Software and Systems Modeling最新文献

筛选
英文 中文
User journey games: automating user-centric analysis 用户旅程游戏:自动进行以用户为中心的分析
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2024-03-14 DOI: 10.1007/s10270-024-01148-2
Paul Kobialka, S. Lizeth Tapia Tarifa, Gunnar R. Bergersen, Einar Broch Johnsen
{"title":"User journey games: automating user-centric analysis","authors":"Paul Kobialka, S. Lizeth Tapia Tarifa, Gunnar R. Bergersen, Einar Broch Johnsen","doi":"10.1007/s10270-024-01148-2","DOIUrl":"https://doi.org/10.1007/s10270-024-01148-2","url":null,"abstract":"<p>The servitization of business is moving industry to business models driven by customer demand. Customer satisfaction is connected with financial rewards, forcing companies to invest in their users’ experience. User journeys describe how users maneuver through a service. Today, user journeys are typically modeled graphically, and lack formalization and analysis support. This paper proposes a formalization of user journeys as weighted games between the user and the service provider and a systematic data-driven method to derive these user journey games from system logs, using process mining techniques. As the derived games may contain cycles, we define an algorithm to transform user journeys games with cycles into acyclic weighted games, which can be model checked using to uncover potential challenges in a company’s interactions with its users and derive company strategies to guide users through their journeys. Finally, we propose a user journey sliding-window analysis to detect changes in the user journey over time by model checking a sequence of generated games. Our analysis pipeline has been evaluated on an industrial case study; it revealed design challenges within the studied service and could be used to derive actionable recommendations for improvement.\u0000</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"74 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lightweight approach to nontermination inference using Constrained Horn Clauses 利用约束角分句进行非终止推理的轻量级方法
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2024-03-14 DOI: 10.1007/s10270-024-01161-5
Bishoksan Kafle, Graeme Gange, Peter Schachte, Harald Søndergaard, Peter J. Stuckey
{"title":"A lightweight approach to nontermination inference using Constrained Horn Clauses","authors":"Bishoksan Kafle, Graeme Gange, Peter Schachte, Harald Søndergaard, Peter J. Stuckey","doi":"10.1007/s10270-024-01161-5","DOIUrl":"https://doi.org/10.1007/s10270-024-01161-5","url":null,"abstract":"<p>Nontermination is an unwanted program property for some software systems, and a safety property for other systems. In either case, automated discovery of preconditions for nontermination is of interest. We introduce <span>NtHorn</span>, a fast lightweight nontermination analyser, which is able to deduce non-trivial sufficient conditions for nontermination. Using Constrained Horn Clauses (CHCs) as a vehicle, we show how established techniques for CHC program transformation and abstract interpretation can be exploited for the purpose of nontermination analysis. <span>NtHorn</span> is comparable in effectiveness to the state-of-the-art nontermination analysis tools, as measured on standard competition benchmark suites (consisting of integer manipulating programs), while typically solving problems faster by one order of magnitude.\u0000</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"13 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling competences in enterprise architecture: from knowledge, skills, and attitudes to organizational capabilities 企业架构能力建模:从知识、技能和态度到组织能力
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2024-03-05 DOI: 10.1007/s10270-024-01151-7
{"title":"Modeling competences in enterprise architecture: from knowledge, skills, and attitudes to organizational capabilities","authors":"","doi":"10.1007/s10270-024-01151-7","DOIUrl":"https://doi.org/10.1007/s10270-024-01151-7","url":null,"abstract":"<h3>Abstract</h3> <p>Competence-based approaches have received increased attention, as the demand for qualified people with the right combination of competences establishes itself as a major factor of organizational performance. This paper examines how competences can be incorporated into Enterprise Architecture modeling: (i) we identify a key set of competence-related concepts such as knowledge, skills, and attitudes, (ii) analyze and relate them using a reference ontology (grounded on the Unified Foundational Ontology), and (iii) propose a representation strategy for modeling competences and their constituent elements leveraging the ArchiMate language, discussing how the proposed models can fit in enterprise competence-based practices. Our approach is intended to cover two tasks relevant to the combined application of Enterprise Architecture and Competence Modeling: ‘zooming in’ on competences, revealing the relations between competences, knowledge, skills, attitudes and other personal characteristics that matter in organizational performance, and ‘zooming out’ of competences, placing them in the wider context of other personal competences and overall organizational capabilities. An assessment of the representation is offered in the form of an empirical survey.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"10 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140035352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Circular systems engineering 循环系统工程
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2024-02-29 DOI: 10.1007/s10270-024-01154-4
{"title":"Circular systems engineering","authors":"","doi":"10.1007/s10270-024-01154-4","DOIUrl":"https://doi.org/10.1007/s10270-024-01154-4","url":null,"abstract":"<h3>Abstract</h3> <p>The perception of the value and propriety of modern engineered systems is changing. In addition to their functional and extra-functional properties, nowadays’ systems are also evaluated by their sustainability properties. The next generation of systems will be characterized by an overall elevated sustainability—including their post-life, driven by efficient value retention mechanisms. Current systems engineering practices fall short of supporting these ambitions and need to be revised appropriately. In this paper, we introduce the concept of circular systems engineering, a novel paradigm for systems sustainability, and define two principles to successfully implement it: end-to-end sustainability and bipartite sustainability. We outline typical organizational evolution patterns that lead to the implementation and adoption of circularity principles, and outline key challenges and research opportunities.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"84 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140006337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FloBP: a model-driven approach for developing and executing IoT-enhanced business processes FloBP:开发和执行物联网增强型业务流程的模型驱动方法
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2024-02-28 DOI: 10.1007/s10270-024-01150-8
Arianna Fedeli, Fabrizio Fornari, Andrea Polini, Barbara Re, Victoria Torres, Pedro Valderas
{"title":"FloBP: a model-driven approach for developing and executing IoT-enhanced business processes","authors":"Arianna Fedeli, Fabrizio Fornari, Andrea Polini, Barbara Re, Victoria Torres, Pedro Valderas","doi":"10.1007/s10270-024-01150-8","DOIUrl":"https://doi.org/10.1007/s10270-024-01150-8","url":null,"abstract":"<p>The capability to integrate Internet of Things (IoT) technologies into business processes (BPs) has emerged as a transformative paradigm, offering unprecedented opportunities for organisations to enhance their operational efficiency and productivity. Interacting with the physical world and leveraging real-world data to make more informed business decisions is of greatest interest, and the idea of IoT-enhanced BPs promises to automate and improve business activities and permit them to adapt to the physical environment of execution. Nonetheless, combining these two domains is challenging, and it requires new modelling methods that do not increase notation complexity and provide independent execution between the process and the underlying device technology. In this work, we propose <i>FloBP</i>, a model-driven engineering approach separating concerns between the IoT and BPs, providing a structured and systematic approach to modelling and executing IoT-enhanced BPs. Applying the separation of concerns through an interdisciplinary team is needed to ensure that the approach covers all necessary process aspects, including technological and modelling ones. The <i>FloBP</i> approach is based on modelling tools and a microservices architecture to deploy BPMN models, and it facilitates integration with the physical world, providing flexibility to support multiple IoT device technologies and their evolution. A smart canteen scenario describes and evaluates the approach’s feasibility and its possible adoption by various stakeholders. The performed evaluation concludes that the application of <i>FloBP</i> facilitates the modelling and development of IoT-enhanced BPs by sharing and reusing knowledge among IoT and BP experts.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"23 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140006637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A technique for discovering BPMN collaboration diagrams 发现 BPMN 协作图的技术
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2024-02-28 DOI: 10.1007/s10270-024-01153-5
{"title":"A technique for discovering BPMN collaboration diagrams","authors":"","doi":"10.1007/s10270-024-01153-5","DOIUrl":"https://doi.org/10.1007/s10270-024-01153-5","url":null,"abstract":"<h3>Abstract</h3> <p>The process mining domain is actively supported by techniques and tools addressing the discovery of single-participant business processes. In contrast, approaches for discovering collaboration models out of distributed data stored by multiple interacting participants are lacking. In this context, we propose a novel technique for discovering collaboration models from sets of event logs that include data about participants’ interactions. The technique discovers each participant’s process through already available algorithms introduced by the process mining community. Then, it analyzes the logs to extract information on the exchange of messages to automatically combine the discovered processes into a collaboration model representing the distributed system’s behavior and providing analytics on the interactions. The technique has been implemented in a tool evaluated via several experiments on different application domains.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"68 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140006542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Report on the state of the SoSyM journal (2023 summary) SoSyM 期刊状况报告(2023 年摘要)
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2024-02-19 DOI: 10.1007/s10270-024-01152-6
Stéphanie Challita, Benoit Combemale, Huseyin Ergin, Jeff Gray, Bernhard Rumpe, Martin Schindler
{"title":"Report on the state of the SoSyM journal (2023 summary)","authors":"Stéphanie Challita, Benoit Combemale, Huseyin Ergin, Jeff Gray, Bernhard Rumpe, Martin Schindler","doi":"10.1007/s10270-024-01152-6","DOIUrl":"https://doi.org/10.1007/s10270-024-01152-6","url":null,"abstract":"","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"29 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140885140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontology-based security modeling in ArchiMate ArchiMate 中基于本体的安全建模
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2024-02-16 DOI: 10.1007/s10270-024-01149-1
Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli, Giancarlo Guizzardi
{"title":"Ontology-based security modeling in ArchiMate","authors":"Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli, Giancarlo Guizzardi","doi":"10.1007/s10270-024-01149-1","DOIUrl":"https://doi.org/10.1007/s10270-024-01149-1","url":null,"abstract":"<p>Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the <i>Risk and Security Overlay</i> (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign have been executed for the risk elements of the RSO grounded in the <i>Common Ontology of Value and Risk</i>. The next step along this line of research is to address the following research problems: What would be the outcome of an ontological analysis of security-related elements of the RSO? That is, can we identify other semantic deficiencies in the RSO through an ontological analysis? Once such an analysis is provided, can we redesign the security elements of the RSO accordingly, in order to produce an improved artifact? Here, with the aid of the <i>Reference Ontology for Security Engineering</i> (ROSE) and the ontological theory of prevention behind it, we address the remaining gap by proceeding with an <i>ontological analysis</i> of the security-related constructs of the RSO. The outcome of this assessment is an ontology-based redesign of the ArchiMate language regarding security modeling. In a nutshell, we report the following contributions: (1) an ontological analysis of the RSO that identifies six limitations concerning security modeling; (2) because of the key role of the notion of prevention in security modeling, the introduction of the ontological theory of prevention in ArchiMate; (3) a well-founded redesign of security elements of ArchiMate; and (4) ontology-based security modeling patterns that are logical consequences of our proposal of redesign due to its underlying ontology of security. As a form of evaluation, we show that our proposal can describe risk treatment options, according to ISO 31000. Finally, besides presenting multiple examples, we proceed with a real-world illustrative application taken from the cybersecurity domain.\u0000</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"30 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139768140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward an ontology for EA modeling and EA model quality 为 EA 建模和 EA 模型质量建立本体论
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2024-02-03 DOI: 10.1007/s10270-023-01146-w
Jan A. H. Schoonderbeek, Henderik A. Proper
{"title":"Toward an ontology for EA modeling and EA model quality","authors":"Jan A. H. Schoonderbeek, Henderik A. Proper","doi":"10.1007/s10270-023-01146-w","DOIUrl":"https://doi.org/10.1007/s10270-023-01146-w","url":null,"abstract":"<p>Models have long since been used, in different shapes and forms, to understand, communicate about, and (re)shape, the world around us; including many different social, economic, biological, chemical, physical, and digital aspects. This is also the case in the context of enterprise architecture (EA), where we see a wide range of models in many different shapes and forms being used as well. Researchers in EA modeling usually introduce their own lexicon, and perspective of what a model actually is, while accepting (often implicitly) the accompanying ontological commitments. Similarly, practitioners of EA modeling implicitly also commit to (different) ontologies, resulting in models that have an uncertain ontological standing. This is because, for the subject domain of enterprise architecture models (as opposed to the content of such models), no single ontology has gained major traction. As a result, studies into aspects of enterprise architecture models, such as “model quality” and “return on modeling effort”, are fragmented, and cannot readily be compared or combined. This paper proposes a comprehensive applied ontology, specifically geared to enterprise architecture modeling. Ontologies represent structured knowledge about a particular subject domain. It allows for study into, and reasoning about, that subject domain. Our ontology is derived from a theory of modeling, while clarifying concepts such as “enterprise architecture model”, and introduces novel concepts such as “model audience” and “model objective”. Furthermore, the relevant interrelations between these different concepts are identified and defined. The resulting ontology for enterprise architecture models is represented in OntoUML, and shown to be consistent with the foundational ontology for modeling, Unified Foundational Ontology.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"1 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139679209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A framework for embedded software portability and verification: from formal models to low-level code 嵌入式软件可移植性和验证框架:从形式模型到低级代码
IF 2 3区 计算机科学
Software and Systems Modeling Pub Date : 2024-02-01 DOI: 10.1007/s10270-023-01144-y
Renata Martins Gomes, Bernhard Aichernig, Marcel Baunach
{"title":"A framework for embedded software portability and verification: from formal models to low-level code","authors":"Renata Martins Gomes, Bernhard Aichernig, Marcel Baunach","doi":"10.1007/s10270-023-01144-y","DOIUrl":"https://doi.org/10.1007/s10270-023-01144-y","url":null,"abstract":"<p>Porting software to new target architectures is a common challenge, particularly when dealing with low-level functionality in drivers or OS kernels that interact directly with hardware. Traditionally, adapting code for different hardware platforms has been a manual and error-prone process. However, with the growing demand for dependability and the increasing hardware diversity in systems like the IoT, new software development approaches are essential. This includes rigorous methods for verifying and automatically porting Real-Time Operating Systems (RTOS) to various devices. Our framework addresses this challenge through formal methods and code generation for embedded RTOS. We demonstrate a hardware-specific part of a kernel model in Event-B, ensuring correctness according to the specification. Since hardware details are only added in late modeling stages, we can reuse most of the model and proofs for multiple targets. In a proof of concept, we refine the generic model for two different architectures, also ensuring safety and liveness properties. We then showcase automatic low-level code generation from the model. Finally, a hardware-independent factorial function model illustrates more potential of our approach.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"2 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139670254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信