01238nam 2200337Ka 450 991069469370332120051020133339.0(CKB)5470000002363759(OCoLC)62120587(EXLCZ)99547000000236375920051020d2004 ua 0engtxtrdacontentcrdamediacrrdacarrierTHERMOD[electronic resource] an enhanced thermal model for determining aircraft operational temperatures user's manual : final reportWashington, D.C. :U.S. Dept. of Transportation, Federal Aviation Administration, Office of Aviation Research,[2004]1 volume digital, PDF fileTitle from title screen (viewed on Oct. 20, 2005)."December 2004."THERMOD Thermal analysisComputer programsHandbooks, manuals, etcHandbooks and manuals.lcgftThermal analysisComputer programsUnited States.Federal Aviation Administration.Office of Aviation Research.GPOGPOBOOK9910694693703321THERMOD3424866UNINA10850nam 2200505 450 99646448430331620231110213808.03-030-91279-5(MiAaPQ)EBC6803036(Au-PeEL)EBL6803036(CKB)19410602800041(OCoLC)1285526166(PPN)258839929(EXLCZ)991941060280004120220816d2021 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierThe practice of enterprise modeling 14th IFIP WG 8.1 Working Conference, PoEM 2021, Riga, Latvia, November 24-26, 2021, proceedings /Estefanía Serral [and three others]Cham, Switzerland :Springer International Publishing,[2021]©20211 online resource (300 pages)Lecture Notes in Business Information Processing ;v.432Print version: Serral, Estefanía The Practice of Enterprise Modeling Cham : Springer International Publishing AG,c2021 9783030912789 Intro -- Preface -- Organization -- Abstracts of Invited Keynote Talks -- Software Sustainability: The Challenges and Opportunities for Enterprises and their Researchers -- Design Science for Constructive Enterprise Modelling -- Contents -- Enterprise Modeling and Enterprise Architecture -- Enterprise Coherence with GEA - A 15year Co-evolution of Practice and Theory -- 1 Introduction -- 2 Main Elements of GEA -- 3 The Development of GEA -- 4 Lessons Learned from Applying GEA in Practice -- 5 Conclusion and Further Research -- References -- Machine Learning-Based Enterprise Modeling Assistance: Approach and Potentials -- 1 Introduction -- 2 State of the Art Review -- 2.1 Recommender System Techniques in Conceptual Modelling -- 2.2 Machine Learning in Modeling -- 3 Proposed Approach -- 3.1 Machine Learning-Based Assistance of EM -- 3.2 GNN Models for Approach Feasibility Evaluation -- 4 Experimental Evaluation -- 5 Discussion -- 6 Conclusions and Future Work -- References -- The Models for Knowledge Acquisition in PMI Specific Requirements Engineering -- 1 Introduction -- 2 PMI Requirements Elicitation Quality Criteria and Literature Review -- 3 PMI Specific Knowledge Acquisition Model -- 4 Demonstration of the Applicability of the Proposed Model -- 5 Summary -- References -- Using Knowledge Graphs to Detect Enterprise Architecture Smells -- 1 Introduction -- 2 Background -- 2.1 Graph-Based Analysis of EA Models -- 2.2 EA Smells -- 3 Transforming EA Models into Knowledge Graphs -- 4 Knowledge Graph Based EA Smells Detection -- 5 Evaluation -- 6 Conclusion -- References -- Mind the Gap!: Learning Missing Constraints from Annotated Conceptual Model Simulations -- 1 Introduction -- 2 Model Validation -- 3 From Model Finding to Inductive Learning -- 4 Evaluation -- 4.1 Setup -- 4.2 Results -- 4.3 Threats to Validity -- 5 Related Work -- 6 Discussion.7 Conclusion and Perspectives -- References -- Detecting Value Capture Processes Using Fractal Enterprise Model (FEM) -- 1 Introduction -- 2 Methodology -- 3 Short Overview of FEM -- 4 Use of FEM for Value-Based Organisational Design (Hypothetical Example Borrowed from [9]) -- 5 Use of FEM for Detecting Value Capture Processes (Build on Hypothetical Example) -- 6 Discussion -- 6.1 Lessons Learned -- 7 Conclusion, Implications and Limitations -- References -- OLIVE, a Model-Aware Microservice Framework -- 1 Introduction -- 2 Methodology -- 3 Related Works -- 4 Olive -- 5 Evaluation -- 6 Conclusions -- References -- Enterprise Modeling Methods and Method Engineering -- An Experience Report on the Implementation of the KYKLOS Modeling Method -- 1 Introduction -- 2 Background -- 3 Overview of KYKLOS Before the Implementation -- 4 The KYKLOS Implementation -- 4.1 Initial Meta-model to Language Meta-model Conversion -- 4.2 Graphical Notation -- 4.3 User Interaction -- 5 Discussion and Lessons Learned -- 6 Conclusions -- References -- Validation and Verification in Domain-Specific Modeling Method Engineering -- 1 Introduction -- 2 Background -- 2.1 Validation, Verification and Quality Assessment -- 2.2 Approaches to Design Domain-Specific (Enterprise) Modeling Methods -- 3 Validation and Verification in Enterprise Modeling Method Life-Cycle -- 4 Conclusions -- References -- A Foundation for Design, Analysis, and Management of Digital Business Ecosystem through Situational Method Engineering -- 1 Introduction -- 2 Related Work -- 2.1 State of the Art - DBE Design and Modelling Method -- 2.2 Situational Method Engineering -- 2.3 Multi-view Modelling Methods -- 2.4 DBE Roles and Responsibilities -- 3 A Foundation for the Method Engineering Process for DBE Design, Analysis, and Management -- 3.1 Problem Context -- 3.2 Identification of Main Concepts.3.3 Identification of Intentions -- 3.4 Examples of the DBE Method Process -- 4 Discussion -- 5 Conclusions -- References -- Business Process Modeling and Management -- Design Guidelines to Derive an e3value Business Model from a BPMN Process Model in the Financial Securities Sector -- 1 Introduction -- 2 Related Work -- 3 Technical Action Research: A Research Instrument for Design Science -- 3.1 Problem Statement -- 3.2 Treatment Design: From Process Model to Value Model -- 3.3 Treatment: Trading of Financial Securities -- 3.4 Treatment Evaluation -- 4 Conclusion -- References -- Context-Aware Process Modelling for Medicinal Product Development -- 1 Introduction -- 2 ATMP Development: The Need for Guidance -- 2.1 ATMP Development Process -- 2.2 Modelling ATMP Development -- 2.3 The Need for Guidance -- 3 Solution Design and Development -- 3.1 Contextualizing the Domain Model -- 3.2 Contextualizing the Goal Model -- 3.3 Contextuzalizing the Process Model -- 3.4 Guidance Through Context-Aware Process Modelling -- 4 Preliminary Evaluation -- 5 Discussion -- 6 Conclusion -- References -- Process Model Repair Meets Theory Revision - Initial Ideas -- 1 Introduction -- 2 Preliminaries -- 2.1 Process Model Repair -- 2.2 Theory Revision -- 3 Proposal -- 4 Analysis of Existing Process Model Repair Techniques -- 5 Related Work -- 6 Conclusion -- References -- Upper-Bounded Model Checking for Declarative Process Models -- 1 Introduction -- 2 Running Example and Basic Terminology -- 2.1 Events, Traces and Logs -- 2.2 Declare and Declare Constraints -- 2.3 Running Example -- 3 Related Work -- 4 Determining an Upper Bound for Model Checking -- 4.1 Transformation of Declare Templates into Finite State Automata -- 4.2 Transformation of Declare Process Models to Finite State Automata -- 4.3 Determining an Upper Bound -- 4.4 Checking Declare Models for Equality.4.5 Evaluation and Runtime Analysis -- 4.6 Limitations and Expandability to Other Process Modelling Languages -- 5 Conclusion and Future Work -- References -- Requirements Engineering for Privacy, Security and Governance -- On the Philosophical Foundations of Privacy: Five Theses -- 1 Introduction -- 2 The Concept of Privacy: A Historical Overview -- 3 The Philosophical Foundation of Privacy -- 3.1 Thesis One: Privacy as an Individual Right -- 3.2 Thesis Two: Privacy as Solitude in the Private Sphere -- 3.3 Thesis Three: Privacy as Property and Legal Right -- 3.4 Thesis Four: Privacy as Ownership of PI -- 3.5 Thesis Five: Privacy as Control over PI -- 4 Characterizing the Privacy Concept -- 5 Conceptualizing Privacy Requirements -- 5.1 The Underlying Rationality of Privacy Requirements -- 5.2 A New Conceptualization of Privacy Requirements -- 6 Challenges and Future Work -- 7 Conclusions -- References -- A Cyber Security Digital Twin for Critical Infrastructure Protection: The Intelligent Transport System Use Case -- 1 Introduction -- 2 Theoretical Background -- 2.1 Enterprise Architecture, Viewpoints, Views -- 2.2 Digital Twin -- 3 Methodology -- 3.1 Phase 1: Derive a Cybersecurity View -- 3.2 Phase 2: Derive the Cyber Security Digital Twin from the Cybersecurity View -- 4 The Cooperative-Intelligent Traffic Systems Use Case -- 4.1 C-ITS Overview -- 4.2 Enterprise Architectures for C-ITS -- 4.3 Evaluating the C-ITS Cyber Security Properties -- 5 Related Works -- 6 Conclusion and Future Work -- References -- Expanding Data Governance Across Company Boundaries - An Inter-organizational Perspective of Roles and Responsibilities -- 1 Introduction -- 2 Related Work -- 2.1 Data Governance -- 2.2 Inter-organizational Networks -- 3 Research Background: Network Management Requirements -- 4 Research Method -- 5 Results.5.1 Intra-organizational Data Governance Roles -- 5.2 Allocation of Network Management Requirements (ANMR) -- 6 Discussion and Conclusion -- References -- Case Studies and Experiences -- Can SysML Be Used for Enterprise Modelling? -- 1 Introduction -- 2 Background and Related Work -- 2.1 Enterprise Modelling and Systems Modelling -- 2.2 The Systems Modeling Language (SysML) -- 2.3 Related Work on Enterprise Modelling Languages -- 3 Case Study -- 3.1 Method -- 3.2 Context: System Development and Safety Processes for Civil Aircraft -- 3.3 Diagrams -- 4 Challenges of Using SysML for Enterprise Modelling -- 4.1 Temporal Representation -- 4.2 Timing and Scheduling -- 4.3 Collaboration Between Teams -- 4.4 Decision Tree -- 5 Conclusion and Future Work -- References -- A Collaborative Model for Connecting Product Design and Assembly Line Design: An Aeronautical Case -- 1 Introduction -- 2 An Aeronautical Case Study -- 3 Product and Production Designers: Two Actors Trying to Work Together -- 3.1 Aircraft and Assembly Line Goals -- 3.2 Collaboration: A Dependency Cycle -- 3.3 Addition of a Third Actor -- 4 Building the Collaboration Between Design and Production -- 4.1 The Integrated Morphological Chart Method -- 4.2 Application to the DRAGON Case Study -- 5 Conclusion and Perspectives -- References -- Assignment of Actors to Activities at Process-Oriented Applications: A Research Agenda -- 1 Motivation -- 2 Basic Requirements for the Organizational Perspective -- 3 Scientific State of the Art and Resulting Research Questions -- References -- Author Index.Lecture Notes in Business Information Processing Business enterprisesData processingCongressesManagement information systemsCongressesBusiness enterprisesData processingManagement information systems658.05Serral EstefaníaMiAaPQMiAaPQMiAaPQBOOK996464484303316The practice of enterprise modeling1933905UNISA