Security engineering deals with modeling, analysis, and implementation of complex security mechanisms. The dynamic nature of such mechanisms makes it difficult to anticipate undesirable emergent behavior. In this work...
详细信息
The deployment of business components in large enterprise information systems offers great potential. Nonetheless the process of finding and defining the right business components is very challenging. While the defini...
详细信息
ISBN:
(纸本)3885793997
The deployment of business components in large enterprise information systems offers great potential. Nonetheless the process of finding and defining the right business components is very challenging. While the definition of business components is comparatively simple for small business domains, it becomes very complex for larger domains of interest. This paper illustrates the experiences made during the modeling process of an integrated information system architecture for Customer Relation Management (CRM) and Supply Chain Management (SCM) with more than 500 functions and 1000 information objects under usage of the Business Component Identification (BCI)-Method. Based on this experience possible enhancements and needed extensions for the BCI-Method are proposed and explained.
Versioning system repositories and bug tracking systems are valuable sources of information to study the evolution of large open source softwaresystems. However, being conceived for specific purposes, i.e., to suppor...
详细信息
Ontologies are becoming increasingly important in the biomedical domain since they enable the re-use and sharing of knowledge in a formal, homogeneous and unambiguous way. In the rapidly growing field of biomedicine, ...
详细信息
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledge into already deployed applications, t...
详细信息
Data mining has proven a successful gateway for discovering useful knowledge and for enhancing business intelligence in a range of application fields. Incorporating this knowledge into already deployed applications, though, is highly impractical, since it requires reconfigurable software architectures, as well as human expert consulting. In an attempt to overcome this deficiency, we have developed agent academy, an integrated development framework that supports both design and control of multiagent systems (MAS), as well as agent training. We define agent training as the automated incorporation of logic structures generated through data mining into the agents of the system. The increased flexibility and cooperation primitives of MAS, augmented with the training and retraining capabilities of agent academy, provide a powerful means for the dynamic exploitation of data mining extracted knowledge. In this paper, we present the methodology and tools for agent retraining. Through experimental results with the agent academy platform, we demonstrate how the extracted knowledge can be formulated and how retraining can lead to the improvement - in the long run - of agent intelligence.
Ontologies are widely used for capturing and organizing knowledge of a particular domain of interest. This knowledge is usually evolvable and therefore an ontology maintenance process is required. In the context of on...
详细信息
Ontologies are widely used for capturing and organizing knowledge of a particular domain of interest. This knowledge is usually evolvable and therefore an ontology maintenance process is required to keep the ontologic...
详细信息
The Object Constraint Language (OCL) is a notational language for analysis and design of softwaresystems, which is used in conjunction with the Unified Modelling Language (UML) to specify the semantics of the buildin...
The Object Constraint Language (OCL) is a notational language for analysis and design of softwaresystems, which is used in conjunction with the Unified Modelling Language (UML) to specify the semantics of the building blocks precisely. OCL can also be used by other languages, notations, methods and software tools in order to specify restrictions and other expressions of their models. Likewise, OCL is used by the Object Management Group (OMG) in the definition of other fast spreading industrial standards such as Meta Object Facility (MOF) or XML Metadata Interchange (XMI). Support tools aimed at making this language easier to use are becoming available. These tools are capable of supporting and handling OCL expressions. This paper presents a comparative study of the main tools currently available, both commercial and freely available ones. The study is very practical, with the advantages and disadvantages of the different tools being pointed out. The evaluations made may be of use in helping those developers and analysts who already use the language, as well as those who intend to use it in the near future, to choose the OCL tool which best adapts to their requirements.
暂无评论