The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber-attacks are increasing at an alarming rate and the attackers have progressively improved in devising attacks towards specific targets. To further develop the area of cyber-attack communication, we propose an ontology based issue resolution system used to identify and defend against cyber-attacks. The issue resolution system (IRS) facilitates attack discovery and suggestive defenses for a small...
In the definition of Enterprise Architecture (EA) business and technology specialists participate, being the former the ones who know models of their endeavor and to whom the EA models are not natural and include complex issues that only the specialists understand. The detection of any inconsistency or gap can take place, in the worst case, during the implementation of technological solutions or,...
It is inevitable to make use of technology to support 287 million adult illiterates of India spread across 22 Indian Languages and dialects. How to reduce the complexity during the creation and maintenance of adult literacy instructional design (goals, process, context, content and so on) while addressing large scale and variety? In this paper, we motivate the need for ontologies to address this inherent...
Scientific workflows have become the workhorse of Big Data analytics for scientists. As well as being repeatable and optimizable pipelines that bring together datasets and analysis tools, workflows make-up an important part of the provenance of data generated from their execution. By faithfully capturing all stages in the analysis, workflows play a critical part in building up the audit-trail (a.k...
Business processes perform a significant role in increasing the success of organizational processes and functionalities. Due to the ever increasing growth in the scale and complexity of processes in line with taking advantage of combinational methods and ideas to optimize workflows and gain higher efficiency, lack of a framework considering both business process semantic and structure for business...
Responding to a terrorist attack is extraordinarily complex due to the unpredictability as well as the resulting devastation, confusion, and apprehension. Further complications arise from the enormity of available data as well as the participation of multiple agencies and organizations, which often hinders the discovery and assimilation of pertinent information in a timely fashion. A solution to these...
In this paper, we propose methods to deal with self-adaptive information systems where one has to control in real time a complex substratum organized with numerous proactive elements continuously producing active links and generating multiple informational exchanges. Such exchanges arise when linking concurrent distributed complex systems. More generally, the growing complexity of today's grand challenges...
B-SCP is a promising framework addressing alignment of IT with business strategy from a requirements engineering perspective. A problem with the B-SCP framework is that it is extremely difficult to track dependencies between requirements in a project of realistic complexity. We discuss how the RDF data model with OWL semantics, will greatly benefit an implementation using B-SCP. Our contribution is...
Aiming at the problem existing in the current knowledge organization, a model of knowledge organization based on modular ontology is put forward. The model can provide an approach to knowledge organization autonomously and collaboratively, based on which advanced knowledge organization is discussed. To some extent, the model can improve the ability of knowledge reuse and knowledge integration, and...
As ubiquitous virtual reality (U-VR) systems become more and more popular and several systems coexist all together, sharing events between them in order to improve the user experience and increase their scope and functionality will be mandatory. Since U-VR systems have a dynamic and decoupled nature, and they have their own event model, we propose in this paper a semantic publish/subscribe infrastructure...
Modern business process modeling languages such as BPMN or EPC provide users with more constructs to represent real world situations than their predecessors such as IDEF or Petri Nets. But this apparent increase in expressiveness is accompanied by an increase in language complexity. In practice many organizations choose to only use a subset of the available modeling constructs. Using a well established...
Like RM-ODP [1], enterprise architecture (or EA for short) has its own perspectives as a basic construct for its architecture definition to represent areas of concern. In this paper, difference between RM-ODP and one concrete example EA, and applicability of Use of UML for ODP system specifications [2] (or UML4ODP in short) standard to the example EA, are discussed. Several additional diagrams that...
In the current globalized world, characterized by strong Web based interactions, relationships between people and organizations are subject to fast changes. This situation justifies the need for an approach that can capture business changes and quickly implement them into computational systems. Considering that some business logic portions are quite volatile and susceptible to changes and other portions...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.