首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 41 毫秒
1.
Scientific communities are under increasing pressure from funding organizations to publish their raw data, in addition to their traditional publications, in open archives. Many scientists would be willing to do this if they had tools that streamlined the process and exposed simple provenance information, i.e., enough to explain the methodology and validate the results without compromising the author’s intellectual property or competitive advantage. This paper presents Provenance Explorer, a tool that enables the provenance trail associated with a scientific discovery process to be visualized and explored through a graphical user interface (GUI). Based on RDF graphs, it displays the sequence of data, states and events associated with a scientific workflow, illustrating the methodology that led to the published results. The GUI also allows permitted users to expand selected links between nodes to reveal more fine-grained information and sub-workflows. But more importantly, the system enables scientists to selectively construct “scientific publication packages” by choosing particular nodes from the visual provenance trail and dragging-and-dropping them into an RDF package which can be uploaded to an archive or repository for publication or e-learning. The provenance relationships between the individual components in the package are automatically inferred using a rules-based inferencing engine.  相似文献   

2.
Service management and design has largely focused on the interactions between employees and customers. This perspective holds that the quality of the “service experience” is primarily determined during this final “service encounter” that takes place in the “front stage.” This emphasis discounts the contribution of the activities in the “back stage” of the service value chain where materials or information needed by the front stage are processed. However, the vast increase in web-driven consumer self-service applications and other automated services requires new thinking about service design and service quality. It is essential to consider the entire network of services that comprise the back and front stages as complementary parts of a “service system.” We need new concepts and methods in service design that recognize how back stage information and processes can improve the front stage experience. This paper envisions a methodology for designing service systems that synthesizes (front-stage-oriented) user-centered design techniques with (back stage) methods for designing information-intensive applications.  相似文献   

3.
Grid Data Management: Open Problems and New Issues   总被引:3,自引:0,他引:3  
Initially developed for the scientific community, Grid computing is now gaining much interest in important areas such as enterprise information systems. This makes data management critical since the techniques must scale up while addressing the autonomy, dynamicity and heterogeneity of the data sources. In this paper, we discuss the main open problems and new issues related to Grid data management. We first recall the main principles behind data management in distributed systems and the basic techniques. Then we make precise the requirements for Grid data management. Finally, we introduce the main techniques needed to address these requirements. This implies revisiting distributed database techniques in major ways, in particular, using P2P techniques. Work partially funded by ARA “Massive Data” of the French ministry of research (project Respire), the European Strep Grid4All project, the CAPES–COFECUB Daad project and the CNPq–INRIA Gridata project.  相似文献   

4.
In this paper, we introduce an efficient mechanism to collect, store, and retrieve data provenance information in workflows of multiphysics simulations. Using notifications, we enable the nonintrusive collection of information about workflow events during workflow execution. Combining these events with workflow structure information, constant for every execution of a workflow, we obtain the data provenance information for the specific run of the workflow. Data provenance information is structured into a graph that represents workflow events on the basis of their causal dependency. We use a graph database to store this graph and utilize the traversal framework provided, to efficiently retrieve data provenance information from the graph by traversing backwards from a data object to every workflow event that is part of its provenance. Finally, we integrate data provenance information with semantics of workflow services to provide complete and meaningful data provenance information. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

5.
Traditional information systems return answers after a user submits a complete query. Users often feel “left in the dark” when they have limited knowledge about the underlying data and have to use a try-and-see approach for finding information. A recent trend of supporting autocomplete in these systems is a first step toward solving this problem. In this paper, we study a new information-access paradigm, called “type-ahead search” in which the system searches the underlying data “on the fly” as the user types in query keywords. It extends autocomplete interfaces by allowing keywords to appear at different places in the underlying data. This framework allows users to explore data as they type, even in the presence of minor errors. We study research challenges in this framework for large amounts of data. Since each keystroke of the user could invoke a query on the backend, we need efficient algorithms to process each query within milliseconds. We develop various incremental-search algorithms for both single-keyword queries and multi-keyword queries, using previously computed and cached results in order to achieve a high interactive speed. We develop novel techniques to support fuzzy search by allowing mismatches between query keywords and answers. We have deployed several real prototypes using these techniques. One of them has been deployed to support type-ahead search on the UC Irvine people directory, which has been used regularly and well received by users due to its friendly interface and high efficiency.  相似文献   

6.
Dealing with forward and backward jumps in workflow management systems   总被引:1,自引:0,他引:1  
Workflow management systems (WfMS) offer a promising technology for the realization of process-centered application systems. A deficiency of existing WfMS is their inadequate support for dealing with exceptional deviations from the standard procedure. In the ADEPT project, therefore, we have developed advanced concepts for workflow modeling and execution, which aim at the increase of flexibility in WfMS. On the one hand we allow workflow designers to model exceptional execution paths already at buildtime provided that these deviations are known in advance. On the other hand authorized users may dynamically deviate from the pre-modeled workflow at runtime as well in order to deal with unforeseen events. In this paper, we focus on forward and backward jumps needed in this context. We describe sophisticated modeling concepts for capturing deviations in workflow models already at buildtime, and we show how forward and backward jumps (of different semantics) can be correctly applied in an ad-hoc manner during runtime as well. We work out basic requirements, facilities, and limitations arising in this context. Our experiences with applications from different domains have shown that the developed concepts will form a key part of process flexibility in process-centered information systems. Received: 6 October 2002 / Accepted: 8 January 2003 Published online: 27 February 2003 This paper is a revised and extended version of [40]. The described work was partially performed in the research project “Scalability in Adaptive Workflow Management Systems” funded by the Deutsche Forschungsgemeinschaft (DFG).  相似文献   

7.
A scientific workflow environment for Earth system related studies   总被引:1,自引:0,他引:1  
Many separate tasks must be performed to configure, run, and analyze Earth system modeling applications. This work is motivated by the complexities of running a large modeling system on a high performance network and the need to reduce those complexities, particularly for the average user. Scientific workflow systems can be used to simplify these task and their relationships, although how to implement such systems is still an open research area. In this paper, we present a methodology to combine a scientific workflow and modeling framework approach to create a standardized work environment and provide a first example of a self-describing Earth system model. We then show the results of an example workflow that is based on the proposed methodology. The example workflow allows running and analyzing a global circulation model on both a grid computing environment and a cluster system, with meaningful abstractions for the model and computing environment. As can be seen through this example, a layered approach to collecting provenance and metadata information has the added benefit of documenting a run in far greater detail than before. This approach facilitates exploration of runs and leads to possible reproducibility.  相似文献   

8.
Deployment of embedded technologies is increasingly being examined in industrial supply chains as a means for improving efficiency through greater control over purchase orders, inventory and product related information. Central to this development has been the advent of technologies such as bar codes, Radio Frequency Identification (RFID) systems, and wireless sensors which when attached to a product, form part of the product’s embedded systems infrastructure. The increasing integration of these technologies dramatically contributes to the evolving notion of a “smart product”, a product which is capable of incorporating itself into both physical and information environments. The future of this revolution in objects equipped with smart embedded technologies is one in which objects can not only identify themselves, but can also sense and store their condition, communicate with other objects and distributed infrastructures, and take decisions related to managing their life cycle. The object can essentially “plug” itself into a compatible systems infrastructure owned by different partners in a supply chain. However, as in any development process that will involve more than one end user, the establishment of a common foundation and understanding is essential for interoperability, efficient communication among involved parties and for developing novel applications. In this paper, we contribute to creating that common ground by providing a characterization to aid the specification and construction of “smart objects” and their underlying technologies. Furthermore, our work provides an extensive set of examples and potential applications of different categories of smart objects.  相似文献   

9.
溯源管理是科学工作流系统的核心功能之一。科学工作流语境下的溯源,可分为工作流定义溯源和工作流执行溯源,分别描述工作流定义和执行阶段的元数据、过程依赖及数据演化。本文重点关注工作流定义溯源和执行溯源的表示及查询技术,并阐释针对科学工作流领域内独有问题,如"黑盒"问题、依赖区分问题以及细粒度溯源等问题的解决方案。文中还将介绍现存的一些面向科学工作流的溯源系统,并提出对溯源技术未来的展望。  相似文献   

10.
Fundamentals of control flow in workflows   总被引:2,自引:0,他引:2  
Abstract. Although workflow management emerged as a research area well over a decade ago, little consensus has been reached as to what should be essential ingredients of a workflow specification language. As a result, the market is flooded with workflow management systems, based on different paradigms and using a large variety of concepts. The goal of this paper is to establish a formal foundation for control-flow aspects of workflow specification languages, that assists in understanding fundamental properties of such languages, in particular their expressive power. Workflow languages can be fully characterized in terms of the evaluation strategy they use, the concepts they support, and the syntactic restrictions they impose. A number of results pertaining to this classification will be proven. This should not only aid those developing workflow specifications in practice, but also those developing new workflow engines. Received 16 January 2001 / 13 November 2002 This research is supported by an ARC SPIRT grant “Component System Architecture for an Open Distributed Enterprise Management System with Configurable Workflow Support” between QUT and Mincom.  相似文献   

11.
We demonstrate a means of knowledge discovery through feature extraction that exploits the search history of a search-based optimization run. We regress a symbolic model ensemble from optimization run search points and their objective scores. The frequency of a variable in the models of the ensemble indicates to what the extent it is an influential feature. Our demonstration uses a genetic programming symbolic regression software package that is designed to be “off-the-shelf”. By default, the only parameter needed in order to evolve a suite of models is how long the user is willing to wait. Then the user can easily specify which models should go forward in terms of sufficient accuracy and complexity. For illustration purposes, we consider a sequencing heuristic used to chain remote sensors from one to the next: “place the most reliable sensor last”. The heuristic is derived based on the mathematical form of the optimization objective function which places emphasis on the decision variable pertaining to the last sensor. Feature extraction on optimized sensor sequences demonstrates that the heuristic is usually effective though it is not always trustworthy. This is consistent with knowledge in sensor processing.  相似文献   

12.
Discovering Social Networks from Event Logs   总被引:5,自引:0,他引:5  
Process mining techniques allow for the discovery of knowledge based on so-called “event logs”, i.e., a log recording the execution of activities in some business process. Many information systems provide such logs, e.g., most WFM, ERP, CRM, SCM, and B2B systems record transactions in a systematic way. Process mining techniques typically focus on performance and control-flow issues. However, event logs typically also log the performer, e.g., the person initiating or completing some activity. This paper focuses on mining social networks using this information. For example, it is possible to build a social network based on the hand-over of work from one performer to the next. By combining concepts from workflow management and social network analysis, it is possible to discover and analyze social networks. This paper defines metrics, presents a tool, and applies these to a real event log within the setting of a large Dutch organization.  相似文献   

13.
Much of the ongoing research in ubiquitous computing has concentrated on providing context information, e.g. location information, to the level of services and applications. Typically, mobile clients obtain location information from their environment which is used to provide “locally optimal” services. In contrast, it may be of interest to obtain information about the current context a mobile user or device is in, from a client somewhere on the Web, i.e. to use the mobile device as an information provider for Internet clients. As an instance of such services we propose the metaphor of a “location-aware” Web homepage of mobile users providing information about, e.g. the current location a mobile user is at. Requesting this homepage can be as easy as typing a URL containing the mobile user's phone number such ashttp://mhp.net/+49123456789 in an off-the-shelf browser. The homepage is dynamically constructed as Web users access it and it can be configured in various ways that are controlled by the mobile user. We present the architecture and implementation and discuss issues around this example of “inverse” ubiquitous computing.  相似文献   

14.
15.
Product testing of mobile communication technology has typically employed the same research methodologies that were traditionally applied to stationary technology. An approach that does not primarily rely on physical location to study mobile communication technologies is thus needed. The stable component of mobile communication technology is not physical space but human communication. Therefore, a research model is developed based on an ethnography of communication approach, which designates “talk” (i.e., symbolic communication) as the primary and essential unit of measurement while making stationary physical location secondary. This allows design teams to enter a user “speech community” anywhere. Eight participants tested both the stationary and mobile version of customer relationship management software for sales. All participants were professional salespeople, comprising a speech community. Users articulated their “local” speech community meaning systems in the form of scenarios of use, which can guide product design and marketing. The findings show that proof-of-concept testing of mobile versions of desktop software can be done in conjunction with the usability testing for stationary technology.  相似文献   

16.
Research in distributed database systems to date has assumed a “variable cost” model of network response time. However, network response time has two components: transmission time (variable with message size) and latency (fixed). This research improves on existing models by incorporating a “fixed plus variable cost” model of the network response time. In this research, we: (1) develop a distributed database design approach that incorporates a “fixed plus variable cost”, network response time function; (2) run a set of experiments to create designs using this model, and (3) evaluate the impact the new model had on the design in various types of networks. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

17.
Although “User-Centred”, “Participatory”, and other similar design approaches have proved to be very valuable for mainstream design, their principles are more difficult to apply successfully when the user group contains, or is composed of, older and/or disabled users. In the field of design for older and disabled people, the “Universal Design”, “Inclusive Design” and “Design for All” movements have encouraged designers to extend their design briefs to include older and disabled people. The downside of these approaches is that they can tend to encourage designers to follow a traditional design path to produce a prototype design, and only then investigate how to modify their interfaces and systems to cope with older and/or disabled users. This can lead to an inefficient design process and sometimes an inappropriate design, which may be “accessible” to people with disabilities, but in practice unusable. This paper reviews the concept that the authors have called “User-Sensitive Inclusive Design”, which suggests a different approach to designing for marginalised groups of people. Rather than suggesting that designers rely on standards and guidelines, it is suggested that designers need to develop a real empathy with their user groups. A number of ways to achieve this are recommended, including the use of ethnography and techniques derived from professional theatre both for requirements gathering and for improving designers’ empathy for marginalised groups of users, such as older and disabled people.  相似文献   

18.
Metaphors are often used to provide the user with a mental model to ease the use of computers. An example of such a metaphor is the commonly used “Desktop Metaphor”. Metaphors also can be used to ease context-aware information access for the users of mobile information systems. In this paper we present a taxonomy that allows the categorisation of such metaphors. Furthermore, we give an overview of existing metaphors and their implementations. After introducing some new metaphors we conclude our considerations with a classification of new and existing metaphors using our taxonomy.  相似文献   

19.
Fluidic flow and species transport in integrated microfluidic devices can readily be simulated with computational fluid dynamics. Nevertheless, the common practice to evaluate the solution accuracy is to decrease the discretization size (i.e., mesh size) until the value of the quantity of interest (termed “output” here-in) does not change within a fixed tolerance. For systems of partial differential equations such as the ones needed to be solved for electro-osmotic flows, this procedure is inappropriate due to the resulting large computation cost when dealing with finer discretizations. Furthermore, in a design environment, when investigating many geometries and flow configurations, the numerical uncertainty in the output may not allow the designer to select the best design. In this paper, we present a numerical technique that is particularly appropriate to provide certainty information for outputs of electro-osmotic microflows. The method uses an a-posteriori error estimation technique termed the bound method to provide fast, inexpensive, and reliable bounds to the “output”, therefore, alleviating the need to systematically run different meshes. To demonstrate the usefulness of the bound method, the electro-osmotic flow applied to the cross-intersection in microchannel configuration is analyzed. The bound method presented in this paper is also extend to use an adaptive refinement strategy to sharpen the bounds, the direct equilibrating strategy to calculate the ‘hybrid-flux’ very efficiently, and parallel local computations to speed up the fine h-mesh computations.  相似文献   

20.
Workflow management systems (WfMSs) are being increasingly deployed to deliver e-business transactions across organizational boundaries. To ensure a high service quality in such transactions, exception-handling schemes for conflict resolution are needed. The conflicts primarily arise due to failure of a task in workflow execution because of underlying application, or controlling WfMS component failures or insufficient user input. So far, little progress has been reported in addressing conflict resolution in cross-organizational business processes, though its importance has been recognized. In this paper, we identify the exception handling techniques that support conflict resolution in cross-organizational settings. In particular, we propose a novel, bundled exception-handling approach, which supports (1) exception knowledge sharing--sharing exception specifications and handling experiences, (2) coordinated exception handling, and (3) intelligent problem solving--using case based reasoning to reuse exception handing experiences. A prototype of this exception handling mechanism is developed and integrated as a part of the METEOR Workflow Management System. An evaluation of our approach is also presented through some sample workflow applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号