The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Conceptual elevation of data in business process modeling was first formulated in 2003. The research community responded to this new idea enthusiastically. In the past decade, there have been numerous research activities concerning the interactions between business processes/activities and data in many aspects of business process management. Many of the advancements have or will have impacted on design/modeling,...
This article explores one of the approaches to the use of the conceptual graphs (CGs) theory in the tasks dealing with automated development of the embedded expert systems (ESs) being realized in an open program code in universal high level algorithmic languages. Within this approach CGs are used as an universal expression means for representation of overall, self-sufficient, fully portable expert...
We propose to study the impact of the representation of the data in defect prediction models. For this study, we focus on the use of developer activity data, from which we structure dependency graphs. Then, instead of manually generating features, such as network metrics, we propose a model inspired in recent advances in Representation Learning which are able to automatically learn representations...
Group work, in certain circumstances, could encourage peer learning and provide the learners an opportunity to clarify and refine their knowledge. However, randomly grouping learners of different level of knowledge and activeness could decrease the effectiveness of a group. In this paper, we present a criterion for recommending the formation of groups of learners. This criterion is based on traces...
Many performance engineering tasks, from long-term performance monitoring to post-mortem analysis and online tuning, require efficient runtime methods for introspection and performance data collection. To understand interactions between components in increasingly modular HPC software, performance introspection hooks must be integrated into runtime systems, libraries, and application codes across the...
The traditional duplicate bug reports detection approaches are usually based on vector space model. However, the experimental result is rarely satisfying since this method cannot distinguish semantic correlation among bug reports which written by natural languages. Topic model, as a method to model underlying topics of texts, can solve the problem of document similarity calculation methods used in...
Most data warehouses have limitations in terms of efficiency, flexibility and scalability. One difficulty is the maintenance and the analysis due to data growth and overload. This paper presents the methodology for collaborative working between users through a tool which allows the design of cube structures based on the Object-Oriented Data Model or Ontological maps. The users will provide their knowledge...
Software interrelationships have an impact on the quality and evolution of software projects and are therefore important to development and maintenance. Package management and build systems result in software ecosystems that usually are syntactically and semantically incompatible with each other, although the described software can overlap. There is currently no general way for querying software interrelationships...
Sensor network deployments, such as smart cities and smart logistics, are evolving towards open infrastructure on top of which multiple parties deploy and make use of each other's application software. Of vital importance in such distributed settings, is an agreement on message semantics and contents. Yet, the current state-of-the-art in sensor programming typically remains low-level in terms of messaging,...
This paper proposes a systematic software product line test case derivation method that reuses test data. With the method, significant test cases reduction can be achieved over the conventional software product line testing. The key to achieving reuse lies in performing test data determination during domain test engineering so that application test engineers share test data rather than creating different...
Accumulated provenance data about correctly constructed and successfully executed scientific workflows provides a valuable source of knowledge, which may be used and reused in new scientific experiments' design. In this paper we propose a provenance-based workflow composition approach — the opposite to package-based one, presented earlier. Processing semantic-compliant provenance data makes available...
The paper focuses on development and application of a software engineering system BPsim.SD, part of decision support suite BPsim.DSS, which greatly simplifies analysts work and their interaction with software developers. System is integrated into a decision support suite, which allows instant transition from software entities design to simulation of developed product with possible application of simulation...
The paper focuses on development and application of a software engineering system BPsim. SD, part of decision support suite BPsim. DSS, which greatly simplifies analysts work and their interaction with software developers. System is integrated into a decision support suite, which allows instant transition from software entities design to simulation of developed product with possible application of...
Creating of web application and corresponding information architecture is often associated with social informatics. It clearly lays at the crossing of the ICT and social sciences, especially because effective information architectures enable people to find content quickly, easily and intuitively. Model Driven Architecture (MDA) technique is initiated by the Object Management Group (OMG), based on...
Building Information Modeling is considered by the scientific literature as an emerging trend in the architectural documentation scenario, as it is basically a digital representation of physical and functional features of facilities, serving as a shared knowledge resource during their whole life cycle. BIM is actually a process (not a software, as someone indicated), in which different players act...
In this paper, we describe a method for mining both frequent episodes and rare episodes in multiple data streams. The main issues include episodes mining and data streams relationship processing. Therefore, a mining algorithm together with two dedicated handling mechanisms is presented. We propose the concept of alternative support for discovering frequent and rare episodes, and define the semantic...
Within the enterprise, domain-specific knowledge is often recorded by IT processes or employees in the form of noisy, unstructured data. The question then arises on how to gain actionable insight from the volumes of un-structured data in order to improve the bottom line in an effective and timely manner. In this paper we propose a method on how to approach the issue within the realm of software license...
Design patterns provide experience reusability and increase quality of object oriented designs. Knowing which design patterns are implemented in a software is important in comprehending, maintaining and refactoring its design. However, despite the interest in using design patterns, traditionally, their usage is not explicitly documented. Therefore, a method is required to reveal this information from...
Nowadays, almost any software application deals with private information. However, effective tools that support the specification and implementation of privacy-aware systems are still missing. This work makes a step to address this issue. In this paper we present MAPaS, a model based framework for the modeling and analysis of privacy-aware systems. MAPaS provides a modeling language for the privacy...
Software of various domains needs to access information on assets in an industrial facility. For this purpose, it is not only necessary to provide the required technical infrastructure, but also to have a common understanding of the way assets are modeled. Since globally valid models are currently not available, sharing asset information between different software tools is hard to accomplish. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.