business process analysts must face the task of analyzing, monitoring and promoting improvements to different business processes. Process mining has emerged as a useful tool for analyzing event logs that are registere...
详细信息
ISBN:
(数字)9783319158952
ISBN:
(纸本)9783319158952;9783319158945
business process analysts must face the task of analyzing, monitoring and promoting improvements to different business processes. Process mining has emerged as a useful tool for analyzing event logs that are registered by information systems. It allows the discovering of process models considering different perspectives (control-flow, organizational, time). However, currently they lack the ability to explore jointly and interactively the different perspectives, which hinder the understanding of what is happening in the organization. This article proposes a novel approach for interactive discovery aimed at providing process analysts with a tool that allow them to explore multiple perspectives at different levels of detail, which is inspired on OLAP interactive concepts. This approach was implemented as a ProM plug-in and tested in an experiment with real users. Its main advantages are the productivity and operability when performing process discovery.
This paper analyses the way we teach Scrum. We reflect on our intended learning outcomes, which challenges we find in teaching Scrum and which lessons we have learned during the last four years. We also give an outloo...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
This paper analyses the way we teach Scrum. We reflect on our intended learning outcomes, which challenges we find in teaching Scrum and which lessons we have learned during the last four years. We also give an outlook on the way we want to introduce and apply Scrum in our teaching and how we intend to improve the curriculum.
An XML document D often has a regular structure, i. e., it is composed of many similarly named and structured subtrees. Therefore, the entropy of a trees structuredness should be relatively low and thus the trees shou...
详细信息
ISBN:
(纸本)9783319270302;9783319270296
An XML document D often has a regular structure, i. e., it is composed of many similarly named and structured subtrees. Therefore, the entropy of a trees structuredness should be relatively low and thus the trees should be highly compressible by transforming them to an intermediate form. In general, this idea is used in permutation based XML-conscious compressors. An example of such a compressor is called XSAQCT, where the compressible form is called an annotated tree. While XSAQCT proved to be useful for various applications, it was never shown that it is a lossless compressor. This paper provides the formal background for the definition of an annotated tree, and a formal proof that the compression is lossless. It also shows properties of annotated trees that are useful for various applications, and discusses a measure of compressibility using this approach, followed by the experimental results showing compressibility of annotated trees.
As of today, millions of people share messages via online social networks, some of which probably contain sensitive information. An adversary can collect these freely available messages and specifically analyze them f...
详细信息
ISBN:
(纸本)9783319267623;9783319267616
As of today, millions of people share messages via online social networks, some of which probably contain sensitive information. An adversary can collect these freely available messages and specifically analyze them for privacy leaks, such as the users' location. Unlike other approaches that try to detect these leaks using complete message streams, we put forward a rule-based approach that works on single and very short messages to detect location leaks. We evaluated our approach based on 2817 tweets from the Tweets2011 data set. It scores significantly better (accuracy = 84.95 %) on detecting whenever a message reveals the user's location than a baseline using machine learning and three extensions using heuristic. Advantages of our approach are not only to apply for online social network messages but also to extend for other areas (such as email, military, health) and for other languages.
Free and Open Source Software (FOSS) and Agile Software Development(ASD) research have gained momentum over the past decade. However, to the best of our knowledge, there exists no work about these two phenomena combin...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
Free and Open Source Software (FOSS) and Agile Software Development(ASD) research have gained momentum over the past decade. However, to the best of our knowledge, there exists no work about these two phenomena combined. This thesis will show how Agile Software Development(ASD), specifically the Kanban Method, and FOSS can be consolidated and how they can benefit from each other's advantages. The agile community and the FOSS community can benefit from this body of work, as we aim at broadening the understanding of both.
Safety-critical systems such as process control-and signal systems play a fundamental role in many important industries and aspects of society. Such systems, including software, must fulfill extreme demands for correc...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
Safety-critical systems such as process control-and signal systems play a fundamental role in many important industries and aspects of society. Such systems, including software, must fulfill extreme demands for correct operation and integrity, meaning that development must follow strict standards (in our case IEC 61508), which has to be documented and evaluated by external certification bodies to receive necessary approval. We present recent industrial experience in applying the SafeScrum approach in a complex software organization.
Enterprises are facing increasingly complex business processes. Engineering processes in the automotive domain, for example, may comprise hundreds or thousands of process tasks. In such a scenario, existing modeling n...
详细信息
ISBN:
(数字)9783319158952
ISBN:
(纸本)9783319158952;9783319158945
Enterprises are facing increasingly complex business processes. Engineering processes in the automotive domain, for example, may comprise hundreds or thousands of process tasks. In such a scenario, existing modeling notations do not always allow for a user-friendly process visualization. In turn, this hampers the comprehensibility of business processes, especially for non-experienced process participants. This paper tackles this challenge by suggesting alternative ways of visualizing large and complex process models. A controlled experiment with 22 subjects provides first insights into how users perceive these approaches.
This work deals with Interaction Protocol (IP) adaptation at build time for coordination in the context of Crisis Management Processes (CMP). CMP refer to the coordination of several partners in a dynamic and unstable...
详细信息
ISBN:
(纸本)9783319243993;9783319243986
This work deals with Interaction Protocol (IP) adaptation at build time for coordination in the context of Crisis Management Processes (CMP). CMP refer to the coordination of several partners in a dynamic and unstable context. One possible way to deal with this coordination is the use of IP. In order to guarantee an efficient use of IP, we need to adapt them. In previous work, we proposed an MDA (Model Driven Architecture) framework for IP adaptation based on version and context notions. In this paper, we focus on the PIM (Platform-Independent Model) level of the proposed MDA framework. More precisely, we propose an extension of AUML (Agent UML) sequence diagram meta-model in order to specify graphically the contextualized versioned IP. We also give two examples of contextualized versioned IP specified with extended AUML. Finally, we illustrate the IP adaptation based coordination through a well-known case study "Air Crash Management Process".
This paper contains an empirical analysis of acquisition dynamics in the electronic design automation (EDA) industry. Using qualitative and quantitative data, we show that particular groups of EDA firms strongly contr...
详细信息
ISBN:
(纸本)9783319195933;9783319195926
This paper contains an empirical analysis of acquisition dynamics in the electronic design automation (EDA) industry. Using qualitative and quantitative data, we show that particular groups of EDA firms strongly contribute to acquisition activity in the industry at specific times. Based on this we provide empirical evidence that specialized firms pursue focused and 'defensive' acquisitions during times of uncertainty, indicating that concentration on existing competencies is preferred over diversification into promising new, but unfamiliar markets.
暂无评论