• Home
  • Carlos Rodriguez
Carlos Rodriguez

Carlos Rodriguez
UCA - UCOM - UNSW Sydney (Visiting Fellow)

Ph.D.

About

42
Publications
16,523
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
386
Citations
Additional affiliations
October 2019 - present
Universidad Católica Nuestra Señora de la Asunción
Position
  • Lecturer
June 2019 - September 2019
UNSW Sydney
Position
  • Lecturer
May 2018 - May 2018
UNSW Sydney
Position
  • Lecturer

Publications

Publications (42)
Chapter
The ever-increasing amount of security vulnerabilities discovered and reported in recent years are significantly raising the concerns of organizations and businesses regarding the potential risks of data breaches and attacks that may affect their assets (e.g. the cases of Yahoo and Equifax). Consequently, organizations, particularly those suffering...
Conference Paper
Full-text available
The ever-increasing amount of security vulnerabilities discovered and reported in recent years are significantly raising the concerns of organizations and businesses regarding the potential risks of data breaches and attacks that may affect their assets (e.g. the cases of Yahoo and Equifax). Consequently, organizations, particularly those suffering...
Chapter
Collaboration tools are important for workplace communication. The amount of conversation data produced in workplaces are increasing rapidly, placing a burden on workers. There is a necessity to analyze large amounts of data automatically to extract actionable information. Multiple studies were conducted on action extraction to identify actions suc...
Conference Paper
Application Programming Interfaces (APIs) have become one of the key assets within modern businesses, facilitating the linking and integration of intra- and inter-organizational data and systems in the context of complex and heterogeneous technology ecosystems. APIs allow organizations to monetize data, build profitable partnerships and foster inno...
Conference Paper
Application Programming Interface (API) is a core technology that facilitates developers’ productivity by enabling the reuse of software components. Understanding APIs and gaining knowledge about their usage are therefore fundamental needs for developers that impact a wide range of software development activities. This paper presents an approach to...
Conference Paper
Collaboration tools are important for workplace communication. The amount of conversation data produced in workplaces are increasing rapidly, placing a burden on workers. There is a necessity to analyze large amounts of data automatically to extract actionable information. Multiple studies were conducted on action extraction to identify actions suc...
Article
Full-text available
In law enforcement, investigators are typically tasked with analyzing large collections of evidences in order to identify and extract key information to support investigation cases. In this context, events are key elements that help understanding and reconstructing what happened from the collection of evidence items. With the ever increasing amount...
Conference Paper
Full-text available
There have been ever-increasing amounts of security vulnerabilities discovered and reported in recent years. Much of the information related to these vulnerabilities is currently available to the public, in the form of rich, textual data (e.g. vulnerability reports). Many of the state-of-the-art techniques used today to process such textual data re...
Chapter
Task-oriented virtual assistants (or simply chatbots) are in very high demand these days. They employ third-party APIs to serve end-users via natural language interactions. Chatbots are famed for their easy-to-use interface and gentle learning curve (it only requires one of humans’ most innate ability, the use of natural language). Studies on human...
Chapter
Full-text available
Mentoring is widely acknowledged as an effective method for professional and academic development. The advances in the area of Information Technologies (IT) have positively impacted the mentoring process through a more technology-mediated form of mentoring known as e-mentoring or online mentoring. This form of mentoring has particularly had a great...
Conference Paper
Full-text available
The huge data breaches and attacks reported in the past years (e.g., the cases of Yahoo and Equifax) have significantly raised the concerns on the security of software used and developed by companies for their day-to-day operations. In this context, becoming aware about existing security vulnerabilities and taking preventive actions is of paramount...
Conference Paper
Full-text available
Communities of Question Answering (CQAs) are rapidly growing communities for exchanging information in the form of questions and answers. They rely on the contributions of users (i.e., members of the community) who have appropriate domain knowledge and can provide helpful answers. In order to deliver the most appropriate and valuable answers, ident...
Chapter
Full-text available
Communities of Question Answering (CQAs) are rapidly growing communities for exchanging information in the form of questions and answers. They rely on the contributions of users (i.e., members of the community) who have appropriate domain knowledge and can provide helpful answers. In order to deliver the most appropriate and valuable answers, ident...
Chapter
The huge data breaches and attacks reported in the past years (e.g., the cases of Yahoo and Equifax) have significantly raised the concerns on the security of software used and developed by companies for their day-to-day operations. In this context, becoming aware about existing security vulnerabilities and taking preventive actions is of paramount...
Conference Paper
Full-text available
Mentoring is widely acknowledged as an effective method for professional and academic development. The advances in the area of Information Technologies (IT) have positively impacted the mentoring process through a more technology-mediated form of mentoring known as e-mentoring or online mentoring. This form of mentoring has particularly had a great...
Article
Full-text available
At present, bots are still in their preliminary stages of development. Many are relatively simple, or developed ad-hoc for a very specific use-case. For this reason, they are typically programmed manually, or utilize machine-learning classifiers to interpret a fixed set of user utterances. In reality, real world conversations with humans require su...
Article
Full-text available
While prior work on context-based music recommendation focused on fixed set of contexts (e.g. walking, driving, jogging), we propose to use multiple sensors and external data sources to describe momentary (ephemeral) context in a rich way with a very large number of possible states (e.g. jogging fast along in downtown of Sydney under a heavy rain a...
Article
Full-text available
The authors study the practice of promoting idea campaigns in social networks via the well-known Share/Tweet button. They analyze data about 53 civic participation initiatives collected from IdeaScale, one of the leading online idea management platforms today, and unveil a considerable misconception about the effectiveness of the practice. The arti...
Article
The authors study the practice of promoting idea campaigns in social networks via the well-known Share/Tweet button. They analyze data about 53 civic participation initiatives collected from IdeaScale, one of the leading online idea management platforms today, and unveil a considerable misconception about the effectiveness of the practice. The arti...
Conference Paper
Full-text available
Idea Management (IM) communities have the potential to transform business and communities through innovation. However, building successful communities is a difficult endeavor that requires a significant amount of both community management and technological support. Doing this requires a good understanding of how IM systems are used and how users be...
Conference Paper
Effective matching of activities is the first step toward successful process model matching and search. The problem is nontrivial and has led to a variety of computational similarity metrics and matching approaches, however all still with low performance in terms of precision and recall. In this paper, instead, we study how to leverage on human int...
Article
Pattern mining, that is, the automated discovery of patterns from data, is a mathematically complex and computationally demanding problem that is generally not manageable by humans. In this article, we focus on small datasets and study whether it is possible to mine patterns with the help of the crowd by means of a set of controlled experiments on...
Conference Paper
Full-text available
Quickly and dominantly, REST APIs have spread over the Web and percolated into modern software development practice, especially in the Mobile Internet where they conveniently enable offloading data and computations onto cloud services. We analyze more than 78 GB of HTTP traffic collected by Italy’s biggest Mobile Internet provider over one full day...
Article
The authors study the practice of promoting idea campaigns in social networks via the well-known Share/Tweet button. They analyze data about 53 civic participation initiatives collected from IdeaScale, one of the leading online idea management platforms today, and unveil a considerable misconception about the effectiveness of the practice. The arti...
Conference Paper
Full-text available
Participa is a project that seeks to design, implement and evaluate ICT applications and services that support civic participation for public sector innovation. Using participatory design (PD) methods, the project will involve citizens from an early stage, with the double goal of ensuring that the aforementioned services will be tailored to their l...
Conference Paper
Full-text available
Process mining is a domain where computers undoubtedly outperform humans. It is a mathematically complex and computationally demanding problem, and event logs are at too low a level of abstraction to be intelligible in large scale to humans. We demonstrate that if instead the data to mine from are models (not logs), datasets are small (in the order...
Chapter
Full-text available
Over the past few years, mashup development has been made more accessible with tools such as Yahoo! Pipes that help in making the development task simpler through simplifying technologies. However, mashup development is still a difficult task that requires knowledge about the functionality of web APIs, parameter settings, data mappings, among other...
Article
Full-text available
Facilitating compliance management, that is, assisting a company’s management in conforming to laws, regulations, standards, contracts, and policies, is a hot but non-trivial task. The service-oriented architecture (SOA) has evolved traditional, manual business practices into modern, service-based IT practices that ease part of the problem: the sys...
Article
Full-text available
In this demonstration, we describe Baya, an extension of Yahoo! Pipes that guides and speeds up development by interactively recommending composition knowledge harvested from a repository of existing pipes. Composition knowledge is delivered in the form of reusable mashup patterns, which are retrieved and ranked on the fly while the developer model...
Article
Full-text available
Despite the emergence of mashup tools like Yahoo! Pipes or JackBe Presto Wires, developing mashups is still non-trivial and requires intimate knowledge about the functionality of web APIs and services, their interfaces, parameter settings, data mappings, and so on. We aim to assist the mashup process and to turn it into an interactive co-creation p...
Article
Full-text available
This demo introduces Eventifier, a tool that helps in recon-structing an event log from operational databases upon which process instances have been executed. The purpose of reconstructing such event log is that of discovering process models out of it, and, hence, the tool targets researches and practitioners interested in process mining. The aim o...
Conference Paper
Full-text available
This paper presents requirements elicitation study for a EUD tool for composing service-based applications. WIRE aims at enabling EUD by harvesting and recommending community composition knowledge (the wisdom), thus facilitating knowledge transfer from developers to end-users. The idea was evaluated with 10 contextual interviews to accountants, eli...
Chapter
Full-text available
Assessing whether a company's business practices conform to laws and regulations and follow standards and SLAs, i.e., compliance management, is a complex and costly task. Few software tools aiding compli-ance management exist; yet, they typically do not address the needs of who is actually in charge of assess-ing and understanding compliance. We ad...
Conference Paper
Full-text available
We propose to enable and facilitate the development of service-based development by exploiting community composition knowledge, i.e., knowledge that can be harvested from existing, successful mashups or service compositions defined by other and possibly more skilled developers (the community or crowd) in a same domain. Such knowledge can be used t...
Conference Paper
Full-text available
Automatically monitoring and enforcing compliance of service-based business processes with laws, regulations, standards, contracts, or policies is a hot issue in both industry and research. Little attention has however been paid to the problem of understanding non-compliance and improving business practices to prevent non-compliance in the future,...
Article
Full-text available
Enterprises widely use decision support systems and, in particular, business intelligence techniques for monitoring and analyzing operations to understand areas in which the business isn't performing well. These tools often aren't suitable in scenarios involving Web-enabled, intercompany cooperation and IT outsourcing, however. The authors analyze...
Conference Paper
Full-text available
Assessing whether a company's business practices conform to laws and regulations and follow standards and best practices, i.e., compliance gover-nance, is a complex and costly task. Few software tools aiding compliance go-vernance exist; however, they typically do not really address the needs of who is actually in charge of assessing and controllin...
Article
Full-text available
This paper presents the evaluation of the conceptual design of WIRE, a EUD tool for service-based applications. WIRE exploits community composition knowledge harvested from existing programs defined by other developers in the same domain. Such knowledge can assist less skilled developers in defining the composition they need, allowing them to go be...

Network

Cited By