Information Retrieval List Digest 389 (January 20, 1998) URL = http://hegel.lib.ncsu.edu/stacks/serials/irld/irld-389.txt IRLIST Digest ISSN 1064-6965 January 20, 1998 Volume XV, Number 3 Issue 389 ****************************************************************** II. JOBS 1. 3M: Corporate/Technical Advanced Librarian III. NOTICES A. Publications 1. JoDI Volume 1(2) 2. Museum Digital Licensing Collective 3. JASIS/Metadata - 2nd CFP B. Meetings 1. ACM Annual Conference: Shaping Policy in the Information Age 2. First Automatic Text Summarization Conference (SUMMAC) 3. CSMR98+REF98: Maintenance & Reengineering 4. Information Exploration Workshop at CHI '98 IV. PROJECTS C. Awards, Fellowships, Grants, & Scholarships 1. ISI/ASIS Sponsor Citation Award D. Research 1. NSF/CISE Education Innovation, Proposals Due 3/16/98 ****************************************************************** II. JOBS II.1. =46r: Janet M. Arth Re 3M: Corporate/Technical Advanced Librarian Corporate/Technical Advanced Librarian Business Library 3M Corporate Headquarters Maplewood, MN Primary Responsibilities: provide in-depth business, marketing and competitive intelligence information to 3M employees worldwide using a wide array ofation resources, consulting with employees on information management issues, and support client teams by identifying, distilling and conveying business information related to a particular projects. Also responsible for various aspects of daily library operations. This fast paced Business Library has a staff of ten. The following credentials required: -Bachelor's degree in Business in Marketing fields -ALA accredited Master of Library Science degree -3+ years experience in fast paced business library dealing with both corporate and technical information -Demonstrated experience in online information retrieval -Strong service ethic and demonstrated initiative -Team oriented, flexible and able to work both independently and collaboratively in a complex changing environment -Excellent oral and written communications skills. Pay: 3M offers an excellent total compensation package consisting of great benefits, 401(k) plan, and salary commensurate with experience. Apply by: January 30, 1998 Contact: For confidential consideration, please submit cover letter and resume - No phone calls or agencies please - to the following E-mail: or if you prefer regular mail address: E-mail: careers@mmm.com, (Must reference #R30102) or if you prefer regular mail address: 3M - 3M Center RAE - #R30102 Staffing Resource Center 224-1W-02 St. Paul, MN 55144-1000 ****************************************************************** III. NOTICES III.A.1. =46r: Cliff McKnight Re: JoDI Volume 1(2) Volume 1 Issue 2 of the Journal of Digital Information, JoDI, is now online = at http://jodi.ecs.soton.ac.uk/ Issue 2 is a themed issue on Open Hypermedia: Systems, Interoperability and Standards, edited by Uffe Koch Wiil from the Danish National Centre for IT Research at Aarhus University. Access to JoDI is free but there is a one-time registration process before the full contents can be read. Abstracts and lab reports are available without registration. Instructions for authors intending to submit articles can also be found at the site. Cliff McKnight c.mcknight@lboro.ac.uk ********** III.A.2. =46r: Joan K Lippincott Re: Museum Digital Licensing Collective The Website for the Museum Digital Licensing Collective (MDLC) is now available at www.museumlicensing.org The MDLC is a non-profit organization formed to: - provide financial assistance for the digitization of original materials in museums and collecting institutions - manage the storage, distribution, and licensing of digitized materials to educational institutions, libraries, museums, commercial companies, and the public - develop and distribute related technical and computer services Development partners include the American Association of Museums, Cornell University, Sun Microsystems, and the University of California, Berkeley. The Association of Research Libraries will provide consultation on licensing and use issues. ********** III.A.3. =46r: Zorana Ercegovac Re: JASIS/Metadata - 2nd CFP The next Special Topics Issue of the _Journal of the American Society for Information Science_ (JASIS) is scheduled to come out in 1999 on the topic of Integrating Multiple Overlapping Metadata Standards. The guest editor for this special issue will be Zorana Ercegovac who is with the Department of the Library and Information Science, Graduate School of Education & Information Studies, University of California at Los Angeles (UCLA) and the InfoEN Associates (www.lainet.com/infoen/). As more heterogeneous objects, including text, become available electronically, people have just started to look at different metadata standards that had independently evolved to identify and describe these objects (e.g., geospatial data such as imagery archives and remotely-sensed datasets; museum and cultural information repositories). These metadata standards (e.g., TEI, FGDC, AACR2) come from different disciplines and reflect different perspectives and traditional disciplinary cultures. Only recently have we started to "mesh" these different content metadata standards and converge into superstandard schemes. Example is the collaboration between Federal Geographic Data Committee FGDC Metadata and Anglo-American Cataloguing Rules (AACR 2nd ed.) standards. Both standards have a capability to describe cartographic materials but from different perspectives: while, for example, FGDC focuses on coordinate access points, projection, and other spatial, temporal, security, and data quality attributes, AACR2 is entering maps under the author main heading. Similar differences exist in the areas of visual and archival representation. Specific topics of interest include, but are not limited to, the following:-- Metadata elements for the representation of digital repositories including networked resources; for example, which elements should be included in a metadata record for images and spatial datasets in general? Which data elements should be included at different levels of detail? -- Integrating multiple overlapping metadata standards (e.g., AACR2, FGDC) -- Federal metadata standards for data-intensive application areas -- Designing a superstandard scheme, or a catalog, of metadata entries -- Multiple levels of metadata for multiple user needs -- Integration of data and its metadata -- Economic implications for the integration of metadata standards for multimedia and heterogeneous digital datasets -- Application-specific metadata projects from academia, research laboratories, governmental organizations, and industry Inquiries may be made to the guest editor at zercegov@ucla.edu. Manuscript submissions (four copies of full articles) should be addressed to= : Zorana Ercegovac, Ph. D. Department of Library and Information Science Graduate School of Education & Information Studies 222 GSLIS Building University of California, Los Angeles Los Angeles, CA 90095-1521 (310)206-9361 (work) (310)391-3923 (fax/voice) zercegov@ucla.edu http://www.gslis.ucla.edu/LIS/faculty/zercegov/ercegovac.html http://www.lainet.com/infoen/ The deadline for submitting manuscripts for consideration for publication in this special issue is April 30, 1998. All manuscripts will be reviewed by a select panel of referees, and those accepted will be published in a special issue of JASIS. Original artwork and a single copy of the copyright release form will be required for all accepted papers (http://www.asis.org/ Publications/JASIS/) ********** III.B.1. =46r: Ben Shneiderman Re: ACM Annual Conference: Shaping Policy in the Information Age ASSOCIATION FOR COMPUTING (ACM) ANNUAL CONFERENCE * * * POLICY98 * * * "Shaping Policy in the Information Age" Washington, DC, Renaissance Hotel May 10-12, 1998 Preliminary Notice For Conference and Registration information see: http://www.acm.org/usacm/events/policy98/ The ACM Annual Conference will focus on public policy issues affecting future applications of computing. Our goal is to forge stronger links between computing professionals and policy makers. Attendees will interact with prominent leaders from academia, industry, Congress, and Executive agencies, and participate in debates on policy issues including Universal Access, Electronic Commerce, Intellectual Property, and Education Online. The conference will promote more regular engagement of computing professionals in democratic processes related to productive use of computing and information processing innovations. A blend of technical skills and policy insights are essential to cope with the inherent opportunities and dangers of any transformational technology. Continuing collaborations between computing professionals and policy makers will benefit citizens, consumers, entrepreneurs, researchers, and students. You can make a difference! May 10: Ethical and social impacts papers and panels May 11-12: Public policy panels and featured speakers All Policy98 attendees are invited to the Annual ACM Awards Banquet on Sunday evening May 10th, and a conference reception on Monday evening May 11th. PANEL TOPICS AND COORDINATORS Universal Service: Ollie Smoot What can be done to promote widespread access to the benefits of the Internet? What is the role of government and the role of the private sector in wiring schools, libraries, and medical facilities? Electronic Commerce: Jim Horning How much public policy does EComm need? What problems would inadequate, excessive, or misguided policies cause? Can compromises in areas like fair trade practices, fraud prevention, security, privacy, law enthe interests of all stakeholders? Intellectual Property in Cyberspace: Pam Samuelson What will be the impact of the WIPO agreements on copyright in cyberspace? How should intellectual property be protected and what safeguards are necessary to protect libraries and academic institutions? Education Online: Charles N. Brownstein The Internet offers unparalleled opportunities for learning and teaching. What public policy and technical challenges must be met to realize these prospects? CONFERENCE CO-CHAIRS Ben Shneiderman, USACM (U.S. Public Policy Committee) C. Dianne Martin, SIGCAS (ACM Special Interest Group on Computers & Society) =46or more information, contact: policy98@acm.org or to register electronically, see: http://www.acm.org/usacm/events/policy98/reginfo.html Early registrants and ACM members receive discounts. ********** III.B.2. =46r: Leo Obrst Re: First Automatic Text Summarization Conference (SUMMAC) =46IRST AUTOMATIC TEXT SUMMARIZATION CONFERENCE (SUMMAC) Sponsored by: The TIPSTER Text Program of the Defense Advanced Research Projects Agency Information Technology Office (DARPA/ITO) The high level of interest in automatic text summarization is evident in the proliferation of research and commercial product development. This Summarization Conference, conducted under the auspices of the DARPA TIPSTER Text Program, will provide an independent forum in which to investigate the appropriateness of automatically generated summaries to specific tasks using using shared data and evaluation methods. The tasks have been defined to model real-world activities and are not geared towards any particular summarization technique or technology. 1. GENERAL INFORMATION The goals of the first evaluation are to - provide researchers, potential sponsors and customers with a quantitative means to appreciate the strengths and weaknesses of the technologies, - gain a better understanding of the issues involved in building and evaluating summarization systems and - guide the direction of the research to requirements of real world tasks The tasks selected address the following types of summaries: Task Summary type --------------------------------------------------- categorization Generic, indicative adhoc Query-based, indicative question-and-answer Query-based, informative =46or this evaluation, these summary types are defined as follows: Generic summaries capture the main theme(s) in a document. Query-based summaries capture a specific theme indicated by the query or topic of interest. Indicative summaries provide some overview of the content of the full text, but are not intended to replace it. Informative summaries capture the relevant details of the full text and serve as an adequate substitute. Each organization may participate in the task(s) most appropriate for its approach. Schedule: 1/12/98 - Call for participation issued 1/15/98 - Training data available (upon receipt of statement of interest and participation agreement) * 2/1/98 - Deadline for participation 2/10/98 - Test data available 2/16/98 - Summaries due back 5/4/98 - Results available, reported in conjunction with TIPSTER workshop, to which all participants will be invited. * Use of the LDC and TREC (TIPSTER) data requires signed license agreements for both LDC and NIST. Details are given below. Organizations interested in participating who have not already signed such agreements should attend to this immediately. The workshop will consist primarily of presentations and discussions of innovative techniques, system design, and test results. Attendance at the conference is limited to evaluation participants and to guests invited by the DARPA TIPSTER Text Program. Any papers and test results will be included in the TIPSTER workshop proceedings. The evaluation will consist of three tasks: categorization, simulated adhoc retrieval, and question-and-answer (Q&A). The data for the evaluation will be generated from the TREC/TIPSTER collections, disks 1-5, all sources and TREC topics. Disks 4 and 5 are available from NIST upon signing a license agreement available from http://www.trec.nist.gov. Disks 1-3 are available from the LDC with a membership. (See http://www.ldc.upenn.edu/ldc/index.html.) 2. INDICATIVE SUMMARIES: CATEGORIZATION AND ADHOC TASKS 2.1 Categorization task: The goal of the categorization task is to evaluate generic summaries to determine if the key concept in a given document is captured in the summary. The categories will be divided into sets of topics, each set related at a broad level, e.g. business and sports, with five topics in each set. Each topic will have approximately 100 documents. Only the set of documents to be summarized will be provided to the evaluation participants; the topics will not be provided. Summarization systems developed by the participants will automatically build a generic summary of each document. The system must treat each test text as an individual document, isolated from the others in all ways; it may bring to bear no knowledge that was amassed from the test corpus during the evaluation. The assessor will read a summary and categorize it into one of the five related topic areas in a set, or 'non-relevant', which can be considered a sixth category. 2.2 Adhoc task: The goal of the adhoc task is to evaluate user-directed summaries to determine if each summary effectively captures the information sought by the user, as stated in the query or topic that retrieved the full text document. There will be approximately 20 topics and 50 documents for each topic. Both the topics and corresponding document sets will be provided to the participants. Summarization systems developed by the participants will automatically build a summary using the topic as the indication of user interest. The assessor will review a topic, then read each summary and judge whether or not it is relevant to the topic at hand. 2.3 Format All submissions will be ASCII text, following a specified DTD (see http://www.tipster.org). The summary will include tags for the document, a participant identifier, a document identifier, a title, a summary, and a query number (adhoc task only). The data may be presented in a format of the participant's choosing, within the range of readable ASCII text. No additional formatting is allowed (e.g. highlighting, bold-facing, underlining). 2.4 Evaluation Criteria The categorization and adhoc tasks highlight the acceptability of a summary for a given task, with the assumption that there is not a single 'correct' summary. The main purpose is to determine if the assessor would make the same decision with the summary as they did with the full text, and how long that decision took. For each task, we will record the time required to make each decision, and the actual decision. The decision for each assessor will then be compared to the TREC decisions. Analysis of the results will include consideration of the effect of summary length on the time taken to make the relevance decision as well as its effect on decision accuracy. 2.4.1 Quantitative measures: Categorization/Relevance Decisions: Compare the precision and recall accuracy of the assessors on both the summaries and the full text to the TREC assessors' judgments. Scores will be reported in a variety of formats, including: - straight recall/precision (R/P) measures for all summaries against ground truth (Resources permitting, summarization assessors will create the ground truth, otherwise, TREC assessments will be used.) - R/P for fixed 10% summaries - R/P for best summaries - R/P for best summaries combined with compression ratio - R/P for individual document sources. Time Required: The time required to make a relevance or categorization decision using a summary will be recorded and compared with the time required to make the same document decision using the full text. Summary Length: Each participant may submit up to two summaries for each document. 1) A maximum cutoff length of 10% of the original document length. Any summary exceeding that margin will be truncated. The 10% limit is based on number of characters between the and tags, excluding whitespace. If the limit ends in the middle of a word, completion to the end of the word is permitted. A length program will be made available (late January) for this purpose. 2) The 'best' summary of the document, as determined by each participant's system. 2.4.2 Qualitative measures: User Preference: Assessors will be asked to evaluate each document for desired length (shorter, just right, or longer), readability (poor, acceptable, excellent), and certainty of decision (uncertain, fairly certain, very certain). The information will be compared to the precision and recall for the document sets. 3. INFORMATIVE SUMMARIES: Q&A TASK The Question and Answer (Q&A) test is task-oriented, in that the summaries are imagined to represent the intermediate stage of report writing that an analyst would go through. The Q&A test does not provide an assessment of ultimate utility for the report-writer, but rather an assessment of potential utility at an intermediate step in the report-writing process. The test is designed to assess the quality of summaries on the basis of the number of correct answers they provide to a set of questions that reflect the obligatory aspects of a topic. The obligatory aspects are those that must be satisfied for a document to be judged relevant to the topic.) The same set of questions is used for all documents; the questions do not vary from one document to the next. The challenge for the systems is to understand the topic in relation to each document and to produce a summary that covers all obligatory aspects of the topic in as short a summary as possible. The results from this evaluation task will be identified as experimental, since the task is in the early design stages. 3.1 Corpus: topics, documents, and questions A modified version of the data used in a pilot study will serve as the training corpus. The topics and documents in the test corpus will be taken from the adhoc task corpus, described above. There will be three topics. Participants will submit summaries for all documents in each topic set. Only the topic-relevant documents will be judged. A set of questions will be prepared for each topic. The questions will pertain to obligatory aspects of the topic; there will be approximately five questions per topic. No information concerning the test corpus (topics, questions, documents) will be divulged in advance of the 2/10/98 (when test data will be made available). Test data will include the selected topic from the adhoc task and the corresponding set of documents. 3.2 Evaluation criteria and scoring Assessment is based on alignment of text strings in a summary with strings in an answer key, which consists of passages in the full text that have been identified as providing correct answers to the questions. The same person who wrote the set of questions for a topic will create the answer key for that topic. (The training corpus includes an answer key.) Assessment of the informativeness of the summaries will be based on the correspondence between the sentences of each summary and the sentences of the full text that were identified as providing answers to the questions. The quantitative measure to be used is termed Answer Recall, which is based on the scoring categories of Correct, Partially Correct, and Missing. Answer Recall scores will be computed across the document set for each question separately as well as for all questions together. As a means of determining the tradeoff between summary content and summary length, overall Answer Recall will be compared to the average compression of the response summaries. To serve as a target measure of the degree of compression achievable on the test, evaluators will prepare for each document a model summary that yields 100% recall. The model summaries will consist of full sentences, and will include the minimum number of sentences that are required to answer all questions, plus any sentences that the evaluators feel are necessary to make the question-answering content coherent. (The training corpus includes model summaries, prepared by one of the evaluators.) Alignment and scoring will be carried out manually. In scoring, it will be important to maintain consistency of scoring criteria across summaries and systems. (It is anticipated that the same person who prepared the data for a given topic will do the scoring for that topic. Thus, it is expected that there will be three different people involved in scoring on the Q&A task. A small inter-evaluator test is planned that will gauge the difference in scoring stringency across topics.) 3.3 Submission of summaries Participating sites are limited to submitting one set of summaries per topic. There is no restriction on the length of the summaries; however, it is anticipated that sites will want to aim for an average length that does not exceed 30% of the length of the full documents. Summaries do not have to consist of literal sentence extracts from the full documents; allowances in alignment and scoring will be made for summaries that diverge from the literal input. Summaries are to be submitted in the form of SGML documents, in accordance with instructions outlined in 2.3, above. 4. INSTRUCTIONS TO RESPONDING FOR THE CALL FOR PARTICIPATION Organizations within and outside the U.S. are invited to respond to this call for participation. By the time of the actual testing phase of the evaluation, systems must be able to accept texts without manual preprocessing, process them without human intervention, and output summaries in the expected format. Due to the short suspense for this CFP, it is expected that organizations that have already developed summarization systems will participate in this evaluation, which is still in the initial stages. Organizations wishing to participate in the evaluation and workshop must respond by 1 February, 1998 by submitting a short statement of interest via email to tfirmin@romulus.ncsc.mil and a signed copy of the participation agreement via fax or surface mail. The statement of interest should include the following: a. a brief description of approach to summarization b. summarization task: adhoc (10% submission required, 'best' optional) categorization (10% submission required, 'best' optional) question-and-answer (1 'best' submission allowed) c. primary point of contact. Please include name, surface and e- mail addresses, phone and fax numbers. d. does your site have access to all TREC data (disks 1-5)? The participation agreement can be accessed from the TIPSTER web page (http://www.tipster.org). A signed copy should be sent by fax to Therese =46irmin, 301-688-9070, or by surface mail to Therese Firmin, Dept of Defense, 9800 Savage Rd, Ft. Meade MD 20755-6000. If interest in participating in the evaluation is higher than anticipated, the number of participants will be limited based on the information provided in the statement of interest. If you have general questions or questions concerning the categorization or adhoc task, please address them to tfirmin@romulus.ncsc.mil (with cc to mjchrza@romulus.ncsc.mil). Questions concerning the Q&A task may be addressed to sundheim@nosc.mil (with cc to obrst@mitre.org). ********** III.B.3. =46r: csmr98@dsi.UNIFI.IT Re: CSMR98+REF98: Maintenance & Reengineering http://www.dsi.unifi.it/~nesi/csmr98.html 2nd EUROMICRO CONFERENCE on SOFTWARE MAINTENANCE AND REENGINEERING 6th REENGINEERING FORUM Palazzo degli Affari, FIRENZE, Italy, March 8-11, 1998 csmr98@aguirre.ing.unifi.it, csmr98@dsi.unifi.it http://www.dsi.unifi.it/~nesi/csmr98.html, http://www.reengineer.org/ref98/ =46ax: +39-(0)55-4796363 Sponsored by EUROMICRO, REENGINEERING FORUM IEEE Computer Society IEEE Task Force on Information Technology, IEEE Technical Council on Software Engineering In Cooperation with CESVIT, Universita' di Firenze. Patroned by AICA, AIIA, DeQualitate, Dipartimento di Sistemi e Informatica, Jackson, TABOO, UNINFO. Keynote Speakers: - Continuous Engineering for Industrial Scale Software Systems. H. Weber, ISST, D - Evolving Software Practice for Year 2000 and Beyond. S. Bohner, META Group - Software Engineering Strategies, USA STEVENS LECTURE ON SOFT. DEVELOPMENT METHODS - Presentation of the Wayne Stevens Award and the Stevens Lecture on Software Development Methods. Session: Tool Architecture - Architecture and Functions of a Commercial Software Reengineering Workbench (H. M. Sneed - Software Engineering Service - D) - Control Flow Normalization for COBOL/CICS Legacy System (M. van Brand, A. Sellink, C. Verhoef, - University of Amsterdam - NL) Session: Data Reengineering - A Generic Approach for Data Reverse Engineering Taking into Account Application Domain Knoledge (S. A. Ghannouchi, , H. H. B. Ghezola, F. Kamoun, ENSI, Tun) - A strategy for reducing the effort for database schema maintenance (D. Castelli - Istituto di Elaborazione dell'Informazione - I) - Data Reverse Engineering Methods in Practice (P. Aiken - Virginia Commonwealth University - USA) - Database Reengineering for Quality (E. Locuratolo - IEI - CNR; M. Loffredo, O. Signore, CNUCE - CNR - I) Session: Business Information Technology - An Organizational Framework for Mass-Customized Business Application (P. Ludwig, T. Kaufmann, H. Liessmann - D) - Driving IT Decisions from Architectural Principles (E. Chikofsky - DMR Consulting Group - USA) - Architectural Reflection: Bridging the Gap Between a Running System and its Architectural Specification (W. Cazzola, A. Savigni, A. Sosio, F. Tisato, University of Milano - I) Session: Year 2000 Problem - Variable Classification Technique for Software Maintenance and Application to The Year 2000 Problem (K. Kawabe, A. Matsuo, S. Uehara - Fujitsu Laboratories Ltd. JP A. Ogawa - Fujitsu Ltd. - JP) - From "Y2K" to Data Warehouses [and other beneficial impacts of the millennium problem] (D. Aebi, C. Schucan, ETH Zurich - SW) Session: Program Understanding - On Constructing a Tool to Verify Programs for Processors Built in Machines (T. Ohta, N. Matsumara, Y. Itoh, Shizuoka Univ. - JP) - Improving Comprehensibility of Software with Diagramming, Folding, and Coloring (J. H. Cross II - Auburn University - USA) Session: Reuse and Object Oriented Techniques - A Dependence-Based Representation for Concurrent Object-Oriented Software Maintenance (J. Zhao - Fukouka Institute of Tech. - J. Cheng, K. Ushijima - Kyushu Univ.-JP) - OOA Metrics for the Unified Modeling Language (M. Marchesi-Univ. di Cagliari - I) - Protection Reconfiguration for Reusable Software (C. D. Jensen, D. Hagimont - Universite Joseph Fourier - F) Session: System Assessment - Towards Mature Measurement Program (F. Niessink, H. van Vliet- Univ. Amsterdam NL) - A Tool for Process and Product Assessment of C++ Applications (F. Fioravanti, P. Nesi, S. Perlini - University of Florence - I) - Software Testability Measurement derived from Data Flow Analysis (P.-L. Yeh, J.-C. Lin, Tatung Institute of Technology - Taiwan) Session: System Documentation - Documentu: A Flexible Architecture for Documentation Production Based on a Reverse Engineering Strategy (C. de Oliveira Braga, Arndt von Staa, Julio C.S.P. Leite, PUC-Rio - Brazil) - Documentation Multi-Targeting Using ASML (C. Owen, F. Makedon, J. Ford, S. Rebelsky, Grinnell College - USA) Session: Software Architecture - Assessing Architectural Complexity (R. Kazman - Carnege Mellon University - USA - M. Burth - University of Mannheim - D) - Architecture recovery for Software Evolution (J. C. Duenas, W. L. de Oliveira, J. A. de la Puente - Universidad Politecnica de Madrid - E) - The Hot-Spots Technique to Scavenge for Architectural Elements (H. Gall, B. Bellay, Technical University of Vienna - Austria) Session: Requirements and Specification Evolution - Requirements Evolution in the Midst of Environmental Change A Managed Approach (W. Lam, M. Loomes - Univ. of Hertfordshire - UK) - A Method for Assessing Legacy Systems for Evolution (J. Ransom, I. Sommerville, I. Warren - Lancaster University - UK) - System Specification Reengineering Using the SpecView Tool (T. G. Kirner, R. C. Gratao - Federal University of Sao Carlos - BR) - A Tool Supporting the Re-Design of Legacy Applications (K. Cremer - RWTH Aachen- D) Session: Maintenance Effort - Modeling Maintenance Effort by means of Dynamic System (F. Calzolari, G. Antoniol, P. Tonella - IRST - I) - Improving Defect Removal Effectiveness for Software Development (Hareton K. N. Leung The Honk Kong Poly. Univ.) - The Extract-Transform-Rewrite Cycle A Step Towards metaCARE (B. Kullbach, A. Panse - University of Koblenz - D) Session: Logic Programming, Telecommunications - A Metric Suite for Concurrent Logic Programs (J. Zhao - Fukouka Institute of Technology - J. Cheng, K. Ushijima - Kyushu Univ. - JP) - Identifying Fault Prone Modules An Empirical Study in Telecommunication System (S.-B. Hong, K. Kim - Call Proc.Section, ETRI - KR) Session: Reverse Engineering in Practice - A Process for Reverse Engineering of AXE 10 Software (S. Haglund, Ericsson Software Technology AB - Sweden) - Regenerative Verification and Validation: Moving Forward From Reverse Engineering (T. Roberts - TASC - B. Farley - Motorola - USA) - A Proposed Reverse Engineering Tech to Redocument High-Level Control Structures of Embedded Systems Software (D. Wilkening -USA) - Current Parsing Techniques in Software Renovation Considered Harmful (M. van den Brand, A. Sellink, C. Verhoef, NL) Papers in CSMR98 OPEN FORUM Sections - DBFW A Simple DataBase FrameWork for the Evaluation and Maintenance of Automated Theorem Prover Data (P. Jakobi, A. Wolf, D) - Reengineering of Distributed Systems Using Formal Methods (S. Kleuker - University of Oldenburg D) - Metrics-based Evaluation of Object-Oriented Software development Methods (R. R. Dumke, E. Foltin - University of Magdeburg - D) - RENAISSANCE, A Method To Migrate From Legacy To Immortal Software System (M. Battaglia, G. Savoia, J. Favaro - Intecs Sistemi - I) - Visualization of Differences between Versions of Object-Oriented Sofware (J. Seemann, J. W. von Gudenberg - Wurzburg University - D) - Amber Metrics for the Testing & Maintenance of Object-Oriented Designs (J. Doake, I. Duncan - Anglia Polytechnic University - UK) - Tailoring the Process Model for Maintenance and Reengineering (S. Stoecklin, D. Wiliams, P. Stoecklin, USA) - Toward a systematic object-oriented transformation of a Merise analysis (I. Borne, A. Romanczuk, F. Stefani, Ecole de Nantes - F) - Object Evolution by Model Evolution (R. T. Mittermeir, H. Pirker, Dominik Rauner-Reithmayer - Universit=94t Klagenfurt - A) - A sound and Pratical Approach to the Re-Engineering of Time Critical System (H. Zedan, H. Yang, De Montfort University - UK) - Reengineering a Computerized Numerical Control Towards Object- Oriented (F. Butera, B. Fontanella, P.Nesi, M.Perfetti - ELEXA S.r.l. - I) - Software Artifacts Reuse and Maintenance An organizational Framework (C. Toffolon, S. Dakhli - Paris-Dauphine University - F) - The Task Artifact Cycle: Some Experiences from Reengineering Practice (S. Kutscha, sd&m GmbH und Co KG, D) Session: CSMR98 Industrial Track - ESSI Project CARERRAS (David Fox, England) - ESSI Project PROMASYS (Miguel Fernandez Diaz, Spain) Session: Results of the Reverse Engineering Demonstration Project Companies, research centers, and universities participating in the Reverse Engineering Demonstration Project will present their results on the analysis of a single software system using different tools and techniques. General Time Frame: The conference will run from Sunday 8th to Wednesday 11th. Registration will start on Sunday 8th at the 16:00 and continues till 18:00. Conference will start at the 18:00 of Sunday 8th with the official opening. The registration desk will be also open in the morning from 8:00 to 9:00 of Monday and Tuesday. The conference will close its activities Wednesday 11th at the 18:00. Social Program: On Tuesday 10th the conference dinner will be organized. Tours could be organized with the Agency by BUS or by feet to visit: Boboli Garden, the Dome, Giotto Tower, The Old Bridge, Michelangelo Vista Point, Belvedere, Cappelle Medicee, S. Croce Church, S. Miniato Church, Fiesole Village, S. Gimignano Village, The Chianti Vine Area, the Old Market Area, Siena Village, Museum with the David of Michelangelo, (Accademia Gallery), Uffizi Museum, Medieval Arms Museum, Archeological Museum, and more than 100 churches along the town. etc. =46or travel information, registration form, accommodation form, and all other details please consult the www pages of the conference: http://www.dsi.unifi.it/~nesi/csmr98.html http://www.reengineer.org/ref98/ ********** III.B.4. =46r: Nicholas J. Belkin Re: Information Exploration Workshop at CHI '98 INNOVATION AND EVALUATION IN INFORMATION EXPLORATION INTERFACES Workshop at CHI '98 19-20 April 1998 Los Angeles, California CALL FOR PARTICIPATION This workshop addresses the human-computer interaction issues related to Information Exploration interfaces. Information exploration (i.e., IE) is understood to be a class of interactions with information. The goal of Information Exploration is the refinement of a vague information need that leads, through interaction with information objects and information resources, to a more thorough understanding of the problem. IE in this sense is explicitly contrasted with Information Retrieval (IR), which has typically been concerned with supporting searching for well- specified information objects through query formulation. This Workshop will focus on three themes: developing an understanding of the tasks and contexts of Information Exploration (i.e. Theory); interface design for supporting Information Exploration (i.e. User Interfaces); and, evaluation methods and measures for assessing such interfaces (i.e. Evaluation). About twenty active researchers in these areas will be selected for participation in the Workshop. Selection will be based upon a two-page extended abstract of a position paper on any one of the three themes, as indicated above. These abstracts must include a specification of the IE task which is being addressed, an explicit statement of the relationship of the proposal/position to that task, and an indication of which of the three themes the paper addresses. Abstracts are due at the address indicated below NO LATER THAN 15 FEBRUARY 1998. Decisions on participation will be circulated by 28 FEBRUARY 1998. A four to five page version of accepted position papers will be due NO LATER THAN 31 MARCH 1998. Abstracts will be accepted as ASCII text, PDF or Postscript files, MS Word documents or HTML. Please e-mail abstracts or URLs to gene@pal.xerox.com =46or further information on the Workshop aims and organization, please refe= r to the Workshop Home Page at http://anarch.ie.utoronto.ca/people/golovch/CHI98workshop/ or contact either of the co-organizers of the workshop, as indicated below. Gene Golovchinsky Nicholas J. Belkin gene@pal.xerox.com nick@belkin.rutgers.edu phone: +1 650 813-7361 phone: +1 732 932-8585 fax: +1 650 813-7081 fax: +1 732 932-6916 ****************************************************************** IV. PROJECTS IV.C.1. =46r: Richard Hill Re: ISI/ASIS Sponsor Citation Award The Institute for Scientific Information (ISI) and American Society for Information Science (ASIS) announce a newly co sponsored $3,000 grant to be presented at the ASIS annual meeting, October 25-29, 1998, in Pittsburgh, PA. ISI/ASIS Citation Analysis Research Grant: The purpose of this grant is to support research based on citation analysis by encouraging and assisting individuals in this area of study with their research. Citation analysis is broadly defined, including but not limited to analyses using resources developed by ISI. Because of the limits proposed by timing considerations, the grant may be made for research underway as well as for new research proposed.The grant shall consist of an award of $3,000 (donated by the Institute for Scientific Information) and $500 travel reimbursement to the ASIS annual meeting. Eligibility: Candidates for the ISI/ASIS Citation Analysis Grant shall be eligible without regard to nationality, membership in the Society, or other limitation. The Grant is a once-in-a-lifetime award. Proposals: Proposals are sought globally and may be submitted by anyone. Nominations should be mailed to: the ISI/ASIS Citation Analysis Research Grant, ISI, 3501 Market Street, Philadelphia, PA, 19104. Proposal Package: The submission package should include the following: Name, address, affiliation, and brief biography of applicant(s); Brief statement of the research problem not to exceed a maximum of 1,000 words (double-spaced); Description of the research design and methodology, including details of how citation data will be used; Discussion of the expected impact of the research results; Proposals may be submitted in hard copy, email, or fax. Deadline: June 1st =46or a copy of the guidelines please call ASIS at 301/495-0900 or email mdevine@asis.org Michele Devine ASIS 301 495-0900 mdevine@asis.org http://www.asis.org ********** IV.D.1. =46r: Maria Zemankova Re: NSF/CISE Educ. Innovation, Proposals Due 3/16/98 The following document (nsf9844) is now available from the NSF Online Document System Title: CISE Educational Innovation Program Type: Program Announcements & Information Subtype: Computer/Information Sciences It may be found at: http://www.nsf.gov/cgi-bin/getpub?nsf9844 CISE EDUCATIONAL INNOVATION PROGRAM INTRODUCTION: The objective of the CISE Educational Innovation (EI) program is to stimulate innovative educational activities at the undergraduate level in CISE disciplines by encouraging the transfer of research results into the undergraduate curriculum. SCOPE OF THE PROGRAM: The EI program will support the design, development testing and dissemination of innovative approaches for increasing the effectiveness of the undergraduate learning experience in CISE disciplines (see NSF Guide to Programs, NSF 97-150) by integrating research results into undergraduate courses and curricula. The research, whether on-going or completed, may be drawn from any research project, not just those funded by the National Science Foundation. As a minimum, the set of individuals involved in a project should be chosen to ensure an appropriate level of expertise in teaching, curriculum development, and in the relevant research areas. Addition of individuals with expertise in learning sciences, education, information technologies, cognitive sciences and/or related areas, if appropriate to the project, is encouraged. It is not required that the principal investigator or other active participants in the project be the originators of the research results which are to be transferred to the undergraduate curriculum. However, the proposal should describe the group's expertise in the research area(s). Projects supported by the EI program are expected to act as a national model of excellence by being a prototype of educational experiences for use by a broader segment of the scientific and engineering community. Consequently successful dissemination of the project results is essential. The proposal should contain a detailed set of activities for communicating the results of the project to the CISE community. Collaboration with other institutions, particularly as part of the dissemination activities,is highly encouraged. The formality, level, and nature of this collaboration will be the decision of the institutions concerned; however the effectiveness of the dissemination activities will be part of the evaluation criteria. An institution submitting a proposal should also include a budget amount for at least one trip by the principal investigator to a major educational conference for presentation of results of the project. EI awards will be for three years and are expected to range from $300,000 to $600,000 over the three year period. At the current level of funding for this program, we expect 4-6 proposals to be selected for support. PROPOSAL DEADLINE: The deadline for EI grant proposals is the third Monday in March. Proposals postmarked after this date will be returned unprocessed. Awards are planned for the summer. To learn about additional NSF-wide cross-disciplinary activities, please follow the OSTI information (http://www.nsf.gov/od/osti). The Division of Experimental and Integrative Activities (EIA) (http://www.cise.nsf.gov/eia/index.html) supports experimental research in Computer and Information Science and Engineering (CISE) areas as well as interdisciplinary and integrative research activities that are CISE Directorate- or NSF-wide. You are encouraged to subscribe to the NSF Custom News Service http://www.nsf.gov/home/cns/start.htm and receive the program annoucements and other information of interest to you, as soon as these are released. ****************************************************************** IRLIST Digest is distributed from the University of California, Division of Library Automation, 300 Lakeside Drive, Oakland, CA. 94612-3550. Send subscription requests and submissions to: nancy.gusack@ucop.edu Editorial Staff: Nancy Gusack nancy.gusack@ucop.edu Cliff Lynch (emeritus) cliff@cni.org The IRLIST Archives is set up for anonymous FTP. Using anonymous =46TP via the host ftp.dla.ucop.edu, the files will be found in the directory /data/ftp/pub/irl, stored in subdirectories by year (e.g., data/ftp/pub/irl/1993). Search or browse archived IR-L Digest issues on the Web at: http://www.dcs.gla.ac.uk/idom/irlist/ These files are not to be sold or used for commercial purposes. Contact Nancy Gusack for more information on IRLIST. THE OPINIONS EXPRESSED IN IRLIST DO NOT REPRESENT THOSE OF THE EDITORS OR THE UNIVERSITY OF CALIFORNIA. AUTHORS ASSUME FULL RESPONSIBILITY FOR THEIR MATERIAL.