text from webpages, e-mail and SMS messages, or text can be generated using speech recognition or optical character recognition as input source. The communication tool analyzes the sentences and tries to understand the context and meaning of the text in order to select the most appropriate visual content originating from online sources like YouTube, Flickr, Google Images, and Vimeo. User tests and focus groups with deaf children and interviews with experts in the field of deaf and hard hearing people confirmed the need for a communication aid and proved the utility of the proposed tool.

Paper Nr: 152
Title:

ANALYSIS OF AD HOC ROUTING PROTOCOLS FOR EMERGENCY AND RESCUE SCENARIOS

Authors:

Liliana Enciso Quispe, Rommel Torres Tandazo and Luis Mengual Galan

Abstract: A mobile ad hoc network MANET is a collection of wireless mobile nodes that can dynamically configure a network without a fixed infrastructure or centralized administration. This makes it ideal for emergency and rescue scenarios where information sharing is essential and should occur as soon as possible. This article discusses which of the routing strategies for mobile ad hoc networks: proactive, reactive and hierarchical, have a better performance in such scenarios. Using a real urban area being set for the emergency and rescue scenario, we calculate the density of nodes and the mobility model needed for validation. The NS2 simulator has been used in our study. We also show that the hierarchical routing strategies are beffer suited for this type of scenarios.

Paper Nr: 170
Title:

UBIQLOUD - Social Smart Gateway

Authors:

Petri Vuorimaa, Kalle Säilä, Petri Saarikko and Pia Tukkinen

Abstract: UbiQloud is an end user solution for integrating cloud based social services with mobile applications. It combines multiple embedded short-range wireless technologies, such as NFC and RFID. UbiQloud opens a gateway for developing Web of Things (WoT) services. UbiQloud is based on XMPP publish/subscribe architecture and emerging HTML5 technologies, such as WebSocket. In addition, it has a RESTful interface for accessing event history and subscription management. In this paper, we demonstrate two UbiQloud applications: FeedThroat and InView. FeedThroat is a smart shopping assistant for accessing and sharing product information. InView is a multi-platform application for indoor people monitoring.

Posters
Paper Nr: 78
Title:

TOWARDS USER-CENTRIC SOCIAL NETWORKS

Authors:

Panayiotis Andreou, Panagiotis Germanakos, Andreas Konstantinidis, Dimosthenis Georgiadis, Marios Belk and George Samaras

Abstract: Social network portals, such as Facebook and Twitter, often discover and deliver relevant social data to a user’s query, considering only system-oriented conflicting objectives (e.g., time, energy, recall) and frequently ignoring the satisfaction of the individual “needs” of the query user w.r.t. its perceptual preference characteristics (e.g., data comprehensibility, working memory). In this paper, we introduce User-centric Social Network (USN), a novel framework that deals with the conflicting system-oriented objectives of the social network in the context of Multi-Objective Optimization and utilizes user-oriented objectives in the query dissemination/ acquisition process to facilitate decision making. We present the initial design of the USN framework and its major components. Our preliminary evaluation with real datasets shows that USN enhances the usability and satisfaction of the user while in parallel provides optimal system-choices for network performance.

Paper Nr: 115
Title:

ISSUES AND CHALLENGES IN HANDHELD AUGMENTED REALITY APPLICATIONS

Authors:

Stan Kurkovsky

Abstract: Equipped with powerful processors, cameras for capturing still images and video, and a range of sensors capable of tracking user location, orientation and motion smartphones offer a sophisticated platform for implementing handheld augmented reality applications. Despite the advances in research and development, implementing handheld augmented reality applications remains a challenge due to many unsolved problems related to navigation, context-awareness, visualisation, usability and interaction design, as well as content creation and sharing, which are surveyed in this paper.

Paper Nr: 144
Title:

WISHFUL AND WISDOM AWARE COMPOSING - A Full User-centric Approach to Create NGM

Authors:

Luis Javier Suarez Meza, Luis Antonio Rojas Potosí, Juan Carlos Corrales and Oscar Rodriguez Rocha

Abstract: Nowadays, it’s possible to find huge amounts of steadily increasing web resources. Service composition languages and tools are widely used for creating compositions of multiple services in order to meet the user’s requirements in the cases when a single Web service does not perform a required task. However, despite the relative intuitiveness of currently the available tools, they still require a careful manual assembly of a composition flow by the end-user, thus requiring some technical knowledge on the functioning of each individual component. We provide a full user-centric approach to create NGMs (Next Generation Mashups) interactively through W2AC (Wishful and Wisdom-Aware Composing): First, end-user wishes are considered, then a composition knowledge is extracted from existing reputable mashups created by skilled users. Thus, end-users are able to easily generate their own NGM in a fully customized fashion.