Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

Selected Works

Computer Sciences

Institution
Keyword
Publication
File Type

Articles 31 - 60 of 153

Full-Text Articles in Physical Sciences and Mathematics

Iniu – A Services Portal For Niu Students, Raghu Ariga, Karthik Akula, Shreya Gujjala, Momtazul Karim, Shishira Ramesh, Jia Zhang Jun 2008

Iniu – A Services Portal For Niu Students, Raghu Ariga, Karthik Akula, Shreya Gujjala, Momtazul Karim, Shishira Ramesh, Jia Zhang

Jia Zhang

No abstract provided.


An Automatic Semantic Segment Detection Service For Html Documents, Stephen Yang, Jia Zhang, Stella Tsai Jun 2008

An Automatic Semantic Segment Detection Service For Html Documents, Stephen Yang, Jia Zhang, Stella Tsai

Jia Zhang

No abstract provided.


A Method And Case Study Of Designing Presentation Module In An Soa-Based Solution Using Configurable Architectural Building Blocks (Abbs), Liang-Jie Zhang, Jia Zhang, Abdul Allam Jun 2008

A Method And Case Study Of Designing Presentation Module In An Soa-Based Solution Using Configurable Architectural Building Blocks (Abbs), Liang-Jie Zhang, Jia Zhang, Abdul Allam

Jia Zhang

Service-Oriented Architecture (SOA) projects typically pose challenging requirements on software developers such as flexibility, speed to market, and adaptability to ever changing business requirements. In this paper, we propose a novel method of rapidly designing presentation module for an SOA-based solution using fine-grained configurable architectural building blocks (ABBs). An ABB-based presentation pattern derived from industry best practices is presented, associated with a tailored ABB configuration framework. We also introduce a formal way of modeling ABBs and their interactions. Real-life experiences of applying our ABB-based model are condensed into sixteen architectural decision points, which are further applied into a variety of …


Predicting The Behavior Of A Highly Configurable Component Based Real-Time System, Gabriel A. Moreno, Scott A. Hissam, Daniel Plakosh, Isak Savo, Marcin Stelmarczyk Jun 2008

Predicting The Behavior Of A Highly Configurable Component Based Real-Time System, Gabriel A. Moreno, Scott A. Hissam, Daniel Plakosh, Isak Savo, Marcin Stelmarczyk

Gabriel A. Moreno

Software components and the technology supporting component based software engineering contribute greatly to the rapid development and configuration of systems for a variety of application domains. Such domains go beyond desktop office applications and information systems supporting e-commerce, but include systems having real-time performance requirements and critical functionality. Discussed in this paper are the results from an experiment that demonstrates the ability to predict deadline satisfaction of threads in a real-time system where the functionality performed is based on the configuration of the assembled software components. Presented is the method used to abstract the large, legacy code base of the …


A Game Theory Approach For An Emergency Management Security Advisory System, Cheng-Kuang Wu Jun 2008

A Game Theory Approach For An Emergency Management Security Advisory System, Cheng-Kuang Wu

Cheng-Kuang Wu

Efficient emergency management must determine how and when to alert and advise the critical and appropriate response units to the danger of terrorist attacks, particularly when available resources are limited. We propose a framework for homeland security advisory system that incorporates two game theory models designed to advise response units and raise the alarm. In the first scheme the interactive behaviors between the elements or participants of the multi-emergency response system and the zone response unit are modeled and analyzed as a non-cooperative game, after which the terrorist threat value is derived from the mixed strategy Nash equilibrium. In the …


Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose Jun 2008

Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose

Professor Aditya K. Ghose

Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …


Performance Analysis Of Real-Time Component Architectures: A Model Interchange Approach, Gabriel A. Moreno, Connie U. Smith, Lloyd G. Williams May 2008

Performance Analysis Of Real-Time Component Architectures: A Model Interchange Approach, Gabriel A. Moreno, Connie U. Smith, Lloyd G. Williams

Gabriel A. Moreno

Model interchange approaches support the analysis of software architecture and design by enabling a variety of tools to automatically exchange performance models using a common schema. This paper builds on one of those interchange formats, the Software Performance Model Interchange Format (S-PMIF), and extends it to support the performance analysis of real-time systems. Specifically, it addresses real-time system designs expressed in the Construction and Composition Language (CCL) and their transformation into the S-PMIF for additional performance analyses. This paper defines extensions and changes to the S-PMIF meta-model and schema required for real-time systems. It describes transformations for both simple, best-case …


Distinguishing Between Software Oriented Architecture And Software As A Service: What's In A Name?, Phillip A. Laplante, Jia Zhang, Jeffrey Voas May 2008

Distinguishing Between Software Oriented Architecture And Software As A Service: What's In A Name?, Phillip A. Laplante, Jia Zhang, Jeffrey Voas

Jia Zhang

No abstract provided.


Beyond Mere Compliance Of Rfid Regulations By The Farming Community: A Case Study Of The Cochrane Dairy Farm, A. Trevarthen, Katina Michael May 2008

Beyond Mere Compliance Of Rfid Regulations By The Farming Community: A Case Study Of The Cochrane Dairy Farm, A. Trevarthen, Katina Michael

Professor Katina Michael

Radio-frequency identification (RFID) is changing the face of livestock identification and management. Beyond satisfying the regulations of government agencies for livestock to be a part of a national identification system for tracking purposes, farmers are now considering venturing beyond mere basic compliance systems. Once installed, farmers have begun to realize that their initial capital investment into an RFID system holds great strategic potential. The initial outlay while substantial is a once only cost that with a few more application-centric uses can yield a return on investment manifold. This paper presents a case study of the Cochrane Dairy Farm situated on …


Social And Organizational Aspects Of Information Security Management, Katina Michael May 2008

Social And Organizational Aspects Of Information Security Management, Katina Michael

Professor Katina Michael

This paper aims to explore social and organizational aspects of information security management. The changing nature of security is revealed against the backdrop of globalization. It provides a thorough review of literature on the topics of cyberethics as related to information security and transnational law. The objective of the paper is to cover broadly socio-organizational themes providing for the purpose of definition and a basis for further research. It thus raises a number of pressing issues facing organizations today, and offers an overview discussion on potential solutions. The main outcome of the paper is in showing that successful security strategies …


Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael May 2008

Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael

Professor Katina Michael

This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.


The Social Implications Of Humancentric Chip Implants: A Scenario - ‘Thy Chipdom Come, Thy Will Be Done’, Rodney Ip, Katina Michael, M G. Michael May 2008

The Social Implications Of Humancentric Chip Implants: A Scenario - ‘Thy Chipdom Come, Thy Will Be Done’, Rodney Ip, Katina Michael, M G. Michael

Professor Katina Michael

Radio frequency identification (RFID) chip implants for humans are no longer the tales of science fiction. Already preliminary findings have shown that the number of people willing to get chipped has increased since the technology’s commercial arrival in 2002, despite the fact that adoption rates have been very low. This investigation presents three case studies of the main users/ innovators of humancentric chip implants. The first case is of a British researcher in an academic institution who has conducted several implant experiments; the second case, is of a hobbyist and entrepreneur who has focused on the use of RFID implants …


Is It The End Of Barcodes In Supply Chain Management? , Luke Mccathie, Katina Michael May 2008

Is It The End Of Barcodes In Supply Chain Management? , Luke Mccathie, Katina Michael

Professor Katina Michael

Barcode is a mature automatic identification (auto-ID) technology that has been used in supply chain management (SCM) for several decades. Such has been the domination of the auto-ID technique that it has pervaded all facets of SCM, from item-level identification to transportation applications. It has enjoyed free reign especially in the retail sector. However, recently radio-frequency identification (RFID) has been considered a rival technology, more superior in terms of its power to store and update information instantaneously, and non-line of sight (nLoS) ability to be read. Yet RFID is more costly and for the present barcode is still the most …


Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose May 2008

Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose

Professor Katina Michael

The objective of this paper is to explore the role of human tracking technology, primarily the use of global positioning systems (GPS) in locating individuals for the purposes of mutual legal assistance (MLA), and providing location intelligence for use in inter-state police cooperation within the context of transnational crime. GPS allows for the 24/7 continuous real-time tracking of an individual, and is considered manifold more powerful than the traditional visual surveillance often exercised by the police. As the use of GPS for human tracking grows in the law enforcement sector, federal and state laws in many countries are to a …


A Research Note On Ethics In The Emerging Age Of Überveillance, M. G. Michael, Sarah Jean Fusco, Katina Michael May 2008

A Research Note On Ethics In The Emerging Age Of Überveillance, M. G. Michael, Sarah Jean Fusco, Katina Michael

Professor Katina Michael

Advanced location-based services (A-LBS) for humancentric tracking and monitoring are now emerging as operators and service providers begin to leverage their existing infrastructure and invest in new technologies, toward increasingly innovative location application solutions. We can now point to humancentric tracking and monitoring services where the person (i.e. subject) has become an active node in the network. For example, in health applications through the use of embedded technologies such as radio-frequency identification (RFID) or in campus applications through the use of electronic monitoring techniques in the form of global positioning systems (GPS). These technologies, for the greater part, have been …


Towards Chipification: The Multifunctional Body Art Of The Net Generation, Katina Michael, M G. Michael May 2008

Towards Chipification: The Multifunctional Body Art Of The Net Generation, Katina Michael, M G. Michael

Professor Katina Michael

This paper considers the trajectory of the microchip within the context of converging disciplines to predict the realm of likely possibilities in the shortterm future of the technology. After presenting the evolutionary development from first generation to fourth generation wearable computing, a case study on medical breakthroughs using implantable devices is presented. The findings of the paper suggest that before too long, implantable devices will become commonplace for everyday humancentric applications. The paradigm shift is exemplified in the use of microchips, from their original purpose in identifying humans and objects to its ultimate trajectory with multifunctional capabilities buried within the …


The Hybridization Of Automatic Identification Techniques In Mass Market Applications: Towards A Model Of Coexistence, Katina Michael, M. G. Michael, Holly Tootell, V. Baker May 2008

The Hybridization Of Automatic Identification Techniques In Mass Market Applications: Towards A Model Of Coexistence, Katina Michael, M. G. Michael, Holly Tootell, V. Baker

Professor Katina Michael

The number and type of automatic identification technologies in the market have grown since the bar code was introduced in the retail sector in the late 1960s. This paper studies the selection environment of auto-ID and defines, describes and gives examples of three main patterns of innovation: migration, integration, and convergence. The findings indicate that technology adoption is not always about choosing the dominant design but about how to future-proof an auto-ID implementation. Enterprises wishing to adopt auto-ID techniques need to be aware that technology is not static, auto-ID techniques are not stand-alone, and consumers may have wide-ranging requirements for …


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael May 2008

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

Professor Katina Michael

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip May 2008

Microchip Implants For Humans As Unique Identifiers: A Case Study On Verichip, Katina Michael, M G. Michael, Rodney Ip

Professor Katina Michael

Microchip implants for humans are not new. The installation of pacemakers in humans and a great number of other medical innovations for prosthesis are now considered straightforward procedures. Today we have even realised the potential for microchip implants to be embedded inside the body of humans for the purpose of acting as unique lifetime identifiers (ULI). Tiny radiofrequency identification (RFID) devices are now being utilised to store a unique 16-digit identification number.


The Need For A Digital Aid Framework In Humanitarian Relief, J. Sargent, Katina Michael May 2008

The Need For A Digital Aid Framework In Humanitarian Relief, J. Sargent, Katina Michael

Professor Katina Michael

Humanitarian relief organizations are increasingly becoming reliant upon the use of Information Technology & Telecommunications (IT&T) for the distribution of aid to refugees and Internally Displaced Persons (IDP) throughout the world. Traditionally, basic telecommunications infrastructure like the public switch telephone network (PSTN) has been used to transmit important information but today humanitarian relief organizations are attempting to utilize emerging technologies such as global positioning systems (GPS) telephones and geographic information systems (GIS). For the greater part IT&T utilization by relief organizations has happened in an ad-hoc manner in response to specific events. This paper proposes the use of a complete …


Location-Based Services: A Vehicle For It&T Convergence , Katina Michael May 2008

Location-Based Services: A Vehicle For It&T Convergence , Katina Michael

Professor Katina Michael

Location-based services (LBS), more than any other mobile commerce application area has served to bring together information technology and telecommunications (IT&T) industries. While much has been written on the potential of LBS, literature on how it is a catalyst for digital convergence is scant. This paper identifies and explores the various levels of converging technologies in mobile commerce by using three LBS case studies. Through literal replication the findings indicate that IT&T technologies are converging at the infrastructure, appliance and application level. It is predicted that mCommerce applications will increasingly rely on industry convergence to achieve their desired outcomes.


Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael May 2008

Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael

Professor Katina Michael

Location-based services (LBS) rely on knowledge of a user’s location to provide tailored services or information by means of a wireless device. LBS applications have wide-ranging implications for society, particularly in the context of tracking and monitoring groups of individuals such as children, invalids, and parolees. Despite a great deal of attention paid to technical and commercial aspects of LBS technologies, consideration of the legal, ethical, social and technology momentum issues involved has been wanting. This paper examines some of the more pressing issues that are expected to arise from the widespread use of LBS. The outcome of this paper …


Trends In The Selection Of Automatic Identification Technology In Electronic Commerce Applications, Katina Michael May 2008

Trends In The Selection Of Automatic Identification Technology In Electronic Commerce Applications, Katina Michael

Professor Katina Michael

Since the 1970s, automatic identification (auto-ID) technologies have been evolving to revolutionise the way people live and work. Previous research has not addressed auto-ID technological innovation as a field of study, despite its growing importance on consumer, business and government electronic commerce (EC) applications. This paper is specifically concerned with five auto-ID technologies, bar codes, magnetic-stripe card, smart card, biometrics and radiofrequency identification (RF/ID) tags and transponders. Using multiple embedded case studies and applying the fundamental concepts of the systems of innovation (SI) approach, the overall aim is to understand the selection environment of the auto-ID industry. The results show …


Minimizing Product Shrinkage Across The Supply Chain Using Radio Frequency Identification: A Case Study On A Major Australian Retailer, N. Huber, Katina Michael May 2008

Minimizing Product Shrinkage Across The Supply Chain Using Radio Frequency Identification: A Case Study On A Major Australian Retailer, N. Huber, Katina Michael

Professor Katina Michael

This paper identifies the contributing factors of product shrinkage and investigates the current state of anti-theft technology as part of the loss prevention strategy for a major Australian retailer. Using a case study approach a total of eleven interviews were conducted with employees of the retailer to identify factors contributing to product shrinkage and ways to overcome these through the use of radio frequency identification (RFID) technology. Known sources of product shrinkage included: warehouse discrepancies, internal and external theft, product recalls, shop return fraud, extortion, human and system error, poor stock control, poor rotation of stock, misplaced product items, lost …


The Use Of Information And Communication Technology For The Preservation Of Aboriginal Culture: The Badimaya People Of Western Australia, Katina Michael, L. Dunn May 2008

The Use Of Information And Communication Technology For The Preservation Of Aboriginal Culture: The Badimaya People Of Western Australia, Katina Michael, L. Dunn

Professor Katina Michael

Information and Communication Technology (ICT) has been applied successfully to numerous remote Indigenous communities around the world. The greatest gains have been made when requirements have been first defined by Indigenous members of the community then pattern matched to an ICT solution.


Barriers To Rfid Adoption In The Supply Chain, Nick Huber, Katina Michael, Luke Mccathie May 2008

Barriers To Rfid Adoption In The Supply Chain, Nick Huber, Katina Michael, Luke Mccathie

Professor Katina Michael

This paper explores the current barriers to adoption of radio-frequency identification (RFID) for supply chain applications, and documents the perceptions of key players in the Australian RFID market. The paper contains data collected from interviews of both technology providers (e.g. RFID vendors), and prospective business customer (i.e. a large retailer). Data collected is analyzed using qualitative content analysis, and supported with figures and tables. The findings show that the three main barriers to RFID adoption are: the cost of RFID implementation (especially ongoing tag costs), lack of customer awareness and education, and a technology which is only at the beginning …


The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael May 2008

The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael

Professor Katina Michael

The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for location-based services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer’s or memory loss, and the monitoring of parolees for law enforcement, security or personal protection purposes. The continual miniaturization of the GPS chipset means that receivers can take the form of wristwatches, mini mobiles and bracelets, with the ability to pinpoint the longitude and latitude of a subject 24/7/365. This paper employs usability context analyses to draw out the emerging ethical …


Location-Based Intelligence – Modeling Behavior In Humans Using Gps, Katina Michael, Andrew Mcnamee, M G. Michael, Holly Tootell May 2008

Location-Based Intelligence – Modeling Behavior In Humans Using Gps, Katina Michael, Andrew Mcnamee, M G. Michael, Holly Tootell

Professor Katina Michael

This paper introduces the notion of location-based intelligence by tracking the spatial properties and behavior of a single civilian participant over a two-week study period using a global positioning system (GPS) receiver, and displaying them on a geographic information system (GIS). The paper clearly shows the power of combining speed (S), distance (D), time (T) and elevation (E) data with the exact longitude and latitude position of the user. The issues drawn from the observation and the civilian’s personal diary are useful in understanding the social implications of tracking and monitoring objects and subjects using GPS. The findings show that …


Vendor Perceptions Of How Rfid Can Minimize Product Shrinkage In The Retail Supply Chain, N. Huber, Katina Michael May 2008

Vendor Perceptions Of How Rfid Can Minimize Product Shrinkage In The Retail Supply Chain, N. Huber, Katina Michael

Professor Katina Michael

The objective of this paper is to investigate product shrinkage in the retail supply chain, and to consider how radio frequency identification (RFID) could act as a partial solution toward a retailer’s loss prevention strategy. The research uses semi-structured interviews to collect data, and a qualitative content analysis to present the results. Given that the number of RFID deployments in the retail supply chain is limited, RFID vendors, resellers, and associations are instead used to gather the current value propositions. Representatives from nine Australian RFID vendors and associations were interviewed in August and September of 2006. The results indicate that …


Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose May 2008

Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya K. Ghose

Professor Aditya K. Ghose

Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …