New paper “Blockchain logging for process mining: a systematic review” at HICSS’2022
Authors: Leyla Moctar M’Baba, Mohamed Sellami, Walid Gaaloul and Mohamedade Farouk NANNE
Considerable progress was forcasted for collaborative business processes with the rise of blockchain programmable platforms. One of the saliant promises was auditable traces of business process execution, but practically it has posed challenges specially with regard to blockchain logs’ structure who turned out to be inadequate for process mining techniques. Approaches to answer this issue have started to emerge in the literature; some focusing on the creation process of event logs, and others dealing with their retrieval from the blockchain. This work outlines the generic steps required to solve these challenges and analyzes findings in these approaches with a consideration for efficiency and future research directions.
New paper “Towards higher-level description of SLA-aware reconfiguration strategies based on state-machine” at ICEBE’2021
Authors: Jeremy Mechouche, Roua Touihri, Mohamed Sellami and Walid Gaaloul
High number of European projects and international initiatives show an increased interest in the multi-cloud paradigm. One key need identified in these studies is an SLA-driven service model for multi-cloud environment. While offering a multi-cloud application, cloud consumer define reconfiguration strategies to avoid violating SLAs established with their customers. In this context, this paper presents an approach for enriching multi-cloud SLA representations with reconfiguration strategies. Advantages of this approach are twofold: (i) simplify SLA administration and (ii) limit SLA violations caused by reconfiguration strategies. We represent reconfiguration strategies based on state-machine formalism. Furthermore, we define thresholds to guarantee their compliance with multi-cloud SLAs and anticipate SLA violations. An implementation of the approach is presented in the paper and illustrates how these thresholds are computed.
New paper “A Transactional Approach to Enforce Resource Availabilities – Application to the Cloud” at RCIS’2021
Authors: Zakaria Maamar, Mohamed Sellami and Fatma Masmoudi
This paper looks into the availability of resources, exemplified with the cloud, in an open and dynamic environment like the Internet. A growing number of users consume resources to complete their operations requiring a better way to manage these resources in order to avoid conflicts, for example. Resource availability is defined using a set of consumption properties (limited, limited-but-renewable, and non-shareable) and is enforced at run-time using a set of transactional properties (pivot, retriable, and compensatable). In this paper, a CloudSim-based system simulates how mixing consumption and transactional properties allows to capture users’ needs and requirements in terms of what cloud resources they need, for how long, and to what extent they tolerate the unavailability of these resources.
New article “Real-Time Tracking and Mining of Users’ Actions over Social Media ” at Computer Science and Information Systems
Ejub Kajan, Noura Faci, Zakaria Maamar, Mohamed Sellami, Emir Ugljanin, et al.. Real-time tracking and mining of users’ actions over social media. Computer Science and Information Systems, ComSIS Consortium, In press, pp.2-2. ⟨10.2298/CSIS190822002K⟩. ⟨hal-02514060⟩
Abstract. With the advent of Web 2.0 technologies and social media, companiesare actively looking for ways to know and understand what users think and say about their products and services. Indeed, it has become the practice that users go online using social media like Facebook to raise concerns, make comments, and share recommendations. All these actions can be tracked in real-time and then mined using advanced techniques like data analytics and sentiment analysis. This paper discusses such tracking and mining through a system called Social Miner that allows companies to make decisions about what, when, and how to respond to users’ actions over social media. Questions that Social Miner allows to answer include what actions were frequently executed and why certain actions were executed more than others.
New paper “Towards an Approach for Validating the Internet-of-Transactional-Things” at AINA’2020
Z. Maamar, M. Sellami, N.C. Narendra, I. Guidara, E. Ugljanin, and B. Banihashemi. Towards an Approach for Validating the Internet-of-Transactional-Things. In the 34-th International Conference on Advanced Information Networking and Applications (AINA-2020)
Abstract. This paper examines the impact of transactional properties, known as pivot, retriable, and compensatable, on Internet-of-Things (IoT). Despite the ever-growing number of things in today’s cyber-physical world, a limited number of studies examine this impact while considering things’ particularities in terms of reduced size, restricted connectivity, continuous mobility, limited energy, and constrained storage. To address this gap, this paper proceeds first, with exposing things’ duties, namely sensing, actuating, and communicating. Then, it examines the appropriateness of each transactional property for each duty. During the performance of transactional things, (semi)-atomicity criterion is adopted allowing to approve when these things’ duties could be either canceled or compensated. A system that runs a set of what-if experiments is presented in the paper allowing to demonstrate the technical doability of transactional things.