Significant progress in ontology engineering during the last decade resulted in a growing interest in using ontologies for industrial applications. This paper presents lessons learned and recommendations for ontology ...
详细信息
ISBN:
(数字)9783319192437
ISBN:
(纸本)9783319192437;9783319192420
Significant progress in ontology engineering during the last decade resulted in a growing interest in using ontologies for industrial applications. This paper presents lessons learned and recommendations for ontology engineering projects with focus on industrial applications. The research is based on the analysis of a number of case studies in different industrial domains. Based on the case studies the paper presents experiences from ontology development and gives recommendations for industrial ontology construction projects. The recommendations concern (1) selection of development methods, (2) perspectives on generalisation/specialisation strategy, (3) aspects of user participation in ontology construction and (4) effects on knowledge management in organizations.
The increasing rates of cyber-attacks have led to the subsequent need to rapidly develop secure information systems (IS). Secure Tropos is an actor and goal-oriented approach to identify security goals and to enable s...
详细信息
ISBN:
(纸本)9783319258973;9783319258966
The increasing rates of cyber-attacks have led to the subsequent need to rapidly develop secure information systems (IS). Secure Tropos is an actor and goal-oriented approach to identify security goals and to enable security requirements elicitation. This is achieved by considering system actors, their dependencies and by deriving security constraints that actors need to satisfy. Nevertheless goal-oriented modelling has proven itself to be valid it also contains few shortcomings. One of them is the high granularity of the process, which leads quickly to high complexity models. Security patterns are proven to be reusable solutions that address recurring security problems. In this paper we investigate the integration of a pattern-based security requirements derivation from the Secure Tropos models.
Nowadays enterprises are searching the efficient compliance management method. Being compliant could potentially help capturing the most important information, using practice and existing process solutions;thus reduci...
详细信息
ISBN:
(纸本)9783319258973;9783319258966
Nowadays enterprises are searching the efficient compliance management method. Being compliant could potentially help capturing the most important information, using practice and existing process solutions;thus reducing the management effort and cost. When it comes to the security compliance management, it means treating and reducing the security risks to the acceptable level and employing the validated and cost effective security countermeasures. However, the typical question that small and medium enterprises face, is on how to achieve the security compliance in the efficient way. In this paper we report on our experience to use the security risk-oriented patterns to improve business processes of the insurance brokerage. The analysed case showed the major steps to apply the regulatory standard to check compliance, as well as the major procedures needed to improve the business process compliance. The lessons learnt highlight some method guidelines toward compliance management and suggest needed improvement directions for the application of the security risk-oriented patterns.
This paper looks at enterprise interoperability (EI), specifically process-level interoperability, and suggests that the inherent non-determinacy of human-centred business processes introduces another ingredient into ...
详细信息
ISBN:
(纸本)9783662471579;9783662471562
This paper looks at enterprise interoperability (EI), specifically process-level interoperability, and suggests that the inherent non-determinacy of human-centred business processes introduces another ingredient into the EI puzzle that has thus far been understated in EIF ontologies. A conceptualisation of business process based on socio-technical concepts is presented. It is argued that this provides a better way to accommodate human agency factors, and under the influence of these factors, how business processes inevitably evolve over time, potentially affecting their interoperability. We suggest the extant body of knowledge on the theory of dynamic capabilities is relevant to understanding how organisations can control this potentially undirected process evolution and thereby sustain interoperability. Some initial observations are made concerning how this new ontological element could be accommodated into existing EIFs. The paper aims to stimulate discussion in this area and make a contribution to the EI body of knowledge.
Change requests are inevitable in every phase of the Software Development Life Cycle (SDLC), and responding to a change request without jeopardizing the project success remains a challenge for software developers/mana...
详细信息
ISBN:
(数字)9783319242859
ISBN:
(纸本)9783319242859;9783319242842
Change requests are inevitable in every phase of the Software Development Life Cycle (SDLC), and responding to a change request without jeopardizing the project success remains a challenge for software developers/managers. Expressing functional changes in terms of COSMIC Function Point units can be helpful in identifying changes leading to a potential impact on the software functional size;this latter can be used as a means to plan the project activities. This paper proposes to analyze the impact of functional changes on the size of UML activity diagrams, one artifact type produced early in the SDLC. The proposed analysis handles directly as well as indirectly affected elements in both modelling levels of the activity diagrams.
Globally distributed software development projects are on the rise. However, 69% of cross-regional projects fail completely or partially, because of lack of cross-cultural understanding. This paper presents a qualitat...
详细信息
ISBN:
(纸本)9783319195933;9783319195926
Globally distributed software development projects are on the rise. However, 69% of cross-regional projects fail completely or partially, because of lack of cross-cultural understanding. This paper presents a qualitative study of the impact of communication on Global Software Development (GSD) within firms due to cultural differences. In particular, we provide a model of problems and solutions related to communication of German/Chinese and American/Chinese collaborations in GSD. The model was derived using grounded theory to study six globally distributed software development projects. The results may not only help companies understand cultural problems, but also help them overcome these problems. To this end, we discuss the solutions adopted by the multinational software companies that we studied.
Continual technological advances require software solutions, products and platforms to be adaptable, extendible and rapidly created to meet market needs. Software technologies must be interchangeable, environments tra...
ISBN:
(纸本)9783319186122;9783319186115
Continual technological advances require software solutions, products and platforms to be adaptable, extendible and rapidly created to meet market needs. Software technologies must be interchangeable, environments transparent, solutions maintainable, continuously integrated and delivered with value to the customer. This paper presents a video software solution in which architecture, design, development, quality and integration were all done in an Agile manner to meet quality requirements, functional requirements, timelines and customer needs, while ensuring adaptability to changes at continuously high quality.
A Hidden Markov Model (HMM) is a temporal statistical model which is widely utilized for various applications such as gene prediction, speech recognition and localization prediction. HMM represents the state of the pr...
详细信息
ISBN:
(数字)9783319158952
ISBN:
(纸本)9783319158952;9783319158945
A Hidden Markov Model (HMM) is a temporal statistical model which is widely utilized for various applications such as gene prediction, speech recognition and localization prediction. HMM represents the state of the process in a discrete variable, where the values are the possible observations of the world. For the purpose of process mining for resource allocation, HMM can be applied to discover a probabilistic workflow model from activities and identify the observations based on the resources utilized by each activity. In this paper, we introduce a process discovery method that combines an organizational perspective with a probabilistic approach to address the resource allocation and improve the productivity of resource management, maximizing the likelihood of the model using the Expectation-Maximization procedure.
Transmodality is the partitioning of an image into regions that are expected to present a better entropy using different coding schemes, depending on their structural density, at constant bandwidth. In this paper we p...
详细信息
ISBN:
(数字)9783319223483
ISBN:
(纸本)9783319223483;9783319223476
Transmodality is the partitioning of an image into regions that are expected to present a better entropy using different coding schemes, depending on their structural density, at constant bandwidth. In this paper we present the transmodality of video stream. Our contribution is a transmoder module that includes various different optimized video codecs and implements the concept of transmodality on a set of video streams. We evaluate our proposal in the context of cloud gaming, using an optimized remote rendering chain and several games. A per game adaptation allows an optimal refinement of video encoding parameters, including both quantization and modality parameters. Our algorithm shows comprehensive results by saving up to 2% of bandwidth for the same PSNR in comparison with the state-of-the-art video encoding baselines.
The main objective behind Workflow systems is to support the definition, execution and control of Workflow processes. A Workflow process defines a set of activities and the specific order in which they should be execu...
详细信息
ISBN:
(纸本)9783319291338;9783319291321
The main objective behind Workflow systems is to support the definition, execution and control of Workflow processes. A Workflow process defines a set of activities and the specific order in which they should be executed, in order to reach a common objective. Therefore, it is important to manage in the best possible way time and resources. The proposal of this work is to express in a more realistic way the resource allocation mechanisms when human behavior is considered in Workflow activities. In order to accomplish this, fuzzy sets delimited by possibility distributions will be associated with the Petri net models that represent human type resource allocation mechanisms. Additionally, the duration of activities that appear on the routes (control structure) of the Workflow process, will be represented by fuzzy time intervals. To define the execution of activities belongings to minimum and maximum intervals, a time constraint propagation mechanism is proposed. New firing rules based on a joint possibility distribution will then be defined.
暂无评论