Business Information Systems

Nowadays, the optimization of the representation of big data and their retrieving is actually among the hot studied issues. In this context, this paper proposes a management scheme that enables the representation and the retrieve of big data, even if it is structured or not, based on extended conceptual graphs and the use of structured marks. A case study is given to illustrate the way to represent the generated big data needed to respond to distributed denial of service attacks according to the proposed management scheme and how the querying of such data may help to learn unknown attack fragments.

[1]  Leszek A. Maciaszek,et al.  Practical Software Engineering: A Case-Study Approach , 2004 .

[2]  Jean-Marc Menaud,et al.  SLA-Aware Virtual Resource Management for Cloud Infrastructures , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.

[3]  Frank Maurer,et al.  Merging Project Planning and Web-Enabled Dynamic Workflow Technologies , 2000, IEEE Internet Comput..

[4]  Mike P. Papazoglou,et al.  The Challenges of Service Evolution , 2008, CAiSE.

[5]  Andreas Wombacher,et al.  Evolution of Process Choreographies in DYCHOR , 2006, OTM Conferences.

[6]  Mykola Galushka,et al.  Efficient Similarity Determination and Case Construction Techniques for Case-Based Reasoning , 2002, ECCBR.

[7]  Leszek A. Maciaszek An Investigation of Software Holons - the 'adHOCS' Approach , 2007 .

[8]  Jie Chen,et al.  Signaling Potential Adverse Drug Reactions from Administrative Health Databases , 2010, IEEE Transactions on Knowledge and Data Engineering.

[9]  Eleni Stroulia,et al.  An Empirical Study on Web Service Evolution , 2011, 2011 IEEE International Conference on Web Services.

[10]  Stefanie Rinderle-Ma,et al.  Change patterns and change support features - Enhancing flexibility in process-aware information systems , 2008, Data Knowl. Eng..

[11]  Robin E Ferner,et al.  Internet accounts of serious adverse drug reactions: a study of experiences of Stevens-Johnson syndrome and toxic epidermal necrolysis. , 2012, Drug safety.

[12]  Andreas Wombacher Alignment of Choreography Changes in BPEL Processes , 2009, 2009 IEEE International Conference on Services Computing.

[13]  Alistair Cockburn,et al.  Selecting a Project 's Methodology , 2000, IEEE Softw..

[14]  Dirk Fahland,et al.  Automatic Discovery of Data-Centric and Artifact-Centric Processes , 2012, Business Process Management Workshops.

[15]  Niels Lohmann,et al.  Artifact-Centric Choreographies , 2010, ICSOC.

[16]  Vassilis Koutkias,et al.  Knowledge engineering for adverse drug event prevention: On the design and development of a uniform, contextualized and sustainable knowledge-based framework , 2012, J. Biomed. Informatics.

[17]  Richard Hull,et al.  Artifact-Centric Business Process Models: Brief Survey of Research Results and Challenges , 2008, OTM Conferences.

[18]  B. T. Clegg,et al.  Building a Holarchy Using Business Process-Oriented Holonic (PrOH) Modeling , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[19]  Ying Wang,et al.  A survey of change management in service-based environments , 2013, Service Oriented Computing and Applications.

[20]  Luc Bongaerts,et al.  Reference architecture for holonic manufacturing systems: PROSA , 1998 .

[21]  Yanqing Ji,et al.  A Potential Causal Association Mining Algorithm for Screening Adverse Drug Reactions in Postmarketing Surveillance , 2011, IEEE Transactions on Information Technology in Biomedicine.

[22]  Antonio Puliafito,et al.  CLEVER: A cloud-enabled virtual environment , 2010, The IEEE symposium on Computers and Communications.

[23]  Chris D. Nugent,et al.  Assessment of four modifications of a novel indexing technique for case‐based reasoning , 2007, Int. J. Intell. Syst..

[24]  Jie Chen,et al.  Mining Unexpected Temporal Associations: Applications in Detecting Adverse Drug Reactions , 2008, IEEE Transactions on Information Technology in Biomedicine.

[25]  Jianwen Su,et al.  A Data-Centric Design Methodology for Business Processes , 2009, Handbook of Research on Business Process Modeling.

[26]  Sira Yongchareon,et al.  A Framework for Behavior-Consistent Specialization of Artifact-Centric Business Processes , 2012, BPM.

[27]  Wojciech Cellary,et al.  Agile and pro-active public administration as a collaborative networked organization , 2010, ICEGOV '10.

[28]  Tony Gorschek,et al.  Evaluation and Measurement of Software Process Improvement—A Systematic Literature Review , 2012, IEEE Transactions on Software Engineering.

[29]  Jianwen Su,et al.  Specification and Verification of Artifact Behaviors in Business Process Models , 2007, ICSOC.

[30]  Stefanie Rinderle-Ma,et al.  On evolving partitioned Web Service orchestrations , 2012, 2012 Fifth IEEE International Conference on Service-Oriented Computing and Applications (SOCA).

[31]  Vineet Sinha,et al.  Using dependency models to manage complex software architecture , 2005, OOPSLA '05.

[32]  Caspar Ryan,et al.  A Controlled Experiment for Evaluating the Impact of Coupling on the Maintainability of Service-Oriented Software , 2011, IEEE Transactions on Software Engineering.

[33]  Rajkumar Buyya,et al.  SLA-Based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[34]  Fabio Casati,et al.  Developing Adapters for Web Services Integration , 2005, CAiSE.

[35]  Hsiang-Yuan Yeh,et al.  Probability Analysis on Associations of Adverse Drug Events with Drug-Drug Interactions , 2007, 2007 IEEE 7th International Symposium on BioInformatics and BioEngineering.

[36]  Wei Xu,et al.  Declarative Choreographies for Artifacts , 2012, ICSOC.