Vai al contenuto principale della pagina

Research Challenges in Information Science : 18th International Conference, RCIS 2024, Guimarães, Portugal, May 14-17, 2024, Proceedings, Part II



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Araújo João Visualizza persona
Titolo: Research Challenges in Information Science : 18th International Conference, RCIS 2024, Guimarães, Portugal, May 14-17, 2024, Proceedings, Part II Visualizza cluster
Pubblicazione: Cham : , : Springer, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (190 pages)
Altri autori: de la VaraJose Luis  
SantosMaribel Yasmina  
AssarSaïd  
Nota di contenuto: Intro -- Preface -- Organization -- Abstracts of Keynote Talks -- Information Science Research with Large Language Models: Between Science and Fiction -- The Power of Information Systems Shaping the Future of the Automotive Industry -- BPM in the Era of AI and Generative AI: Opportunities and Challenges -- Contents - Part II -- Contents - Part I -- Forum Papers -- Transfer Learning for Potato Leaf Disease Detection -- 1 Introduction -- 1.1 Contribution -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Dataset Selection and Description -- 4 Results and Discussion -- 5 Conclusion -- References -- Knowledge Graph Multilevel Abstraction: A Property Graph Reification Based Approach -- 1 Introduction -- 2 Knowledge Graph Models -- 3 RDF Reification -- 4 A Model for Property Graph Reification -- 4.1 Reification Strategies on Property Graph -- 4.2 Formal Model for Property Graph Reification -- 4.3 Reified Node Specification -- 5 Conclusion and Perspectives -- References -- ExpO: Towards Explaining Ontology-Driven Conceptual Models -- 1 Introduction -- 2 Background -- 3 ExpO Architecture -- 4 Conclusions and Future Work -- References -- Translucent Precision: Exploiting Enabling Information to Evaluate the Quality of Process Models -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Translucent Precision -- 4.1 Log Behavior -- 4.2 Model Behavior -- 4.3 Computing Precision Scores -- 5 Evaluation -- 6 Conclusion -- References -- IPMD: Intentional Process Model Discovery from Event Logs -- 1 Introduction -- 2 Intentional Process Model Discovery (IPMD) -- 2.1 Phase 1: Strategy Pattern Log Construction -- 2.2 Phase 2: Intentional Process Model Construction -- 3 Conclusion -- References -- Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design -- 1 Introduction -- 2 Related Work -- 3 Forensic-Ready Analysis Suite.
4 Demonstration: Automated Valet Parking System -- 4.1 System Description and Modelling -- 4.2 Validity and Hint Analysis -- 4.3 Evidence Quality Analysis -- 5 Conclusion -- References -- Control and Monitoring of Software Robots: What Can Academia and Industry Learn from Each Other? -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 3.1 Literature Review -- 3.2 Industrial Review -- 4 Analysis -- 4.1 Academic Approaches -- 4.2 RPA Platforms -- 5 Discussion -- 5.1 Recommendations for Industry -- 5.2 Recommendations for Academia -- 6 Conclusion -- References -- Creating a Web-Based Viewer for an ADOxx-Based Modeling Toolkit -- 1 Motivation -- 2 Fractal Enterprise Model -- 3 Functionality of FEM Viewer -- 3.1 User Management -- 3.2 Viewing Models -- 3.3 Importing and Sharing the Models -- 4 Technical Implementation -- 5 Conclusion and Plans for the Future -- References -- Ontology-Based Interaction Design for Social-Ecological Systems Research -- 1 Introduction -- 2 Social-Ecological Systems Integrated Perspective -- 3 Participation and the Collective Negotiation of Meanings -- 4 Ontology-Based Interaction Design: Artefacts and Scripts -- 5 Preliminary Results -- 6 Conclusions and Future Works -- References -- Scriptless and Seamless: Leveraging Probabilistic Models for Enhanced GUI Testing in Native Android Applications -- 1 Introduction -- 2 Scriptless GUI Testing -- 2.1 Existing Tools for Mobile Applications -- 3 MINT -- 3.1 Customizable Rules -- 3.2 Probabilistic Exploration -- 3.3 Composable Oracles -- 3.4 Seamless Integration -- 3.5 Reporting the Results -- 4 Preliminary Evaluation -- 5 Conclusions and Future Work -- References -- Identifying Relevant Data in RDF Sources -- 1 Introduction -- 2 Problem Statement -- 3 Classification Model -- 4 Generating Candidate Instance Descriptions -- 5 Experiments -- 6 Related Work.
7 Conclusion and Future Work -- References -- Novelty-Driven Evolutionary Scriptless Testing -- 1 Introduction -- 2 Five Steps Towards Evolutionary Scriptless Testing -- 2.1 Representation -- 2.2 Select EA Version -- 2.3 Manipulation Operators: Crossover and Mutation -- 2.4 Assigning Fitness -- 2.5 Proposed Architecture -- 3 Implemented Architecture -- 3.1 PonyGE2 -- 3.2 TESTAR -- 3.3 State Model -- 4 Applying Novelty Search for Testing -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Doctoral Consortium Papers -- Strengthening Cloud Applications: A Deep Dive into Kill Chain Identification, Scoring, and Automatic Penetration Testing -- 1 Introduction -- 2 Background and Taxonomy -- 2.1 Architecture -- 2.2 Vulnerabilities and Frameworks -- 2.3 Effective Vulnerability Analysis -- 2.4 Cloud, Edge and IoT -- 3 Research Design -- 3.1 Research Objective -- 3.2 Research Planning -- 3.3 Research Questions -- 4 Conclusions -- 5 Open Science Principles -- References -- Improving Understanding of Misinformation Campaigns with a Two-Stage Methodology Using Semantic Analysis of Fake News -- 1 Introduction -- 2 Related Works -- 2.1 Disinformation Campaign -- 2.2 Fake News Detection -- 2.3 Fake News Characterization -- 2.4 Disinformation Analysis and Response Measures -- 3 Research Objectives -- 3.1 Research Objectives -- 3.2 Research Questions -- 4 Contributions and Advances -- 4.1 A Two-Stage Methodology for Analyzing Fake News -- 4.2 First Results -- 4.3 Discussion and Next Steps -- References -- Automated Scriptless GUI Testing Aligned with Requirements and User Stories -- 1 Introduction -- 2 Background -- 3 Research -- 3.1 Create Behavioral Software Models -- 3.2 Develop Intelligent Action Selectors Using AI -- 3.3 Create Intelligent Test Oracles -- 3.4 Defining Test Adequacy Criteria -- 4 Plan for Validation and Evaluation -- References.
Towards a Cybersecurity Maturity Model Specific for the Healthcare Sector: Focus on Hospitals -- 1 Problem Statement -- 2 Research Questions -- 3 Research Objectives -- 4 Proposed Research Methods -- 4.1 Methodology for RQ1 -- 4.2 Methodology for RQ2 (In Progress) -- 4.3 Methodology and outcome for RQ3 -- 4.4 Research Limitation -- 5 Conclusion and Future Steps -- References -- Towards a Hybrid Intelligence Paradigm: Systematic Integration of Human and Artificial Capabilities -- 1 Introduction -- 2 Research Objectives -- 2.1 Problem Statement -- 2.2 Research Questions -- 3 Research Approach -- 4 Conclusion -- References -- Tutorials -- How Data Analytics and Design Science Fit: A Joint Research-Methodological Perspective -- Abstract -- 1 Introduction -- References -- Decision Intelligence for Enterprise and IS Engineering -- Abstract -- 1 Introduction -- 2 Important Research Areas -- 2.1 Decisions and Processes -- 2.2 Building Decision Models Automatically -- 2.3 Using Decision Models for Intelligent Explanation -- References -- Comparing Products Using Similarity Matching -- Abstract -- 1 Introduction -- 2 Topics -- Disclosure of Interests -- References -- Unleash the Power of Engineering Questions -- Abstract -- 1 Background: System Design Questions -- 2 An Integrated Questioning Technique -- Disclosure of Interests -- References -- Author Index.
Titolo autorizzato: Research Challenges in Information Science  Visualizza cluster
ISBN: 3-031-59468-1
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910855369703321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Business Information Processing Series