Accessing OWL ontologies from IT systems can bring many problems unfamiliar to developers used to the more common relational storage approach. These problems stem from the dynamic nature of ontologies, their open-worl...
详细信息
ISBN:
(纸本)9783319291338;9783319291321
Accessing OWL ontologies from IT systems can bring many problems unfamiliar to developers used to the more common relational storage approach. These problems stem from the dynamic nature of ontologies, their open-world character and expressiveness. In this paper, we present the Java OWL Persistence API (JOPA), a persistence layer allowing object-oriented access to semantic web ontologies. It supports features like caching, transactional processing and a semantically clear contract between the ontology and the object model. In addition, we present the OntoDriver, a software layer decoupling storage access from the object-ontological mapping. We provide an in-depth theoretical complexity analysis of our approach in connection with an analysis and practical evaluation of the performance of ontological storage with regards to application access scenario.
Investing in cloud computing technology is one of the latest trends in IT. This is a multi criteria investment decision involving many stakeholders and a sequence of coordinated assessment activities that are strategi...
详细信息
ISBN:
(纸本)9783319195155;9783319195148
Investing in cloud computing technology is one of the latest trends in IT. This is a multi criteria investment decision involving many stakeholders and a sequence of coordinated assessment activities that are strategic, qualitative (technical) and quantitative (financial) in nature. This paper integrates an information system (IS) success model with preference elicitation techniques drawn from the multi-criteria decision-making literature. We also show how this decision model can be extended as a vendor negotiation tool. Finally, we describe a prototype Decision Support System (DSS) featuring this model.
Enterprises are facing increasingly complex business processes. Engineering processes in the automotive domain, for example, may comprise hundreds or thousands of process tasks. In such a scenario, existing modeling n...
详细信息
ISBN:
(数字)9783319158952
ISBN:
(纸本)9783319158952;9783319158945
Enterprises are facing increasingly complex business processes. Engineering processes in the automotive domain, for example, may comprise hundreds or thousands of process tasks. In such a scenario, existing modeling notations do not always allow for a user-friendly process visualization. In turn, this hampers the comprehensibility of business processes, especially for non-experienced process participants. This paper tackles this challenge by suggesting alternative ways of visualizing large and complex process models. A controlled experiment with 22 subjects provides first insights into how users perceive these approaches.
Virtual enterprises (VEs) are temporary and loosely coupled alliances of businesses that join their skills to catch new business opportunities. However, the dependencies among the activities of a prospective VE cross ...
详细信息
ISBN:
(数字)9783319158952
ISBN:
(纸本)9783319158952;9783319158945
Virtual enterprises (VEs) are temporary and loosely coupled alliances of businesses that join their skills to catch new business opportunities. However, the dependencies among the activities of a prospective VE cross the boundaries of the VE constituents. It is therefore crucial to allow the VE constituents to discover their local views of the interorganizational workflow, enabling each company to re-shape, optimize and analyze the possible local flows that are consistent with the processes of the other VE constituents. We refer to this problem as VE process fusion. Even if it has been widely investigated, no previous work addresses VE process fusion in the presence of privacy constraints. In this paper we demonstrate how private intersection of regular languages can be used as the main building block to implement the privacy preserving fusion of business processes modeled by means of bounded Petri nets.
Interoperability is of major importance in B2B environments. Starting with EDI in the ` 80s, currently interoperability relies heavily on XMLbased standards. Although having great impact, still issues remain to be sol...
详细信息
ISBN:
(纸本)9783662471579;9783662471562
Interoperability is of major importance in B2B environments. Starting with EDI in the ` 80s, currently interoperability relies heavily on XMLbased standards. Although having great impact, still issues remain to be solved for improving B2B interoperability. These issues include lack of dynamics, cost of implementations, adoption and cross-industry exchange. Linked Data (part of the Semantic Web) technology, although originally not intended for the B2B domain, holds the promise of overcoming some of these issues. This paper explores the potential of linked data technology within a B2B context by introducing and studying six scenarios for combining from light to heavy weight 'traditional' standards with Linked Data technology. This research shows that using Linked Data technology has most potential for specifying semantics formally. This provides the 'best of both worlds' solution, in which legacy systems remain unaltered, and developers are supported in (semi) automated generation of transformation schema's to overcome different standards.
Effective communication in software development is impaired when parties perceive communicated information differently. To address this problem, the project QuASE has been established. It aims at a solution that suppo...
详细信息
ISBN:
(纸本)9783319192703;9783319192697
Effective communication in software development is impaired when parties perceive communicated information differently. To address this problem, the project QuASE has been established. It aims at a solution that supports understandability and reusability of communicated information as well as the quality of decisions based on such information. In this paper, we focus on the architectural aspects of the QuASE system and on its knowledge base which consists of two ontologies: a site ontology defining the site-specific communication environment, and a "quality ontology" that incorporates all knowledge necessary for supporting communication. We describe the overall architecture of the system, introduce the ontologies as well as their interplay, and outline the approach for gathering knowledge necessary to form the QuASE site ontology.
An XML document D often has a regular structure, i. e., it is composed of many similarly named and structured subtrees. Therefore, the entropy of a trees structuredness should be relatively low and thus the trees shou...
详细信息
ISBN:
(纸本)9783319270302;9783319270296
An XML document D often has a regular structure, i. e., it is composed of many similarly named and structured subtrees. Therefore, the entropy of a trees structuredness should be relatively low and thus the trees should be highly compressible by transforming them to an intermediate form. In general, this idea is used in permutation based XML-conscious compressors. An example of such a compressor is called XSAQCT, where the compressible form is called an annotated tree. While XSAQCT proved to be useful for various applications, it was never shown that it is a lossless compressor. This paper provides the formal background for the definition of an annotated tree, and a formal proof that the compression is lossless. It also shows properties of annotated trees that are useful for various applications, and discusses a measure of compressibility using this approach, followed by the experimental results showing compressibility of annotated trees.
As of today, millions of people share messages via online social networks, some of which probably contain sensitive information. An adversary can collect these freely available messages and specifically analyze them f...
详细信息
ISBN:
(纸本)9783319267623;9783319267616
As of today, millions of people share messages via online social networks, some of which probably contain sensitive information. An adversary can collect these freely available messages and specifically analyze them for privacy leaks, such as the users' location. Unlike other approaches that try to detect these leaks using complete message streams, we put forward a rule-based approach that works on single and very short messages to detect location leaks. We evaluated our approach based on 2817 tweets from the Tweets2011 data set. It scores significantly better (accuracy = 84.95 %) on detecting whenever a message reveals the user's location than a baseline using machine learning and three extensions using heuristic. Advantages of our approach are not only to apply for online social network messages but also to extend for other areas (such as email, military, health) and for other languages.
The cloud is the future and has an impact on IT support for business processes. This leads to an increased importance of BPM. On the other hand, BPM software in the cloud (like cloud-based modeling tools, integration ...
详细信息
ISBN:
(纸本)9783319158952;9783319158945
The cloud is the future and has an impact on IT support for business processes. This leads to an increased importance of BPM. On the other hand, BPM software in the cloud (like cloud-based modeling tools, integration platforms, and workflow products) brings new possibilities in the areas of collaboration, mobile access, and integration.
Nowadays, the adoption of Open Source Software (OSS) by organizations is becoming a strategic need in a wide variety of application areas. Organizations adopt OSS in very diverse ways. The way in which they adopt OSS ...
详细信息
ISBN:
(纸本)9783319258973;9783319258966
Nowadays, the adoption of Open Source Software (OSS) by organizations is becoming a strategic need in a wide variety of application areas. Organizations adopt OSS in very diverse ways. The way in which they adopt OSS affects and shapes their businesses. Therefore, knowing the impact of different OSS adoption strategies in the context of an organization may help improving the processes undertaken inside this organization and ultimately pave the road to strategic moves. However, there is a lack of support for assessing the impact of the OSS adoption over the business of the adopter organizations. Based on the goal-oriented characterization of some OSS adoption strategies, in this paper, we propose a preliminary approach to assess the business impact of the OSS adoption strategies over the adopter organizations. The proposal is based on the business Model Canvas and graph theory notions to support the elicitation and assessment of the impact of each goal over the adopter organization. We illustrate the application of the approach in the context of a telecommunications company.
暂无评论