From i* to istar 2.0: An Evolving Social Modelling Language

Size: px
Start display at page:

Download "From i* to istar 2.0: An Evolving Social Modelling Language"

Transcription

1 From i* to istar 2.0: An Evoving Socia Modeing Language Lin Liu 1 Schoo of Software, Tsinghua University, Beijing, , China iniu@tsinghua.edu.cn Abstract. Conceptua Modeing, as a thought too, heps its adopters to describe an abstract observation to given rea word phenomena. i*, as a socia modeing anguage, was widey adopted by researchers in both requirements engineering and business information system anaysis. In order to further extend its adoption in future research and practice, istar 2.0 was conceived and pubished to reduce ambiguities and compexities. In this paper, I woud ike to share my observations as an i* modeer, about the major differences identified between i* and istar 2.0, about how to map an i* mode to an istar 2.0 mode, as we as how to further evove the modeing anguage to serve for the next generation modeing needs. Keywords: socia modeing, concepts, reations, evoution 1 Motivation My first contact with i* was in year 1999, a few months before my graduation and joining Eric s group, I downoaded two of his major i* modeing papers, in which he used i* to anayse business process of IKEA [1], and the mutua dependencies between members in software project team [2]. At that time, my word mode was aready agentoriented, due to my master s thesis, on Actor [3], the concurrent computing mode, and PhD thesis, on Agent-oriented requirements anaysis using Agent-Z [4] and process agebra to formaise use case scenarios. My first impression to the exampe modes was: it is a bit compex, and drawn artisticay, different from most other software engineering modes that I was famiiar with, such as, message sequence charts, state machines, and cass diagrams. Tonight, I finay get a chance to read the i* 2.0 Language Guide [5] by Fabiano, Xavier and Jennifer, word by word, which I shoud have done two and haf years earier, whie they sent numerous messages asking for comments and inputs. I fee synchronised with the evoving anguage finay, aas, it is better ate than never.

2 2 2 Reated work Bits and pieces in Retrospect of 17 Years persona modeing and extension experience with i* 2.1 A Successfu exercise - Modeing Trust in Smart Cards It didn t take me ong to faing in ove with using i* to mode rea word. As my first modeing exercise was a perfect match. Modeing trust in smart-cards systems can make use of many of the interesting modeing constructs in i*[6]. Incuding: Strategic dependency modeing captures the major roes in a genera smart-card system, and their dependencies. Roe, position and agent together with roe-paying and position occupancy inks, which are used to capture who is paying attacker, and which organisationa payer is paying the abstract roe of card owner, software owner, data producer, and how the trust and dependency distributed among different organisationa settings. The fexibe use of contribution inks, in particuar, the attacks are represented as a break contribution ignited from the attacker to the victim or vunerabe eement or ink. 2.2 A first attempt to extend i* capturing tempora orders between tasks with prior-to ink My second modeing exercise was due to the marriage of GRL with UCM [7]. GRL is a variation of i*, which emphasis more the goa-oriented perspectives of i*, I think I tried to combine the two anguage in a different way comparing to what the current URN standards suggested. I wanted to use i* mode as the container, or the pace-hoder of scenarios. I ony wanted the jogge ine of UCM, which traversing the tasks in i* payed by different actors. It captures the refining process of goas and generated the run-time execution scenarios invoving mutipe actors in the mode. In my mind, goas, actors, and scenarios are the three pieces to be fit together in the requirements engineering puzze. 2.3 Another successfu exercise modeing service reationships My next major move was using i* in services modeing. Again, i*, especiay, the socia, strategic dependency modeing construct, was a natura fit to mode service providers and service consumers, their needs and capabiities, their deegation of different types, their commitment and deivery of services, and quaity of service [8]. i* is expressive enough support my modeing objectives and provide meaningfu types of anaysis.

3 3 2.4 A second attempt to extend i* capturing context as annotations My second attempt to extend i* was due to the modeing needs of service adaptation. Where I wanted to say that when service text changes, service provider and consumer s choices wi change accordingy, so I associated context information on each of the service goa refinement ink [9]. I am doing this retrospect just to take a position of modeer, to see if the current istar 2.0 concepts and reations wi sti aow me to do simiar things in a cearer way, or it has decided to avoid such use or extension of the modeing anguage. 3 Redrawing i* modes with istar Discard organizationa positions together with occupancy and coverage ink As shown on the eft-hand side, in i*, position is used to capture organizationa positions, which can cover different abstract roes, and being occupied by different agents. As i* was designed as an organizationa modeing anguage, so position is considered as a first-cass modeing concept. In istar 2.0, organization is not stressed anymore, so we can define it as an abstract roe, participatedby agents, and it can speciaize either an attacker or a defender or both using is-a ink. In this case, a cover ink wi become an is-a, an occupies wi become a participates-in. It is not cear whether the INS ink is represented now, as it is a reation between actors of same nature. Athough I can make the mapping, I fee that it is a more natura and direct refection of the rea word meaning using pays and is-part-of than participates-in in this case. Fig. 1 actors and association inks in i* [6] 3.2 Changing means-ends and decomposition as AND/OR refinement In istar 2.0, the means-ends and decomposition inks in i* are unified to be caed AND/OR refinement inks, which oosens up the origina i* s strict enforcement on iterative eicitation of aternative ways to satisfy a given goa using means-ends ink. As a modeer, I had hated the constraint of imposed by this means-ends semantics, as I had to use some dummy tasks and goas when there are not meaningfu aternatives to choose from. However, I have to admit that we shoud keep it in mind to ask the

4 4 question each time we face a goa. In other words, I woud rather see the current istar 2.0 treatment as a simpification of the i* syntax rather than a change of semantics. 3.3 Adding Quaification ink between a quaity attributes with its associated eements A new kind of ink, quaification ink, represented as dotted ine, inks the quaity attributes with the corresponding goa, resource and task eements expicity. This is a major extension in istar 2.0, which can ony be represented using the naming convention of subject[object] in softgoas in i* or NFR framework [10]. This extension carifies the semantics of quaity attributes and suggests a proper way of its usage. 3.4 Adding DependerEmt, dependeeemt, rues and constraints on socia dependencies There is a rues and constraints section in the specification of dependency reationship in istar 2.0. It gives cearer guideines to modeers which encourage the proper use of the ink. This incude: (1) adding definition of dependeremt, dependeeemt, and confine depender and dependee as actors; (2) when a depender deegates a dependeremt to others, it cannot be refined or contributed by other eements within the actor boundary. Dependency reationships are not aowed to share the same name, which means there is exacty one depender and one dependee for each dependums. This extension is aso a very good move in making the semantics of dependency ink cear and easy to use. 3.5 Adding NeededBy reation between a task and its required resource Resources are considered a sub-component of a task in i*, which is not distinguished from a sub-goa, sub-task, or sub-softgoa. In istar 2.0, as resources are different from goas and task in nature, a different kind of ink NeededBy is suggested. Its impication is that resources are eave nodes, they wi not be further refined, they are ony checked for avaiabiity or not. 3.6 Removing some of the contribution inks in i* In istar 2.0, four types of contribution inks are defined: hep, hurt, make and break. Other contribution ink types, such as: some+, some-, unknown, AND, OR are discarded. The impication of this change is that, contribution inks are evauated individuay, we ony consider weak or sufficient, positive or negative contributions from a source eement to a quaity attribute. This aso improves the carity of the modes.

5 5 4 Discussions In summary, istar 2.0 carifies ambiguities in i* modeing framework, which makes the adoption by students and engineers earning the modeing syntax and semantics easy. For i* users, it wi not require much effort to understand the changes and adopt it in new cases and appying the changes in existing i* modes. Some minor points require further deiberation are as foows: Is a roe aowed to participates-in an agent? Whie there is no ogica expanation for it, in the istar 2.0 meta-mode, it is not prohibited? Is instantiation reation in actors aowed in istar 2.0? Sometimes the modeer may want to express scenarios at an instance eve? Is a quaity attribute evauated by itsef or together with the eement it quaifies? In other words, whether a quaity attribute is a standaone eement or is ony meaningfu together with an entity? A major probem yet to be addressed are using views of actors as a measure to contro scaabiity of mode. In today s organization, socia and strategic anaysis is often supported with operationa data as evidence for socia dependencies and infuentia factors. Thus, automated eicitation of socia modeing concepts and reations are considered an effective way to obtain socia reation modes as in i*. Acknowedgements This paper is partiay supported by the Nationa Natura Science Foundation Project (Grant No ) and Nationa Science and Technoogy Support Program (project no. 2015BAH14F02). Tong Li acknowedges the support of BJUT Startup Funding No References 1. E. Yu. Strategic Modeing for Enterprise Integration, Proceedings of the 14th Word Congress of Internationa Federation of Automatic Contro (IFAC 99), Juy 5-9, 1999, Beijing, China. pp Permagon, Esevier Science. 2. E. Yu and J. Myopouos. Modeing Organizationa Issues for Enterprise Integration, Proceedings of Internationa Conference on Enterprise Integration and Modeing Technoogy, October 28-30, 1997, Turin, Itay. 3. Agha G A. Actors: A mode of concurrent computation in distributed systems[r]. MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE LAB, d'inverno M, Kinny D, Luck M, et a. A forma specification of dmars[c]//internationa Workshop on Agent Theories, Architectures, and Languages. Springer Berin Heideberg, 1997:

6 6 5. Dapiaz F, Franch X, Horkoff J. istar 2.0 anguage guide[j]. arxiv preprint arxiv: , Yu E, Liu L. Modeing trust for system design using the i* strategic actors framework[m]//trust in Cyber-societies. Springer Berin Heideberg, 2001: Liu L, Yu E. Designing information systems in socia context: a goa and scenario modeing approach[j]. Information systems, 2004, 29(2): Liu L, Liu Q, Chi C H, et a. Towards a service requirements modeing ontoogy based on agent knowedge and intentions[j]. Internationa Journa of Agent-Oriented Software Engineering, 2008, 2(3): Sun J, Liu F, Zhang H, et a. Understanding the Diversity of Services Based on Users Identities[C]//Internationa Conference on Advanced Information Systems Engineering. Springer Berin Heideberg, 2011: Chung L, do Prado Leite J C S. On non-functiona requirements in software engineering[m]//conceptua modeing: Foundations and appications. Springer Berin Heideberg, 2009:

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Outerjoins, Constraints, Triggers

Outerjoins, Constraints, Triggers Outerjoins, Constraints, Triggers Lecture #13 Autumn, 2001 Fa, 2001, LRX #13 Outerjoins, Constraints, Triggers HUST,Wuhan,China 358 Outerjoin R S = R S with danging tupes padded with nus and incuded in

More information

Relational Model. Lecture #6 Autumn, Fall, 2001, LRX

Relational Model. Lecture #6 Autumn, Fall, 2001, LRX Reationa Mode Lecture #6 Autumn, 2001 #06 Reationa Mode HUST,Wuhan,China 121 Reationa Mode Tabe = reation. Coumn headers = attributes. Row = tupe Reation schema = name(attributes). Exampe: Beers(name,

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Section 3 : Exploring 3D shapes

Section 3 : Exploring 3D shapes Section 3 : Exporing 3D shapes Copyright 2016 The Open University Contents Section 3: Exporing 3D shapes 3 1. Using practica work 3 2. A cross-curricuar approach 4 3. Using practica work to consoidate

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement Internationa Laboratory Accreditation Cooperation The ILAC Mutua Recognition Arrangement Enhancing the acceptance of products and services across nationa borders Removing barriers to goba trade Accreditation

More information

Outline. Introduce yourself!! What is Machine Learning? What is CAP-5610 about? Class information and logistics

Outline. Introduce yourself!! What is Machine Learning? What is CAP-5610 about? Class information and logistics Outine Introduce yoursef!! What is Machine Learning? What is CAP-5610 about? Cass information and ogistics Lecture Notes for E Apaydın 2010 Introduction to Machine Learning 2e The MIT Press (V1.0) About

More information

A Method for Group Extraction in Complex Social Networks

A Method for Group Extraction in Complex Social Networks This is not the fina version of this paper. You can find the fina version on the pubisher web page. A Method for Group Extraction in Compex Socia Networks Piotr Bródka 1, Katarzyna Musia 2, Przemysław

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home]

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home] "Using Python": a Book Preview May 13, 1995 Mark Lutz Bouder, Coorado utz@kapre.com (303) 546-8848 [work] (303) 684-9565 [home] Introduction. This paper is a brief overview of the upcoming Python O'Reiy

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

A study of comparative evaluation of methods for image processing using color features

A study of comparative evaluation of methods for image processing using color features A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

The Internet and the web

The Internet and the web The Internet and the web Contents Introduction 3 1 The Internet at home 4 2 Loca Area Networks sma office/home office 5 3 Loca Area Networks business 6 4 Wide Area Networks 8 5 Wireess networks 9 6 Mobie

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

index.pdf March 17,

index.pdf March 17, index.pdf March 17, 2013 1 ITI 1121. Introduction to omputing II Marce Turcotte Schoo of Eectrica Engineering and omputer Science Linked List (Part 2) Tai pointer ouby inked ist ummy node Version of March

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

Section 3: Exploring 3D shapes

Section 3: Exploring 3D shapes Section 3: Exporing 3D shapes Contents Section 3: Exporing 3D shapes 3 1. Using practica work 3 2. A cross-curricuar approach 5 3. Using practica work to consoidate earning 6 Resource 1: Coecting and making

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Infinity Connect Web App Customization Guide

Infinity Connect Web App Customization Guide Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Administration and Autonomy In A Replication-Transparent Distributed DBMS

Administration and Autonomy In A Replication-Transparent Distributed DBMS Administration and Autonomy In A Repication-Transparent Distributed DBMS Kenneth R. Abbott, Dennis R. McCarthy Computer Corporation of America Four Cambridge Center, Cambridge, MA 02142 Abstract Administrative

More information

FDA Registration Trials. Aisha Shah CRP Information Meeting, Conducting FDA Registration Trials

FDA Registration Trials. Aisha Shah CRP Information Meeting, Conducting FDA Registration Trials FDA Registration Trias Aisha Shah CRP Information Meeting, Conducting FDA Registration Trias November 1, 2018 Goas Registration Tria Considerations DTL and RCR AE Submissions Essentia Documents Protoco

More information

Modelling and Querying Video Data

Modelling and Querying Video Data Modeing and Querying Video Data Rune Hjesvod and Roger Midtstraum Department of Computer Systems and Teematics Norwegian Institute of Technoogy { rhj,roger}@idt.unit.no Abstract As video data is penetrating

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

IFLA LRM- finally here

IFLA LRM- finally here IFLA LRM- finay here Maja Žumer University of Ljubjana, Sovenia Pat Riva Concordia University, Montrea, Canada FRBR Consoidation - Why and How FRBR (1998), FRAD (2009), FRSAD (2010) 3 distinct modes Different

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Dynamic Symbolic Execution of Distributed Concurrent Objects

Dynamic Symbolic Execution of Distributed Concurrent Objects Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United

More information

More Relation Model: Functional Dependencies

More Relation Model: Functional Dependencies More Reation Mode: Functiona Dependencies Lecture #7 Autumn, 2001 Fa, 2001, LRX #07 More Reation Mode: Functiona Dependencies HUST,Wuhan,China 152 Functiona Dependencies X -> A = assertion about a reation

More information

Extracting semistructured data from the Web: An XQuery Based Approach

Extracting semistructured data from the Web: An XQuery Based Approach EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. Extracting semistructured data from the Web: An XQuery Based Approach Gies Nachouki Université de Nantes - Facuté des Sciences, IRIN, 2, rue de a Houssinière,

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

Half Year 2018 DDoS Trends Report

Half Year 2018 DDoS Trends Report Haf Year 2018 DDoS Trends Report EXECUTIVE SUMMARY 3 Key Trends 7 Key Insights 12 Recommendations 14 Summary Organizations have become dependent on the Internet as a means to conduct business and deiver

More information

INTELLIGENT USER INTERFACE IN FUZZY ENVIRONMENT

INTELLIGENT USER INTERFACE IN FUZZY ENVIRONMENT INTELLIGENT SE INTEFACE IN FZZY ENVIONMENT Ben Khayut 1, Lina Fabri 2 and Maya Abuhana 3 1 Department of &D, IDTS at Inteigence Decisions Technoogies Systems, Ashdod, Israe ben_hi@hotmai.com 2 Department

More information

Link Registry Protocol Options

Link Registry Protocol Options Link Registry Protoco Options Norman Finn, March 2017 HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN At east two obvious choices for P802.1CS Link Registration Protoco An IS-IS-ike protoco. TCP (Transmission

More information

Welcome - CSC 301. CSC 301- Foundations of Programming Languages

Welcome - CSC 301. CSC 301- Foundations of Programming Languages Wecome - CSC 301 CSC 301- Foundations of Programming Languages Instructor: Dr. Lutz Hame Emai: hame@cs.uri.edu Office: Tyer, Rm 251 Office Hours: TBA TA: TBA Assignments Assignment #0: Downoad & Read Syabus

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS

A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS Artificia Inteigence and Language Processing ]acques Cohen Editor A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS LESLIE LAMPORT Over the past few years, I have deveoped an approach to the forma specification

More information

NCH Software Express Delegate

NCH Software Express Delegate NCH Software Express Deegate This user guide has been created for use with Express Deegate Version 4.xx NCH Software Technica Support If you have difficuties using Express Deegate pease read the appicabe

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Confidence in measurement

Confidence in measurement Confidence in measurement Caibration Goba caibration network www.kister.com Tech Center Tech Office Production Center Kister caibration network Acceerometers Data Acquisition (Crash) Whee Force Transducers

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

Avaya Interaction Center Client SDK Programmer Guide

Avaya Interaction Center Client SDK Programmer Guide Avaya Interaction Center Cient SDK Programmer Guide Reease 7.2 May 2013 Issue 1.1 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies.

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies. Chapter 3: KDE Page 1 of 31 Chapter 3: KDE In This Chapter What Is KDE? Instaing KDE Seecting KDE Basic Desktop Eements Running Programs Stopping KDE KDE Capabiities Configuring KDE with the Contro Center

More information

ngenius Instrumentation Overview

ngenius Instrumentation Overview ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark

More information

Chapter 3: Introduction to the Flash Workspace

Chapter 3: Introduction to the Flash Workspace Chapter 3: Introduction to the Fash Workspace Page 1 of 10 Chapter 3: Introduction to the Fash Workspace In This Chapter Features and Functionaity of the Timeine Features and Functionaity of the Stage

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Geometric clustering for line drawing simplification

Geometric clustering for line drawing simplification Eurographics Symposium on Rendering (2005) Kavita Baa, Phiip Dutré (Editors) Geometric custering for ine drawing simpification P. Bara, J.Thoot and F. X. Siion ε ARTIS GRAVIR/IMAG INRIA Figure 1: The two

More information

Avaya one-x Mobile Pre-Installation Checklist

Avaya one-x Mobile Pre-Installation Checklist Avaya one-x Mobie 18-602133 Issue 1 November 2007 Avaya one-x Mobie November 2007 1 00A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina

More information

Computing devices have become increasingly mobile at the client end, and the

Computing devices have become increasingly mobile at the client end, and the Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized

More information

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

PCT: Partial Co-Alignment of Social Networks

PCT: Partial Co-Alignment of Social Networks PCT: Partia Co-Aignment of Socia Networks Jiawei Zhang University of Iinois at Chicago Chicago, IL, USA jzhan9@uicedu Phiip S Yu University of Iinois at Chicago, IL, USA Institute for Data Science Tsinghua

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

(12) United States Patent (16) Patent N0.: US 6,604,196 B1 Monday et al. (45) Date of Patent: Aug. 5, 2003

(12) United States Patent (16) Patent N0.: US 6,604,196 B1 Monday et al. (45) Date of Patent: Aug. 5, 2003 US006604196B1 (12) United States Patent (16) Patent N0.: Monday et a. () Date of Patent: Aug. 5, 2003 (54) APPARATUS AND METHOD FOR (56) References Cited COMPONENT ROLE FULFILLMENT BASED ON ENVIRONMENT

More information

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams Reaization of GGF DAIS Data Interface for Grid Access to Data Streams Ying Liu, Beth Pae, Nithya Vijayakumar Indiana University Boomington, IN IU-CS TR 613 ABSTRACT As the computation power of hardware

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Evolving Role Definitions Through Permission Invocation Patterns

Evolving Role Definitions Through Permission Invocation Patterns Evoving Roe Definitions Through Permission Invocation Patterns Wen Zhang EECS Dept. Vanderbit University Nashvie, TN, USA wen.zhang.1@vanderbit.edu David Liebovitz Dept. of Medicine Northwestern University

More information

People's Republic of China b College of Life and Environmental Science, Central University. Nanjing, People's Republic of China

People's Republic of China b College of Life and Environmental Science, Central University. Nanjing, People's Republic of China This artice was downoaded by: [Nationa Library of China] On: 30 December 2011, t: 18:19 Pubisher: Tayor & Francis Informa Ltd Registered in Engand and Waes Registered Number: 1072954 Registered office:

More information

A Taxonomy for Computer Architectures

A Taxonomy for Computer Architectures A Taxonomy for Computer Architectures David B. Skiicorn Queen s University at Kingston F ynn s cassification of architectures does not discriminate ceary between different mutiprocessor architectures.

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Importance of Timely Data Submission

Importance of Timely Data Submission Importance of Timey Data Submission Shauna Himan Mayo Cinic CRP Information Session, November 2 nd, 2017 Presentation Objectives Iustrate the importance of data submission timeiness Communicate the status

More information

Complex Human Activity Searching in a Video Employing Negative Space Analysis

Complex Human Activity Searching in a Video Employing Negative Space Analysis Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798

More information

On Reasoning about Structural Equality in XML: A Description Logic Approach

On Reasoning about Structural Equality in XML: A Description Logic Approach On Reasoning about Structura Equaity in XML: A Description Logic Approach David Toman and Grant Wedde Schoo of Computer Science, University of Wateroo, Canada {david,gwedde}@uwateroo.ca Abstract. We define

More information

Rough Sets Clustering and Markov model for Web Access Prediction

Rough Sets Clustering and Markov model for Web Access Prediction Proceedings of the Postgraduate Annua Research Seminar 006 470 Rough Sets Custering and Marov mode for Web Access Prediction Siriporn Chimphee 1, Naomie Saim, Mohd Saihin Bin Ngadiman, Witcha Chimphee

More information

User-Centered Security

User-Centered Security User-Centered Security Mary Een Zurko zurko@opengroup.org The Open Group Research Institute Eeven Cambridge Center Cambridge, MA 02142 Richard T. Simon rsimon@opengroup.org The Open Group Research Institute

More information

MOS 2013 Study Guide. Microsoft Excel Expert EXAMS & Mark Dodge.

MOS 2013 Study Guide. Microsoft Excel Expert EXAMS & Mark Dodge. MOS 2013 Study Guide Mark Dodge EXAMS 77-427 & 77-428 Microsoft Exce Expert PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright 2013

More information

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup Specia Edition Using Microsoft Office 2000 - Chapter 7 - Sharing Documents Within a.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Office 2000-7 - Sharing

More information