The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In nascent areas, such as Smart Manufacturing, new collaborative research and development programs (R&D) are frequently formed with the goal to ignite the innovation lifecycle. Yet, clearly formulating common goals and enabling shared understanding of key concepts, which are critical to achieving these goals, often involve long, drawn-out processes. These processes typically involve road-mapping...
Any reasonable implementation of privacy requirements can not be made through legal compliance alone. The belief that a software system can be developed without privacy being an integral concept, or that a privacy policy is sufficient as requirements or compliance check is at best dangerous for the users, customers and business involved. While requirements frameworks exist, the specialisation of these...
Industrial cyber-physical systems require complex distributed software to orchestrate many heterogeneous mechatronic components and control multiple physical processes. Industrial automation software is typically developed in a model-driven fashion where abstractions of physical processes called plant models are co-developed and iteratively refined along with the control code. Testing such multi-dimensional...
As a kind of critical system, safety-critical system is always used for the key areas such as aerospace, national defense, transportation, nuclear energy, health and so on, which require the high security. Due to the inherent defects which caused by the complexity of the organizational structure, and the external threats which caused by the open and dynamic environment, some unexpected results will...
Cyber security systems are comprised of a wide variety of interconnected systems. If these individual systems are not sufficiently designed and implemented to work well when integrated, additional opportunities for adversaries to hide and attack are created. To better enable researchers to broaden their scope and work together, they must be able to explore research in other areas and work across disciplines...
In this article, the authors provide an example workflow-and a simple classification of user questions on the workflow's data products-to combine and interchange contextual metadata through a semantic data model and infrastructure. They also analyze their approach's potential to support enhanced semantic provenance applications.
Service oriented architecture (SOA) promotes highly standardized, loosely coupled and Web-enabled services to foster rapid, low-cost and easy composition of distribute applications. Critical to SOA software development is to acquire users' requirements and to provide service analysis and design techniques for identifying, conceptualizing, profiling, and rationalising service-enable applications. Semantic-enabled...
To cope with current inconsistencies and incompleteness of technical documents, we propose a combined, model-based structured graphical and textual meta-standard approach for specification, verification and validation of complex systems in general and ISO enterprise standards in particular. This methodology, developed under the auspices of the ISO TC 184/SC 5 OPM Study Group, is presented along with...
Interaction and reconciliation of software requirements is one bounded issue about semantic interoperability, and related studies focus on constrain, extending and clustering of requirements semantics to satisfy stakeholders' requirements. Regarding the problem, a novel approach of interoperability extending for requirements semantics based on connecting ontologies that act as a semantic information...
In this paper, we investigate how ontologies developed for use in Semantic Web technology could be used in checking the consistency of requirements specifications. Our approach's main idea and original contribution is that we use reasoning which is a part of ontology. In the first step, we transform the static part of the UML model and its constraints into a problem ontology and try to discover contradictions...
This paper provides an overview regarding the application of an ontology-driven requirements engineering methodology, namely OntoREM, in the aerospace industry with the objective to assess the extent to which this approach has the potential to develop better quality requirements in less time and at less cost compared to traditional requirements engineering processes, taking the Airbus wing-engineering...
Government laws and regulations impose legal requirements on information practices in healthcare and finance. These requirements govern the use and disclosure of information across organizations and their business practices. To comply with the law, organizations must demonstrate that they have verifiable procedures in-place to implement these requirements. This paper surveys our experiences acquiring...
Requirements management (RM) tools for software product lines have special requirements that until now have not been satisfied by existing tools. MKS integrity for requirements management is a new product that satisfies all the major criteria outlined in Beuche et al. It is an enterprise-scale product that allows analysts to efficiently share requirements amongst different documents and projects without...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.