W3C home > Mailing lists > Public > www-ws-arch@w3.org > August 2006

Call for Papers

From: Michael Fitzgerald Nowlan <mfn3@georgetown.edu>
Date: Thu, 10 Aug 2006 18:53:23 -0400
Message-ID: <38f35538fd56.38fd5638f355@imap.georgetown.edu>

The contents of the latest issue of:


International Journal of Information Technology and Web Engineering (IJITWE) 
Official Publication of the Information Resources Management Association 
Volume 1, Issue 2, April-June 2006 
Published: Quarterly in Print and Electronically 
ISSN: 1554-1045 
EISSN: 1554-1053


Co-Editors-In-Chief: 
Ghazi Alkhatib, Applied Science University, Amman, Jordan 
David Rine, George Mason University, USA


EDITORIAL PREFACE:


David Rine, George Mason University, USA 
Ghazi Alkhatib, Applied Science University, Amman, Jordan 
Zakaria Maamar, IJSWIS Board Coordinator, Zayed University, United Arab Emirates


The papers in this second issue of the International Journal of Information Technology and Web Engineering address three important dimensions of design in the deployment of modern Web-engineered knowledge intensive systems: users, user Web communities, and associated risk and security measures. The authors discuss how these topics are interrelated and how they are important to the future of ubiquitous computing.


RESEARCH PAPERS


PAPER ONE:


“Agile Development of Secure Web-Based Applications”


A. F. Tappenden, University of Alberta, Canada 
T. Huynh, University of Alberta, Canada 
J. Miller, University of Alberta, Canada 
A. Geras, University of Calgary, Canada 
M. Smith, University of Calgary, Canada


This article outlines a four-point strategy for the development of secure Web-based applications within an agile development framework and introduces strategies to mitigate security risks commonly present in Web-based applications. The proposed strategy includes the representation of security requirements as test cases supported by the open source tool FIT, the deployment of a highly testable architecture allowing for security testing of the application at all levels, the outlining of an extensive security testing strategy supported by the open source unit-testing framework HTTPUnit, and the introduction of the novel technique of security refactoring that transforms insecure working code into a functionally equivalent secure code. 
To obtain a copy of the entire article, click on the link below. 
http://www.idea-group.com/articles/details.asp?id=6085


PAPER TWO: 


“E-Portfolio to Promote the Virtual Learning Group Communities on the Grid”


Guy Gouardères, Laboratoire LIUPPA - Université de Pau et des Pays de l’Adour, France 
Emilie Conté, Laboratoire LIUPPA - Université de Pau et des Pays de l’Adour, France


In vocational and educational training (VET), new trends are toward social learning and, more precisely, toward informal learning. This article introduces a process  the e-Qualification  to manage informal learning on the ELeGI (“Learning Grid Infrastructure”). It argues that this process must occur in a social context, such as virtual communities. It describes their necessary characteristics and properties that lead to the creation of a new kind of virtual community: the Virtual Learning Grid Community (VLGC). The e-Qualification and Virtual Learning Grid Communities’ management will rely on the cooperation of different distributed, autonomous, goal-oriented entities, called Mobile Peer-to-Peer (P2P) agents. Implementing these services will decrease the lack of informal learning treatment on the grid and will become the basis for new services on the learning grid.


To obtain a copy of the entire article, click on the link below. 
http://www.idea-group.com/articles/details.asp?id=6086


PAPER THREE: 


“High Performance Scheduling Mechanism for Mobile Computing Based on Self-Ranking Algorithm”


Hesham A. Ali, Mansoura University, Egypt 
Tamer Ahmed Farrag, Mansoura University, Egypt


Due to the rapidly increasing number of mobile devices connected to the Internet, an increasing amount of research is being conducted to maximize the benefit of such integration. This article describes how to enhance the performance of the scheduling mechanism of the mobile computing environment by distributing some of the responsibilities of the access point among the available attached mobile devices. To this aim, the authors investigate a scheduling mechanism framework that comprises an algorithm, providing the mobile device with the authority to evaluate itself as a resource. The proposed mechanism is based on the “self ranking algorithm” (SRA), which provides a lifetime opportunity to reach a proper solution. The authors also evaluate the performance of the investigated algorithm extensively, to show how it overcomes the connection stability problem of the mobile devices. 


To obtain a copy of the entire article, click on the link below. 
http://www.idea-group.com/articles/details.asp?id=6087


PAPER FOUR:


“Incremental Learning for Interactive E-Mail Filtering”


Ding-Yi Chen, University of Queensland, Australia 
Xue Li, University of Queensland, Australia 
Zhao Yang Dong, University of Queensland, Australia 
Xia Chen, University of Queensland, Australia


In this article, the authors propose a frameworkPrediction-Learning-Distillation (PLD)for interactive document classification and distilling misclassified documents. Whenever a user points out misclassified documents, the PLD learns from the mistakes and identifies the same mistakes from all other classified documents. The PLD then enforces this learning for future classifications. If the classifier fails to accept relevant documents or reject irrelevant documents on certain categories, then PLD will assign those documents as new positive/negative training instances. The classifier can then strengthen its weakness by learning from these new training instances.


To obtain a copy of the entire article, click on the link below. 
http://www.idea-group.com/articles/details.asp?id=6088


***************************************************** 
For full copies of the above articles, check for this issue of International Journal of Information Technology and Web Engineering (IJITWE) in your Institution's library.  If your library is not currently subscribed to this Journal, please recommend IJITWE subscription to your librarian. 
***************************************************** 
Note: For only $18.00, purchase an IJITWE article or any of over 1,200 single journal articles available electronically by visiting www.idea-group.com/articles.


CALL FOR PAPERS


Mission of IJITWE:


The main objective of the journal is to publish refereed papers in the area covering Information Technology (IT) concepts, tools, methodologies, and ethnography, in the contexts of global communication systems and Web engineered applications. In accordance with this emphasis on the Web and communication systems, the journal publishes papers on IT research and practice that support seamless end-to-end information and knowledge flow among individuals, teams, and organizations. This end-to-end strategy for research and practice requires emphasis on integrated research among the various steps involved in data/knowledge (structured and unstructured) capture (manual or automated), classification and clustering, storage, analysis, synthesis, dissemination, display, consumption, and feedback. The secondary objective is to assist in the evolving and maturing of IT-dependent organizations, as well as individuals, in information and knowledge based culture and commerce, including e-com
merce.


Coverage of IJITWE:


Web systems architectures, including distributed, grid computer, and communication systems processing 
Web systems engineering design 
Web systems performance engineering studies 
Web user interfaces design, development, and usability engineering studies 
Radio Frequency Identification (RFID) research and applications in web engineered systems 
Mobile, location-aware, and ubiquitous computing 
Ontology and semantic Web studies 
Software agent-based applications 
Integrated user profile, provisioning, and context-based processing 
Security, integrity, privacy and policy issues 
Quality of service and service level agreement issues among integrated systems 
Information filtering and display adaptation techniques for wireless devices 
Metrics-based performance measurement of IT-based and Web-based organizations 
Data analytics for business and government organizations 
Integrated heterogeneous and homogeneous workflows and databases within and across organizations and with suppliers and customers 
Case studies validating Web-based IT solutions 
Data and knowledge capture and quality issues 
Data and knowledge validation and verification 
Knowledge structure, classification and search algorithms or engines 
Strategies for linking business needs and IT 
IT readiness and technology transfer studies 
IT Education and Training 
Human factors and cultural impact of IT-based systems 
Virtual teams and virtual enterprises: communication, policies, operation, creativity, and innovation 
Competitive/intelligent information systems.


Interested authors should consult the Journal's manuscript 
submission guidelines at http://www.idea-group.com/ijitwe 


All inquiries and submissions should be sent to: 
Ghazi Alkhatib at alkhatib@asu.edu.jo 
                         Or 
David Rine at drine@gmu.edu 
Received on Thursday, 10 August 2006 22:54:26 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Tuesday, 3 July 2007 12:25:29 GMT