Fatma Mili | UNC Charotte (original) (raw)
Papers by Fatma Mili
— Malicious attacks are often targeted to affect the most vulnerable or most critical resources o... more — Malicious attacks are often targeted to affect the most vulnerable or most critical resources of a system. In sensor networks, because of the large amount of inherent redundancy, the most serious threats are the ones attacking critical paths in the network attempting to break them thus disrupting the overall function of the network. In this paper we define a set of graph properties that characterize the level of vulnerability of specific links. We use these properties to define a bio-inspired model of self-organization and adaptive reorganization that impart networks with resilience in the face of a variety of scenarios from simple power depletion to targeted malicious attacks. Keywords- fault-tolerance; managing redundancy; k-connectedness; differential k-connectedness; elasticity. I.
Researchers are sometimes daunted by the specter of bringing undergraduate students into their la... more Researchers are sometimes daunted by the specter of bringing undergraduate students into their labs without compromising their research agenda, but still providing a meaningful educational experience for students. This panel brings together experienced undergraduate research mentors to discuss and explore the challenges, strategies, and benefits of robust research programs for undergraduates.
Object-Oriented models are used extensively to capture multiple aspects of software systems and p... more Object-Oriented models are used extensively to capture multiple aspects of software systems and processes. The quality of these models impacts highly the quality of the overall system. There has been an increasing awareness in the software community of the need to develop quality criteria and quality assurance processes specifically adapted to Object-Oriented Models. This heightened awareness resulted in a number of proposals defining quality assurance criteria and processes for Object-Oriented models. The diversity in motivation, focus, and approach in these proposals raises the need for a framework for assessing, comparing, and combining these proposals. In this paper, we formulate such a generic quality assurance framework, identify requirements for quality assurance proposals, and use the framework to discuss a selected set of existing proposals. Key Words: Object Oriented Modeling, modeling quality, formal evaluation. 1.
s reusing both the products of previous software projects, and the processes deployed to produce ... more s reusing both the products of previous software projects, and the processes deployed to produce them, leading to a wide pectrum of reuse approaches, from the building blocks (reusing products) approach on one hand, to the generative or t reusable processor (reusing processes) on the other [68]. We discuss the implication of such approaches on the organiza ion, control, and method of software development, and discuss proposed models for their economic analysis. Software
Journal of Complex Networks, 2019
Knowledge management has been claimed as the correct response to rapid change. Decisions need to ... more Knowledge management has been claimed as the correct response to rapid change. Decisions need to be made in light of up to date knowledge. The changing nature of the knowledge raises issues of quality assessment and monitoring. In this paper, we motivate the need for system monitoring of knowledge quality and present a set of structural properties that promote knowledge consistency. We briefly discuss system monitoring of these properties.
The increasing number of Object Oriented databases and knowledge bases raises the need for some c... more The increasing number of Object Oriented databases and knowledge bases raises the need for some criteria of model validity, modeling guidelines, and quality criteria to be used in modeling. Although some researchers have developed some specialized sets of modeling guidelines, we found no general-purpose framework to evaluate these proposals and customize them. In this paper we develop a theoretical framework for characterizing modeling. Modeling is seen as a transformation process. These transformations must be valid, and must increase the quality of the model. The framework is centered around these two issues of validity and quality. 1. KNOWLEDGE MODELING Modeling is a central activity in databases. It consists of defining a set of constructs (relations, classes, constraints) that, together, capture the contents of interest and exhibit model-specific structural quality (normal forms, schema invariants). Software design is also a modeling activity. According to Jocabson et al. [14],...
Malicious attacks are often targeted to affect the most vulnerable or most critical resources of ... more Malicious attacks are often targeted to affect the most vulnerable or most critical resources of a system. In sensor networks, because of the large amount of inherent redundancy, the most serious threats are the ones attacking critical paths in the network attempting to break them thus disrupting the overall function of the network. In this paper we define a set of graph properties that characterize the level of vulnerability of specific links. We use these properties to define a bio-inspired model of self-organization and adaptive reorganization that impart networks with resilience in the face of a variety of scenarios from simple power depletion to targeted malicious attacks. Keywordsfault-tolerance; managing redundancy; kconnectedness; differential k-connectedness; elasticity.
Journal of Computational Social Science
In a community, individuals hold opinions and views that are shaped in part by their sources of i... more In a community, individuals hold opinions and views that are shaped in part by their sources of information and their social network. These opinions and views are rarely uniformly distributed through the possible spectrum. They can exhibit different patterns. We are, in particular, interested in two opposite patterns: polarization, where views are concentrated around extreme positions, and coherence, where views are closer to the center, more moderate positions. We seek to create a model of views evolution and their convergence towards one or another of the patterns. Furthermore, we focus on applying interventions to the structure of networks to demote the polarization issue and influence a network toward convergence of cohered views. Our results show adding links between the weakly-connected nodes reduces polarization, implying the weakly-connected nodes can form bridges between extreme views.
In the last few years bureaucratic procedures didn't show a significant reduction in the volume o... more In the last few years bureaucratic procedures didn't show a significant reduction in the volume of paper documents created. In order to reduce the huge amount of space for archiving and preserving documents and to speed up the secarh process, a semantic-based dematerialization process should be performed. In this paper we describe a novel system that manages several kind of bureaucratic documents in the e-gov domain, automatically extracts several interesting information and produces a suitable semantic representation that may be considered as the first step towards a full automated document management system.
Australian Computer Journal
ABSTRACT
Advances in sensing and communication technology make sensor networks a convenient and cost effec... more Advances in sensing and communication technology make sensor networks a convenient and cost effective tool for collecting data in hard to reach and hazardous areas Increasingly, sensor networks are used to monitor the environment and enable swift and accurate intervention. Environmental monitoring is characterized by the facts that the area under surveillance tends to be large whereas incidents tend to be both sparse in time and localized. In this research, we investigate means by which we get good coverage, so that we do not miss events of interest, and we reduce cost, so that we do not deploy too many sensors in areas where nothing is happening. We propose to use a combination of static and mobile sensors. Initially, the nodes are randomly deployed. While the static sensors remain in place until they die out, mobile sensor nodes are constantly evaluating their position, scouting for "interesting" events. They move to areas where they can contribute useful and relevant information. As the dynamics of the events move, so do the mobile nodes. In this paper, we present the decision making process mobile nodes go through in order to adaptively adjust coverage. This process is simulated and the results presented.
The reuse community has focused extensive research efforts on low level code reuse, and on high l... more The reuse community has focused extensive research efforts on low level code reuse, and on high level domain analysis reuse. We propose here to add an intermediate level that we call problem solving reuse. Problem solving reuse is the collection, indexing, and use of all information pertaining to the applicability of mathematical models to classes of problems. A reuse base incorporating problem solving information is structured into three layers: 1. The functional layer describing the abstract, domain-independent, functional behavior of software components. 2. The problem solving layer describing applications of abstract models to various classes of problems. 3. The domain analysis layer describing the domain, the problems of interest, and their key attributes. By dissociating components from the domains to which they are being applied, we make them applicable to a wider range of domains. By dissociating the problem descriptions from potential solutions, we open the door for...
— Malicious attacks are often targeted to affect the most vulnerable or most critical resources o... more — Malicious attacks are often targeted to affect the most vulnerable or most critical resources of a system. In sensor networks, because of the large amount of inherent redundancy, the most serious threats are the ones attacking critical paths in the network attempting to break them thus disrupting the overall function of the network. In this paper we define a set of graph properties that characterize the level of vulnerability of specific links. We use these properties to define a bio-inspired model of self-organization and adaptive reorganization that impart networks with resilience in the face of a variety of scenarios from simple power depletion to targeted malicious attacks. Keywords- fault-tolerance; managing redundancy; k-connectedness; differential k-connectedness; elasticity. I.
Researchers are sometimes daunted by the specter of bringing undergraduate students into their la... more Researchers are sometimes daunted by the specter of bringing undergraduate students into their labs without compromising their research agenda, but still providing a meaningful educational experience for students. This panel brings together experienced undergraduate research mentors to discuss and explore the challenges, strategies, and benefits of robust research programs for undergraduates.
Object-Oriented models are used extensively to capture multiple aspects of software systems and p... more Object-Oriented models are used extensively to capture multiple aspects of software systems and processes. The quality of these models impacts highly the quality of the overall system. There has been an increasing awareness in the software community of the need to develop quality criteria and quality assurance processes specifically adapted to Object-Oriented Models. This heightened awareness resulted in a number of proposals defining quality assurance criteria and processes for Object-Oriented models. The diversity in motivation, focus, and approach in these proposals raises the need for a framework for assessing, comparing, and combining these proposals. In this paper, we formulate such a generic quality assurance framework, identify requirements for quality assurance proposals, and use the framework to discuss a selected set of existing proposals. Key Words: Object Oriented Modeling, modeling quality, formal evaluation. 1.
s reusing both the products of previous software projects, and the processes deployed to produce ... more s reusing both the products of previous software projects, and the processes deployed to produce them, leading to a wide pectrum of reuse approaches, from the building blocks (reusing products) approach on one hand, to the generative or t reusable processor (reusing processes) on the other [68]. We discuss the implication of such approaches on the organiza ion, control, and method of software development, and discuss proposed models for their economic analysis. Software
Journal of Complex Networks, 2019
Knowledge management has been claimed as the correct response to rapid change. Decisions need to ... more Knowledge management has been claimed as the correct response to rapid change. Decisions need to be made in light of up to date knowledge. The changing nature of the knowledge raises issues of quality assessment and monitoring. In this paper, we motivate the need for system monitoring of knowledge quality and present a set of structural properties that promote knowledge consistency. We briefly discuss system monitoring of these properties.
The increasing number of Object Oriented databases and knowledge bases raises the need for some c... more The increasing number of Object Oriented databases and knowledge bases raises the need for some criteria of model validity, modeling guidelines, and quality criteria to be used in modeling. Although some researchers have developed some specialized sets of modeling guidelines, we found no general-purpose framework to evaluate these proposals and customize them. In this paper we develop a theoretical framework for characterizing modeling. Modeling is seen as a transformation process. These transformations must be valid, and must increase the quality of the model. The framework is centered around these two issues of validity and quality. 1. KNOWLEDGE MODELING Modeling is a central activity in databases. It consists of defining a set of constructs (relations, classes, constraints) that, together, capture the contents of interest and exhibit model-specific structural quality (normal forms, schema invariants). Software design is also a modeling activity. According to Jocabson et al. [14],...
Malicious attacks are often targeted to affect the most vulnerable or most critical resources of ... more Malicious attacks are often targeted to affect the most vulnerable or most critical resources of a system. In sensor networks, because of the large amount of inherent redundancy, the most serious threats are the ones attacking critical paths in the network attempting to break them thus disrupting the overall function of the network. In this paper we define a set of graph properties that characterize the level of vulnerability of specific links. We use these properties to define a bio-inspired model of self-organization and adaptive reorganization that impart networks with resilience in the face of a variety of scenarios from simple power depletion to targeted malicious attacks. Keywordsfault-tolerance; managing redundancy; kconnectedness; differential k-connectedness; elasticity.
Journal of Computational Social Science
In a community, individuals hold opinions and views that are shaped in part by their sources of i... more In a community, individuals hold opinions and views that are shaped in part by their sources of information and their social network. These opinions and views are rarely uniformly distributed through the possible spectrum. They can exhibit different patterns. We are, in particular, interested in two opposite patterns: polarization, where views are concentrated around extreme positions, and coherence, where views are closer to the center, more moderate positions. We seek to create a model of views evolution and their convergence towards one or another of the patterns. Furthermore, we focus on applying interventions to the structure of networks to demote the polarization issue and influence a network toward convergence of cohered views. Our results show adding links between the weakly-connected nodes reduces polarization, implying the weakly-connected nodes can form bridges between extreme views.
In the last few years bureaucratic procedures didn't show a significant reduction in the volume o... more In the last few years bureaucratic procedures didn't show a significant reduction in the volume of paper documents created. In order to reduce the huge amount of space for archiving and preserving documents and to speed up the secarh process, a semantic-based dematerialization process should be performed. In this paper we describe a novel system that manages several kind of bureaucratic documents in the e-gov domain, automatically extracts several interesting information and produces a suitable semantic representation that may be considered as the first step towards a full automated document management system.
Australian Computer Journal
ABSTRACT
Advances in sensing and communication technology make sensor networks a convenient and cost effec... more Advances in sensing and communication technology make sensor networks a convenient and cost effective tool for collecting data in hard to reach and hazardous areas Increasingly, sensor networks are used to monitor the environment and enable swift and accurate intervention. Environmental monitoring is characterized by the facts that the area under surveillance tends to be large whereas incidents tend to be both sparse in time and localized. In this research, we investigate means by which we get good coverage, so that we do not miss events of interest, and we reduce cost, so that we do not deploy too many sensors in areas where nothing is happening. We propose to use a combination of static and mobile sensors. Initially, the nodes are randomly deployed. While the static sensors remain in place until they die out, mobile sensor nodes are constantly evaluating their position, scouting for "interesting" events. They move to areas where they can contribute useful and relevant information. As the dynamics of the events move, so do the mobile nodes. In this paper, we present the decision making process mobile nodes go through in order to adaptively adjust coverage. This process is simulated and the results presented.
The reuse community has focused extensive research efforts on low level code reuse, and on high l... more The reuse community has focused extensive research efforts on low level code reuse, and on high level domain analysis reuse. We propose here to add an intermediate level that we call problem solving reuse. Problem solving reuse is the collection, indexing, and use of all information pertaining to the applicability of mathematical models to classes of problems. A reuse base incorporating problem solving information is structured into three layers: 1. The functional layer describing the abstract, domain-independent, functional behavior of software components. 2. The problem solving layer describing applications of abstract models to various classes of problems. 3. The domain analysis layer describing the domain, the problems of interest, and their key attributes. By dissociating components from the domains to which they are being applied, we make them applicable to a wider range of domains. By dissociating the problem descriptions from potential solutions, we open the door for...