首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The artifacts constituting a software system often drift apart over time. We have developed the software reflexion model technique to help engineers perform various software engineering tasks by exploiting, rather than removing, the drift between design and implementation. More specifically, the technique helps an engineer compare artifacts by summarizing where one artifact (such as a design) is consistent with and inconsistent with another artifact (such as source). The technique can be applied to help a software engineer evolve a structural mental model of a system to the point that it is “good enough” to be used for reasoning about a task at hand. The software reflexion model technique has been applied to support a variety of tasks, including design conformance, change assessment, and an experimental reengineering of the million-lines-of-code Microsoft Excel product. We provide a formal characterization of the reflexion model technique, discuss practical aspects of the approach, relate experiences of applying the approach and tools, and place the technique into the context of related work  相似文献   

2.
This paper discusses links that may be made between process models and Unified Modelling Language (UML) software specification techniques, working from an argument that the whole complexity of organisational activity cannot be captured by UML alone. The approach taken is to develop a set of use cases, which would be capable of providing information support to a pre-defined organisational process. The nature of the thinking, which is necessary to derive the use cases, is outlined using the pre-defined process as a case study. The grouping of transactions and state changes into Use Cases is shown to require design choices, which may vary between particular organisational contexts. Conclusions are drawn about the direction of further investigation of links between process modelling and UML.  相似文献   

3.
It is known that many people are being excluded unnecessarily from using products, services and environments that are essential for supporting independence and quality of life. Such exclusion often arises from designers taking inadequate account of the end users functional capabilities when making design decisions. This paper addresses how traditional usability techniques can be extended to include accessibility issues by considering the spread of user functional capabilities across the population. A series of measures for evaluating the level of design exclusion based on those capabilities is also presented.  相似文献   

4.
It is common for large organizations to maintain repositories of business process models in order to document and to continuously improve their operations. Given such a repository, this paper deals with the problem of retrieving those models in the repository that most closely resemble a given process model or fragment thereof. Up to now, there is a notable research gap on comparing different approaches to this problem and on evaluating them in the same setting. Therefore, this paper presents three similarity metrics that can be used to answer queries on process repositories: (i) node matching similarity that compares the labels and attributes attached to process model elements; (ii) structural similarity that compares element labels as well as the topology of process models; and (iii) behavioral similarity that compares element labels as well as causal relations captured in the process model. These metrics are experimentally evaluated in terms of precision and recall. The results show that all three metrics yield comparable results, with structural similarity slightly outperforming the other two metrics. Also, all three metrics outperform text-based search engines when it comes to searching through a repository for similar business process models.  相似文献   

5.
Enterprise models cover all aspects of modern enterprises, from accounting, through management of custom orders and invoicing, to operational data such as records on machines and workers. In other words, all data necessary for running the company are available in enterprise models. However, these data are not in the proper format for some tasks such as scheduling and optimization. Namely, the concepts and terminology used in enterprise models are different from what is traditionally used in scheduling and optimization software. This paper deals with the automated translation of data from the enterprise model to a scheduling model and back. In particular, we describe how to extract data from the enterprise model for solving the scheduling problem using constraint-based solvers.  相似文献   

6.
This paper describes TORUS, a natural language understanding system that serves as a front end to a data base management system in order to facilitate communication with casual users. The system employs a semantic network to store knowledge about a data base of student files. This knowledge is used to find the meaning of each input statement, to decide what action to take with respect to the data base, and to select information that must be output in response to the input statement. A prototype version of TORUS has been implemented.  相似文献   

7.
8.
Product development involves many experts collaborating to the same design goal. Every expert has his own formalisms and tools leading to a high heterogeneity of information systems supporting design activities. Interoperability became a major challenge to avoid information incompatibility along the product life cycle. To synchronise heterogeneous representations of product will be a major step to integrate expert activities. In this paper, the authors propose a meta-model framework to connect together heterogeneous design models. This meta-model framework is used to formalise possible interactions between heterogeneous representations. Interaction formalisation is considered as a key point to synchronise heterogeneous models and to provide more interoperability between various computer assisted systems. The synchronisation loop is also presented as a major sequence of activities to manage collaborative design. Tools to support synchronisation are proposed. However, through a basic case study, authors highlight what can be automated and where human intervention is still expected.  相似文献   

9.
Secure software engineering is concerned with developing software systems that will continue delivering its intended functionality despite a multitude of harmful software technologies that can attack these systems from anywhere and at anytime. Misuse cases and mal-activity diagrams are two techniques to model functional security requirements address security concerns early in the development life cycle. This allows system designers to equip their systems with security mechanisms built within system design rather than relying on external defensive mechanisms. In a model-driven engineering process, misuse cases are expected to drive the construction of mal-activity diagrams. However, a systematic approach to transform misuse cases into mal-activity diagrams is missing. Therefore, this process remains dependent on human skill and judgment, which raises the risk of developing mal-activity diagrams that are inconsistent with the security requirements described in misuse cases, leading to the development of an insecure system. This paper presents an authoring structure for misuse cases and a transformation technique to systematically perform this desired model transformation. A study was conducted to evaluate the proposed technique using 46 attack stories outlined in a book by a former well-known hacker (Mitnick and Simon in The art of deception: controlling the human element of security, Wiley, Indianapolis, 2002). The results indicate that applying the proposed technique produces correct mal-activity diagrams from misuse cases.  相似文献   

10.
《Information & Management》2005,42(7):921-933
The full potential of the expected role of Information Technology (IT) in facilitating organizational adaptation has not yet been realized because most of the existing systems do not lend themselves to the levels of flexibility required to support changes in business processes. This problem is accentuated with increase of inter-organizational linkages involving disparate IT systems. Web services have emerged as a disruptive technology, with a real potential of enabling flexible business processes. This paper examines the influence of Web services on business process flexibility and analyses its impact on organizational adaptation.  相似文献   

11.
Extraction-Transformation-loading (ETL) tools are pieces of software responsible for the extraction of data from several sources, their cleansing, customization and insertion into a data warehouse. Literature and personal experience have guided us to conclude that the problems concerning the ETL tools are primarily problems of complexity, usability and price. To deal with these problems we provide a uniform metamodel for ETL processes, covering the aspects of data warehouse architecture, activity modeling, contingency treatment and quality management. The ETL tool we have developed, namely , is capable of modeling and executing practical ETL scenarios by providing explicit primitives for the capturing of common tasks. provides three ways to describe an ETL scenario: a graphical point-and-click front end and two declarative languages: XADL (an XML variant), which is more verbose and easy to read and SADL (an SQL-like language) which has a quite compact syntax and is, thus, easier for authoring.  相似文献   

12.
13.
Touchscreen mobile devices are highly customizable, allowing designers to create inclusive user interfaces that are accessible to a broader audience. However, the knowledge to provide this new generation of user interfaces is yet to be uncovered. The goal was to thoroughly study mobile touchscreen interfaces and provide guidelines for informed design. The paper presents an evaluation performed with 15 tetraplegic and 18 able-bodied users that allowed to identify their main similarities and differences within a set of interaction techniques (Tapping, Crossing, and Directional Gesturing) and parameterizations. Results show that Tapping and Crossing are the most similar and easy to use techniques for both motor-impaired and able-bodied users. Regarding Tapping, error rates start to converge at 12 mm, showing to be a good compromise for target size. As for Crossing, it offered a similar level of accuracy; however, larger targets (17 mm) are significantly easier to cross for motor-impaired users. Directional Gesturing was the least inclusive technique. Regarding position, edges showed to be troublesome. For instance, they have shown to increase Tapping precision for disabled users, while decreasing able-bodied users’ accuracy when targets are too small (7 mm). It is argued that despite the expected error rate disparity, there are clear resemblances between user groups, thus enabling the development of inclusive touch interfaces. Tapping, a traditional interaction technique, was among the most effective for both target populations, along with Crossing. The main difference concerns Directional Gesturing that in spite of its unconstrained nature shows to be inaccurate for motor-impaired users.  相似文献   

14.
The content–user gap is the difference between the limited range of content-relevant preferences that may be expressed using the MPEG-7 user interaction tools and the much wider range of metadata that may be represented using the MPEG-7 content tools. One approach for closing this gap is to make the user and content metadata isomorphic by using the existing MPEG-7 content tools to represent user (as well as content) metadata (Agius and Angelides 2006, 2007). Subsequently, user preferences may be specified for all content, without omission. Since there is a wealth of user preference and history metadata within the MPEG-7 user interaction tools that can usefully complement these specific content preferences, in this paper we develop a method by which all user and content metadata may be bridged.
Marios C. AngelidesEmail:
  相似文献   

15.
Abstract.  We develop a process model of post-merger knowledge sharing based on distributed cognition, a systems perspective and path dependence. The framework conceptualizes knowledge sharing by layers of management choice and employee appropriation of knowledge resources seen as knowledge as content and knowledge as connection. We use the framework to study a merger of two polymer companies. The study reveals that mergers represent a discontinuity in knowledge sharing. Yet, chosen strategies often mirror the learned knowledge-sharing practices of one of the merged companies and match poorly with the post-merger knowledge-sharing needs. Five factors emerged contribute to this knowledge gap: (a) the nature of the merger; (b) a lack of shared context; (c) the incompatibility of existing knowledge systems; (d) the tacit dimension of knowledge; and (e) time pressures of the merger. Our study shows that, employees enacted knowledge new sharing practices that differed significantly from the official strategy to close to the post-merger knowledge gap.  相似文献   

16.
17.
This paper proposes a framework for business process design, which is based on process comparison and integration. This framework supports process stakeholders to model business processes collaboratively, which can greatly enhance the efficiency and effectiveness of business process design. By applying this framework, each process stakeholder can create his or her own model of the business process. The different models of the same business process can be automatically compared to find the conflicts between them. Based on the conflicts, process stakeholders can collaborate to improve the models. Then the models can be integrated to form a more complete model.  相似文献   

18.
International Journal on Software Tools for Technology Transfer - Although widely used in embedded systems design, Matlab/Simulink is not considered a state-of-the-art design environment by the...  相似文献   

19.
Beyond soundness: on the verification of semantic business process models   总被引:1,自引:0,他引:1  
The verification of control-flow soundness is well understood as an important step before deploying business process models. However, the control flow does not capture what the process activities actually do when they are executed. Semantic annotations offer the opportunity to take this into account. Inspired by semantic Web service approaches such as OWL-S and WSMO, we consider process models in which the individual activities are annotated with logical preconditions and effects, specified relative to an ontology that axiomatizes the underlying business domain. Verification then addresses the overall process behavior, arising from the interaction between control-flow and behavior of individual activities. To this end, we combine notions from the workflow community with notions from the AI actions and change literature. We introduce a formal execution semantics for annotated business processes. We point out four verification tasks that arise, concerning precondition/effect conflicts, reachability, and executability. We examine the borderline between classes of processes that can, or cannot, be verified in polynomial time. For precondition/effect conflicts, we show that the borderline is the same as that of the logic underlying the ontology axioms. For reachability and executability, we identify a class of processes that can be verified in polynomial time by a fixpoint algorithm which we design for that purpose. We show that this class of processes is maximal in the sense that, when generalizing it in any of the most relevant directions, the validation tasks become computationally hard.  相似文献   

20.
Companies operating in multiple markets or segments often need to manage multiple variants of the same business process. Such multiplicity may stem for example from distinct products, different types of customers or regulatory differences across countries in which the companies operate. During the management of these processes, analysts need to compare models of multiple process variants in order to identify opportunities for standardization or to understand performance differences across variants. To support this comparison, this paper proposes a technique for diagnosing behavioral differences between process models. Given two process models, it determines if they are behaviorally equivalent, and if not, it describes their differences in terms of behavioral relations – like causal dependencies or conflicts – that hold in one model but not in the other. The technique is based on a translation from process models to event structures, a formalism that describes the behavior as a collection of events (task instances) connected by binary behavioral relations. A naïve version of this translation suffers from two limitations. First, it produces redundant difference statements because an event structure describing a process may contain unnecessary event duplications. Second, this translation is not directly applicable to process models with cycles as the corresponding event structure is infinite. To tackle the first issue, the paper proposes a technique for reducing the number of events in an event structure while preserving the behavior. For the second issue, relying on the theory of complete unfolding prefixes, the paper shows how to construct a finite prefix of the unfolding of a possibly cyclic process model where all possible causes of every activity is represented. Additionally, activities that can occur multiple times in an execution of the process are distinguished from those that can occur at most once. The finite prefix thus enables the diagnosis of behavioral differences in terms of activity repetition and causal relations that hold in one model but not in the other. The method is implemented as a prototype that takes as input process models in the Business Process Model and Notation (BPMN) and produces difference statements in natural language. Differences can also be graphically overlaid on the process models.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号