Matching Items (152)
149668-Thumbnail Image.png
Description
Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different

Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different entities and physically distributed across the Internet. Compared with traditional software system components which are usually specifically designed for the target systems and bound tightly, the interfaces of services and their communication protocols are standardized, which allow SBS systems to support late binding, provide better interoperability, better flexibility in dynamic business logics, and higher fault tolerance. The development process of SBS systems can be divided to three major phases: 1) SBS specification, 2) service discovery and matching, and 3) service composition and workflow execution. This dissertation focuses on the second phase, and presents a privacy preserving service discovery and ranking approach for multiple user QoS requirements. This approach helps service providers to register services and service users to search services through public, but untrusted service directories with the protection of their privacy against the service directories. The service directories can match the registered services with service requests, but do not learn any information about them. Our approach also enforces access control on services during the matching process, which prevents unauthorized users from discovering services. After the service directories match a set of services that satisfy the service users' functionality requirements, the service discovery approach presented in this dissertation further considers service users' QoS requirements in two steps. First, this approach optimizes services' QoS by making tradeoff among various QoS aspects with users' QoS requirements and preferences. Second, this approach ranks services based on how well they satisfy users' QoS requirements to help service users select the most suitable service to develop their SBSs.
ContributorsYin, Yin (Author) / Yau, Stephen S. (Thesis advisor) / Candan, Kasim (Committee member) / Dasgupta, Partha (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2011
150189-Thumbnail Image.png
Description
This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log

This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log archives over a period of five years) and focused on drawing more precise metrics from different perspectives of the communication data. Also, I attempted to overcome the scalability issue by using Apache Pig libraries, which run on a MapReduce framework based Hadoop Cluster. I described four metrics based on which I observed and analyzed the data and also presented the results which show the required patterns and anomalies to better understand and infer the communication. Also described the usage experience with Pig Latin (scripting language of Apache Pig Libraries) for this research and how they brought the feature of scalability, simplicity, and visibility in this data intensive research work. These approaches are useful in project monitoring, to augment human observation and reporting, in social network analysis, to track individual contributions.
ContributorsMotamarri, Lakshminarayana (Author) / Santanam, Raghu (Thesis advisor) / Ye, Jieping (Thesis advisor) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2011
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
151108-Thumbnail Image.png
Description
Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing

Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing to not only leverage advanced technologies and services at lower costs, but also to maintain their competitive edge and grow. Furthermore, as prior studies have shown, there are systematic differences among industries in terms of the degree and impact of IT outsourcing. This dissertation uses a three-study approach to investigate issues related to IT outsourcing at the macro and micro levels, and provides different perspectives for understanding the issues associated with IT outsourcing at a firm and industry level. The first study evaluates the diffusion patterns of IT outsourcing across industries at aggregate level and within industries at a firm level. In addition, it analyzes the factors that influence the diffusion of IT outsourcing and tests models that help us understand the rate and patterns of diffusion at the industry level. This study establishes the presence of hierarchical contagion effects in the diffusion of IT outsourcing. The second study explores the role of location and proximity of industries to understand the diffusion patterns of IT outsourcing within clusters using the spatial analysis technique of space-time clustering. It establishes the presence of simultaneous space and time interactions at the global level in the diffusion of IT outsourcing. The third study examines the development of specialized hubs for IT outsourcing services in four developing economies: Brazil, Russia, India, and China (BRIC). In this study, I adopt a theory-building approach involving the identification of explanatory anomalies, and propose a new hybrid theory called- knowledge network theory. The proposed theory suggests that the growth and development of the IT and related services sector is a result of close interactions among adaptive institutions. It is also based on new knowledge that is created, and which flows through a country's national diaspora of expatriate entrepreneurs, technologists and business leaders. In addition, relevant economic history and regional geography factors are important. This view diverges from the traditional view, wherein effective institutions are considered to be the key determinants of long-term economic growth.
ContributorsMann, Arti (Author) / Kauffman, Robert J. (Thesis advisor) / Santanam, Raghu (Thesis advisor) / St. Louis, Robert (Committee member) / Anselin, Luc (Committee member) / Nault, Barrie R (Committee member) / Arizona State University (Publisher)
Created2012
135962-Thumbnail Image.png
Description
Cyber-weapons and the rapid progression of utilizing cyberspace in conflict poses several risks to states and their ability to maintain control of their respective technological infrastructures. Susceptibility to these weapons extend to virtually all existing nations, and indicates a critical need for transnational organizations and their members to establish collective

Cyber-weapons and the rapid progression of utilizing cyberspace in conflict poses several risks to states and their ability to maintain control of their respective technological infrastructures. Susceptibility to these weapons extend to virtually all existing nations, and indicates a critical need for transnational organizations and their members to establish collective strategies for governing cyber-arms. In this paper, the United Nations, as a prime example of an influential transnational organization, is utilized as a case study for a framework that seeks to define and establish guidelines for arms control policy as it relates to cyber-weapons. Presented is a strategy that seeks to define cyber-warfare and cyber-weapons, distinguish it from other existing forms of weapons and warfare, and outline recommended actions for the United Nations and its affiliates, including the United Nations Office for Disarmament Affairs and United Nations Security Council.
ContributorsSidhu, Arman Singh (Author) / Berliner, Daniel (Thesis director) / Santanam, Raghu (Committee member) / Barrett, The Honors College (Contributor) / School of Politics and Global Studies (Contributor) / Department of Information Systems (Contributor)
Created2015-12
136774-Thumbnail Image.png
Description
Considering the overwhelming prevalence of BPH, how can it best be managed in light of the aging population? The purpose of this investigation is to illustrate that BPH and LUTS are conditions that are highly conducive to health literacy technology interventions. This objective will be met by: a) Providing an

Considering the overwhelming prevalence of BPH, how can it best be managed in light of the aging population? The purpose of this investigation is to illustrate that BPH and LUTS are conditions that are highly conducive to health literacy technology interventions. This objective will be met by: a) Providing an overview of the clinically relevant information regarding BPH, including anatomy, physiology, epidemiology, symptoms, and medical treatment for the disease; b) Establishing the necessity for novel health care delivery solutions by identifying past successes and challenges associated with technologic advances in related fields; c) Providing evidence of a lack of a systematic approach to BPH education, especially as it relates to health literacy. The relative successes and failures of previously established clinical decision aids will be discussed, leading to recommendations on how to improve upon these standards. Finally, the procedures and results of a pilot study will be analyzed in an effort to further highlight the necessity of engaging patients in the clinical decision making process.
Created2014-12
137259-Thumbnail Image.png
Description
Prenatal care is a widely administered preventative care service, and its adequate use has been shown to decrease poor infant and maternal health outcomes. Today however, in the United States, preterm birth rates remain among the highest in the industrialized world, with low socioeconomic women having the highest risk of

Prenatal care is a widely administered preventative care service, and its adequate use has been shown to decrease poor infant and maternal health outcomes. Today however, in the United States, preterm birth rates remain among the highest in the industrialized world, with low socioeconomic women having the highest risk of preterm births. This group of women also face the greatest barriers to access adequate prenatal care in the United States. This paper explores the viability of short message service to help bridge gaps in prenatal care for low socioeconomic women in the United States and provides areas for further research.
ContributorsMiles, Kelly Nicole (Author) / Ketcham, Jonathan (Thesis director) / Santanam, Raghu (Committee member) / Barrett, The Honors College (Contributor) / W. P. Carey School of Business (Contributor) / Department of Marketing (Contributor) / Department of Finance (Contributor)
Created2014-05
130393-Thumbnail Image.png
Description
Mathematical epidemiology, one of the oldest and richest areas in mathematical biology, has significantly enhanced our understanding of how pathogens emerge, evolve, and spread. Classical epidemiological models, the standard for predicting and managing the spread of infectious disease, assume that contacts between susceptible and infectious individuals depend on their relative

Mathematical epidemiology, one of the oldest and richest areas in mathematical biology, has significantly enhanced our understanding of how pathogens emerge, evolve, and spread. Classical epidemiological models, the standard for predicting and managing the spread of infectious disease, assume that contacts between susceptible and infectious individuals depend on their relative frequency in the population. The behavioral factors that underpin contact rates are not generally addressed. There is, however, an emerging a class of models that addresses the feedbacks between infectious disease dynamics and the behavioral decisions driving host contact. Referred to as “economic epidemiology” or “epidemiological economics,” the approach explores the determinants of decisions about the number and type of contacts made by individuals, using insights and methods from economics. We show how the approach has the potential both to improve predictions of the course of infectious disease, and to support development of novel approaches to infectious disease management.
Created2015-12-01
133056-Thumbnail Image.png
Description
While non-invasive breast cancer treatments may be considered less costly in the short-term, over the course of a lifetime, a more aggressive treatment can be overall less costly, especially with recurrence cases; however, these more aggressive treatments are not necessarily covered by insurance and are difficult to discuss in the

While non-invasive breast cancer treatments may be considered less costly in the short-term, over the course of a lifetime, a more aggressive treatment can be overall less costly, especially with recurrence cases; however, these more aggressive treatments are not necessarily covered by insurance and are difficult to discuss in the short amount of time in physician consultations. This analysis studied data from 982 women diagnosed with breast cancer over a five-year period to evaluate monetary costs associated with treatment options and incorporated five in-depth interviews to understand experiences and non-monetary costs. Data showed the most expensive option was a unilateral mastectomy with radiation therapy and the least costly option was breast conserving surgery. Interviews determined each woman evaluated the monetary costs with each treatment but most heavily focused on personal values, biases and recommended opinions when deciding on a treatment. The use of prompt sheets before physician appointments and consultations, along with the addition of financial counselor meeting with each patient can improve patient satisfaction and alleviate stress by simplifying a woman's choice in deciding a treatment. In addition, increased insurance coverage to include every treatment chosen by women (rather than on a case-by-case basis), specifically contralateral prophylactic mastectomy and additional screening options, could decrease long term costs \u2014 both monetarily and in quality of life for patients.
ContributorsOsumi, Alana (Author) / LaRosa, Julia (Thesis director) / Sivanantham, Jai (Committee member) / Barrett, The Honors College (Contributor) / W.P. Carey School of Business (Contributor)
Created2018-12
133387-Thumbnail Image.png
Description
In 2016, in the United States alone, the cosmetics industry made an estimated 62.46 billion dollars in revenue (Revenue of the Cosmetic Industry in the U.S. 2002-2016 | Forecast). With a consistent increase in sales in the last several years, the industry has reached continued success even during times of

In 2016, in the United States alone, the cosmetics industry made an estimated 62.46 billion dollars in revenue (Revenue of the Cosmetic Industry in the U.S. 2002-2016 | Forecast). With a consistent increase in sales in the last several years, the industry has reached continued success even during times of hardship, such as the Great Recession of 2008. The use of Corporate Social Responsibility (CSR), external campaigns, and thoughtful packaging and ingredients resonates with targeted consumers. This has served as an effective strategy to maintain growth in the industry. Cosmetic companies promote their brand image using these sustainability tactics, but there seems to be a lack of transparency in this unregulated industry. The purpose of this thesis is to determine if the cosmetics industry is a good steward of the sustainability movement. Important terms and concepts relating to the industry will be discussed, then an analysis of sustainability focused cosmetic brands will be provided, which highlights the extent to which these brands engage in activities that promote sustainability. This is followed by an application of findings to a company that could benefit from using such practices. Overall, the analysis of the different brands proved to be shocking and disappointing. This is due to the sheer amount that scored very poorly based on the sustainability criteria developed. The cosmetics industry is too inconsistent and too unregulated to truly act as a good steward for sustainability. Though some companies in the industry succeed, these accomplishments are not consistent across all cosmetic companies. Hence, the cosmetics industry as a good steward for sustainability can only be as strong as its weakest link.
ContributorsMamus, Sydney Wasescha (Author) / Ostrom, Amy (Thesis director) / Kristofferson, Kirk (Committee member) / Department of Marketing (Contributor) / W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05