The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Flexible processes emerged to provide flexibility to business process execution. A flexible process is not static and can have several different executions, that is influenced by the current situation. In this context, the decision-making is placed in the hands of any knowledge worker during the execution, who decides which tasks and in which order they will be executed. Two approaches for flexible...
This paper argues in favor of expressing modeling requirements in a modeling language agnostic way, at least whenever those requirements are part of a contracting relationship between some of the stakeholders. Contracting authorities may require from contractors specific design models in order to perform early design (functional, safety, security, etc.) analyses. However, in order to allow contractors...
This paper presents a model-driven approach for the systematic development of tools for checking the conformity of models when the domain formalization does not only consist of a meta-model but also on a set of constraints enhancing it. The strategy is built on top of the idea of representing the result of the verification as a model which gathers all the constraint violations found in the model,...
Enterprise Modeling Languages (EMLs) are generally perceived as conceptual modeling languages having a formal syntax and informal semantics. The non-formality of semantics is mainly caused by the materiality of the addressed domain (enterprises and its related aspects) and the resulting personal interpretation of syntactical constructs. However, EMLs may also explicitly define invariant interpretations...
Metamodelling and model transformation play important roles in model-driven engineering as they can be used to define domain-specific modelling languages. During the modelling phase, modellers encode domain knowledge into models which may include both structural and behavioral aspects of a system. The contribution of this paper is a new web-based metamodelling and model transformation tool called...
As a contribution to the adoption of the Model-Driven Engineering (MDE) paradigm, the research community has proposed concrete model transformation solutions for the MDE infrastructure and for domain-specific problems. However, as the adoption increases and with the advent of the new initiatives for the creation of repositories, it is legitimate to question whether proposals for concrete transformation...
With the explosive growth of information on the Internet, it becomes more and more important to improve the efficiency of information acquisition. Automatic text summarization provides a good means for quick acquisition of information through compression and refinement. While existing methods for automatic text summarization achieve elegant performance on short sequences, however, they are facing...
In this paper, we present a new SaaS (software as a service) design for employee job performance appraisals, SaaS-JPA. We use IoT and computer systems to collect data related to the daily works of employees. A semantic model is developed to guide the data collection process, facilitate data interpretation and interoperation, and enable big data analysis to make job performance appraisal decisions...
The purpose of this study is to analyze the research trends of traffic research through analyzing the semantic network of existing traffic related research papers and to compare research trends in Korea. The subjects of the analysis are about 21,000 research papers collected from the database of 'Web of Science' which is an academic information database. Using the open source software, Khcoder, semantic...
The analysis of malicious software (malware) is one of the hardest open problems in computer security, since there is a huge and varied number of samples produced daily. In addition,modern malicious programs have automatic mutation capabilities. Through behavior analysis of existing malware, we are able to understand new variants and develop new protection methods. Ontologies can be used to model...
In multi-agents recommender systems, agents interact with each other to provide an efficient recommendation to the end user. Trust is, therefore, important to make these interactions useful. In an open, heterogeneous and dynamic multi-agent environment, it is difficult for agents to assess and establish trusting relationships for cooperation. Thus, modeling and evaluating trust relationships between...
The movie recommendation system provides an important way for users to choose a movie. In order to avoid manmode operations in the movie recommendation, the emotional analysis in the recommended system provides a new way of thinking. The traditional methods were based on knowledge, statistics and the hybrid approach. However these methods could obtain effect only base on the dataset with small amount...
We investigate multi-agent epistemic modal logic with common knowledge modalities for groups of agents and obtain van Benthem style model-theoretic characterisations, in terms of bisimulation invariance of classical first-order logic over the non-elementary classes of (finite or arbitrary) common knowledge Kripke frames. The fixpoint character of common knowledge modalities and the rôle that reachability...
To improve the accuracy of analysis results is one of the hard challenges for static analysis. Especially, static analyzers generally analyze all paths of a program, including infeasible paths, which undoubtedly decreases the analysis accuracy. To mitigate the issue, we design and implement a static analyzer, called ABAZER-SE, which is based on the meta-compilation and the GCC abstract syntax tree...
This paper discusses the challenge messy data presents to System-of-Systems (SoS) performance, and introduces a technique for evaluating its effects. The technique, called Data Dependency Network Analysis (DDNA), based on previous work on Functional Dependency Network Analysis (FDNA), introduces a quantitative model for evaluating the effects of messy data in SoS and coming up with mitigation strategies...
A new visual simulation method of interactive process of forest management was proposed. First of all, we developed a manager-oriented visual workflow designer and designed ten graphic self-defined activities. Secondly, using lexical, syntax and semantic analysis of compiler principles, a self-defined mathematical model parser was constructed and a self-defined visualization model of stand growth...
In many cases, the information spread in an online network may not always be truthful or correct; such information corresponds to rumors. In recent years, signed networks have become increasingly popular because of their ability to represent diverse relationships such as friends, enemies, trust, and distrust. Signed networks are ideal for information flow in a network with varying beliefs (trust or...
Despite the representation of a business process (BP) with Business Process Model and Notation (BPMN) can provide support for business designers, BPMN models lack of a formal semantics to conduct qualitative analysis. In this work, we describe the use of timed automata (TA) formal language to check BPs modelled with BPMN using the model checking verification technique. Two algorithms are introduced...
Safety is one of the main guidelines for critical systems design. Designers are in charge of developing architectures that comply with the safety requirements. Thus they must ensure that qualitative safety indicators such as the minimal size of failures scenario leading to a failure condition fc and quantitative indicators such as the probability to reach fc after a certain time interval, are kept...
An automated means to identify behavior patterns would enable system developers to gain the benefit of past results in current and future system design. Analysis of decision patterns captures the interactions of human operators, systems, and their interface with the environment. Monterey Phoenix (MP) uses a formal language thereby exploiting the precision of lightweight formal methods as a means to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.