COMPLEX INTELLIGENT SYSTEMS AND THEIR APPLICATIONS Springer Optimization and Its Applications VOLUME41 ManagingEditor PanosM.Pardalos(UniversityofFlorida) Editor–CombinatorialOptimization Ding-ZhuDu(UniversityofTexasatDallas) AdvisoryBoard J.Birge(UniversityofChicago) C.A.Floudas(PrincetonUniversity) F.Giannessi(UniversityofPisa) H.D.Sherali(VirginiaPolytechnicandStateUniversity) T.Terlaky(McMasterUniversity) Y.Ye(StanfordUniversity) AimsandScope Optimizationhasbeenexpandinginalldirectionsatanastonishingratedur- ing the last few decades. New algorithmic and theoretical techniques have beendeveloped,thediffusionintootherdisciplineshasproceededatarapid pace, and our knowledge of all aspects of the field has grown even more profound. Atthesametime,oneofthemoststrikingtrendsinoptimization is the constantly increasing emphasis on the interdisciplinary nature of the field.Optimizationhasbeenabasictoolinallareasofappliedmathematics, engineering,medicine,economicsandothersciences. The series Springer Optimization and Its Applications publishes under- graduate and graduate textbooks, monographs and state-of-the-art exposi- tory works that focus on algorithms for solving optimization problems and also study applications involving such problems. Some of the topics cov- ered include nonlinear optimization (convex and nonconvex), network flow problems, stochastic optimization, optimal control, discrete optimization, multi-objectiveprogramming,descriptionofsoftwarepackages,approxima- tiontechniquesandheuristicapproaches. Forothertitlesinthisseries,gotowww.springer.com/series/7393 COMPLEX INTELLIGENT SYSTEMS AND THEIR APPLICATIONS EditedBy FATOSXHAFA Birkbeck,UniversityofLondon London,UK LEONARDBAROLLI FukuokaInstituteofTechnology Fukuoka,Japan PETRAQJ.PAPAJORGJI UniversityofFlorida Florida,USA Editors FatosXhafa PetraqJ.Papajorgji TechnicalUniversityofCatalonia UniversityofFlorida NorthCampus,Ed.Omega DepartmentofIndustrial& DepartmentofLanguages& SystemsEngineering InformaticsSystems 303WeilHall C/JordiGirona1-3 Gainesville,Florida32611 08034Barcelona USA Spain [email protected]fl.edu [email protected] LeonardBarolli FukuokaInstituteofTechnology Fac.InformationEngineering Dept.Information& CommunicationEngineering Wajiro-higashi3-30-1 811-0214Fukuoka Higashi-ku Japan barolli@fit.ac.jp ISSN1931-6828 ISBN978-1-4419-1635-8 e-ISBN978-1-4419-1636-5 DOI10.1007/978-1-4419-1636-5 SpringerNewYorkDordrechtHeidelbergLondon LibraryofCongressControlNumber:2010930775 ©SpringerScience+BusinessMedia,LLC2010 Allrightsreserved.Thisworkmaynotbetranslatedorcopiedinwholeorinpartwithoutthewritten permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY10013,USA),exceptforbriefexcerptsinconnectionwithreviewsorscholarlyanalysis.Usein connectionwithanyformofinformationstorageandretrieval,electronicadaptation,computersoftware, orbysimilarordissimilarmethodologynowknownorhereafterdevelopedisforbidden. Theuseinthispublicationoftradenames,trademarks,servicemarks,andsimilarterms,eveniftheyare notidentifiedassuch,isnottobetakenasanexpressionofopinionastowhetherornottheyaresubject toproprietaryrights. Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface Nowadays IT enterprises, networking, and business processes are becoming ex- tremely demanding due to the ever-increasing complexity of systems and real-life applications.Complexintelligentsystemsarecallingforadvanceddecisionsupport systemstodealwiththehugeamountsofinformation,manipulationofcomplexdata aswellasefficiency,scalability,andsecurityissuestosupportmodernbusinessesin anautonomous,intelligentandadaptivemanner. ThebookComplexIntelligentSystemsandTheirApplicationsbringsacompre- hensiveviewofthemostrecentadvancesincomplexintelligentsystemsandtheir application to the resolution of real-life problems from networking, finance, engi- neering, production processes, IT enterprises, and business security. The selected chapterscoverabroadspectrumofissuesandapplicationsinthefieldofcomplex intelligentsystemsandstate-of-the-artresultsfortheoreticandpracticalapproaches insuchsystems. Among the many features of Complex Intelligent Systems highlighted in the book,wecoulddistinguishthefollowingonesbychapter: InChap.1,Moseretal.presentanapproachforintegratingcomplexinformation systems in the ATM domain. The large-scale and the critical issues in integration of various complex information systems in the ATM domain are real challenges tackled in the chapter. The approach presents software engineering and intelligent solutions to the integration of complex information systems in the ATM domain. Anindustrycaseisusedtoevaluatetheapproachanditscomparisontotraditional systemintegrationapproachesintheATMdomain. Chapter 2 by Veres et al. addresses the use of semantic technologies in align- mentofITwithbusinessstrategyfromarequirementsengineeringperspective.The proposedapproachisshowntobeveryusefulinITbusiness.Datamodelsandse- mantics are explored to achieve the goals of the proposed approach by extending BSCP(BusinessStrategy,Context,andProcess)framework.Seven–ElevenJapanis usedasacasestudytovalidateinpracticetheapproach. Goebel et al. in Chap. 3 use RFID-based inter-organizational system architec- ture for decision support in modern business environments such as supply chain event management. By using standardized formats for event and context data, the v vi Preface approachsupportstheinteroperabilityofinformationsystemsindifferentorganiza- tionsandfacilitatestheintegrationofevent-basedapplicationsintoenterprisearchi- tectures.Bothpull-andpush-basedarchitecturesareanalyzedregardingefficiency andreliability. InChap.4,HussainandDillonreportadecision-makingapproachfordemand- drivenproductionprocesses.Withtheeverincreasingcomplexityoftheproduction processesandthedemandingqualityofservicesofcostumers,theenterprisesneed advanceddecisionsupportsystems.Theproposeddecisionsupportsystemisaimed tohedgewiththirdpartyproducerstoassistmanufacturersinthecost-benefitanal- ysis. Chapter 5 by Tashi and Ghernaouti-Hélie proposes a security assurance model forinformationsecurityinorganizations.Asinformationsecurityisbecomingvery complexandcritical,modelsforassessingassuranceofsecurityinITenterprisesis becomingimperative.Inthischaptertheauthorsbringaframeworkandanin-depth analysisofassurancemodels.Also,issuesofefficiencyandefficacyoftheassessing theassurancearetackled. Jakoubietal.inChap.6dealwithissuesarisinginrisk-awarebusinessprocess managementaimingatestablishingthelinkbetweenbusinessandsecurity.Theau- thorspresentasurveyofexistingapproachesintheliteraturetacklingthechallenge of integratingeconomic,risk, and security aspects. Then, a methodologyenabling therisk-awaremodelingandsimulationofbusinessprocessesispresented. In Chap. 7, Pournaraset al.present AETOS(AdaptiveEpidemicTree Overlay Service), a self-organization approach for maintaining the hierarchical structures inlarge-scaledistributedsystems.Theapproachisshownusefulinmanycomplex applications arising in energy optimization, Internet-based multicast applications, etc.Theexperimentalstudyrevealsthecomplexityoftheapproachandhighlights thefindings,namely,ATEOSprovideshighconnectivityintreeoverlaysoptimized accordingtoapplicationrequirements. Chapter8byKitajimaetal.proposesanintelligenttechniqueforefficientlyfil- tering data in broadcasting systems based on the biological metaphor of attractor selection from living organisms. The approach is shown useful in many complex large-scale applications with particular focus on complex applications from net- working domain. The feasibility of the proposed approach is validated by experi- mentalstudyandsimulations. InChap.9,GorawskiandChrószczintroduceanewquerysystemfortemporal dataanalysis.Withtheincreasingcomplexityofapplicationsandthelargeamounts ofdatatostoreandprocess,advancedquerysystemsareamusttoefficientlycope with the various challenges raised in temporal data analysis. The authors present StreamAPASsystemanditsdeclarativequerylanguagethatenablesuserstodefine temporaldataanalysis. Chapter 10 by Pllana et al. deals with agent-supported programming of multi- corecomputingsystems.Theauthorsarguethatanintelligentprogramdevelopment environment that proactively supports the user helps a mainstream programmer to overcome the difficulties of programming multicore computing systems. Then, a programming environment is proposed using intelligent software agents. An ex- Preface vii ample to illustrate how the best practices from HPC combined with agent-based programdevelopmentcanobtainefficientsolutionsisalsogiven. InChap.11,GentileandVitabilebringthestate-of-the-artapproachesinHuman Computer Interaction (HCI). HCI is gaining new momentumdue to the increasing useofalargevarietyofcomputationaldevices.Theauthorspresentacomprehen- siveviewofHCIapproachesandhaveexemplifiedthepresentationbyusingagents for HCI approaches. The applicabilityof the approachis shown for context-aware complexdistributedapplicationsfromeBusiness,CulturalHeritage,etc.forprovid- ingservicesandcontentstocostumers. The last chapter by Doncescu et al. introduces new operators for advanced knowledge-based systems. Clustering has become central not only to data mining butmorebroadlytoknowledge-basedsystems.Theauthorspresentnovelreinforced operators that allow for using different sources of information. The approach is shownusefulforadvanceddecisionmakingincomplexintelligentsystems. Allinall,thechapterscollectedinthisbookprovidenewinsightsandapproaches on the analysis and the development of Complex Intelligent Systems aiming to greatly support modern businesses in an autonomous, intelligent, and adaptable manner. Researchers, academics, developers, practitioners, and students will find inthisbookthelatesttrendsintheseresearchanddevelopmenttopics. Wehopethereadersofthisbookwillshareourjoyandfinditavaluableresource intheirresearch,development,andacademicactivities. December2009 Theeditors Acknowledgements Theeditorsofthebookwouldliketothanktheauthorsofthe chaptersfortheircontributions.Weareverygratefultotherefereesfortheirfeed- backandconstructivecritique,whichgreatlyhelpedimprovingthemanuscripts.We wouldliketogratefullyacknowledgethesupportandencouragementreceivedfrom Prof. Panos Pardalos, the editor in chief of Springer series Springer Optimization and Its Applications, and Ms Elizabeth Loew (Springer, USA) for her assistance duringtheeditorialwork. Fatos Xhafa’s work is done at Birkbeck, University of London (on leave from TechnicalUniversityofCatalonia,Barcelona,Spain).Hisresearchissupportedby a grant from the General Secretariat of Universities of the Ministry of Education, Spain. Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v ListofContributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Efficient Integration of Complex Information Systems in the ATM DomainwithExplicitExpertKnowledgeModels . . . . . . . . . . . 1 ThomasMoser,RichardMordinyi,AlexanderMikula,andStefanBiffl AnOntology-BasedApproachforSupportingBusiness-ITAlignment . . 21 CsabaVeres,JenniferSampson,KarlCox,StevenBleistein,andJune Verner EPCIS-BasedSupplyChainEventManagement . . . . . . . . . . . . . . 43 ChristophGoebel,SergeiEvdokimov,ChristophTribowski,andOliver Günther Cost-Benefit Analysis to Hedge with Third-Party Producers in Demand-DrivenProduction . . . . . . . . . . . . . . . . . . . . . . . 69 OmarHussainandTharamDillon ASecurityAssuranceModelto HolisticallyAssess the Information SecurityPosture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 IgliTashiandSolangeGhernaouti-Hélie Risk-Aware Business Process Management—Establishing the Link BetweenBusinessandSecurity . . . . . . . . . . . . . . . . . . . . . 109 StefanJakoubi,SimonTjoa,SigrunGoluch,andGerhardKitzler Self-OptimisedTreeOverlaysUsingProximity-DrivenSelf-Organised Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 EvangelosPournaras,MartijnWarnier,andFrancesM.T.Brazier ix