When developing Enterprise Models, it is common to aggregate information from several partial models that describe a fragment of the enterprise. This integration is made by connecting elements from different domain mo...
详细信息
ISBN:
(纸本)9783319192437;9783319192420
When developing Enterprise Models, it is common to aggregate information from several partial models that describe a fragment of the enterprise. This integration is made by connecting elements from different domain models, and is usually a manual task for two reasons: (1) the criteria for connecting pairs of elements is mostly subjective and requires specialized domain knowledge, and (2) any error may impact the coherency of the whole model. However, manual weaving is a difficult and tedious task, with limited support both from methodologies and tools alike. In this paper, we describe a visual approach for weaving domain models, connecting model elements by using adjacency matrices, and visualizing changes at the moment they are made.
In recent years, the artifact-centric approach to process modeling has attracted a lot of attention. One of the research lines in this area is finding a suitable way to represent the dimensions in this approach. Beari...
详细信息
ISBN:
(数字)9783319200521
ISBN:
(纸本)9783319200521;9783319200514
In recent years, the artifact-centric approach to process modeling has attracted a lot of attention. One of the research lines in this area is finding a suitable way to represent the dimensions in this approach. Bearing this in mind, this paper proposes a way to specify artifact-centric business process models by means of well-known UML diagrams, from a high-level of abstraction and with a technology-independent perspective. UML is a graphical language, widely used and with a precise semantics.
In many companies, product management struggles in getting accurate customer feedback. Often, validation and confirmation of functionality with customers takes place only after the product has been deployed, and there...
详细信息
ISBN:
(纸本)9783319195933;9783319195926
In many companies, product management struggles in getting accurate customer feedback. Often, validation and confirmation of functionality with customers takes place only after the product has been deployed, and there are no mechanisms that help product managers to continuously learn from customers. Although there are techniques available for collecting customer feedback, these are typically not applied as part of a continuous feedback loop. As a result, the selection and prioritization of features becomes far from optimal, and product deviates from what the customers need. In this paper, we present a literature review of currently recognized techniques for collecting customer feedback. We develop a model in which we categorize the techniques according to their characteristics. The purpose of this literature review is to provide an overview of current software engineering research in this area and to better understand the different techniques that are used for collecting customer feedback.
Interoperability is of major importance in B2B environments. Starting with EDI in the ` 80s, currently interoperability relies heavily on XMLbased standards. Although having great impact, still issues remain to be sol...
详细信息
ISBN:
(纸本)9783662471579;9783662471562
Interoperability is of major importance in B2B environments. Starting with EDI in the ` 80s, currently interoperability relies heavily on XMLbased standards. Although having great impact, still issues remain to be solved for improving B2B interoperability. These issues include lack of dynamics, cost of implementations, adoption and cross-industry exchange. Linked Data (part of the Semantic Web) technology, although originally not intended for the B2B domain, holds the promise of overcoming some of these issues. This paper explores the potential of linked data technology within a B2B context by introducing and studying six scenarios for combining from light to heavy weight 'traditional' standards with Linked Data technology. This research shows that using Linked Data technology has most potential for specifying semantics formally. This provides the 'best of both worlds' solution, in which legacy systems remain unaltered, and developers are supported in (semi) automated generation of transformation schema's to overcome different standards.
Effective communication in software development is impaired when parties perceive communicated information differently. To address this problem, the project QuASE has been established. It aims at a solution that suppo...
详细信息
ISBN:
(纸本)9783319192703;9783319192697
Effective communication in software development is impaired when parties perceive communicated information differently. To address this problem, the project QuASE has been established. It aims at a solution that supports understandability and reusability of communicated information as well as the quality of decisions based on such information. In this paper, we focus on the architectural aspects of the QuASE system and on its knowledge base which consists of two ontologies: a site ontology defining the site-specific communication environment, and a "quality ontology" that incorporates all knowledge necessary for supporting communication. We describe the overall architecture of the system, introduce the ontologies as well as their interplay, and outline the approach for gathering knowledge necessary to form the QuASE site ontology.
This paper analyses the way we teach Scrum. We reflect on our intended learning outcomes, which challenges we find in teaching Scrum and which lessons we have learned during the last four years. We also give an outloo...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
This paper analyses the way we teach Scrum. We reflect on our intended learning outcomes, which challenges we find in teaching Scrum and which lessons we have learned during the last four years. We also give an outlook on the way we want to introduce and apply Scrum in our teaching and how we intend to improve the curriculum.
The long tradition of research on participative design dates back to 1970 s and has traditionally investigated software development within organizational settings. In this context, many approaches to engaging users in...
详细信息
ISBN:
(纸本)9783319217833;9783319217826
The long tradition of research on participative design dates back to 1970 s and has traditionally investigated software development within organizational settings. In this context, many approaches to engaging users in software development were proposed and evaluated, leading to the establishment of principles of participative design. Recently, the proliferation of content-producing technologies such as social media and crowdsourcing has led to the explosion of user-generated content (UGC). In this paper we discuss how UGC settings differ substantially from the organizational environment in which principles of participative design have been originally developed. Developing systems that harness UGC presents unique challenges of user engagement generally not present in organizational settings. We thus identify the need for research extending participative design principles to the context of user-generated content.
Refactoring is one of the key practices in Extreme Programming and other agile methods. Duplicated code is one of the most pervasive and pungent smells to remove from source code through refactoring. Duplicated code h...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
Refactoring is one of the key practices in Extreme Programming and other agile methods. Duplicated code is one of the most pervasive and pungent smells to remove from source code through refactoring. Duplicated code has been largely studied in the literature, and different types of duplications, or "clones", have been identified. Some studies analyzed in details the problems caused by clones in the code, others outlined also the difficulties in removing clones, and the cases in which it could be better not removing them. The refactoring cost for removing clones can be very high, also due to the different choices on the possible refactoring steps. In this paper, we describe our approach and tool developed with the aim to suggest the best refactorings to remove clones in Java code. Our approach is based on the classification of the clones in terms of their location in a class hierarchy, and allows to choose among a restricted set of refactorings, which are then evaluated using multiple criteria. We provide a validation of the effectiveness of the approach.
An XML document D often has a regular structure, i. e., it is composed of many similarly named and structured subtrees. Therefore, the entropy of a trees structuredness should be relatively low and thus the trees shou...
详细信息
ISBN:
(纸本)9783319270302;9783319270296
An XML document D often has a regular structure, i. e., it is composed of many similarly named and structured subtrees. Therefore, the entropy of a trees structuredness should be relatively low and thus the trees should be highly compressible by transforming them to an intermediate form. In general, this idea is used in permutation based XML-conscious compressors. An example of such a compressor is called XSAQCT, where the compressible form is called an annotated tree. While XSAQCT proved to be useful for various applications, it was never shown that it is a lossless compressor. This paper provides the formal background for the definition of an annotated tree, and a formal proof that the compression is lossless. It also shows properties of annotated trees that are useful for various applications, and discusses a measure of compressibility using this approach, followed by the experimental results showing compressibility of annotated trees.
As of today, millions of people share messages via online social networks, some of which probably contain sensitive information. An adversary can collect these freely available messages and specifically analyze them f...
详细信息
ISBN:
(纸本)9783319267623;9783319267616
As of today, millions of people share messages via online social networks, some of which probably contain sensitive information. An adversary can collect these freely available messages and specifically analyze them for privacy leaks, such as the users' location. Unlike other approaches that try to detect these leaks using complete message streams, we put forward a rule-based approach that works on single and very short messages to detect location leaks. We evaluated our approach based on 2817 tweets from the Tweets2011 data set. It scores significantly better (accuracy = 84.95 %) on detecting whenever a message reveals the user's location than a baseline using machine learning and three extensions using heuristic. Advantages of our approach are not only to apply for online social network messages but also to extend for other areas (such as email, military, health) and for other languages.
暂无评论