The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A task at the beginning of the software development process is the creation of a requirements specification. The requirements specification is usually created by a software engineering expert. We try to substitute this expert by a domain expert (the user) and formulate the problem of creating requirements specifications as a search-based software engineering problem. The domain expert provides only...
Process Mining aims to extract information from event logs to highlight the underlying business processes. It is useful in situations where there is no detailed and complete knowledge of how an overall system works, such as in a hospital where most processes are complex and ad-hoc. Many Process Mining discovery techniques have been proposed so far, but many challenges are still to be faced. Implicit...
The competition inherent to globalisation has led enterprises to gather in nests of specialised business providers with the purpose of building better applications and provide more complete solutions. This, added to the improvements on the Information and Communications Technologies (ICT), led to a paradigm shift from product-centrism to service-centrism and to the need to communicate and interoperate...
In the software development field, the amount ofdata related to documentation and to the source code itselfis huge. Relevant knowledge can be extracted from this data,provided that adequate tools are in place. In this context, datamining can be seen as an important tool. This paper presentsan approach to mine sequential patterns from source code andto suggest these patterns to developers, according...
Knowledge Discovery in Databases (KDD) is a highly complex, iterative and interactive process involving several types of knowledge and expertise. In this paper we propose to support users of a multi-view analysis (a KDD process held by several experts with different viewpoints). Our objective is to enhance both reusability of the process and coordination between experts. To do so, we propose a formalization...
Since XML documents can appear in any semi-structured form, structural and integrity constraints are often imposed on the data that are to be modified or processed. These constraints are formally defined in a schema. But, despite the obvious advantages, the presence of a schema is not mandatory and many XML documents are not joined with any. Consequently, no integrity constrains are specified as well...
Function Points (FP) are widely used as a basis to estimate software development cost and efforts. At the requirements level several estimation tools have been developed, but these tools use unified modeling language (UML) diagram. However, not all requirements documents include supplementary UML diagram. This paper describes the development of an automated tool to estimate size of software projects...
An interactive electronic technical manual (IETM) is a digital document designed to operate interactively with the user. In order to organize lots of technical data in IETMs, an IETM data model is needed. In this paper, we propose an extensible IETM data model which consists of a minimal set of data types to define the core processing logic of IETM browsers. Domain-specific data types are created...
Many designers use the patterns of a pattern language in creating the design model. In designing with patterns, there are three aspects of the pattern language that must be taken into consideration: structural, syntactic, and semantic. That means, the patterns must be applied correctly, the relationship between patterns must be correct, and the design model must be semantically correct. The syntactic...
We introduce a novel domain-driven rule discovery and evaluation algorithm based on Swanson's logical relation approach. Over more than a decade, rules have been mined from large biomedical datasets and been evaluated solely based on statistical properties of the rules or user-belief specifications. This approach faces tremendous challenges to determine novel, actionable and interesting rules. In...
A lot of knowledge has been accumulated and documented in the form of process models, standards, best practices, etc. The knowledge tells how a high quality software process should look like, in other words, which constrains should be fulfilled by a software process to assure high quality software products. Compliance checking for a predefined process against proper constrains is helpful to quality...
Mashup tools are becoming increasingly important enabling users to compose services and processes on the Web. Most existing tools focus on Web-based interfaces, usability, and visual languages for creating mashups. A major challenge that has received limited attention is context-awareness and adaptivity of service mashups. In this paper we focus on two main aspects: First, a service capability model...
In multi-agent-based e-commerce environments, like a social network, it is critical for buying agents to build trust with the selling agents in the virtual e-marketplaces so as to mitigate the possible harm inflicted by any dishonest sellers. However, traditional approaches for establishing trust in the physical world can no longer be used. This paper introduces a graphical representation approach...
Software architecture has become essential in the struggle to manage today's increasingly large and complex systems. Software architecture views are created to capture important system characteristics on an abstract and, thus, comprehensible level. As the system is implemented and later maintained, it often deviates from the original design specification. Such deviations can have implication for the...
The majority of large companies are adopting Service Oriented Architectures, mainly to automate their business processes, both centralized and distributed. This paper will focus on distributed business processes. At the moment there are two interesting ways to implement a distributed business process, via orchestration or choreography. Whereas an orchestration can be thought of as a service composition...
SOCK is a process calculus for the modeling of service oriented systems recently extended with primitives for dynamic fault and compensation handling. In this paper we investigate the relationships between the sagas calculi for compensable flow composition and SOCK. First, we present an encoding of parallel sagas (with interruption and centralized compensation) into SOCK. Then, we discuss a new semantics...
Programming graphical user interfaces is hard and expensive, while automatic generation is still quite challenging. One of the issues involved in automatic generation is the presentation of content from the domain of discourse according to its purpose in the current context of the human-machine dialogue. For example, it makes a difference whether the same piece of information is to be presented in...
Dependency structure matrix (DSM) has been successfully applied to identify software dependencies among packages and subsystems. A number of algorithms were proposed to compute the matrix so that it highlights patterns and problematic dependencies between subsystems. However, existing DSM implementations often miss important information to fully support reengineering effort. For example, they do not...
The indisputable dominance of mobile and pervasive computing devices and their typical characteristics require services offered to be rethought and sometimes redesigned in order to better assist users. Considering the importance of data mining services to provide intelligence locally on devices on these environments, we propose a data mining service that adapts the embedded data mining algorithm according...
The complicity of context information and task performance of actors in smart environment is demanding in terms of analysis, modeling and utilization. This paper proposes a task-based modeling approach, namely CTML, suitable for requirement stage of development to gain insight about the envisioned way tasks are performed. Additionally those models can be further employed to start-off the design phase...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.