共查询到20条相似文献,搜索用时 41 毫秒
1.
Scientific communities are under increasing pressure from funding organizations to publish their raw data, in addition to
their traditional publications, in open archives. Many scientists would be willing to do this if they had tools that streamlined
the process and exposed simple provenance information, i.e., enough to explain the methodology and validate the results without
compromising the author’s intellectual property or competitive advantage. This paper presents Provenance Explorer, a tool that enables the provenance trail associated with a scientific discovery process to be visualized and explored through
a graphical user interface (GUI). Based on RDF graphs, it displays the sequence of data, states and events associated with
a scientific workflow, illustrating the methodology that led to the published results. The GUI also allows permitted users
to expand selected links between nodes to reveal more fine-grained information and sub-workflows. But more importantly, the
system enables scientists to selectively construct “scientific publication packages” by choosing particular nodes from the
visual provenance trail and dragging-and-dropping them into an RDF package which can be uploaded to an archive or repository
for publication or e-learning. The provenance relationships between the individual components in the package are automatically
inferred using a rules-based inferencing engine. 相似文献
2.
Service management and design has largely focused on the interactions between employees and customers. This perspective holds
that the quality of the “service experience” is primarily determined during this final “service encounter” that takes place
in the “front stage.” This emphasis discounts the contribution of the activities in the “back stage” of the service value
chain where materials or information needed by the front stage are processed. However, the vast increase in web-driven consumer
self-service applications and other automated services requires new thinking about service design and service quality. It
is essential to consider the entire network of services that comprise the back and front stages as complementary parts of
a “service system.” We need new concepts and methods in service design that recognize how back stage information and processes
can improve the front stage experience. This paper envisions a methodology for designing service systems that synthesizes
(front-stage-oriented) user-centered design techniques with (back stage) methods for designing information-intensive applications. 相似文献
3.
Grid Data Management: Open Problems and New Issues 总被引:3,自引:0,他引:3
Initially developed for the scientific community, Grid computing is now gaining much interest in important areas such as enterprise
information systems. This makes data management critical since the techniques must scale up while addressing the autonomy,
dynamicity and heterogeneity of the data sources. In this paper, we discuss the main open problems and new issues related
to Grid data management. We first recall the main principles behind data management in distributed systems and the basic techniques.
Then we make precise the requirements for Grid data management. Finally, we introduce the main techniques needed to address
these requirements. This implies revisiting distributed database techniques in major ways, in particular, using P2P techniques.
Work partially funded by ARA “Massive Data” of the French ministry of research (project Respire), the European Strep Grid4All
project, the CAPES–COFECUB Daad project and the CNPq–INRIA Gridata project. 相似文献
4.
In this paper, we introduce an efficient mechanism to collect, store, and retrieve data provenance information in workflows of multiphysics simulations. Using notifications, we enable the nonintrusive collection of information about workflow events during workflow execution. Combining these events with workflow structure information, constant for every execution of a workflow, we obtain the data provenance information for the specific run of the workflow. Data provenance information is structured into a graph that represents workflow events on the basis of their causal dependency. We use a graph database to store this graph and utilize the traversal framework provided, to efficiently retrieve data provenance information from the graph by traversing backwards from a data object to every workflow event that is part of its provenance. Finally, we integrate data provenance information with semantics of workflow services to provide complete and meaningful data provenance information. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
5.
Guoliang Li Shengyue Ji Chen Li Jianhua Feng 《The VLDB Journal The International Journal on Very Large Data Bases》2011,20(4):617-640
Traditional information systems return answers after a user submits a complete query. Users often feel “left in the dark”
when they have limited knowledge about the underlying data and have to use a try-and-see approach for finding information.
A recent trend of supporting autocomplete in these systems is a first step toward solving this problem. In this paper, we
study a new information-access paradigm, called “type-ahead search” in which the system searches the underlying data “on the
fly” as the user types in query keywords. It extends autocomplete interfaces by allowing keywords to appear at different places
in the underlying data. This framework allows users to explore data as they type, even in the presence of minor errors. We
study research challenges in this framework for large amounts of data. Since each keystroke of the user could invoke a query
on the backend, we need efficient algorithms to process each query within milliseconds. We develop various incremental-search
algorithms for both single-keyword queries and multi-keyword queries, using previously computed and cached results in order
to achieve a high interactive speed. We develop novel techniques to support fuzzy search by allowing mismatches between query
keywords and answers. We have deployed several real prototypes using these techniques. One of them has been deployed to support
type-ahead search on the UC Irvine people directory, which has been used regularly and well received by users due to its friendly
interface and high efficiency. 相似文献
6.
Workflow management systems (WfMS) offer a promising technology for the realization of process-centered application systems.
A deficiency of existing WfMS is their inadequate support for dealing with exceptional deviations from the standard procedure.
In the ADEPT project, therefore, we have developed advanced concepts for workflow modeling and execution, which aim at the
increase of flexibility in WfMS. On the one hand we allow workflow designers to model exceptional execution paths already
at buildtime provided that these deviations are known in advance. On the other hand authorized users may dynamically deviate
from the pre-modeled workflow at runtime as well in order to deal with unforeseen events. In this paper, we focus on forward
and backward jumps needed in this context. We describe sophisticated modeling concepts for capturing deviations in workflow
models already at buildtime, and we show how forward and backward jumps (of different semantics) can be correctly applied
in an ad-hoc manner during runtime as well. We work out basic requirements, facilities, and limitations arising in this context.
Our experiences with applications from different domains have shown that the developed concepts will form a key part of process
flexibility in process-centered information systems.
Received: 6 October 2002 / Accepted: 8 January 2003
Published online: 27 February 2003
This paper is a revised and extended version of [40]. The described work was partially performed in the research project “Scalability
in Adaptive Workflow Management Systems” funded by the Deutsche Forschungsgemeinschaft (DFG). 相似文献
7.
Ufuk Utku Turuncoglu Sylvia MurphyCecelia DeLuca Nuzhet Dalfes 《Computers & Geosciences》2011,37(7):943-952
Many separate tasks must be performed to configure, run, and analyze Earth system modeling applications. This work is motivated by the complexities of running a large modeling system on a high performance network and the need to reduce those complexities, particularly for the average user. Scientific workflow systems can be used to simplify these task and their relationships, although how to implement such systems is still an open research area. In this paper, we present a methodology to combine a scientific workflow and modeling framework approach to create a standardized work environment and provide a first example of a self-describing Earth system model. We then show the results of an example workflow that is based on the proposed methodology. The example workflow allows running and analyzing a global circulation model on both a grid computing environment and a cluster system, with meaningful abstractions for the model and computing environment. As can be seen through this example, a layered approach to collecting provenance and metadata information has the added benefit of documenting a run in far greater detail than before. This approach facilitates exploration of runs and leads to possible reproducibility. 相似文献
8.
Tomás Sánchez López Damith Chinthana Ranasinghe Bela Patkai Duncan McFarlane 《Information Systems Frontiers》2011,13(2):281-300
Deployment of embedded technologies is increasingly being examined in industrial supply chains as a means for improving efficiency
through greater control over purchase orders, inventory and product related information. Central to this development has been
the advent of technologies such as bar codes, Radio Frequency Identification (RFID) systems, and wireless sensors which when
attached to a product, form part of the product’s embedded systems infrastructure. The increasing integration of these technologies
dramatically contributes to the evolving notion of a “smart product”, a product which is capable of incorporating itself into
both physical and information environments. The future of this revolution in objects equipped with smart embedded technologies
is one in which objects can not only identify themselves, but can also sense and store their condition, communicate with other
objects and distributed infrastructures, and take decisions related to managing their life cycle. The object can essentially
“plug” itself into a compatible systems infrastructure owned by different partners in a supply chain. However, as in any development
process that will involve more than one end user, the establishment of a common foundation and understanding is essential
for interoperability, efficient communication among involved parties and for developing novel applications. In this paper,
we contribute to creating that common ground by providing a characterization to aid the specification and construction of
“smart objects” and their underlying technologies. Furthermore, our work provides an extensive set of examples and potential
applications of different categories of smart objects. 相似文献
9.
溯源管理是科学工作流系统的核心功能之一。科学工作流语境下的溯源,可分为工作流定义溯源和工作流执行溯源,分别描述工作流定义和执行阶段的元数据、过程依赖及数据演化。本文重点关注工作流定义溯源和执行溯源的表示及查询技术,并阐释针对科学工作流领域内独有问题,如"黑盒"问题、依赖区分问题以及细粒度溯源等问题的解决方案。文中还将介绍现存的一些面向科学工作流的溯源系统,并提出对溯源技术未来的展望。 相似文献
10.
Fundamentals of control flow in workflows 总被引:2,自引:0,他引:2
Abstract. Although workflow management emerged as a research area well over a decade ago, little consensus has been reached as to what
should be essential ingredients of a workflow specification language. As a result, the market is flooded with workflow management
systems, based on different paradigms and using a large variety of concepts. The goal of this paper is to establish a formal
foundation for control-flow aspects of workflow specification languages, that assists in understanding fundamental properties
of such languages, in particular their expressive power. Workflow languages can be fully characterized in terms of the evaluation
strategy they use, the concepts they support, and the syntactic restrictions they impose. A number of results pertaining to
this classification will be proven. This should not only aid those developing workflow specifications in practice, but also
those developing new workflow engines.
Received 16 January 2001 / 13 November 2002
This research is supported by an ARC SPIRT grant “Component System Architecture for an Open Distributed Enterprise Management
System with Configurable Workflow Support” between QUT and Mincom. 相似文献
11.
Kalyan K. Veeramachaneni Ekaterina Vladislavleva Una-May O’Reilly 《Annals of Mathematics and Artificial Intelligence》2011,61(2):105-123
We demonstrate a means of knowledge discovery through feature extraction that exploits the search history of a search-based
optimization run. We regress a symbolic model ensemble from optimization run search points and their objective scores. The
frequency of a variable in the models of the ensemble indicates to what the extent it is an influential feature. Our demonstration
uses a genetic programming symbolic regression software package that is designed to be “off-the-shelf”. By default, the only
parameter needed in order to evolve a suite of models is how long the user is willing to wait. Then the user can easily specify
which models should go forward in terms of sufficient accuracy and complexity. For illustration purposes, we consider a sequencing
heuristic used to chain remote sensors from one to the next: “place the most reliable sensor last”. The heuristic is derived based on the mathematical form of the optimization objective function which places emphasis
on the decision variable pertaining to the last sensor. Feature extraction on optimized sensor sequences demonstrates that
the heuristic is usually effective though it is not always trustworthy. This is consistent with knowledge in sensor processing. 相似文献
12.
Discovering Social Networks from Event Logs 总被引:5,自引:0,他引:5
Process mining techniques allow for the discovery of knowledge based on so-called “event logs”, i.e., a log recording the
execution of activities in some business process. Many information systems provide such logs, e.g., most WFM, ERP, CRM, SCM,
and B2B systems record transactions in a systematic way. Process mining techniques typically focus on performance and control-flow
issues. However, event logs typically also log the performer, e.g., the person initiating or completing some activity. This paper focuses on mining social networks using this information.
For example, it is possible to build a social network based on the hand-over of work from one performer to the next. By combining
concepts from workflow management and social network analysis, it is possible to discover and analyze social networks. This
paper defines metrics, presents a tool, and applies these to a real event log within the setting of a large Dutch organization. 相似文献
13.
Much of the ongoing research in ubiquitous computing has concentrated on providing context information, e.g. location information,
to the level of services and applications. Typically, mobile clients obtain location information from their environment which
is used to provide “locally optimal” services. In contrast, it may be of interest to obtain information about the current
context a mobile user or device is in, from a client somewhere on the Web, i.e. to use the mobile device as an information
provider for Internet clients.
As an instance of such services we propose the metaphor of a “location-aware” Web homepage of mobile users providing information
about, e.g. the current location a mobile user is at. Requesting this homepage can be as easy as typing a URL containing the
mobile user's phone number such ashttp://mhp.net/+49123456789 in an off-the-shelf browser. The homepage is dynamically constructed as Web users access it and it can be configured in various
ways that are controlled by the mobile user. We present the architecture and implementation and discuss issues around this
example of “inverse” ubiquitous computing. 相似文献
14.
15.
Linda M. Gallant 《Personal and Ubiquitous Computing》2006,10(5):325-332
Product testing of mobile communication technology has typically employed the same research methodologies that were traditionally applied to stationary technology. An approach that does not primarily rely on physical location to study mobile communication technologies is thus needed. The stable component of mobile communication technology is not physical space but human communication. Therefore, a research model is developed based on an ethnography of communication approach, which designates “talk” (i.e., symbolic communication) as the primary and essential unit of measurement while making stationary physical location secondary. This allows design teams to enter a user “speech community” anywhere. Eight participants tested both the stationary and mobile version of customer relationship management software for sales. All participants were professional salespeople, comprising a speech community. Users articulated their “local” speech community meaning systems in the form of scenarios of use, which can guide product design and marketing. The findings show that proof-of-concept testing of mobile versions of desktop software can be done in conjunction with the usability testing for stationary technology. 相似文献
16.
Jesper M. Johansson 《Information Technology and Management》2000,1(3):183-194
Research in distributed database systems to date has assumed a “variable cost” model of network response time. However, network
response time has two components: transmission time (variable with message size) and latency (fixed). This research improves
on existing models by incorporating a “fixed plus variable cost” model of the network response time. In this research, we:
(1) develop a distributed database design approach that incorporates a “fixed plus variable cost”, network response time function;
(2) run a set of experiments to create designs using this model, and
(3) evaluate the impact the new model had on the design in various types of networks.
This revised version was published online in July 2006 with corrections to the Cover Date. 相似文献
17.
A. F. Newell P. Gregor M. Morgan G. Pullin C. Macaulay 《Universal Access in the Information Society》2011,10(3):235-243
Although “User-Centred”, “Participatory”, and other similar design approaches have proved to be very valuable for mainstream
design, their principles are more difficult to apply successfully when the user group contains, or is composed of, older and/or
disabled users. In the field of design for older and disabled people, the “Universal Design”, “Inclusive Design” and “Design
for All” movements have encouraged designers to extend their design briefs to include older and disabled people. The downside
of these approaches is that they can tend to encourage designers to follow a traditional design path to produce a prototype
design, and only then investigate how to modify their interfaces and systems to cope with older and/or disabled users. This
can lead to an inefficient design process and sometimes an inappropriate design, which may be “accessible” to people with
disabilities, but in practice unusable. This paper reviews the concept that the authors have called “User-Sensitive Inclusive
Design”, which suggests a different approach to designing for marginalised groups of people. Rather than suggesting that designers
rely on standards and guidelines, it is suggested that designers need to develop a real empathy with their user groups. A
number of ways to achieve this are recommended, including the use of ethnography and techniques derived from professional
theatre both for requirements gathering and for improving designers’ empathy for marginalised groups of users, such as older
and disabled people. 相似文献
18.
Peter Coschurba Joachim Baumann Uwe Kubach Alexander Leonhardi 《Personal and Ubiquitous Computing》2001,5(1):16-19
Metaphors are often used to provide the user with a mental model to ease the use of computers. An example of such a metaphor
is the commonly used “Desktop Metaphor”. Metaphors also can be used to ease context-aware information access for the users
of mobile information systems. In this paper we present a taxonomy that allows the categorisation of such metaphors. Furthermore,
we give an overview of existing metaphors and their implementations. After introducing some new metaphors we conclude our
considerations with a classification of new and existing metaphors using our taxonomy. 相似文献
19.
Fluidic flow and species transport in integrated microfluidic devices can readily be simulated with computational fluid dynamics.
Nevertheless, the common practice to evaluate the solution accuracy is to decrease the discretization size (i.e., mesh size)
until the value of the quantity of interest (termed “output” here-in) does not change within a fixed tolerance. For systems
of partial differential equations such as the ones needed to be solved for electro-osmotic flows, this procedure is inappropriate
due to the resulting large computation cost when dealing with finer discretizations. Furthermore, in a design environment,
when investigating many geometries and flow configurations, the numerical uncertainty in the output may not allow the designer
to select the best design. In this paper, we present a numerical technique that is particularly appropriate to provide certainty
information for outputs of electro-osmotic microflows. The method uses an a-posteriori error estimation technique termed the
bound method to provide fast, inexpensive, and reliable bounds to the “output”, therefore, alleviating the need to systematically run
different meshes. To demonstrate the usefulness of the bound method, the electro-osmotic flow applied to the cross-intersection
in microchannel configuration is analyzed. The bound method presented in this paper is also extend to use an adaptive refinement
strategy to sharpen the bounds, the direct equilibrating strategy to calculate the ‘hybrid-flux’ very efficiently, and parallel
local computations to speed up the fine h-mesh computations. 相似文献
20.
Zongwei Luo Amit Sheth Krys Kochut Budak Arpinar 《Distributed and Parallel Databases》2003,13(3):271-306
Workflow management systems (WfMSs) are being increasingly deployed to deliver e-business transactions across organizational boundaries. To ensure a high service quality in such transactions, exception-handling schemes for conflict resolution are needed. The conflicts primarily arise due to failure of a task in workflow execution because of underlying application, or controlling WfMS component failures or insufficient user input. So far, little progress has been reported in addressing conflict resolution in cross-organizational business processes, though its importance has been recognized. In this paper, we identify the exception handling techniques that support conflict resolution in cross-organizational settings. In particular, we propose a novel, bundled exception-handling approach, which supports (1) exception knowledge sharing--sharing exception specifications and handling experiences, (2) coordinated exception handling, and (3) intelligent problem solving--using case based reasoning to reuse exception handing experiences. A prototype of this exception handling mechanism is developed and integrated as a part of the METEOR Workflow Management System. An evaluation of our approach is also presented through some sample workflow applications. 相似文献