ICEIS 2004 Abstracts


Rejecteds
Paper Nr: 907
Title:

STRATEGIES FOR THE DIGITAL ENTREPREUNERSHIP - How to survive in the actual dotcom reallity

Authors:

Felipe Zurita Quadros, Hugo Hoeschl, Andre Bortolon and Francisco da Silva

Abstract: This article approaches the importance of business plans development for Information technology companies, wrapped up into an extremely fast and dynamic reality of the globalized world transformations. A recent approach was given about the mistakes made mainly by the companies based on the Internet, well known as dotcoms, before the crash of NASDAQ in 2000. It was searched to trace a parallel among the mistakes made by these companies thanks to inefficiency of its business plans, also identifying their flaws, suggesting a reflection for entrepreneurs and futures managers, who see in the Business Plan development a way to enlarge its business and attract investors, as weel through electronic means as for conventional means.
Download

Area 1 - Databases and Information Systems Integration

Full Papers
Paper Nr: 29
Title:

CONNECTIVITY OF ERP SYSTEM

Authors:

Vatcharaporn Esichaikul and Piyanan Nuankhieo

Abstract: The study is an attempt to propose the criteria for determining the appropriate connectivity of ERP systems. The result of this study provides a framework assisting ERP adopters in selecting integration approach which are appropriate to their needs. A survey was conducted to obtain information from ERP users to learn about their opinions on factors and criteria affecting connectivity of ERP systems. Findings from the study revealed that data oriented approach and application integration oriented approach are the most preferred integration methodologies. Opinions on criteria for evaluating ERP connectivity are nature of business process of organization, availability of technologies and service supports, nature of information system of organization, system flexibility, degree of integration, transaction volume, implementation cost, ease of maintenance, implementation time, security, and budget. Finally, the study proposes a framework to determine appropriate connectivity of ERP systems.
Download

Paper Nr: 48
Title:

ASSESSING EFFORT PREDICTION MODELS FOR CORRECTIVE SOFTWARE MAINTENANCE - An empirical study

Authors:

Andrea De Lucia, Eugenio Pompella and Silvio Stefanucci

Abstract: We present an assessment of an empirical study aiming at building effort estimation models for corrective maintenance projects. We show results from the application of the prediction models to a new corrective maintenance project within the same enterprise and the same type of software systems used in a previous study. The data available for the new project are finer grained according to the indications devised in the first study. This allowed to improve the confidence in our previous empirical analysis by confirming most of the hypotheses made and to provide other useful indications to better understand the maintenance process of the company in a quantitative way.
Download

Paper Nr: 80
Title:

ORGANIZATIONAL AND TECHNOLOGICAL CRITICAL SUCCESS FACTORS BEHAVIOR ALONG THE ERP IMPLEMENTATION PHASES

Authors:

Jose Esteves and Joan Pastor

Abstract: This paper analyzes the evolution of organizational and technological critical success factors along the ERP implementation phases. The identification of factors leading to success or failure of ERP systems is an issue of increasing importance, since the number of organizations choosing the ERP path keeps growing. Our findings suggest that while both good organizational and technological perspectives are essential for a successful ERP implementation project, their importance shifts as the project moves through its lifecycle.
Download

Paper Nr: 81
Title:

ACME-DB: AN ADAPTIVE CACHING MECHANISM USING MULTIPLE EXPERTS FOR DATABASE BUFFERS

Authors:

Faizal Riaz-Ud-din and Markus Kirchberg

Abstract: An adaptive caching algorithm, known as Adaptive Caching with Multiple Experts (ACME), has recently been presented in the field of web-caching. We explore the migration of ACME to the database caching environment. By integrating recently proposed database replacement policies into ACME’s existing policy pool, an attempt is made to gauge ACME’s ability to utilise newer methods of database caching. The results suggest that ACME is indeed well-suited to the database environment and performs as well as the best currently caching policy within its policy pool at any particular moment in its request stream. Although execution time increases by integrating more policies into ACME, the overall processing time improves drastically with erratic patterns of access, when compared to static policies.
Download

Paper Nr: 212
Title:

TOWARDS CONCEPTUAL MEDIATION - A semantic architecture for dynamic integration of heterogeneous databases

Authors:

Ismael Navas D. and José F. Aldana M.

Abstract: Mediators are usually developed as monolithic systems which envelope the data source’s semantics as well as its location. Furthermore, its architecture based on wrappers involves a high coupling degree among the mediator’s components. This coupling does not allow sharing services with other organizations or the dynamic integration of new data sources. Therefore, wrappers must be re-designed and manually added for each mediation system. We propose an architecture for conceptual mediation in which the sources’ query capabilities are published as web services. These services can be registered in one or more resource directories (Semantic Directories), which are the core of this architecture because they provide the needed flexibility and scalability for dynamic integration. Finally, we show an application in a bioinformatics context to validate our approach.
Download

Paper Nr: 249
Title:

THE CONCEPT AND IMPLEMENTATION OF THE MARKET PLACE E-UTILITIES•COM

Authors:

Jamil Dimassi, Carine Souveyet and Colette Rolland

Abstract: In order to remain competitive in a deregulated environment, a group of European Utilities developed a prototype of a single Marketplace called e-utilities•com whose mandate is a clear customer centric orientation in the European environment for a successful mid-term multi-utility business via the Web. This paper highlights the concept of e-utilities•com and its implementation in a Web portal.
Download

Paper Nr: 261
Title:

ACCESS MODEL IN COOPERATIVE INFORMATION SYSTEMS - Preserving local autonomy with a global integration process

Authors:

Eric Disson and Danielle Boulanger

Abstract: This research focuses on access security in cooperating information systems. The offered modeling has to treat the interoperation of open and evolutive information systems and, moreover, has to guarantee the respect of various local security policies. The coexistence of heterogeneous information sources within an information systems framework involves homogenization problems between local security policies. We distinguish two types of heterogeneity: heterogeneity of the local access policies and semantic heterogeneity between object or subject instances of the local access schemas. To solve this twofold difficulty, we propose an original role model allowing a unified representation of local access schemas. This model preserves the flow control properties in the three main access policies (discretionary, role-based model and multilevel models). The described access schemas are enriched to establish intra-system access authorizations.
Download

Paper Nr: 261
Title:

ACCESS MODEL IN COOPERATIVE INFORMATION SYSTEMS - Preserving local autonomy with a global integration process

Authors:

Eric Disson and Danielle Boulanger

Abstract: This research focuses on access security in cooperating information systems. The offered modeling has to treat the interoperation of open and evolutive information systems and, moreover, has to guarantee the respect of various local security policies. The coexistence of heterogeneous information sources within an information systems framework involves homogenization problems between local security policies. We distinguish two types of heterogeneity: heterogeneity of the local access policies and semantic heterogeneity between object or subject instances of the local access schemas. To solve this twofold difficulty, we propose an original role model allowing a unified representation of local access schemas. This model preserves the flow control properties in the three main access policies (discretionary, role-based model and multilevel models). The described access schemas are enriched to establish intra-system access authorizations.
Download

Paper Nr: 261
Title:

ACCESS MODEL IN COOPERATIVE INFORMATION SYSTEMS - Preserving local autonomy with a global integration process

Authors:

Eric Disson and Danielle Boulanger

Abstract: This research focuses on access security in cooperating information systems. The offered modeling has to treat the interoperation of open and evolutive information systems and, moreover, has to guarantee the respect of various local security policies. The coexistence of heterogeneous information sources within an information systems framework involves homogenization problems between local security policies. We distinguish two types of heterogeneity: heterogeneity of the local access policies and semantic heterogeneity between object or subject instances of the local access schemas. To solve this twofold difficulty, we propose an original role model allowing a unified representation of local access schemas. This model preserves the flow control properties in the three main access policies (discretionary, role-based model and multilevel models). The described access schemas are enriched to establish intra-system access authorizations.
Download

Paper Nr: 261
Title:

ACCESS MODEL IN COOPERATIVE INFORMATION SYSTEMS - Preserving local autonomy with a global integration process

Authors:

Eric Disson and Danielle Boulanger

Abstract: This research focuses on access security in cooperating information systems. The offered modeling has to treat the interoperation of open and evolutive information systems and, moreover, has to guarantee the respect of various local security policies. The coexistence of heterogeneous information sources within an information systems framework involves homogenization problems between local security policies. We distinguish two types of heterogeneity: heterogeneity of the local access policies and semantic heterogeneity between object or subject instances of the local access schemas. To solve this twofold difficulty, we propose an original role model allowing a unified representation of local access schemas. This model preserves the flow control properties in the three main access policies (discretionary, role-based model and multilevel models). The described access schemas are enriched to establish intra-system access authorizations.
Download

Paper Nr: 272
Title:

BUSINESS MODELLING THROUGH ROADMAPS

Authors:

Judith B. Albornoz and Jonás Arturo Montilva Calderón

Abstract: Business modelling is a central activity to many different areas, including Business Process Reengineering, Organisational Development, Enterprise Modelling & Integration, Business Process Management and Enterprise Application Integration. It is well known that the business domain is not easy to understand neither to represent even for specialised people. The success of most of the contemporary methods for modelling Business Organisations is strongly associated with the level of understanding that the modelling team can attain about the specific situation being modelled. This understanding is directly related with the degree of modelling experience that the team has, as well as their ability to work with the techniques and tools prescribed by a specific method. Nowadays, most of the existing business modelling methods is concentrated in what the business concepts are and how to represent them. But, they lack of process guidance, which is needed to help the team through the modelling process. We elaborated the method BMM for modelling business application domains that provides working guidelines for the modelling team. This method, based on method engineering concepts helps teams to, not only, get a comprehensive knowledge about the business domain being modelled, but also, about the process of modelling the domain itself. This paper concerns with the representation of the process of modelling a business by using decision oriented process model formalism. The main contribution of our work is a set of roadmaps that contains the knowledge associated with team member’s modelling experience in business modelling and EIS development. This knowledge arises from several case studies.
Download

Paper Nr: 334
Title:

A TRANSACTION MODEL FOR LONG RUNNING BUSINESS PROCESSES

Authors:

Jinling Wang, Beihong Jin and Jing Li

Abstract: Many business processes in the enterprise applications are both long running and transactional in nature, but currently no transaction model can provide full transaction support for such long running business processes. In this paper, we proposed a new transaction model — PP/T model. It can provide full transaction support for the long running business processes, so that application developers can focus on the business logic, with the underlying platform providing the required transactional semantics. Simulation results show that the model has good performance in processing the long running business processes.
Download

Paper Nr: 410
Title:

CORRELATING EVENTS FOR MONITORING BUSINESS PROCESSES

Authors:

Josef Schiefer and Carolyn Mcgregor

Abstract: With the increasing demand for real-time information on critical performance indicators of business processes, the capturing, transformation and correlation of real-world events with minimal latency are a prerequisite for improving the speed and effectiveness of an organization's business operations. Events often include key business information about their relationship to other events that can be utilized to collect relevant event data for the calculation of business performance indicators. In this paper we introduce an approach for correlating events of business processes that uses correlation sessions to represent correlation knowledge. Correlation sessions facilitate the processing of data across multiple events and thereby enable a calculating of business metrics in near real-time. The benefit over existing approaches is that it is tailored to instrument business processes and business applications that may operate in a heterogeneous software environment. We propose a Java-based, container-managed environment which provides a distributed, scalable, near-real time processing of events and which includes a correlation service that effectively manages correlation sessions. We also show a complete example that illustrates how correlation sessions can be utilized for computing the cycle time of business processes.
Download

Paper Nr: 422
Title:

AN EVENT PROCESSING SYSTEM FOR RULE-BASED COMPONENT INTEGRATION

Authors:

Susan Urban, Sunitha Kambhampati, Suzanne Dietrich, Ying Jin and Amy Sundermier

Abstract: The Integration Rules (IRules) project has developed an environment in which active rules, known as integration rules, are used together with transactions to provide an event-driven, rule-based approach to the integration of black-box components. This paper presents the event processing system that supports the use of integration rules over components. The event processing system is composed of the language framework for the specification of different types of events, an event generation system for generating event instances, and an event handler for communicating the occurrence of events to the integration rule processor. The language framework supports the enhancement of EJB components with events that are generated before and after the execution of methods on components. Since integration rules support an immediate coupling mode and execute in the context of nested transactions, a synchronization algorithm has been developed to coordinate the execution of immediate integration rules with the execution of methods on components. The synchronization algorithm makes it possible to suspend and resume distributed application transactions to accommodate the nested execution of integration rules with an immediate coupling mode.
Download

Paper Nr: 452
Title:

IMPROVING VIEW SELECTION IN QUERY REWRITING USING DOMAIN SEMANTICS

Authors:

Qingyuan Bai, Jun Hong and Michael F. Mctear

Abstract: Query rewriting using views is an important issue in data integration. Several algorithms have been proposed, such as the bucket algorithm, the inverse rules algorithm, the SVB algorithm, and the MiniCon algorithm. These algorithms can be divided into two categories. The algorithms of the first category are based on use of buckets while the ones of the second category are based on use of inverse rules. The bucket-based algorithms have not considered the effects of integrity constraints, such as domain semantics, functional and inclusion dependencies. As a result, they might miss query rewritings or generate redundant query rewritings in the presence of these constraints. A bucket-based algorithm consists of two steps. The first step is called view selection that selects views relevant to a given query and puts the views into the corresponding buckets. The second step is to generate all the possible query rewritings by combining a view from each bucket. In this paper, we consider an improvement of view selection in the bucket-based algorithms using domain semantics. We use the resolution method to generate a pseudo residue for each view given a set of domain semantics. Given a query, the pseudo residue of each view is compared with it and any conflict that exists can be found. As a result, irrelevant views can be removed even before a bucket-based algorithm is used.
Download

Paper Nr: 511
Title:

EFFICIENT QUERYING OF TRANSFORMED XML DOCUMENTS

Authors:

Sven Groppe, Stefan Böttcher and Georg Birkenheuer

Abstract: An application using XML for data representation requires the transformation of XML data if the application accesses XML data of other applications, or of a global database using another XML format. The common approach transforms entire XML documents from one format into another e.g. by using an XSLT stylesheet. The application can then work locally on a copy of the original document transformed in the application-specific fo