The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing remains an increasingly popular topic among practitioners as well as researchers. The literature spans across multiple disciplines, and the knowledge is fragmented and not systematized. To address this issue we apply topic models to conduct a meta-review on cloud computing. We identify twenty research topics across multiple disciplines, and demonstrate the use of the approach to conduct...
In the present mobile climate, both companies as well as their consumers are able to execute various processes at any time in any location using a myriad of wireless technologies. Organizational trends demonstrate that mobile devices are being utilized exponentially more to solve problems from the strategic planning level to the operational level through various departments. This propensity was recently...
In this paper we discuss how knowledge management can contribute to the analysis of big data by joining enterprise modeling methods with data analyses. The goal of this approach is to enable the seamless interaction and exchange of information between knowledge-oriented representations as provided by enterprise modeling on the one hand and methods for analyzing data on the other hand. For the realization...
Despite their wide adoption, industrial business process models often display a wide range of quality issues. While significant efforts have been undertaken to better understand factors impacting process model comprehension, only few studies focused on their creation. This paper presents a set of fixation patterns that have been derived from a modeling session with 120 participants during which the...
Accurately modeling the interarrival times (IAT) is important when constructing a business process simulation model given its influence on process performance metrics such as the average flow time. To this end, the use of real data from information systems is highly relevant as it becomes more readily available. This paper considers event logs, a particular type of file containing process execution...
Software that applied in the industrial safety-critical systems are usually developed from reused components. The redundant parts of the safety-critical software introduced by such approach shall therefore be considered from the perspective of avoidance and protection from systematic failure. The large scale and high complexity of modern safety-critical software increase the difficulty on conducting...
Educational simulation is concerned with the use of all suitable forms of simulation, including simulation games, in education. Focusing on management science and economics, we analyze a choice of simulation models for identifying opportunities how to turn them into educational simulations. As a result of our analysis, we propose a framework for classifying and building different types of educational...
Temporal violations often take place during the running of large batch of parallel business cloud workflow, which have a serious impact on the on-time completion of massive concurrent user requests. Existing studies have shown that local temporal violations (namely the delays of workflow activities) occurring during cloud workflow execution are the fundamental causes for failed on-time completion...
Some applications introduced in each 5G mobile communication project (5G-P) assume special use cases such as when many people simultaneously use their mobile phone in a restricted area like a stadium or when using traffic safety systems are in common. And, some of them such as mobile healthcare and the Internet of things (IOT) have already been presented by many people. However, the reasons those...
To identify crosscutting concerns in the requirement phase, this paper proposes a method for discovering crosscutting concerns based on goal model and two-state algorithm. We analyze each phenomena of goal model and summarize the identification rules. Crosscutting concerns are identified by calculating the scatter and centralization values of goals. The method includes four steps: building the goal...
In order to make the service composition with lower consumption resource and reduce execution time of service composition process, this paper proposes a method to optimize service composition model based on analysis of service composition execution log information and optimization of its Petri net model, which includes three steps: firstly, the log information and extracting related data are collected;...
Software productivity is influenced by how efficiently programmers execute tasks assigned to them. For executing a task, programmers execute several steps. How the execution of these steps is organized by a programmer is referred to as task process. While overall software process has been well studied, the impact of task processes has not been studied much. In this work, we study the impact of task...
Clinical safety checklists receive much research attention since they can reduce medical errors and improve patient safety. Computerized checklist support systems are also being developed actively. Such systems should individualize checklists based on information from the patient's medical record while also considering the context of the clinical workflows. Unfortunately, the form definitions, database...
Supporting adaptation of metamodels is essential for realising Model-Driven Engineering. However, adapting and changing metamodels impact other artefacts of the metamodelling ecosystem. In particular, conformant models will no longer be valid instances of their changed metamodel. This gives rise to co-evolution issues where metamodels and models are no longer synchronised. This is critical as systems...
We consider the relationship of Internet service providers (ISP) like network operators and content service providers in the Internet ecosystem. Currently the position of ISPs is challenged by the emergence of powerful content service providers, especially with the spreading of bandwidth demanding video services. One issue here is that the further investment in the network capacity may be hindered...
Informatization involves the intensive use of information in all areas of society and has a significant social and economic impact. In this article, we construct a set of systematic, objective, and effective informatization performance evaluation models, and utilize quantization methods to evaluate China and the world's informatization development. We have shown the applicability of the informatization...
Industries and industry-wide standards of credit is littery at present, there is not uniform standard of credit system and the social evaluation, application and supervision system. And large credit is lossing in the process of credit evaluation and it cannot have better credit rating, including personal and business groups. Application of dimension analysis in this paper from the other side, namely...
Business process “BP” modeling and simulation is performed on different levels. For each level, a set of formalisms or languages are more suitable. BPMN “Business Process Modeling Notation” is a less formal language used at the conceptual phase of BPs modeling. However, models in BPMN cannot be executed directly. They need to be transformed to another language. In this paper, we present a BPMN models...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.