15,939 research outputs found
Identification and resolution of anomalies in process models using patterns
Modeliranje procesa i metodološka istraživanja modeliranja funkcionalnosti (funkcija, procesa, aktivnosti, operacija, itd.) provode se od početaka razvoja i primjene računala. Pritom su predmet interesa metode i tehnike modeliranja, ali i anomalije modela te njihovo otkrivanje i otklanjanje. Suvremene servisno orijentirane arhitekture, razvoj vođen transformacijom modela i općenito težnja prema automatiziranom razvoju, daju novu važnost istraživanjima anomalija modela procesa i drugih modela funkcionalnosti. Rad se bavi istraživanjem anomalija u modelima procesa, njihovim osobinama, zajedničkim obilježjima, podjelom, metodama i metodikama prepoznavanja, te rješavanja uz primjenu uzoraka. Temeljni pristup otkrivanja i rješavanja anomalija u radu je formiranje taksonomije anomalija, te opis njihovih svojstava i uzoraka. Namjera je da se za svaku klasu anomalija odrede metode otkrivanja i rješavanja, s ciljem automatizacije prepoznavanja i rješavanja anomalija.Anomalies in business process models represent situations in which there is a deviation from the rules of modeling and presentation models. Anomalies are departures from the expected or normal structure, behavior, functionality, performance and etc. Since anomalies have certain common properties and characteristics by which they can be grouped and classified, we can say that the anomalies are actually patterns that cause deviations from normal behavior model and need to be cleared. A model in which exists an anomaly is defective and requires additional intervention which corrects this model. Anomalies in the models of business processes can occur during: modeling, modify models and conversion models. Problems with anomalies especially come to the fore in the case of conversion models from one notation to another. In this case, different uses of specific notation usually dictate and emphasis details on individual elements of the model. For this reason, may cause loss of information during this transformation. This paper deals with anomalies in the models of business processes, their properties, characteristics and features, by developing their taxonomy, the ways of their recognition and ways of their solution. This paper presents an overview of anomalies, which are classified according to certain characteristics. For each anomaly is given a description and example. He also suggested a way to identify and solve, in the form of OCL rules or in pseudo-code. Finally worked out a proposal automation to identify and solve anomalies based on pattern recognition, and our model is tested on several examples
Recommended from our members
Advancing the state of the art in the modelling and simulation of information systems evaluation
It is widely accepted that Information Systems Evaluation (ISE) is a powerful and useful technique
that can be used to assess IT/IS investments in an a-priori or a-posteriori sense. Traditional
approaches to ISE have tended to centre upon financial and management accounting frameworks,
seeking to reconcile tangible and intangible costs, benefits, risks and value factors. Such techniques,
however, do not provide the IS researcher or practitioner with further insight or appreciation of any
inherent and implicit inter-relationships, in the investment justification process. Thus, this paper
outlines and discusses via a taxonomy and resulting classification, alternative and complementary
approaches that can be applied to ISE from the fields of Artificial Intelligence (AI), Operational
Research (OR) and Management Science (MS). The paper subsequently concludes that such
approaches can be potentially used by researchers and practitioners in the field, as a basis for
carrying out further research in the field of applied ISE
Comprehensive Security Framework for Global Threats Analysis
Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to normalize the IS information and counter these new threads. This paper presents a framework which details the principal and necessary steps for monitoring an IS. We present the architecture of the framework, i.e. an ontology of activities carried out within an IS to model security information and User Behavioral analysis. The results of the performed experiments on real data show that the modeling is effective to reduce the amount of events by 91%. The User Behavioral Analysis on uniform modeled data is also effective, detecting more than 80% of legitimate actions of attack scenarios
Construction of a taxonomy for requirements engineering commercial-off-the-shelf components
This article presents a procedure for constructing a taxonomy of COTS products in the field of Requirements Engineering (RE). The taxonomy and the obtained information reach transcendental benefits to the selection of systems and tools that aid to RE-related actors to simplify and facilitate their work. This taxonomy is performed by means of a goal-oriented methodology inspired in GBRAM (Goal-Based Requirements Analysis Method), called GBTCM (Goal-Based Taxonomy Construction Method), that provides a guide to analyze sources of information and modeling requirements and domains, as well as gathering and organizing the knowledge in any segment of the COTS market. GBTCM claims to promote the use of standards and the reuse of requirements in order to support different processes of selection and integration of components.Peer ReviewedPostprint (published version
- …