Fatma Mili | UNC Charotte (original) (raw)

Papers by Fatma Mili

Research paper thumbnail of Adaptive Immunity through Differential Elasticity

— Malicious attacks are often targeted to affect the most vulnerable or most critical resources o... more — Malicious attacks are often targeted to affect the most vulnerable or most critical resources of a system. In sensor networks, because of the large amount of inherent redundancy, the most serious threats are the ones attacking critical paths in the network attempting to break them thus disrupting the overall function of the network. In this paper we define a set of graph properties that characterize the level of vulnerability of specific links. We use these properties to define a bio-inspired model of self-organization and adaptive reorganization that impart networks with resilience in the face of a variety of scenarios from simple power depletion to targeted malicious attacks. Keywords- fault-tolerance; managing redundancy; k-connectedness; differential k-connectedness; elasticity. I.

Research paper thumbnail of REUs: UNDERGRADUATE RESEARCH EXPERIENCES AND FUNDING * PANEL DISCUSSION

Researchers are sometimes daunted by the specter of bringing undergraduate students into their la... more Researchers are sometimes daunted by the specter of bringing undergraduate students into their labs without compromising their research agenda, but still providing a meaningful educational experience for students. This panel brings together experienced undergraduate research mentors to discuss and explore the challenges, strategies, and benefits of robust research programs for undergraduates.

Research paper thumbnail of Quality in Object-Oriented Models: Assessment and Comparison of Quality Proposals

Object-Oriented models are used extensively to capture multiple aspects of software systems and p... more Object-Oriented models are used extensively to capture multiple aspects of software systems and processes. The quality of these models impacts highly the quality of the overall system. There has been an increasing awareness in the software community of the need to develop quality criteria and quality assurance processes specifically adapted to Object-Oriented Models. This heightened awareness resulted in a number of proposals defining quality assurance criteria and processes for Object-Oriented models. The diversity in motivation, focus, and approach in these proposals raises the need for a framework for assessing, comparing, and combining these proposals. In this paper, we formulate such a generic quality assurance framework, identify requirements for quality assurance proposals, and use the framework to discuss a selected set of existing proposals. Key Words: Object Oriented Modeling, modeling quality, formal evaluation. 1.

Research paper thumbnail of Reusing Software : Issues R And esearch Directions

s reusing both the products of previous software projects, and the processes deployed to produce ... more s reusing both the products of previous software projects, and the processes deployed to produce them, leading to a wide pectrum of reuse approaches, from the building blocks (reusing products) approach on one hand, to the generative or t reusable processor (reusing processes) on the other [68]. We discuss the implication of such approaches on the organiza ion, control, and method of software development, and discuss proposed models for their economic analysis. Software

Research paper thumbnail of Corrigendum to “Identifying and using driver nodes in temporal networks”

Journal of Complex Networks, 2019

Research paper thumbnail of Defining and Monitoring Knowledge Integrity

Knowledge management has been claimed as the correct response to rapid change. Decisions need to ... more Knowledge management has been claimed as the correct response to rapid change. Decisions need to be made in light of up to date knowledge. The changing nature of the knowledge raises issues of quality assessment and monitoring. In this paper, we motivate the need for system monitoring of knowledge quality and present a set of structural properties that promote knowledge consistency. We briefly discuss system monitoring of these properties.

Research paper thumbnail of Theoretical Framework for Defining Validity and Quality in Modeling

The increasing number of Object Oriented databases and knowledge bases raises the need for some c... more The increasing number of Object Oriented databases and knowledge bases raises the need for some criteria of model validity, modeling guidelines, and quality criteria to be used in modeling. Although some researchers have developed some specialized sets of modeling guidelines, we found no general-purpose framework to evaluate these proposals and customize them. In this paper we develop a theoretical framework for characterizing modeling. Modeling is seen as a transformation process. These transformations must be valid, and must increase the quality of the model. The framework is centered around these two issues of validity and quality. 1. KNOWLEDGE MODELING Modeling is a central activity in databases. It consists of defining a set of constructs (relations, classes, constraints) that, together, capture the contents of interest and exhibit model-specific structural quality (normal forms, schema invariants). Software design is also a modeling activity. According to Jocabson et al. [14],...

Research paper thumbnail of Adaptive Immunity through Differential Elasticity

Malicious attacks are often targeted to affect the most vulnerable or most critical resources of ... more Malicious attacks are often targeted to affect the most vulnerable or most critical resources of a system. In sensor networks, because of the large amount of inherent redundancy, the most serious threats are the ones attacking critical paths in the network attempting to break them thus disrupting the overall function of the network. In this paper we define a set of graph properties that characterize the level of vulnerability of specific links. We use these properties to define a bio-inspired model of self-organization and adaptive reorganization that impart networks with resilience in the face of a variety of scenarios from simple power depletion to targeted malicious attacks. Keywordsfault-tolerance; managing redundancy; kconnectedness; differential k-connectedness; elasticity.

Research paper thumbnail of Coherence and polarization in complex networks

Journal of Computational Social Science

In a community, individuals hold opinions and views that are shaped in part by their sources of i... more In a community, individuals hold opinions and views that are shaped in part by their sources of information and their social network. These opinions and views are rarely uniformly distributed through the possible spectrum. They can exhibit different patterns. We are, in particular, interested in two opposite patterns: polarization, where views are concentrated around extreme positions, and coherence, where views are closer to the center, more moderate positions. We seek to create a model of views evolution and their convergence towards one or another of the patterns. Furthermore, we focus on applying interventions to the structure of networks to demote the polarization issue and influence a network toward convergence of cohered views. Our results show adding links between the weakly-connected nodes reduces polarization, implying the weakly-connected nodes can form bridges between extreme views.

Research paper thumbnail of Structured Specifying: Techniques and Applications

Research paper thumbnail of Computer program construction

Research paper thumbnail of Distributed Algorithms for Mobile Event Swarming

Research paper thumbnail of Knowledge representation and management for Engineering Design

In the last few years bureaucratic procedures didn't show a significant reduction in the volume o... more In the last few years bureaucratic procedures didn't show a significant reduction in the volume of paper documents created. In order to reduce the huge amount of space for archiving and preserving documents and to speed up the secarh process, a semantic-based dematerialization process should be performed. In this paper we describe a novel system that manages several kind of bureaucratic documents in the e-gov domain, automatically extracts several interesting information and produces a suitable semantic representation that may be considered as the first step towards a full automated document management system.

Research paper thumbnail of On the Analysis of Iterative and Recursive Programs

Australian Computer Journal

ABSTRACT

Research paper thumbnail of Quality in Object-Oriented Models: Assessment and Comparison of Quality Proposals

Research paper thumbnail of Agile Sensor Networks: Adaptive Coverage via Mobile Nodes

Advances in sensing and communication technology make sensor networks a convenient and cost effec... more Advances in sensing and communication technology make sensor networks a convenient and cost effective tool for collecting data in hard to reach and hazardous areas Increasingly, sensor networks are used to monitor the environment and enable swift and accurate intervention. Environmental monitoring is characterized by the facts that the area under surveillance tends to be large whereas incidents tend to be both sparse in time and localized. In this research, we investigate means by which we get good coverage, so that we do not miss events of interest, and we reduce cost, so that we do not deploy too many sensors in areas where nothing is happening. We propose to use a combination of static and mobile sensors. Initially, the nodes are randomly deployed. While the static sensors remain in place until they die out, mobile sensor nodes are constantly evaluating their position, scouting for "interesting" events. They move to areas where they can contribute useful and relevant information. As the dynamics of the events move, so do the mobile nodes. In this paper, we present the decision making process mobile nodes go through in order to adaptively adjust coverage. This process is simulated and the results presented.

Research paper thumbnail of Multi-Disciplinary Perspective on Knowledge Quality: Dimensions of Knowledge Quality

Research paper thumbnail of Problem Solving Reuse: Bridging the gap between concrete problems and mathematical abstractions

The reuse community has focused extensive research efforts on low level code reuse, and on high l... more The reuse community has focused extensive research efforts on low level code reuse, and on high level domain analysis reuse. We propose here to add an intermediate level that we call problem solving reuse. Problem solving reuse is the collection, indexing, and use of all information pertaining to the applicability of mathematical models to classes of problems. A reuse base incorporating problem solving information is structured into three layers: 1. The functional layer describing the abstract, domain-independent, functional behavior of software components. 2. The problem solving layer describing applications of abstract models to various classes of problems. 3. The domain analysis layer describing the domain, the problems of interest, and their key attributes. By dissociating components from the domains to which they are being applied, we make them applicable to a wider range of domains. By dissociating the problem descriptions from potential solutions, we open the door for...

Research paper thumbnail of Formal Verification of Cognitive Models

Research paper thumbnail of Information Theory Based Intruder Detection in Sensor Networks

Research paper thumbnail of Adaptive Immunity through Differential Elasticity

— Malicious attacks are often targeted to affect the most vulnerable or most critical resources o... more — Malicious attacks are often targeted to affect the most vulnerable or most critical resources of a system. In sensor networks, because of the large amount of inherent redundancy, the most serious threats are the ones attacking critical paths in the network attempting to break them thus disrupting the overall function of the network. In this paper we define a set of graph properties that characterize the level of vulnerability of specific links. We use these properties to define a bio-inspired model of self-organization and adaptive reorganization that impart networks with resilience in the face of a variety of scenarios from simple power depletion to targeted malicious attacks. Keywords- fault-tolerance; managing redundancy; k-connectedness; differential k-connectedness; elasticity. I.

Research paper thumbnail of REUs: UNDERGRADUATE RESEARCH EXPERIENCES AND FUNDING * PANEL DISCUSSION

Researchers are sometimes daunted by the specter of bringing undergraduate students into their la... more Researchers are sometimes daunted by the specter of bringing undergraduate students into their labs without compromising their research agenda, but still providing a meaningful educational experience for students. This panel brings together experienced undergraduate research mentors to discuss and explore the challenges, strategies, and benefits of robust research programs for undergraduates.

Research paper thumbnail of Quality in Object-Oriented Models: Assessment and Comparison of Quality Proposals

Object-Oriented models are used extensively to capture multiple aspects of software systems and p... more Object-Oriented models are used extensively to capture multiple aspects of software systems and processes. The quality of these models impacts highly the quality of the overall system. There has been an increasing awareness in the software community of the need to develop quality criteria and quality assurance processes specifically adapted to Object-Oriented Models. This heightened awareness resulted in a number of proposals defining quality assurance criteria and processes for Object-Oriented models. The diversity in motivation, focus, and approach in these proposals raises the need for a framework for assessing, comparing, and combining these proposals. In this paper, we formulate such a generic quality assurance framework, identify requirements for quality assurance proposals, and use the framework to discuss a selected set of existing proposals. Key Words: Object Oriented Modeling, modeling quality, formal evaluation. 1.

Research paper thumbnail of Reusing Software : Issues R And esearch Directions

s reusing both the products of previous software projects, and the processes deployed to produce ... more s reusing both the products of previous software projects, and the processes deployed to produce them, leading to a wide pectrum of reuse approaches, from the building blocks (reusing products) approach on one hand, to the generative or t reusable processor (reusing processes) on the other [68]. We discuss the implication of such approaches on the organiza ion, control, and method of software development, and discuss proposed models for their economic analysis. Software

Research paper thumbnail of Corrigendum to “Identifying and using driver nodes in temporal networks”

Journal of Complex Networks, 2019

Research paper thumbnail of Defining and Monitoring Knowledge Integrity

Knowledge management has been claimed as the correct response to rapid change. Decisions need to ... more Knowledge management has been claimed as the correct response to rapid change. Decisions need to be made in light of up to date knowledge. The changing nature of the knowledge raises issues of quality assessment and monitoring. In this paper, we motivate the need for system monitoring of knowledge quality and present a set of structural properties that promote knowledge consistency. We briefly discuss system monitoring of these properties.

Research paper thumbnail of Theoretical Framework for Defining Validity and Quality in Modeling

The increasing number of Object Oriented databases and knowledge bases raises the need for some c... more The increasing number of Object Oriented databases and knowledge bases raises the need for some criteria of model validity, modeling guidelines, and quality criteria to be used in modeling. Although some researchers have developed some specialized sets of modeling guidelines, we found no general-purpose framework to evaluate these proposals and customize them. In this paper we develop a theoretical framework for characterizing modeling. Modeling is seen as a transformation process. These transformations must be valid, and must increase the quality of the model. The framework is centered around these two issues of validity and quality. 1. KNOWLEDGE MODELING Modeling is a central activity in databases. It consists of defining a set of constructs (relations, classes, constraints) that, together, capture the contents of interest and exhibit model-specific structural quality (normal forms, schema invariants). Software design is also a modeling activity. According to Jocabson et al. [14],...

Research paper thumbnail of Adaptive Immunity through Differential Elasticity

Malicious attacks are often targeted to affect the most vulnerable or most critical resources of ... more Malicious attacks are often targeted to affect the most vulnerable or most critical resources of a system. In sensor networks, because of the large amount of inherent redundancy, the most serious threats are the ones attacking critical paths in the network attempting to break them thus disrupting the overall function of the network. In this paper we define a set of graph properties that characterize the level of vulnerability of specific links. We use these properties to define a bio-inspired model of self-organization and adaptive reorganization that impart networks with resilience in the face of a variety of scenarios from simple power depletion to targeted malicious attacks. Keywordsfault-tolerance; managing redundancy; kconnectedness; differential k-connectedness; elasticity.

Research paper thumbnail of Coherence and polarization in complex networks

Journal of Computational Social Science

In a community, individuals hold opinions and views that are shaped in part by their sources of i... more In a community, individuals hold opinions and views that are shaped in part by their sources of information and their social network. These opinions and views are rarely uniformly distributed through the possible spectrum. They can exhibit different patterns. We are, in particular, interested in two opposite patterns: polarization, where views are concentrated around extreme positions, and coherence, where views are closer to the center, more moderate positions. We seek to create a model of views evolution and their convergence towards one or another of the patterns. Furthermore, we focus on applying interventions to the structure of networks to demote the polarization issue and influence a network toward convergence of cohered views. Our results show adding links between the weakly-connected nodes reduces polarization, implying the weakly-connected nodes can form bridges between extreme views.

Research paper thumbnail of Structured Specifying: Techniques and Applications

Research paper thumbnail of Computer program construction

Research paper thumbnail of Distributed Algorithms for Mobile Event Swarming

Research paper thumbnail of Knowledge representation and management for Engineering Design

In the last few years bureaucratic procedures didn't show a significant reduction in the volume o... more In the last few years bureaucratic procedures didn't show a significant reduction in the volume of paper documents created. In order to reduce the huge amount of space for archiving and preserving documents and to speed up the secarh process, a semantic-based dematerialization process should be performed. In this paper we describe a novel system that manages several kind of bureaucratic documents in the e-gov domain, automatically extracts several interesting information and produces a suitable semantic representation that may be considered as the first step towards a full automated document management system.

Research paper thumbnail of On the Analysis of Iterative and Recursive Programs

Australian Computer Journal

ABSTRACT

Research paper thumbnail of Quality in Object-Oriented Models: Assessment and Comparison of Quality Proposals

Research paper thumbnail of Agile Sensor Networks: Adaptive Coverage via Mobile Nodes

Advances in sensing and communication technology make sensor networks a convenient and cost effec... more Advances in sensing and communication technology make sensor networks a convenient and cost effective tool for collecting data in hard to reach and hazardous areas Increasingly, sensor networks are used to monitor the environment and enable swift and accurate intervention. Environmental monitoring is characterized by the facts that the area under surveillance tends to be large whereas incidents tend to be both sparse in time and localized. In this research, we investigate means by which we get good coverage, so that we do not miss events of interest, and we reduce cost, so that we do not deploy too many sensors in areas where nothing is happening. We propose to use a combination of static and mobile sensors. Initially, the nodes are randomly deployed. While the static sensors remain in place until they die out, mobile sensor nodes are constantly evaluating their position, scouting for "interesting" events. They move to areas where they can contribute useful and relevant information. As the dynamics of the events move, so do the mobile nodes. In this paper, we present the decision making process mobile nodes go through in order to adaptively adjust coverage. This process is simulated and the results presented.

Research paper thumbnail of Multi-Disciplinary Perspective on Knowledge Quality: Dimensions of Knowledge Quality

Research paper thumbnail of Problem Solving Reuse: Bridging the gap between concrete problems and mathematical abstractions

The reuse community has focused extensive research efforts on low level code reuse, and on high l... more The reuse community has focused extensive research efforts on low level code reuse, and on high level domain analysis reuse. We propose here to add an intermediate level that we call problem solving reuse. Problem solving reuse is the collection, indexing, and use of all information pertaining to the applicability of mathematical models to classes of problems. A reuse base incorporating problem solving information is structured into three layers: 1. The functional layer describing the abstract, domain-independent, functional behavior of software components. 2. The problem solving layer describing applications of abstract models to various classes of problems. 3. The domain analysis layer describing the domain, the problems of interest, and their key attributes. By dissociating components from the domains to which they are being applied, we make them applicable to a wider range of domains. By dissociating the problem descriptions from potential solutions, we open the door for...

Research paper thumbnail of Formal Verification of Cognitive Models

Research paper thumbnail of Information Theory Based Intruder Detection in Sensor Networks