128 research outputs found

    An eclectic quadrant of rule based system verification: work grounded in verification of fuzzy rule bases.

    Get PDF
    In this paper, we used a research approach based on grounded theory in order to classify methods proposed in literature that try to extend the verification of classical rule bases to the case of fuzzy knowledge modeling. Within this area of verification we identify two dual lines of thought respectively leading to what is termed respectively static and dynamic anomaly detection methods. The major outcome of the confrontation of both approaches is that their results, most often stated in terms of necessary and/or sufficient conditions are difficult to reconcile. This paper addresses precisely this issue by the construction of a theoretical framework, which enables to effectively evaluate the results of both static and dynamic verification theories. Things essentially go wrong when in the quest for a good affinity, matching or similarity measure, one neglects to take into account the effect of the implication operator, an issue that rises above and beyond the fuzzy setting that initiated the research. The findings can easily be generalized to verification issues in any knowledge coding setting.Systems;

    Modeling the Dialogue Aspects of an Information System

    Get PDF
    In this paper we investigate techniques offered by current object-oriented development methods for the specification of the user-system dialogue aspect of a software system. Current development methods do not give very extensive guidelines on how to model this aspect and the available techniques need some refinement and elaboration to fit this particular task in the software specification process. The paper first compares a number of approaches. The common elements of these approaches are summarized and further developed into one comprehensive set of techniques that addresses the needs of functional requirements analysis

    A theoretical exploration of the relationship between outsourcing and business/ict alignment

    Get PDF
    In this paper we examine the likely impact of two different outsourcing scenarios on business/ICT alignment. We argue that there is a need to put ICT outsourcing in a broader business context and that it has an important impact on how organisations align business and ICT. Based on previous literature we combine several conceptual models on both outsourcing and B/ICT alignment and identify the possible problem areas in each of these scenarios. The goal of this “theoretical exercise”, which is mainly based on argument, is to end the paper with a theoretical proposition which needs to be tested and backed by empirical data. Therefore, this paper should be regarded as the first step in a research process

    A case study on variability management in software product lines: identifying why real-life projects fail

    Get PDF
    Economies of scale can be seen as some kind of “holy grail” in state of the art literature on the development of sets of related software systems. Software product line methods are often mentioned in this context, due to the variability management aspects they propose, in order to deal with sets of related software systems. They realize the sought-after reusability. Both variability management and software product lines already have a strong presence in theoretical research, but in real-life software product line projects trying to obtain economies of scale still tend to fall short of target. The objective of this paper is to study this gap between theory and reality through a case study in order to see why such gap exists, and to find a way to bridge this gap. Through analysis of the causes of failure identified by the stakeholders in the case study, the underlying problem, which is found to be located in the requirements engineering phase, is crystallized. The identification of a framework describing the problems will provide practitioners with a better focus for future endeavors in the field of software product lines, so that economies of scale can be achieved

    Rewiring strategies for changing environments

    Get PDF
    A typical pervasive application executes in a changing environment: people, computing resources, software services and network connections come and go continuously. A robust pervasive application needs adapt to this changing context as long as there is an appropriate rewiring strategy that guarantees correct behavior. We combine the MERODE modeling methodology with the ReWiRe framework for creating interactive pervasive applications that can cope with changing environments. The core of our approach is a consistent environment model, which is essential to create (re)configurable context-aware pervasive applications. We aggregate different ontologies that provide the required semantics to describe almost any target environment. We present a case study that shows a interactive pervasive application for media access that incorporates parental control on media content and can migrate between devices. The application builds upon models of the run-time environment represented as system states for dedicated rewiring strategies

    A case study of applying boosting naive bayes to claim fraud diagnosis

    Full text link

    A Structured Object-Oriented View on Systems Modeling

    No full text
    • …
    corecore