265 results on '"Tari, Z."'
Search Results
2. Achieving energy efficiency in data centers with a performance-guaranteed power aware routing
- Author
-
Baccour, E., Foufou, S., Hamila, R., and Tari, Z.
- Published
- 2017
- Full Text
- View/download PDF
3. Data Summarization Techniques for Big Data—A Survey
- Author
-
Hesabi, Z. R., Tari, Z., Goscinski, A., Fahad, A., Khalil, I., Queiroz, C., Khan, Samee U., editor, and Zomaya, Albert Y., editor
- Published
- 2015
- Full Text
- View/download PDF
4. Serverless Vehicular Edge Computing for the Internet of Vehicles
- Author
-
Alam, F, Toosi, AN, Cheema, MA, Cicconetti, C, Serrano, P, Iosup, A, Tari, Z, Sarvi, M, Alam, F, Toosi, AN, Cheema, MA, Cicconetti, C, Serrano, P, Iosup, A, Tari, Z, and Sarvi, M
- Published
- 2023
5. MicroGRID: An Accurate and Efficient Real-Time Stream Data Clustering with Noise
- Author
-
Tari, Z., primary, Thompson, A., additional, Almusalam, N., additional, Bertok, P., additional, and Mahmood, A., additional
- Published
- 2018
- Full Text
- View/download PDF
6. Measurement-driven blind topology estimation for sparse data injection attack in energy system
- Author
-
Anwar, Adnan, Mahmood, AN, Tari, Z, Kalam, A, Anwar, Adnan, Mahmood, AN, Tari, Z, and Kalam, A
- Published
- 2022
7. AI-enabled Secure Microservices in Edge Computing: Opportunities and Challenges
- Author
-
Al-Doghman, F, Moustafa, N, Khalil, I, Tari, Z, Zomaya, A, Al-Doghman, F, Moustafa, N, Khalil, I, Tari, Z, and Zomaya, A
- Abstract
The paradigm of edge computing has formed an innovative scope within the domain of IoT through expanding the services of the cloud to the network edge to design distributed architectures and securely enhance decision-making applications. Due to the heterogeneous of edge Computing, edge applications are required to be developed as a set of lightweight and interdependent modules. As this concept aligns with the objectives of microservice architecture, effective implementation of microservices-based edge applications within IoT networks has the prospective of fully leveraging edge nodes capabilities. Deploying microservices at IoT edge faces plenty of challenges associated with security and privacy. Advances in AI, and the easy access to resources with powerful computing providing opportunities for deriving precise models and developing different intelligent applications at the edge of network. In this study, an extensive survey is presented for securing edge computing-based AI Microservices to elucidate the challenges of IoT management and enable secure decision-making systems at the edge. We present recent research studies on edge AI and microservices orchestration and highlight key requirements as well as challenges of securing Microservices at IoT edge. We also propose a Microservices-based edge framework that provides secure edge AI algorithms as Microservices utilizing the containerization technology.
- Published
- 2022
8. Method restructuring and consistency checking for object-oriented schemas
- Author
-
Tari, Z., Li, X., Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, and Loucopoulos, Pericles, editor
- Published
- 1994
- Full Text
- View/download PDF
9. Consistency checking of evolving methods
- Author
-
Li, X., Tari, Z., Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, and Karagiannis, Dimitris, editor
- Published
- 1994
- Full Text
- View/download PDF
10. Wundheilungsstörung bei kutaner Graft-versus-Host-Disease unter Therapie mit Everolimus
- Author
-
Brown, A., Neumayer, D., Rafieé-Tari, Z., Krieg, T., and Eming, S.A.
- Published
- 2014
- Full Text
- View/download PDF
11. Graceful Performance Degradation in Apache Storm
- Author
-
HoseinyFarahabady, M. R., Taheri, Javid, Zomaya, A. Y., Tari, Z., HoseinyFarahabady, M. R., Taheri, Javid, Zomaya, A. Y., and Tari, Z.
- Abstract
The concept of stream data processing is becoming challenging in most business sectors where try to improve their operational efficiency by deriving valuable information from unstructured, yet, contentiously generated high volume raw data in an expected time spans. A modern streamlined data processing platform is required to execute analytical pipelines over a continues flow of data-items that might arrive in a high rate. In most cases, the platform is also expected to dynamically adapt to dynamic characteristics of the incoming traffic rates and the ever-changing condition of underlying computational resources while fulfill the tight latency constraints imposed by the end-users. Apache Storm has emerged as an important open source technology for performing stream processing with very tight latency constraints over a cluster of computing nodes. To increase the overall resource utilization, however, the service provider might be tempted to use a consolidation strategy to pack as many applications as possible in a (cloud-centric) cluster with limited number of working nodes. However, collocated applications can negatively compete with each other, for obtaining the resource capacity in a shared platform that, in turn, the result may lead to a severe performance degradation among all running applications. The main objective of this work is to develop an elastic solution in a modern stream processing ecosystem, for addressing the shared resource contention problem among collocated applications. We propose a mechanism, based on design principles of Model Predictive Control theory, for coping with the extreme conditions in which the collocated analytical applications have different quality of service (QoS) levels while the shared-resource interference is considered as a key performance limiting parameter. Experimental results confirm that the proposed controller can successfully enhance the p -99 latency of high priority applications by 67%, compared to the default round r
- Published
- 2021
- Full Text
- View/download PDF
12. Morbus Behçet mit aseptischer Meningitis: F1
- Author
-
Rafiee, Tari Z, Neumayer, D, Rasokat, H, Kohlmorgen, S, Krieg, T, and Kurschat, P
- Published
- 2012
- Full Text
- View/download PDF
13. Flow boiling heat transfer characteristics of R245fa refrigerant in a plate heat exchanger
- Author
-
Ghorbani Tari, Z, primary
- Published
- 2020
- Full Text
- View/download PDF
14. TON-IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems
- Author
-
Alsaedi, A, Moustafa, N ; https://orcid.org/0000-0001-6127-9349, Tari, Z, Mahmood, A, Adna N Anwar, Alsaedi, A, Moustafa, N ; https://orcid.org/0000-0001-6127-9349, Tari, Z, Mahmood, A, and Adna N Anwar
- Abstract
Although the Internet of Things (IoT) can increase efficiency and productivity through intelligent and remote management, it also increases the risk of cyber-attacks. The potential threats to IoT applications and the need to reduce risk have recently become an interesting research topic. It is crucial that effective Intrusion Detection Systems (IDSs) tailored to IoT applications be developed. Such IDSs require an updated and representative IoT dataset for training and evaluation. However, there is a lack of benchmark IoT and IIoT datasets for assessing IDSs-enabled IoT systems. This paper addresses this issue and proposes a new data-driven IoT/IIoT dataset with the ground truth that incorporates a label feature indicating normal and attack classes, as well as a type feature indicating the sub-classes of attacks targeting IoT/IIoT applications for multi-classification problems. The proposed dataset, which is named TON-IoT, includes Telemetry data of IoT/IIoT services, as well as Operating Systems logs and Network traffic of IoT network, collected from a realistic representation of a medium-scale network at the Cyber Range and IoT Labs at the UNSW Canberra (Australia). This paper also describes the proposed dataset of the Telemetry data of IoT/IIoT services and their characteristics. TON-IoT has various advantages that are currently lacking in the state-of-the-art datasets: i) it has various normal and attack events for different IoT/IIoT services, and ii) it includes heterogeneous data sources. We evaluated the performance of several popular Machine Learning (ML) methods and a Deep Learning model in both binary and multi-class classification problems for intrusion detection purposes using the proposed Telemetry dataset.
- Published
- 2020
15. TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems
- Author
-
Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, Adnan, Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., and Anwar, Adnan
- Published
- 2020
16. Auto-tuning of large-scale iterative operations on modern streaming platforms
- Author
-
Hoseinyfarahabady, M. R., Taheri, Javid, Zomaya, A. Y., Tari, Z., Hoseinyfarahabady, M. R., Taheri, Javid, Zomaya, A. Y., and Tari, Z.
- Abstract
As more analytical applications today require real-time processing over high volume data streams, finding an optimal implementation of traditional algorithms which possess iterative computations are gaining popularity and become crucial in most commercial contexts, particularly in edge processing and cloud applications. In this work, we propose an auto-tuning mechanism for enhancing the run-time performance of real-world iterative and cyclic stream processing applications (Multi-Join Operation as the study case) to correctly adjust the right performance bounds for workloads with different characteristics and data-sizes running on modern streaming data processing platform.
- Published
- 2020
- Full Text
- View/download PDF
17. A Dynamic Resource Controller for Resolving Quality of Service Issues in Modern Streaming Processing Engines
- Author
-
Hoseinyfarahabady, M. R., Taheri, Javid, Zomaya, A. Y., Tari, Z., Hoseinyfarahabady, M. R., Taheri, Javid, Zomaya, A. Y., and Tari, Z.
- Abstract
Devising an elastic resource allocation controller of data analytical applications in virtualized data-center has received a great attention recently, mainly due to the fact that even a slight performance improvement can translate to huge monetary savings in practical large-scale execution. Apache Flink is among modern streamed data processing run-times that can provide both low latency and high throughput computation in to execute processing pipelines over high-volume and high-velocity data-items under tight latency constraints. However, a yet to be answered challenge in a large-scale platform with tens of worker nodes is how to resolve the run-time violation in the quality of service (QoS) level in a multi-tenant data streaming platforms, particularly when the amount of workload generated by different users fluctuates. Studies showed that a static resource allocation algorithm (round-robin), which is used by default in Apache Flink, suffer from lack of responsiveness to sudden traffic surges happening unpredictably during the run-time. In this paper, we address the problem of resource management in a Flink platform for ensuring different QoS enforcement levels in a platform with shared computing resources. The proposed solution applies theoretical principals borrowed from close-loop control theory to design a CPU and memory adjustment mechanism with the primary goal to fulfill the different QoS levels requested by submitted applications while the resource interference is considered as the critical performance-limiting factor. The performance evaluation is carried out by comparing the proposed resource allocation mechanism with two static heuristics (round robin and class-based weighted fair queuing) in a 80-core cluster under multiple traffic patterns resembling sudden changes in the incoming workloads of low-priory streaming applications. The experimental results confirm the stability of the proposed controller to regulate the underlying platform resources to smo
- Published
- 2020
- Full Text
- View/download PDF
18. Q-Flink : A QoS-Aware Controller for Apache Flink
- Author
-
Reza Hoseinyfarahabady, M., Jannesari, A., Taheri, Javid, Bao, W., Zomaya, A. Y., Tari, Z., Reza Hoseinyfarahabady, M., Jannesari, A., Taheri, Javid, Bao, W., Zomaya, A. Y., and Tari, Z.
- Abstract
Modern stream-data processing platforms are required to execute processing pipelines over high-volume, yet high-velocity, datasets under tight latency constraints. Apache Flink has emerged as an important new technology of large-scale platform that can distribute processing over a large number of computing nodes in a cluster (i.e., scale-out processing). Flink allows application developers to design and execute queries over continuous raw-inputs to analyze a large amount of streaming data in a parallel and distributed fashion. To increase the throughput of computing resources in stream processing platforms, a service provider might be tempted to use a consolidation strategy to pack as many processing applications as possible on the working nodes, with the hope of increasing the total revenue by improving the overall resource utilization. However, there is a hidden trap for achieving such a higher throughput solely by relying on an interference-oblivious consolidation strategy. In practice, collocated applications in a shared platform can fiercely compete with each others for obtaining the capacity of shared resources (e.g., cache and memory bandwidth) which in turn can lead to a severe performance degradation for all consolidated workloads.This paper addresses the shared resource contention problem associated with the auto-resource controlling mechanism of Apache Flink engine running across a distributed cluster. A controlling strategy is proposed to handle scenarios in which stream processing applications may have different quality of service (QoS) requirements while the resource interference is considered as the key performance-limiting parameter. The performance evaluation is carried out by comparing the proposed controller with the default Flink resource allocation strategy in a testbed cluster with total 32 Intel Xeon cores under different workload traffic with up to 4000 streaming applications chosen from various benchmarking tools. Experimental results demons
- Published
- 2020
- Full Text
- View/download PDF
19. Spark-Tuner : An elastic auto-tuner for apache spark streaming
- Author
-
Hoseinyfarahabady, M. R., Taheri, Javid, Zomaya, A. Y., Tari, Z., Hoseinyfarahabady, M. R., Taheri, Javid, Zomaya, A. Y., and Tari, Z.
- Abstract
Spark has emerged as one of the most widely and successfully used data analytical engine for large-scale enterprise, mainly due to its unique characteristics that facilitate computations to be scaled out in a distributed environment. This paper deals with the performance degradation due to resource contention among collocated analytical applications with different priority and dissimilar intrinsic characteristics in a shared Spark platform. We propose an auto-tuning strategy of computing resources in a distributed Spark platform for handling scenarios in which submitted analytical applications have different quality of service (QoS) requirements (e.g., latency constraints), while the interference among computing resources is considered as a key performance-limiting parameter. We compared Spark-Tuner to two widely used resource allocation heuristics in a large scale Spark cluster through extensive experimental settings across several traffic patterns with uncertain rate and application types. Experimental results show that with Spark-Tuner, the Spark engine can decrease the $p$-99 latency of high priority applications by 43% during the high-rate traffic periods, while maintaining the same level of CPU throughput across a cluster.
- Published
- 2020
- Full Text
- View/download PDF
20. Correlated Differential Privacy: Feature Selection in Machine Learning
- Author
-
Zhang, T, Zhu, T, Xiong, P, Huo, H, Tari, Z, Zhou, W, Zhang, T, Zhu, T, Xiong, P, Huo, H, Tari, Z, and Zhou, W
- Abstract
© 2005-2012 IEEE. Privacy preserving in machine learning is a crucial issue in industry informatics since data used for training in industries usually contain sensitive information. Existing differentially private machine learning algorithms have not considered the impact of data correlation, which may lead to more privacy leakage than expected in industrial applications. For example, data collected for traffic monitoring may contain some correlated records due to temporal correlation or user correlation. To fill this gap, in this article, we propose a correlation reduction scheme with differentially private feature selection considering the issue of privacy loss when data have correlation in machine learning tasks. The proposed scheme involves five steps with the goal of managing the extent of data correlation, preserving the privacy, and supporting accuracy in the prediction results. In this way, the impact of data correlation is relieved with the proposed feature selection scheme, and moreover the privacy issue of data correlation in learning is guaranteed. The proposed method can be widely used in machine learning algorithms, which provide services in industrial areas. Experiments show that the proposed scheme can produce better prediction results with machine learning tasks and fewer mean square errors for data queries compared to existing schemes.
- Published
- 2020
21. The Effect of Coating on Flow Boiling Heat Transfer Rates in Plate Heat Exchangers
- Author
-
Karayiannis, T, Ghorbani Tari, Z, Coletti, F, and Reip, A
- Published
- 2019
22. Method restructuring and consistency checking for object-oriented schemas
- Author
-
Tari, Z., primary and Li, X., additional
- Published
- 1994
- Full Text
- View/download PDF
23. Message from the BDCloud 2018 Chairs
- Author
-
Lin, X., Buyya, R., Yang, L., Tari, Z., Choo, K. -KR., Vlassov, Vladimir, Yao, L., Yin, H., Wang, W., Lin, X., Buyya, R., Yang, L., Tari, Z., Choo, K. -KR., Vlassov, Vladimir, Yao, L., Yin, H., and Wang, W.
- Abstract
Part of proceedings: ISBN 978-1-7281-1141-4QC 20190611
- Published
- 2019
- Full Text
- View/download PDF
24. PTNet: An efficient and green data center network
- Author
-
Gouissem, A., Aldhahir, N., Baccour, E., Foufou, Sebti, Hamila, R., Tari, Z., Zomaya, A.Y., Department of Electrical Engineering, College of Engineering, Qatar University, PO BOX 2713, Doha, Qatar, Qatar University, Department of Electrical and Computer Engineering - University of Texas (ECE), University of Texas at Austin [Austin], Laboratoire d'Electronique, d'Informatique et d'Image [EA 7508] (Le2i), Université de Technologie de Belfort-Montbeliard (UTBM)-Université de Bourgogne (UB)-École Nationale Supérieure d'Arts et Métiers (ENSAM), Arts et Métiers Sciences et Technologies, HESAM Université (HESAM)-HESAM Université (HESAM)-Arts et Métiers Sciences et Technologies, HESAM Université (HESAM)-HESAM Université (HESAM)-AgroSup Dijon - Institut National Supérieur des Sciences Agronomiques, de l'Alimentation et de l'Environnement-Centre National de la Recherche Scientifique (CNRS), Laboratoire d'Informatique de Bourgogne [Dijon] (LIB), Université de Bourgogne (UB), Laboratoire de micro-optoelectronique et nanostructures, Université de Monastir - University of Monastir (UM), School of Science, RMIT University, Melbourne, Australia, CSE Department, College of Engineering, Qatar University, PO BOX 2713, Doha, Qatar, Laboratoire d'Electronique, d'Informatique et d'Image UMR CNRS 6306 ( Le2i ), Université de Technologie de Belfort-Montbeliard ( UTBM ) -Centre National de la Recherche Scientifique ( CNRS ) -École Nationale Supérieure d'Arts et Métiers ( ENSAM ) -Université de Bourgogne ( UB ) -AgroSup Dijon - Institut National Supérieur des Sciences Agronomiques, de l'Alimentation et de l'Environnement, School of Information Technologies [Sydney] ( IT ), The University of Sydney [Sydney], NPRP from Qatar National Research Fund (a member of Qatar Foundation) 6-718-2-298, School of Information Technologies [Sydney] (IT), and The University of Sydney
- Subjects
[ INFO ] Computer Science [cs] ,Computer Networks and Communications ,Computer science ,Distributed computing ,02 engineering and technology ,Network topology ,[ INFO.INFO-AO ] Computer Science [cs]/Computer Arithmetic ,Theoretical Computer Science ,03 medical and health sciences ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0302 clinical medicine ,Artificial Intelligence ,Robustness (computer science) ,Energy saving ,Server ,Architecture ,0202 electrical engineering, electronic engineering, information engineering ,[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO] ,[INFO]Computer Science [cs] ,ComputingMilieux_MISCELLANEOUS ,Average path length ,Interconnection ,Energy ,[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB] ,business.industry ,[INFO.INFO-AO]Computer Science [cs]/Computer Arithmetic ,Scalability ,020206 networking & telecommunications ,Data center network ,Networking hardware ,[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR] ,Hardware and Architecture ,030220 oncology & carcinogenesis ,[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV] ,Data center ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,business ,Software ,Computer network - Abstract
International audience; In recent years, data centers have witnessed an exponential growth for hosting hundreds of thousands of servers as well as to accommodating a very large demand for resources. To fulfill the required level of demand, some approaches tackled network aspects so to host a huge number of servers while others focused on delivering rapid services to the clients by minimizing the path length between any two servers. In general, network devices are often designed to achieve 1:1 oversubscription. Alternatively, in a realistic data center environment, the average utilization of a network could vary between 5% and 25%, and thus the energy consumed by idle devices is wasted. This paper proposes a new parameterizable data center topology, called PTNet. PTNet offers a gradual scalability that interconnects small to large networks covering different ranges of sizes. This new interconnection network provides also a small path length between any two servers even in large sized data centers. PTNet does not only reduce path length and latency, it also uses a power-aware routing algorithm which saves up to 40% of energy with an acceptable computation time. In comparison to existing solutions (e.g. Flatnet, BCube, DCell and Fat-tree), PTNet shows substantial improvements in terms of capacity, robustness, cost-effectiveness and power efficiency: this improvement reaches up to 50% in some cases. (C) 2017 Elsevier Inc. All rights reserved.
- Published
- 2017
- Full Text
- View/download PDF
25. Exploring Modelling Strategies in a Meta--modelling Context
- Author
-
Bommel, P. van, Hoppenbrouwers, S.J.B.A., Proper, H.A., Weide, T.P. van der, Meersman, R., Tari, Z., Herrero, P., Meersman, R., Tari, Z., and Herrero, P.
- Subjects
Information Retrieval and Information Systems - Abstract
Contains fulltext : 35890.pdf (Publisher’s version ) (Closed access) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops,Montpellier, France,, 29 oktober 2006
- Published
- 2006
26. Probability Risk Identification Based Intrusion Detection System for SCADA Systems
- Author
-
Hu, J, Khalil, I, Tari, Z, Wen, S, Marsden, T, Moustafa, N ; https://orcid.org/0000-0001-6127-9349, Sitnikova, E ; https://orcid.org/0000-0001-7392-0383, Creech, G ; https://orcid.org/0000-0003-3854-2940, Hu, J, Khalil, I, Tari, Z, Wen, S, Marsden, T, Moustafa, N ; https://orcid.org/0000-0001-6127-9349, Sitnikova, E ; https://orcid.org/0000-0001-7392-0383, and Creech, G ; https://orcid.org/0000-0003-3854-2940
- Abstract
As Supervisory Control and Data Acquisition (SCADA) systems control several critical infrastructures, they have connected to the internet. Consequently, SCADA systems face different sophisticated types of cyber adversaries. This paper suggests a Probability Risk Identification based Intrusion Detection System (PRI-IDS) technique based on analysing network traffic of Modbus TCP/IP for identifying replay attacks. It is acknowledged that Modbus TCP is usually vulnerable due to its unauthenticated and unencrypted nature. Our technique is evaluated using a simulation environment by configuring a testbed, which is a cus- tom SCADA network that is cheap, accurate and scalable. The testbed is exploited when testing the IDS by sending individual packets from an attacker located on the same LAN as the Modbus master and slave. The experimental results demonstrated that the proposed technique can effectively and efficiently recognise replay attacks.
- Published
- 2018
27. Fog computing as a critical link between a central cloud and iot in support of fast discovery of new hydrocarbon reservoirs
- Author
-
Hu, J, Khalil, I, Tari, Z, Wen, S, Goscinski, Andrzej, Aziz, IA, Alzahrani, EJ, Hu, J, Khalil, I, Tari, Z, Wen, S, Goscinski, Andrzej, Aziz, IA, and Alzahrani, EJ
- Published
- 2018
28. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures
- Author
-
Bolzoni, D., Etalle, S., Meersman, R., Tari, Z., Mathematics and Computer Science, and Security
- Subjects
Boosting (machine learning) ,business.industry ,Computer science ,Anomaly-based intrusion detection system ,SCS-Cybersecurity ,Intrusion detection system ,computer.software_genre ,Web application security ,Regular language ,False positive paradox ,Web application ,Anomaly detection ,Data mining ,business ,computer - Abstract
We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the "regular" ones based on the inference of a regular language. We support our proposal by realizing Sphinx, an anomaly-based intrusion detection system based on it. Thorough benchmarks show that Sphinx performs better than current state-of-the-art systems, both in terms of false positives/false negatives as well as needing a shorter training period.
- Published
- 2008
- Full Text
- View/download PDF
29. A model-driven approach for the specification and analysis of access control policies
- Author
-
Fabio Massacci, Zannone, Nicola, Meersman, R., and Tari, Z.
- Subjects
Computer science ,business.industry ,Modeling language ,Process (engineering) ,Role-based access control ,Systems engineering ,System requirements specification ,Access control ,Software engineering ,business - Abstract
The last years have seen the definition of many languages, models and standards tailored to specify and enforce access control policies, but such frameworks do not provide methodological support during the policy specification process. In particular, they do not provide facilities for the analysis of the social context where the system operates. In this paper we propose a model-driven approach for the specification and analysis of access control policies. We build this framework on top of SI*, a modeling language tailored to capture and analyze functional and security requirements of socio-technical systems. The framework also provides formal mechanisms to assist policy writers and system administrators in the verification of access control policies and of the actual user-permission assignment.
- Published
- 2008
- Full Text
- View/download PDF
30. PTNet: An efficient and green data center network
- Author
-
Baccour, E., primary, Foufou, S., additional, Hamila, R., additional, Tari, Z., additional, and Zomaya, A.Y., additional
- Published
- 2017
- Full Text
- View/download PDF
31. Modeling data federations in ORM
- Author
-
Balsters, Herman, Halpin, Terry, Meersman, R, Tari, Z, and Herrero, P
- Subjects
Information retrieval ,Computer science ,InformationSystems_DATABASEMANAGEMENT ,computer.software_genre ,Conceptual schema ,Data warehouse ,Data modeling ,Set (abstract data type) ,Consistency (database systems) ,Data extraction ,Star schema ,Schema (psychology) ,Component (UML) ,Global schema ,Data mining ,computer - Abstract
Two major problems in constructing data federations (for example, data warehouses and database federations) concern achieving and maintaining consistency and a uniform representation of the data on the global level of the federation. The first step in creating uniform representations of data is known as data extraction, whereas data reconciliation is concerned with resolving data inconsistencies. Our approach to constructing a global conceptual schema as the result of integrating a collection of (semantically) heterogeneous component schemas is based on the concept of exact views. We show that a global schema constructed in terms of exact views integrates component schemas in such a way that the global schema is populated by exactly those instances allowed by the local schemas (and in special cases, also the other way around). In this sense, the global schema is equivalent to the set of component schemas from which the global schema is derived. This paper describes a modeling framework for data federations based on the Object-Role Modeling (ORM) approach. In particular, we show that we can represent exact views within ORM, providing the means to resolve in a combined setting data extraction and reconciliation problems on the global level of the federation.
- Published
- 2007
- Full Text
- View/download PDF
32. Understanding the occurrence of errors in process models based on metrics
- Author
-
Mendling, J., Neumann, G., Aalst, van der, W.M.P., Meersman, R., Tari, Z., and Information Systems IE&IS
- Subjects
Process modeling ,Business process ,Computer science ,Process (engineering) ,Management science ,media_common.quotation_subject ,Information system ,Sample (statistics) ,Quality (business) ,Business process modeling ,Work in process ,Data science ,media_common - Abstract
Business process models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive application of process modeling in practice, there are hardly empirical results available on quality aspects of process models. This paper aims to advance the understanding of this matter by analyzing the connection between formal errors (such as deadlocks) and a set of metrics that capture various structural and behavioral aspects of a process model. In particular, we discuss the theoretical connection between errors and metrics, and provide a comprehensive validation based on an extensive sample of EPC process models from practice. Furthermore, we investigate the capability of the metrics to predict errors in a second independent sample of models. The high explanatory power of the metrics has considerable consequences for the design of future modeling guidelines and modeling tools.
- Published
- 2007
- Full Text
- View/download PDF
33. Modeling dynamic rules in ORM
- Author
-
Balsters, H., Carver, A., Halpin, T., Morgan, T., Meersman, R., Tari, Z., and Herrero, P.
- Subjects
Theoretical computer science ,Relation (database) ,Syntax (programming languages) ,Transaction processing ,Business rule ,business.industry ,Computer science ,Formal methods ,Transaction Type ,Data integrity ,Artificial intelligence ,State (computer science) ,business ,computer ,Database transaction ,Object Constraint Language ,computer.programming_language - Abstract
This paper proposes an extension to the Object-Role Modeling approach to support formal declaration of dynamic rules Dynamic rules differ from static rules by pertaining to properties of state transitions, rather than to the states themselves In this paper, application of dynamic rules is restricted to so-called single-step transactions, with an old state (the input of the transaction) and a new state (the direct result of that transaction) Such restricted rules are easier to formulate (and enforce) than a constraint applying historically over all possible states In our approach, dynamic rules specify an elementary transaction type indicating which kind of object or fact is being added, deleted or updated, and (optionally) pre-conditions relevant to the transaction, followed by a condition stating the properties of the new state, including the relation between the new state and the old state These dynamic rules are formulated in a syntax designed to be easily validated by non-technical domain experts.
- Published
- 2006
34. Migration of a SCADA system to IaaS clouds – a case study
- Author
-
Church, P, Mueller, H, Ryan, C, Gogouvitis, SV, Goscinski, Andrzej, Tari, Z, Church, P, Mueller, H, Ryan, C, Gogouvitis, SV, Goscinski, Andrzej, and Tari, Z
- Published
- 2017
35. Modeling Views for Semantic Web Using eXtensible Semantic (XSemantic) Nets
- Author
-
Rajugan, R., Chang, E., Feng, L., Dillon, T., meersman, R, Tari, Z, herrero, p, Méndez, G., Cavedon, L., Martin, D., Hinze, A., Buchanan, G., and Databases (Former)
- Subjects
METIS-229532 ,business.industry ,Computer science ,IR-63529 ,Materialized view ,DB-SW: SEMANTIC WEB ,computer.file_format ,Ontology (information science) ,Task (project management) ,World Wide Web ,Ontology ,The Internet ,Semantic Web Stack ,RDF ,View model ,business ,computer ,Semantic Web ,EWI-7320 - Abstract
The emergence of Semantic Web (SW) and the related technologies promise to make the web a meaningful experience. Yet, high level modeling, design and querying techniques proves to be a challenging task for organizations that are hoping utilize the SW paradigm for their industrial applications, which are still using traditional database techniques. To address such an issue, in this paper, we propose a view model for the SW (SW-View), to SW-enable traditional solutions. First we outline the view model, its properties and some modeling issues, followed by some discussions on modeling such views (at the conceptual level). We also provide a brief discussion on how this view model is utilized in the design and construction of materialized ontology views to support extraction of sub-ontologies.
- Published
- 2005
- Full Text
- View/download PDF
36. Process mining and verification of properties : an approach based on temporal logic
- Author
-
Aalst, van der, W.M.P., Beer, de, H.T., Dongen, van, B.F., Meersman, R., Tari, Z., and Information Systems IE&IS
- Subjects
business.industry ,Computer science ,Event (computing) ,Process mining ,Petri net ,computer.software_genre ,Business process management ,Business process discovery ,Workflow ,Knowledge extraction ,Linear temporal logic ,Information system ,Temporal logic ,Data mining ,business ,computer - Abstract
Information systems are facing conflicting requirements. On the one hand, systems need to be adaptive and self-managing to deal with rapidly changing circumstances. On the other hand, legislation such as the Sarbanes-Oxley Act, is putting increasing demands on monitoring activities and processes. As processes and systems become more flexible, both the need for, and the complexity of monitoring increases. Our earlier work on process mining has primarily focused on process discovery, i.e., automatically constructing models describing knowledge extracted from event logs. In this paper, we focus on a different problem complementing process discovery. Given an event log and some property, we want to verify whether the property holds. For this purpose we have developed a new language based on Linear Temporal Logic (LTL) and we combine this with a standard XML format to store event logs. Given an event log and an LTL property, our LTL Checker verifies whether the observed behavior matches the (un)expected/(un)desirable behavior.
- Published
- 2005
- Full Text
- View/download PDF
37. On the notion of coupling in communication middleware
- Author
-
Aldred, L., Aalst, van der, W.M.P., Dumas, M., Hofstede, ter, A.H.M., Meersman, R., Tari, Z., and Information Systems IE&IS
- Subjects
Transaction processing ,Computer science ,computer.internet_protocol ,business.industry ,Distributed computing ,Mobile computing ,Loose coupling ,computer.software_genre ,Grid ,Business Process Execution Language ,Software ,Grid computing ,Common Object Request Broker Architecture ,Asynchronous communication ,Middleware (distributed applications) ,Middleware ,Message oriented middleware ,Software architecture ,business ,computer - Abstract
It is well accepted that different types of distributed architectures require different levels of coupling. For example, in client-server and three-tier architectures the application components are generally tightly coupled between them and with the underlying communication middleware. Meanwhile, in off-line transaction processing, grid computing and mobile application architectures, the degree of coupling between application components and with the underlying middleware needs to be minimised along different dimensions. In the literature, terms such as synchronous, asynchronous, blocking, non-blocking, directed, and non-directed are generally used to refer to the degree of coupling required by a given architecture or provided by a given middleware. However, these terms are used with various connotations by different authors and middleware vendors. And while several informal definitions of these terms have been provided, there is a lack of an overarching framework with a formal grounding upon which software architects can rely to unambiguously communicate architectural requirements with respect to coupling. This paper addresses this gap by: (i) identifying and formally defining three dimensions of coupling; (ii) relating these dimensions to existing communication middleware; and (iii) proposing notational elements for representing coupling configurations. The identified dimensions provide the basis for a classification of middleware which can be used as a selection instrument.
- Published
- 2005
- Full Text
- View/download PDF
38. Efficient Processing of Secured XML Metadata
- Author
-
Feng, L., meersman, R, Jonker, Willem, Tari, Z, and Databases (Former)
- Subjects
Information management ,Data element ,Service delivery framework ,computer.internet_protocol ,Computer science ,Knowledge engineering ,Meta Data Services ,Metadata repository ,Metadata ,World Wide Web ,DB-SDM: SECURE DATA MANAGEMENT ,Metadata management ,EWI-8092 ,Information system ,computer ,XML ,Database catalog ,IR-63666 - Abstract
Metadata management is a key issue in intelligent Web-based environments. It plays an important role in a wide spectrum of areas, ranging from semantic explication, information handling, knowledge management, multimedia processing to personalized service delivery. As a result, security issues around metadata management needs to be addressed in order to build trust and confidence to ambient environments. The aim of this paper is to bring together the worlds of security and XML-formatted metadata management in such a way that, on the one hand the requirement on secure metadata management is satisfied, while on the other other hand the efficiency on metadata processing can still be guaranteed. To this end, we develop an effective approach to enable efficient search on encrypted XML metadata. The basic idea is to augment encrypted XML metadata with encodings which characterize the topology and content of every tree-structured XML metadata, and then filter out candidate data for decryption and query execution by examining query conditions against these encodings. We describe a generic framework consisting of three phases, namely, query preparation, query pre-processing and query execution, to implement the proposed search strategy.
- Published
- 2003
- Full Text
- View/download PDF
39. Preparing SCORM for the semantic web
- Author
-
Aroyo, L.M., Pokraev, S., Brussee, Rogier, meersman, R, Tari, Z, and Schmidt, D.C.
- Subjects
Knowledge representation and reasoning ,Computer science ,Business process ,business.industry ,METIS-306393 ,Interoperability ,Knowledge engineering ,Context (language use) ,computer.file_format ,Semantics ,IR-92525 ,World Wide Web ,Annotation ,SDG 4 – Kwaliteitsonderwijs ,ComputingMilieux_COMPUTERSANDEDUCATION ,The Internet ,RDF ,business ,Semantic Web ,computer ,SDG 4 - Quality Education - Abstract
In this paper we argue that the effort within the context of Semantic Web research, such as RDF and DAML-S. will allow for better knowledge representation and engineering of educational systems and easier integration of e-learning with other business processes. We also argue that existing educational standards, such as SCORM and LOM could be mapped to those technologies, providing for more efficient automation of processes like educational resource annotation, and intelligent accessibility management. In this way we can use a successful combination of the technical advances outside of educational context and the existing educational standards, and allow for easier interoperability. To illustrate these issues and a solution approach we present the OntoAIMS educational environment.
- Published
- 2003
- Full Text
- View/download PDF
40. Visualizing Formalisms with ORM Models
- Author
-
Overbeek, S.J., Bommel, P. van, Proper, H.A., Rijsenbrij, D.B.B., Meersman, R., Tari, Z., Herrero, P., Meersman, R., Tari, Z., and Herrero, P.
- Subjects
Theoretical computer science ,Modeling language ,Programming language ,Computer science ,Software Science ,Object type ,Lecture Notes in Computer Science ,computer.software_genre ,Notation ,Representation (mathematics) ,computer ,Rotation formalisms in three dimensions - Abstract
During the development of theoretical frameworks researchers often graphically represent formal textual notations as part of a developed theory. This may lead to enrichments and new insights regarding a theory. A possibility for graphical representation of formalisms is the utilization of modeling languages such as ORM. This paper deals with the technique of visualizing formalisms by using ORM models and shows the advantages of graphically representing a formal theoretical framework. An application of the approach that has already been successfully practised is elaborated. This application concerns a theoretical framework consisting of knowledge intensive task properties and shows how the approach to visualize formalisms with ORM can be materialized.
- Published
- 2007
41. Capturing Modeling Processes -- Towards the MoDial Modeling Laboratory
- Author
-
Hoppenbrouwers, S.J.B.A., Lindeman, L., Proper, H.A., Meersman, R., Tari, Z., Herrero, P., Meersman, R., Tari, Z., and Herrero, P.
- Subjects
Information Retrieval and Information Systems ,Lecture notes in computer science - Abstract
Contains fulltext : 36033.pdf (Publisher’s version ) (Closed access)
- Published
- 2006
42. Fact-Oriented Modeling from a Programming Language Designer's Perspective
- Author
-
Pepels, Betsy, Plasmeijer, Rinus, Proper, H.A., Meersman, R., Tari, Z., Herrero, P., Meersman, R., Tari, Z., and Herrero, P.
- Subjects
Informatics for Technical Applications ,Software Technology ,Information Retrieval and Information Systems ,Lecture notes in computer science - Abstract
Contains fulltext : 35834.pdf (Publisher’s version ) (Closed access) Contains fulltext : 35834.pdf (Author’s version postprint ) (Open Access)
- Published
- 2006
43. Worklets: A Service-Oriented Implementation of Dynamic Flexibility in Workflows
- Author
-
Adams, M., Hofstede, ter, A.H.M., Edmond, D., Aalst, van der, W.M.P., Meersman, R., Tari, Z., Information Systems IE&IS, Meersman, R., and Tari, Z.
- Subjects
Work practice ,Flexibility (engineering) ,Collaborative software ,workflow ,business.industry ,Business process ,Computer science ,computer.internet_protocol ,Activity Theory ,Distributed computing ,Virtual team ,Context (language use) ,Software maintenance ,Service-oriented architecture ,Extensibility ,Task (project management) ,flexibility ,Workflow ,Ripple ,080699 Information Systems not elsewhere classified ,Down Rules ,worklet ,Software engineering ,business ,computer - Abstract
This paper presents the realisation, using a Service Oriented Architecture, of an approach for dynamic flexibility and evolution in workflows through the support of flexible work practices, based not on proprietary frameworks, but on accepted ideas of how people actually work. A set of principles have been derived from a sound theoretical base and applied to the development of worklets, an extensible repertoire of self-contained sub-processes aligned to each task, from which a dynamic runtime selection is made depending on the context of the particular work instance. An erratum to this chapter can be found at http://dx.doi.org/10.1007/11914853_71.
- Published
- 2006
- Full Text
- View/download PDF
44. Quality Makes the Information Market
- Author
-
Gils, B. van, Proper, H.A., Bommel, P. van, Weide, T.P. van der, Meersman, R., Tari, Z., Meersman, R., and Tari, Z.
- Subjects
Information Retrieval and Information Systems ,Lecture Notes in Computer Science - Abstract
Contains fulltext : 35489.pdf (Publisher’s version ) (Closed access)
- Published
- 2006
45. Giving Meaning to Enterprise Architectures -- Architecture Principles with ORM and ORC
- Author
-
Bommel, P. van, Hoppenbrouwers, S.J.B.A., Proper, H.A., Weide, T.P. van der, Meersman, R., Tari, Z., Herrero, P., Meersman, R., Tari, Z., and Herrero, P.
- Subjects
Information Retrieval and Information Systems ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Lecture Notes in Computer Science - Abstract
Contains fulltext : 35813pre.pdf (Author’s version preprint ) (Open Access) Contains fulltext : 35813pub.pdf (Publisher’s version ) (Closed access)
- Published
- 2006
46. Mining reference process models and their configurations
- Author
-
Gottschalk, F., Aalst, van der, W.M.P., Jansen - Vullers, M.H., Meersman, R., Tari, Z., Herrero, P., and Information Systems IE&IS
- Subjects
Process modeling ,business.industry ,Business process ,Process (engineering) ,Computer science ,Information technology ,Process mining ,Business process modeling ,computer.software_genre ,Data mining ,business ,Adaptation (computer science) ,Reference model ,computer - Abstract
Reference process models are templates for common processes run by many corporations. However, the individual needs among organizations on the execution of these processes usually vary. A process model can address these variations through control-flow choices. Thus, it can integrate the different process variants into one model. Through configuration parameters, a configurable reference models enables corporations to derive their individual process variant from such an integrated model. While this simplifies the adaptation process for the reference model user, the construction of a configurable model integrating several process variants is far more complex than the creation of a traditional reference model depicting a single best-practice variant. In this paper we therefore recommend the use of process mining techniques on log files of existing, well-running IT systems to help the reference model provider in creating such integrated process models. Afterwards, the same log files are used to derive suggestions for common configurations that can serve as starting points for individual configurations.
- Published
- 2008
47. Formal Semantics of Dynamic Rules in ORM
- Author
-
Balsters, Herman, Halpin, Terry, Meersman, R, Tari, Z, and Herrero, P
- Subjects
INTEGRITY CONSTRAINTS - Abstract
This paper provides formal semantics for an extension of the Object-Role Modeling approach that supports declaration of dynamic rules. Dynamic rules differ from static rules by pertaining to properties of state transitions, rather than to the states themselves. In this paper we restrict application of dynamic rules to so-called single-step transactions, with ail old state (the input of the transaction) and a new state (the direct result of that transaction). These dynamic rules further specify an elementary transaction type by indicating which kind of object or fact (being added, deleted or updated) is actually allowed. Dynamic rules may declare pre-conditions relevant to the transaction, and a condition stating the properties of the new state, including the relation between the new state and the old state. In this paper we provide such dynamic rules with a formal semantics based on sorted, first-order predicate logic. The key idea to our solution is the formalization of dynamic constraints as static constraints on the database transaction history.
- Published
- 2008
48. Cycle time prediction : When will this case finally be finished?
- Author
-
Dongen, van, B.F., Crooy, R.A., Aalst, van der, W.M.P., Meersman, R., Tari, Z., and Information Systems IE&IS
- Subjects
Cycle time ,Engineering ,Operations research ,business.industry ,Event (computing) ,Information system ,business ,Data science ,Regression - Abstract
A typical question for people dealing with administrative processes is: "When will my case be finished?". In this paper, we show how this question can be answered, using historic information in the form of event logs of the systems supporting these administrative processes. Many information systems record information about activities performed for past cases in logs. Hence, to provide insights into the remaining cycle time of a case, the current case can be compared to all past ones. The most trivial way of estimating the remaining cycle time of a case is by looking at the average cycle time and deducting the already past time of the case under consideration. However, in this paper we show how to compute the remaining cycle time using non-parametric regression on the data recorded in event logs. An experiment is presented that demonstrates that our techniques perform well on logs taken from practice.
- Published
- 2008
- Full Text
- View/download PDF
49. Game Development Framework Based Upon Sensors and Actuators
- Author
-
van Brandenburg, Ray, Horst, Arie, Burgers, Bas, Meratnia, Nirvana, meersman, R, Tari, Z, and herrero, p
- Subjects
Engineering ,METIS-252122 ,Pervasive game ,Multimedia ,Video game development ,business.industry ,ComputingMilieux_PERSONALCOMPUTING ,Robotics ,Modular design ,computer.software_genre ,Field (computer science) ,Bridging (programming) ,Identification (information) ,EWI-14215 ,IR-65135 ,Robot ,Artificial intelligence ,business ,computer - Abstract
Urge for comfort and excitement have made gadgets indispensable part of our life. The technology-enabled gadgets not only facilitate and enrich our daily lives but also are interesting tools to challenge human imagination to design and implement new ubiquitous applications. Pervasive gaming, in which human interaction and game/scenario-dependent designs are often common practices, has proved to be one of the areas to successfully combine technology and the human fantasy. By moving away from games being played by humans and by focusing instead on games played by robots and giving humans the leading role of defining game strategies and players’ roles, this paper aims at bridging the two fields of robotics and wireless sensor/actuator networks and exploring their potentials in the field of pervasive gaming. A generic game development framework is introduced that accommodates different types of robots and various kinds of sensors and actuators. Being extensible and modular, the proposed framework can be used for a wide range of pervasive applications built upon sensors and actuators. To enable game development, a Wiimote-based robot identification and localization technique is presented. The proposed framework and robot identification, localization, control and communication mechanisms are evaluated by implementing a game example.
- Published
- 2008
- Full Text
- View/download PDF
50. Merging event-driven process chains
- Author
-
Gottschalk, F., Aalst, van der, W.M.P., Jansen - Vullers, M.H., Meersman, R., Tari, Z., and Information Systems IE&IS
- Subjects
Business Process Model and Notation ,Business process discovery ,Business process management ,Engineering ,Process modeling ,business.industry ,Artifact-centric business process model ,Business process ,Systems engineering ,Process mining ,Business process modeling ,business ,Industrial engineering - Abstract
While business processes are typically handled differently among companies, many of them are variations of a common process like procurement or invoicing. To gain synergy effects from corporate mergers, process analysts align such processes by identifying and seamlessly integrating overlapping process parts. To support this, we present in this paper an approach that merges two business process models which are depicted as Event-driven Process Chains into a single process model which can serve as a starting point for further process optimization. The approach has been implemented in the ProM process mining framework and can thus be used together with a wide range of other process mining and analysis techniques.
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.