The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a compilation tool SBVR2Alloy which is used to automatically generate as well as validate service choreographies specified in structured natural language. The proposed approach builds on a model transformation between Semantics of Business Vocabulary and Rules (SBVR), an OMG standard for specifying business models in structured English, and the Alloy Analyzer which is a SAT based constraint...
Automatic localization of services at the time of logical modeling is a difficult task. This is because of the complexity of models and the scattered nature of enterprise architecture information in organizations, systems as well as actors and applications. However, all information about logical services is described in the eLEL and in the aspects of the business architecture of the Praxeme methodology...
System specifications can be modeled using various types of notations and diagrams regarding applications of the particular model. In this paper, we present an overview of the existing solutions, focusing on UML, BPMN and DMN models and the diagrams provided by these notations. We perform a comparison of these approaches and provide examples of representing system requirements in these notations.
In the recent times, software security has gained a great deal of attention in the Software Development Life Cycle due to increased cases of reported cyber threats and incidents. A considerable number of cyber-attacks targeting financial systems has made security be the most critical feature in banking systems. However, establishing security requirements for these applications can be a challenging...
Business processes are a collection of related, structured activities performed to achieve a defined business outcome. Adopting a business process perspective is an essential advantage for organizations to orchestrate and achieve continuous improvements on time and within specified resource constraints. The increased popularity of this domain, however, has resulted in a variety of interdisciplinary...
Tight coupling of business and the software implementation is the biggest difficulty of designing software system architecture. The business change will inevitably lead to software restructuring, which is the necessary result of business-driven development, and it greatly restrict the development of software productivity. Metadata driven design, as an architecture pattern, can effectively reduce the...
Spreadsheets are used in professional business contexts to make decisions based on collected data. Usually, these spreadsheets are developed by end users (e.g. accountants) in an ad-hoc way. The effect of this practice is that the business logic of a concrete spreadsheet is not explicit to them. Thus, its correctness is hard to assess and users have to trust. We present an approach where structure...
We discuss our experience in use of models and model-driven techniques for developing large business applications. Benefits accrued and limitations observed are highlighted. We describe possible means of overcoming some of the limitations and experience thereof. A case for shift in focus of model driven engineering (MDE) community in the context of large enterprises is argued. Though emerging from...
Previous work has demonstrated that property-based testing (PBT) is a flexible random testing technique that facilitates the generation of complex form data. For example, it has been shown that PBT can be applied to web-service applications that require various inputs for web-forms. We want to exploit this data generation feature of PBT and combine it with an external test-case generator that can...
UML 2.5 Activity Diagram, being the latest version released in 2015, faces some serious problems inherent in UML itself. UML diagrams lack precise mathematical semantics which leads to ambiguities in its interpretation. Therefore, UML cannot be executed by model checkers for the presence of errors and inconsistencies. Z Notation is a widely used Formal Method, which offers robust notations for specifying...
Java Enterprise Edition is composed of multilingual source code that supports the development of efficient business applications. This architecture is implemented as a layered model that is supported by a series of object oriented patterns called JEA/J2EE Patterns. These Patterns provide recurring solutions for the development of effective enterprise applications. J2EE Patterns can also be used for...
An important phase of a data-oriented software system reengineering is a database reengineering process and, in particular, its subprocess - a database reverse engineering process. In this paper we present one of the model-to-model transformations from a chain of transformations aimed at transformation of a generic relational database schema into a form type data model. The transformation is a step...
In this work we present a synergic integration of the Functional Mock-Up Interface (FMI) and Business Process Model and Notation (BPMN) standards aimed at managing coupled system simulations. The expressiveness of the BPMN diagrams enabled us to define the relationship between the involved systems and guarantees a one-to-one correspondence with an XML file which is the starting point for the automation...
In recent times, the domain of automated analysis and translation of business rules formal representations is getting popular. Various approaches have been presented to translate information presentation such as natural language software requirements to formal presentations. In this paper, an approach is presented to model the DRT tool for semantic analysis for business rules. Business rules write...
UML is actually a standard that is used in the production of software models. Its function is to facilitate the working of visuals of software artifacts. In order to produce a UML diagram, manufacturer has to gather all the software requirements in a natural like English r semi formal like SBVR language. After that he analyzes and produces the activity diagram manually in an available case tool. One...
Many problems of traditional business systems (SAP, Microsoft Dynamics, etc.) are largely caused by their architecture where a tier that implements the business model and data processing (application server or thick client) is separated from the DBMS where the data is stored. A new approach to extend the relational DBMS with a means for creating expressive heterogeneous business models according to...
This paper proposes a complex systems approach to understand the growth and decline of Digital Businesses. Digital Businesses are characterised by unique factors such as a highly networked online customer base, where word of mouth spreads very fast, and minimal cost of incremental users due to economies of scale. Thus online businesses peak and plummet rapidly making it difficult to fathom their success...
Internet affects modern daily life with its technological innovation and rapid change. Trust plays an important role in the Internet world; however, a trust relationship between the buyer and seller is abstract and difficult to quantify. In this study, we conduct literature analysis, discussing trust models provided by many scholars. Thereafter, we design new architecture regarding the trust model...
Cutting-edge technologies play major roles in our daily lives and businesses. They are used by businesses to gain competitive advantage even as individuals use them to simplify their routine activities. However, these technologies are driven by cutting-edge applications (simply called Apps) that are deployed on devices like iPhone, iPad, laptop computers, desktop computers and the like. Just like...
For understanding and practical implementation of all processes in the competitive model of electricity market in Ukraine it is necessary to define and to describe roles and functions of different market participants and to construct the role model of bilateral contracts market and balancing market and of its areas. The common role model of electricity market of Ukraine is developed. The role model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.