The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A number of frameworks suggest artifacts and practices to develop the components of Enterprise Architecture (EA). However, when analyzing the representations proposed, several concerns are scattered and tangled within the essential elements. It harms reuse, making it difficult both to understand and maintain the EA representations. In order to address this issue, we present a method to identify and...
One of the main weaknesses of the concept of alignment between business and information technology (IT) process and functions in enterprises is that it is abstract, difficult to actualize and harder to sustain. The misalignment between business and IT can be attributed to many factors. Two key factors that stand out are the knowledge and cultural gaps between these functions and the perception that...
To determine the circumstances of an incident, investigators need to reconstruct events that occurred in the past. The large amount of data spread across the crime scene makes this task very tedious and complex. In particular, the analysis of the reconstructed timeline, due to the huge quantity of events that occurred on a digital system, is almost impossible and leads to cognitive overload. Therefore,...
In this paper we analyze the structuring principles underlying Service-oriented Enterprise Architecture (SoEA) in the light of a core reference ontology for services (UFO-S). The ontology provides a broad account for services and is centered on the service commitments/claims that are established by service participants throughout the service lifecycle. UFO-S is applied as theory to support the analysis...
With the rapid development of smart phones and mobile Internet, the number of mobile software has largely increased, and online mobile software markets have also emerged, providing mobile software introduction and download for users. However, for online resources are distributed and heterogeneous, different online markets may give different names, incomplete information or incorrect data about the...
In using ontology to support requirements engi-neering, quality of elicited requirements depends on quality of requirements ontology, so a rule-based verification method of the correctness of requirements ontology has been proposed. However, in recent evaluation experiments, users of the method (ontology verifiers) described only a few new rules based on rule grammars and rule examples. That led to...
For specifications, people use natural language. We show that processing natural language and combining this with intelligent deduction and reasoning with ontologies can possibly replace some manual processes associated with requirements engineering (RE). Our prior research shows that the software tools we developed can indeed solve problems in the RE process. This paper shows this does not only work...
Accumulated provenance data about correctly constructed and successfully executed scientific workflows provides a valuable source of knowledge, which may be used and reused in new scientific experiments' design. In this paper we propose a provenance-based workflow composition approach — the opposite to package-based one, presented earlier. Processing semantic-compliant provenance data makes available...
Over the last decade, contextual modeling has gained on importance due to the wide spread introduction of ubiquitous and mobile computing. Common to these systems is that they integrate contextual information to improve situated cognition and awareness as well as stakeholders' usage experience with these systems. While domains such as the next generation of the Web - Web 3.0, which shares many commonalities...
The paper focuses on discussion on the method of integration of simulation models used within the enterprise information system. The integration problem is presented on one sample class of models - the real time models that are used in control, diagnostics and decision making processes. The suggested method is based on multi-agent approach with distributed knowledgeable agents. The dynamic model consists...
Cyber-attacks are increasing at an alarming rate and the attackers have progressively improved in devising attacks towards specific targets. To further develop the area of cyber-attack communication, we propose an ontology based issue resolution system used to identify and defend against cyber-attacks. The issue resolution system (IRS) facilitates attack discovery and suggestive defenses for a small...
Providing accessible web products is a challenge. In particular, the implementation of requirements is still a problem for many developers who may not have the necessary skills to perform this task, including difficulty in interpreting reference documents. This paper presents the AccTrace, a CASE tool (Eclipse plugin) that uses an ontology to specify the technical implementation of accessibility and...
This article discusses the problem of knowledge capitalization that require the operations of evaluation. There have been many approaches to develop specialized procedures and techniques, aimed at assuring the highest level of knowledge quality. The method proposed in this paper is based on a corporate memory building. This memory can capitalize just knowledge evaluated using a different criteria...
Goal-oriented requirement analysis is an approach that semantically suggests requirements based on predefined domain knowledge using ontology. However, developing ontology can be a very expensive process and cause additional efforts. These are major obstacles to introduce Goal-oriented requirement analysis. Furthermore, since the prioritization mechanism depends on how to define ontology, a consistent...
Managing smart spaces with software requires the acquisition and processing of context information about a space. To be usable for exchanging information, a context representation has to be structured with a context model. Existing context-modeling techniques usually require experts and lack support for collaborative distributed creation, which prevents a crowdsourced development in a distributed...
In cloud computing environment, software service often collaborates with other supporting utility services in order to provide a complete solution to end users. The software service itself could provide the required functions to users that fulfill their needs. However, the non-functional requirements, which represent the main criteria in the service selection process, need the collaboration from all...
There are currently several biological databases related to proteins depending on the information we are interested to extract. Therefore, since a heterogeneous set of features will be needed (domains, structures, ontology terms, etc), several quite different databases should be consulted. The handling of different databases can become difficult, as each database could provide a different nomenclature...
This research proposes an innovative agent-based design method known as “MIRA” (Modular, Intelligent and Real-time Agent) to represent products as well as mechatronic components in manufacturing systems. The new agent exploits semantic knowledge representation of its capabilities, tasks and surroundings, and upon which performs rule-based reasoning leading to generation of the IEC 61499 Function Blocks...
This paper refers to the development of a project focused on the developing a system to aid the reporting of health conditions to support medical diagnosis based on mobile devices.
During the software development several interrelated artifacts are created. Despite the common version control of artifacts by existing Software Configuration Management (SCM) tools, current mechanisms do not provide full support for reusing and changing propagation between artifacts. This occurs because they are focused mainly on source-codes and their compilations. Few efforts have been made in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.