01063nam0-22003371i-450-99000681944040332120001010000681944FED01000681944(Aleph)000681944FED0100068194420001010d--------km-y0itay50------baitay-------001yyMarketing per le piccole e medie impreseguida pratica per aumentare i vostri utili e avere clienti piùspddisfattiDonald G. Cyr, Douglas A. Gray.MilanoF. Angelic 1995.240 p.22 cmFormazione permanenteSez. 2Nuove tecniche69Piccole imprese - MarketingMedie imprese - Marketing658.8Cyr,Donald G.252364Gray,Douglas A.ITUNINARICAUNIMARCBK990006819440403321COLLEZ. 1256 (69)26889FSPBCFSPBCMarketing per le piccole e medie imprese634026UNINAGEN0110123nam 2200493 450 99649985600331620230331001032.03-031-21488-9(MiAaPQ)EBC7141580(Au-PeEL)EBL7141580(CKB)25360919200041(PPN)266349943(EXLCZ)992536091920004120230331d2023 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierThe Practice of enterprise modeling 15th IFIP WG 8. 1 working conference, PoEM 2022, London, UK, November 23-25, 2022, proceedings /edited by Balbir S. Barn, Kurt SandkuhlCham, Switzerland :Springer,[2023]©20231 online resource (255 pages)Lecture Notes in Business Information Processing Ser. ;v.456Print version: Barn, Balbir S. The Practice of Enterprise Modeling Cham : Springer International Publishing AG,c2022 9783031214875 Includes bibliographical references and index.Intro -- Preface -- Organization -- Contents -- Models in Information System Development -- Investigating The Effectiveness of Model-Based Testing on Testing Skill Acquisition -- 1 Introduction -- 2 Related Work -- 2.1 Teaching of Software Testing -- 2.2 Model-Based Testing -- 2.3 MERODE Code Generator and TesCaV -- 3 Research Method -- 3.1 Hypotheses -- 3.2 Experimental Design -- 3.3 Evaluation -- 4 Results -- 4.1 Personal Characteristic of the Participants -- 4.2 Test Case Coverage Scores -- 5 Discussion -- 5.1 Contributions -- 5.2 Internal Validity -- 5.3 External Validity -- 6 Conclusion -- 7 Further Research -- References -- Generating Low-Code Applications from Enterprise Ontology -- 1 Introduction -- 2 Theoretical Background -- 2.1 Enterprise Ontology -- 2.2 Enterprise Implementation -- 2.3 Model-Based Engineering and Low-Code Technology -- 3 Mapping -- 4 Implementation and Evaluation -- 5 Conclusions and Discussion -- References -- Supporting the Individuation, Analysis and Gamification of Software Components for Acceptance Requirements Fulfilment -- 1 Introduction -- 2 Motivation and Lessons Learned -- 2.1 Agon Framework -- 2.2 Activities and Lessons Learned. -- 3 SiaGAM Algorithm and Process -- 4 Case Study and Evaluation -- 5 Related Work -- 6 Conclusion -- References -- Modeling Enterprise Architectures -- Historization of Enterprise Architecture Models via Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background and Related Work -- 2.1 EA Debts and Smells -- 2.2 Graph-Based Analysis of EA Models -- 2.3 Graph Historization -- 3 Toward Historization for EA Models -- 3.1 Graph Structure -- 3.2 Storage -- 3.3 Historization Properties -- 4 Implementation -- 5 Analysis -- 6 Discussion -- 7 Conclusion -- References -- Towards Ontology-Based Validation of EA Principles -- 1 Introduction -- 2 Literature Review.2.1 Enterprise Architecture Management(EAM) -- 2.2 Formalizing Enterprise Architecture Models -- 2.3 Enterprise Architecture Principles -- 2.4 Formalizing EA Principles -- 2.5 Research Objective -- 3 Research Method -- 4 Automated Ontology-Based Validation of EA Principles -- 4.1 Knowledge in Models and EA Principles -- 4.2 Representing EA Models in an Enterprise Ontology -- 4.3 Representing EA Principles in an Enterprise Ontology -- 5 Step-By-Step Formalization and Validation of EA Principles -- 5.1 Step 1 - Specification of EA Principles -- 5.2 Step 2 - Creation of SBVR Rules -- 5.3 Step 3 - Formalization of the Vocabulary as an Ontology -- 5.4 Step 4 - Extending EA Models and EA Principles with Domain Knowledge -- 5.5 Step 5 - Formalization of the SBVR Rules -- 6 Evaluation -- 6.1 Case Description -- 6.2 Implemented Approach -- 7 Conclusion and Future Work -- References -- Ontological Analysis and Redesign of Security Modeling in ArchiMate -- 1 Introduction -- 2 Security Modeling in Archimate -- 2.1 The Original ArchiMate Risk and Security Overlay -- 2.2 Redesigned Risk Elements of ArchiMate Based on COVER -- 3 Ontological Foundations of Security -- 4 Ontologically-Founded Analysis of Security Modeling -- 5 Redesigning the Security Elements of ArchiMate -- 6 Related Work -- 7 Final Remarks -- References -- Modeling Capabilities and Ecosystems -- Foundations of Capability Maps - A Conceptual Comparison -- 1 Introduction -- 2 Background -- 3 Analytical Model -- 3.1 Overview of the Analytical Model -- 3.2 Conceptualization of a Capability -- 3.3 Conceptualization of a Capability Map -- 3.4 Conceptualization of In-Use Context -- 4 Research Results -- 4.1 The Studied Capability and Capability Map Constructs -- 4.2 Characterization of Capability Constructs -- 4.3 Characterization of Capability Map Constructs -- 4.4 Conceptualization of In-Use Context.5 Discussion -- 6 Conclusions -- References -- Applying and Evaluating the KYKLOS Method -- 1 Introduction -- 2 Background -- 2.1 Background on Modeling Methods and Evaluation Activities -- 2.2 Overview of KYKLOS -- 3 Methodology -- 4 The Case Study -- 4.1 Case Analysis -- 5 Evaluation Results -- 6 Discussion -- 7 Conclusions -- References -- Using Tangible Modeling to Create an e3value Conceptual Model for Digital Ecosystems -- 1 Introduction -- 2 Related Work -- 3 Relating TED and e3value : Study Design -- 4 The TED Methodology for Ecosystem Design -- 5 The e3value Methodology for Ecosystem Value Modeling -- 6 Relating the TED SM to e3value : The Mobility Platform -- 6.1 Use Case - Digital Platform for Mobility Services -- 6.2 TED SM Model for the Mobility Ecosystem -- 6.3 The e3value Model of the Mobility Ecosystem -- 6.4 Evaluation of the TED SM Model and the e3value Model -- 6.5 Analysis of TED SM Model and e3value Model Correspondences -- 7 Conclusion and Future Work -- References -- DSML and Meta-modeling -- Dynamic Models - The MetaMorph Formalism and Model-Operations -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 Systematization of Operations - Structural Events and Domain Events -- 2.3 ProVis - Probability Visualized -- 2.4 MetaMorph -- 3 Dynamic Models Through Operations -- 4 The Building Blocks of Domain-Specific Operations - Structural Events -- 5 Language Specific Operations - Domain Events -- 5.1 Creation Phase vs. Operationalization Phase -- 5.2 Lifted Structural Events and Domain Events for Operationalization -- 5.3 Case Study -- 6 Conclusion and Outlook -- References -- Establishing Interoperability Between the EMF and the MSDKVS Metamodeling Platforms*-4pt -- 1 Introduction -- 2 Metamodeling Foundations -- 2.1 EMF -- 2.2 MSDKVS -- 3 Related Work -- 3.1 Transformation Bridges -- 3.2 EMF and Microsoft DSL Tools.4 Comparative Analysis of EMF and MSDKVS -- 4.1 Abstract Syntax Features -- 4.2 Graphical Concrete Syntax Features -- 5 Transformation Bridge -- 5.1 EMF2MSDKVS -- 5.2 MSDKVS2EMF -- 5.3 MSDKVS2EMF Transformation Example -- 6 Evaluation -- 6.1 Research Questions -- 6.2 Experimental Setup -- 6.3 Results -- 6.4 Limitations -- 7 Conclusion -- References -- Beyond Business Development: Regulatory Assessment of Energy Sector Projects with Contextual Requirements Engineering -- 1 Introduction -- 2 Motivating Scenario -- 3 Requirements and Existing Modeling Approaches -- 3.1 Requirements -- 3.2 Selecting a Modeling Approach -- 4 Modeling the Motivating Scenario -- 5 Discussion -- 5.1 Lessons Learned -- 5.2 Towards Intertwining Regulation and Business Development -- 6 Concluding Outlook -- References -- Participatory Modeling -- A Methodology for DSML-Assisted Participatory Agent-Based Enterprise Modelling -- 1 Introduction -- 2 Case Study -- 3 Agent-Based Modelling Methodologies -- 4 DSML Methodologies -- 5 A Methodology for DSML-Assisted Participatory Agent-Based Modelling -- 5.1 System Analysis -- 5.2 Model Formalisation -- 5.3 Implementation -- 5.4 Evaluation -- 6 Conclusions -- References -- Advantages and Limitations of Experiments for Researching Participatory Enterprise Modeling and Recommendations for Their Implementation*-4pt -- 1 Introduction -- 2 Participatory Enterprise Modeling -- 3 Research Design Options for Examining PEM -- 4 Example Studies on Participatory Enterprise Modeling -- 4.1 Case Studies -- 4.2 Experimental Studies -- 5 Why Experiments on Participatory Modeling? -- 6 Lessons Learned and Recommendations for Future Experiments -- 6.1 The Kind of Model -- 6.2 Time Limits -- 6.3 Modeling Task and Participatory Culture -- 6.4 Who is Modeling? -- 6.5 The Challenges of Online Participatory Modeling.6.6 Assessing Subjective Perceptions as Dependent Variables -- 6.7 Dealing with Small Sample Sizes -- 6.8 Modeling Experts Might Be Seen as Co-owners -- 6.9 Be Prepared, but Do Not Expect to Be Able to Foresee Everything -- 7 Conclusion -- References -- Designing an Ontology for Human Rights Violations Documentation Through Practitioner Input and Information Infrastructure Theory -- 1 Introduction -- 2 Theoretical Background -- 2.1 The Human Rights Protection System and Technologies -- 2.2 Previous Relevant Ontology Research -- 3 Approach to Develop the Proposed Ontology -- 3.1 Overall Research Framework: Design Science Research -- 3.2 Design Theory: Information Infrastructures -- 4 Requirements Elicitation -- 4.1 Non-functional Requirements Elicitation -- 4.2 Functional Requirements Elicitation -- 4.3 Validation of Requirements -- 5 The Proposed Ontology -- 5.1 Full OntoRights -- 5.2 Simple OntoRights -- 5.3 Demonstration -- 6 Discussion -- 7 Conclusion -- References -- Author Index.Lecture Notes in Business Information Processing Ser.Business enterprisesData processingBusiness enterprisesData processing.260Barn Balbir S.Sandkuhl KurtMiAaPQMiAaPQMiAaPQBOOK996499856003316The practice of enterprise modeling1933905UNISA03884nam 22005655 450 991099977690332120250422130223.03-031-87772-110.1007/978-3-031-87772-8(CKB)38537845100041(DE-He213)978-3-031-87772-8(MiAaPQ)EBC32023841(Au-PeEL)EBL32023841(EXLCZ)993853784510004120250422d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierAdvanced Information Networking and Applications Proceedings of the 39th International Conference on Advanced Information Networking and Applications (AINA-2025), Volume 4 /edited by Leonard Barolli1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (XXXII, 454 p. 166 illus., 139 illus. in color.) Lecture Notes on Data Engineering and Communications Technologies,2367-4520 ;2483-031-87771-3 Broad Learning System Scheme for Multi-Server MEC Wireless Networks -- Investigating the Transferability and Robustness of Adversarial Attacks Between Standard and Dilated CNN Architectures -- Optimized Hybrid Deep Learning Model for Accurate Classification of Alzheimer's Stages -- A Hybrid Machine Learning Method for Detecting Metamorphic Malware -- Assessing the Threat of Neural Network Enhanced Obfuscation in Malware -- Transformative Intelligence in Advanced Security Infrastructure.Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnection problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This volume covers the theory, design and applications of computer networks, distributed computing and information systems. The aim of the volume “Advanced Information Networking and Applications” is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.Lecture Notes on Data Engineering and Communications Technologies,2367-4520 ;248EngineeringData processingComputational intelligenceArtificial intelligenceData EngineeringComputational IntelligenceArtificial IntelligenceEngineeringData processing.Computational intelligence.Artificial intelligence.Data Engineering.Computational Intelligence.Artificial Intelligence.620.00285Barolli Leonardedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910999776903321Advanced Information Networking and Applications2073388UNINA