1 | @workingpaper{
|
---|
2 |
|
---|
3 | Author = {Bittner, S. and Hinze, A.},
|
---|
4 |
|
---|
5 | Title = {Arbitrary Boolean advertisements: the final step in supporting the Boolean publish/subscribe model},
|
---|
6 |
|
---|
7 | Publisher = {Department of Computer Science, The University of Waikato},
|
---|
8 |
|
---|
9 | Number = {06/2006},
|
---|
10 |
|
---|
11 | Pages = {1-46},
|
---|
12 |
|
---|
13 | Month = {June},
|
---|
14 |
|
---|
15 | Abstract = {Publish/subscribe systems allow for an efficient filtering of incoming information. This filtering is based on the specifications of subscriber interests, which are registered with the system as subscriptions. Publishers conversely specify advertisements, describing the messages they will send later-on. What is missing so far is the support of arbitrary Boolean advertisements in publish/subscribe systems. Introducing the opportunity to specify these richer Boolean advertisements increases the accuracy of publishers to state their future messages compared to currently supported conjunctive advertisements. Thus, the amount of subscriptions forwarded in the network is reduced. Additionally, the system can more time efficiently decide whether a subscription needs to be forwarded and more space efficiently store and index advertisements.
|
---|
16 |
|
---|
17 | In this paper, we introduce a publish/subscribe system that supports arbitrary Boolean advertisements and, symmetrically, arbitrary Boolean subscriptions. We show the advantages of supporting arbitrary Boolean advertisements and present an algorithm to calculate the practically required overlapping relationship among subscriptions and advertisements. Additionally, we develop the first optimization approach for arbitrary Boolean advertisements, advertisement pruning. Advertisement pruning is tailored to optimize advertisements, which is a strong contrast to current optimizations for conjunctive advertisements. These recent proposals mainly apply subscription-based optimization ideas, which is leading to the same disadvantages.
|
---|
18 |
|
---|
19 | In the second part of this paper, our evaluation of practical experiments, we analyze the efficiency properties of our approach to determine the overlapping relationship. We also compare conjunctive solutions for the overlapping problem to our calculation algorithm to show its benefits. Finally, we present a detailed evaluation of the optimization potential of advertisement pruning. This includes the analysis of the effects of additionally optimizing subscriptions on the advertisement pruning optimization.},
|
---|
20 |
|
---|
21 | URL = {http://www.cs.waikato.ac.nz/pubs/wp/2006/uow-cs-wp-2006-06.pdf},
|
---|
22 |
|
---|
23 | Year = {2006} }
|
---|
24 |
|
---|
25 |
|
---|
26 |
|
---|
27 | @workingpaper{
|
---|
28 |
|
---|
29 | Author = {Bittner, S. and Hinze, A.},
|
---|
30 |
|
---|
31 | Title = {Event distributions in online book auctions},
|
---|
32 |
|
---|
33 | Publisher = {Department of Computer Science, The University of Waikato},
|
---|
34 |
|
---|
35 | Number = {03/2006},
|
---|
36 |
|
---|
37 | Pages = {1-23},
|
---|
38 |
|
---|
39 | Month = {February},
|
---|
40 |
|
---|
41 | Abstract = {Current quantitative evaluations in various research areas for publish/subscribe systems use artificially created event messages to model the system workload. The assumptions made to create these workloads are rather strong and hardly ever described in detail. This does not allow for a repetition of experiments or comparative evaluations of different approaches by different researches.
|
---|
42 |
|
---|
43 | In this paper, we present an evaluation of the distributions of the values of attributes typically used in online auction scenarios. In particular, we focus on auctions of fiction books. We further show our approach of creating event messages by the help of the gained information. Publishing this information on how to create a typical workload for online auctions should allow for the repetition of experiments and the comparison of different evaluations.},
|
---|
44 |
|
---|
45 | URL = {http://www.cs.waikato.ac.nz/pubs/wp/2006/uow-cs-wp-2006-03.pdf},
|
---|
46 |
|
---|
47 | Year = {2006} }
|
---|
48 |
|
---|
49 |
|
---|
50 | @workingpaper{
|
---|
51 |
|
---|
52 | Author = {Bittner, S. and Hinze, A.},
|
---|
53 |
|
---|
54 | Title = {Subscription tree pruning: a structure-independent routing optimization for general-purpose publish/subscribe systems},
|
---|
55 |
|
---|
56 | Publisher = {Department of Computer Science, The University of Waikato},
|
---|
57 |
|
---|
58 | Number = {01/2006},
|
---|
59 |
|
---|
60 | Pages = {1-31},
|
---|
61 |
|
---|
62 | Month = {January},
|
---|
63 |
|
---|
64 | Abstract = {A main challenge in distributed publish/subscribe systems is the efficient and scalable routing of incoming information (event messages). For large-scale publish/subscribe services, subscription forwarding has been established as a prevalent routing scheme. It reduces the network traffic for event routing due to selectively forwarding event messages to relevant parts of the network only. To further improve event routing, publish/subscribe systems apply routing optimizations. So far, optimizations for general-purpose publish/subscribe systems are still missing.
|
---|
65 |
|
---|
66 | In this paper, we present the architecture, realization, and evaluation of our prototype of a large-scale publish/subscribe service applying a novel routing optimization, subscription tree pruning. We also show a comparison of five existing routing optimizations in respect to six important characteristic parameters affecting the suitability of these approaches in practice (including space usage, time efficiency (throughput), and network load). This comparative analysis clearly demonstrates the advantages of subscription pruning over other routing optimizations. In our practical experiments, we then investigate the behavior of our prototype regarding all quantitatively measurable parameters from our previously theoretically analyzed ones. Our evaluation of subscription pruning in this paper is more extensive than previous analyses of any routing optimizations for publish/subscribe systems, which focus on selected parameters only.},
|
---|
67 |
|
---|
68 | URL = {http://www.cs.waikato.ac.nz/pubs/wp/2006/uow-cs-wp-2006-01.pdf},
|
---|
69 |
|
---|
70 | Year = {2006} }
|
---|
71 |
|
---|
72 |
|
---|
73 |
|
---|
74 | @workingpaper{
|
---|
75 |
|
---|
76 | Author = {Hall, M.},
|
---|
77 |
|
---|
78 | Title = {A decision tree-based attribute weighting filter for Naive Bayes},
|
---|
79 |
|
---|
80 | Publisher = {Department of Computer Science, The University of Waikato},
|
---|
81 |
|
---|
82 | Number = {05/2006},
|
---|
83 |
|
---|
84 | Pages = {1-12},
|
---|
85 |
|
---|
86 | Month = {May},
|
---|
87 |
|
---|
88 | Abstract = {The naive Bayes classifier continues to be a popular learning algorithm for data mining applications due to its simplicity and linear run-time. Many enhancements to the basic algorithm have been proposed to help mitigate its primary weakness?the assumption that attributes are independent given the class. All of them improve the performance of naive Bayes at the expense (to a greater or lesser degree) of execution time and/or simplicity of the fina lmodel. In this paper we present a simple filter method for setting attribute weights for use with naive Bayes. Experimental results show that naive Bayes with attribute weights rarely degrades the quality of the model compared to standard naive Bayes and, in many cases, improves it dramatically. The main advantages of this method compared to other approaches for improving naive Bayes is its run-time complexity and the fact that it maintains the simplicity of the final model.},
|
---|
89 |
|
---|
90 | URL = {http://www.cs.waikato.ac.nz/pubs/wp/2006/uow-cs-wp-2006-05.pdf},
|
---|
91 |
|
---|
92 | Year = {2006} }
|
---|
93 |
|
---|
94 |
|
---|
95 |
|
---|
96 |
|
---|
97 |
|
---|
98 |
|
---|
99 |
|
---|
100 | @workingpaper{
|
---|
101 |
|
---|
102 | Author = {Hinze, A. and Jung, D. and Cunningham, S.J.},
|
---|
103 |
|
---|
104 | Title = {Proceedings of the Second Computing Women Congress (CWC 2006): Student Papers, Hamilton, New Zealand, 11-19 February 2006},
|
---|
105 |
|
---|
106 | Publisher = {Department of Computer Science, The University of Waikato},
|
---|
107 |
|
---|
108 | Number = {02/2006},
|
---|
109 |
|
---|
110 | Pages = {1-32},
|
---|
111 |
|
---|
112 | Month = {February},
|
---|
113 |
|
---|
114 | Abstract = {The Second Computing Women Congress was held at the University of Waikato, Hamilton, New Zealand from February 11th to 19th, 2006. The Computing Women Congress (CWC) is a Summer University of women in computer science. It is a meeting-place for female students, academics and professionals who study or work in Information Technology. CWC provides a forum to learn about and share the latest ideas of computing related topics in a supportive environment. CWC provides an open, explorative learning and teaching environment. Experimentation with new styles of learning is encouraged, with an emphasis on hands-on experience and engaging participatory techniques.},
|
---|
115 |
|
---|
116 | Year = {2006} }
|
---|
117 |
|
---|
118 |
|
---|
119 |
|
---|
120 |
|
---|
121 |
|
---|
122 |
|
---|
123 |
|
---|
124 | @workingpaper{
|
---|
125 |
|
---|
126 | Author = {Reeves, S. and Streader, D.},
|
---|
127 |
|
---|
128 | Title = {Liberalising Event B without changing it},
|
---|
129 |
|
---|
130 | Publisher = {Department of Computer Science, The University of Waikato},
|
---|
131 |
|
---|
132 | Number = {07/2006},
|
---|
133 |
|
---|
134 | Pages = {1-13},
|
---|
135 |
|
---|
136 | Month = {July},
|
---|
137 |
|
---|
138 | Abstract = {We transfer a process algebraic notion of refinement to the B method by using the well-known bridge between the relational semantics underlying the B machines and the labelled transition system semantics of processes. Thus we define delta refinement on Event B systems. We then apply this new refinement to a problem from the literature that previously could only be solved by retrenchment.},
|
---|
139 |
|
---|
140 | Keywords = {process refinement, automatic verification, frame refinement, Event B},
|
---|
141 |
|
---|
142 | URL = {http://www.cs.waikato.ac.nz/pubs/wp/2006/uow-cs-wp-2006-07.pdf},
|
---|
143 |
|
---|
144 | Year = {2006} }
|
---|
145 |
|
---|
146 |
|
---|
147 |
|
---|
148 |
|
---|
149 |
|
---|
150 |
|
---|
151 |
|
---|
152 | @workingpaper{
|
---|
153 |
|
---|
154 | Author = {Reeves, S. and Streader, D.},
|
---|
155 |
|
---|
156 | Title = {LSB - Live and Safe B alternative semantics for Event B},
|
---|
157 |
|
---|
158 | Publisher = {Department of Computer Science, The University of Waikato},
|
---|
159 |
|
---|
160 | Number = {08/2006},
|
---|
161 |
|
---|
162 | Pages = {1-18},
|
---|
163 |
|
---|
164 | Month = {July},
|
---|
165 |
|
---|
166 | Abstract = {We define two lifted, total relation semantics for Event B machines: Safe B for
|
---|
167 |
|
---|
168 | safety-only properties and Live B for liveness properties. The usual Event B proof
|
---|
169 |
|
---|
170 | obligations, Safe, are sufficient to establish Safe B refinement. Satisfying Safe
|
---|
171 |
|
---|
172 | plus a simple additional proof obligation ACT_REF is sufficient to establish Live
|
---|
173 |
|
---|
174 | B refinement. The use of lifted, total relations both prevents the ambiguity of the
|
---|
175 |
|
---|
176 | unlifted relational semantics and prevents operations being clairvoyant.},
|
---|
177 |
|
---|
178 | Keywords = {Process refinement, Event B, Live B, Safe B, LSB},
|
---|
179 |
|
---|
180 | URL = {http://www.cs.waikato.ac.nz/pubs/wp/2006/uow-cs-wp-2006-08.pdf},
|
---|
181 |
|
---|
182 | Year = {2006} }
|
---|
183 |
|
---|
184 |
|
---|
185 |
|
---|
186 |
|
---|
187 |
|
---|
188 |
|
---|
189 |
|
---|
190 | @workingpaper{
|
---|
191 |
|
---|
192 | Author = {Reeves, S. and Streader, D.},
|
---|
193 |
|
---|
194 | Title = {State- and Event-based refinement},
|
---|
195 |
|
---|
196 | Publisher = {Department of Computer Science, The University of Waikato},
|
---|
197 |
|
---|
198 | Number = {09/2006},
|
---|
199 |
|
---|
200 | Pages = {1-8},
|
---|
201 |
|
---|
202 | Month = {September},
|
---|
203 |
|
---|
204 | Abstract = {In this paper we give simple example abstract data types, with atomic operations, that are related by data refinement under a definition used widely in the literature, but these abstract data types are not related by singleton failure refinement. This contradicts results found in the literature. Further we show that a common way to change a model of atomic operations to one of value passing operations actually changes the underlying atomic operational semantics.},
|
---|
205 |
|
---|
206 | Keywords = {Data refinement, process refinement, singleton failures},
|
---|
207 |
|
---|
208 | URL = {http://www.cs.waikato.ac.nz/pubs/wp/2006/uow-cs-wp-2006-09.pdf},
|
---|
209 |
|
---|
210 | Year = {2006} }
|
---|
211 |
|
---|
212 |
|
---|
213 |
|
---|
214 |
|
---|
215 |
|
---|
216 |
|
---|
217 |
|
---|
218 | @workingpaper{
|
---|
219 |
|
---|
220 | Author = {Twidale, M.B. and Nichols, D.M.},
|
---|
221 |
|
---|
222 | Title = {Computational sense: the role of technology in the education of digital librarians},
|
---|
223 |
|
---|
224 | Publisher = {Department of Computer Science, The University of Waikato},
|
---|
225 |
|
---|
226 | Number = {10/2006},
|
---|
227 |
|
---|
228 | Pages = {1-8},
|
---|
229 |
|
---|
230 | Month = {October},
|
---|
231 |
|
---|
232 | Abstract = {The rapid progress of digital library technology from research to implementation has created a force for change in the curricula of library schools. The education of future librarians has always had to adapt to new technologies but the pace, complexity and implications of digital libraries pose considerable challenges. In this article we explore how we might successfully blend elements of computer science and library science to produce effective educational experiences for the digital librarians of tomorrow. We first outline the background to current digital librarian education and then propose the concept of computational sense as an appropriate meeting point for these two disciplines.},
|
---|
233 |
|
---|
234 | URL = {http://www.cs.waikato.ac.nz/pubs/wp/2006/uow-cs-wp-2006-10.pdf},
|
---|
235 |
|
---|
236 | Year = {2006} }
|
---|
237 |
|
---|
238 |
|
---|
239 |
|
---|
240 |
|
---|
241 |
|
---|
242 |
|
---|
243 |
|
---|
244 | @workingpaper{
|
---|
245 |
|
---|
246 | Author = {Utting, M. and Pretschner, A. and Legeard, B.},
|
---|
247 |
|
---|
248 | Title = {A taxonomy of model-based testing},
|
---|
249 |
|
---|
250 | Publisher = {Department of Computer Science, The University of Waikato},
|
---|
251 |
|
---|
252 | Number = {04/2006},
|
---|
253 |
|
---|
254 | Pages = {1-18},
|
---|
255 |
|
---|
256 | Month = {April},
|
---|
257 |
|
---|
258 | Abstract = {Model-based testing relies on models of a system under test and/or its environment to derive test cases for the system. This paper provides an overview of the field. Seven different dimensions define a taxonomy that allows the characterization of different approaches to model-based testing. It is intended to help with understanding benefits and limitations of model-based testing, understanding the approach used in a particular model-based testing tool, and understanding the issues involved in integrating model-based testing into a software development process. To illustrate the taxonomy, we classify several approaches embedded in existing model-based testing tools.},
|
---|
259 |
|
---|
260 | URL = {http://www.cs.waikato.ac.nz/pubs/wp/2006/uow-cs-wp-2006-04.pdf},
|
---|
261 |
|
---|
262 | Year = {2006} }
|
---|
263 |
|
---|
264 |
|
---|
265 |
|
---|
266 |
|
---|
267 |
|
---|
268 |
|
---|
269 |
|
---|
270 |
|
---|
271 |
|
---|
272 |
|
---|
273 |
|
---|
274 |
|
---|
275 |
|
---|
276 |
|
---|
277 |
|
---|
278 | |
---|