Engineering Multi-Agent Systems [[electronic resource] ] : Second International Workshop, EMAS 2014, Paris, France, May 5-6, 2014, Revised Selected Papers / / edited by Fabiano Dalpiaz, Jürgen Dix, M. Birna van Riemsdijk |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 451 p. 125 illus.) |
Disciplina | 006.3 |
Collana | Lecture Notes in Artificial Intelligence |
Soggetto topico |
Artificial intelligence
Software engineering Computer programming Artificial Intelligence Software Engineering Programming Techniques |
ISBN | 3-319-14484-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intelligent agents -- Multi-agent systems -- Software design engineering -- Model-driven software engineering -- Reasoning about belief and knowledge -- Cooperation and coordination -- Constraint and logic programming -- Software verification -- Design patterns. |
Record Nr. | UNISA-996211262803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Multi-Agent Systems : Second International Workshop, EMAS 2014, Paris, France, May 5-6, 2014, Revised Selected Papers / / edited by Fabiano Dalpiaz, Jürgen Dix, M. Birna van Riemsdijk |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 451 p. 125 illus.) |
Disciplina | 006.3 |
Collana | Lecture Notes in Artificial Intelligence |
Soggetto topico |
Artificial intelligence
Software engineering Computer programming Artificial Intelligence Software Engineering Programming Techniques |
ISBN | 3-319-14484-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intelligent agents -- Multi-agent systems -- Software design engineering -- Model-driven software engineering -- Reasoning about belief and knowledge -- Cooperation and coordination -- Constraint and logic programming -- Software verification -- Design patterns. |
Record Nr. | UNINA-9910483745603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Requirements engineering: foundation for software quality : 27th international working conference, refsq 2021, essen, germany, april 12-15, 2021, proceedings / / edited by Fabiano Dalpiaz, Paola Spoletini |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (241 pages) : illustrations |
Disciplina | 005.1 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Artificial intelligence |
ISBN | 3-030-73128-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Keynotes -- Practicing (Whose?) Values: Requirements Engineering as a Catalyst for Technology Justice -- The Challenge(s) of Teaching Requirements Engineering -- What Makes Intelligent Visual Analytics Tools Really Intelligent? -- Contents -- Natural Language Processing and Machine Learning -- Is Requirements Similarity a Good Proxy for Software Similarity? An Empirical Investigation in Industry -- 1 Introduction -- 2 Related Work -- 3 Study Design -- 3.1 Study Context -- 3.2 Objective and Research Questions -- 3.3 Data Collection -- 3.4 Language Models for Requirements Similarity -- 3.5 Software Similarity Pipeline -- 3.6 Execution -- 3.7 Data Analysis -- 4 Results -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusion and Future Work -- References -- Automatic Detection of Causality in Requirement Artifacts: The CiRA Approach -- 1 Introduction -- 2 Terminology -- 3 Case Study: Causality in Requirement Documents -- 3.1 Research Questions -- 3.2 Study Objects -- 3.3 Study Design -- 3.4 Study Results -- 3.5 Implications for Causality Detection and Extraction -- 3.6 Threats to Validity -- 4 Approach: Detecting Causal Requirements -- 4.1 Methods -- 4.2 Evaluation Procedure -- 4.3 Experimental Results -- 5 Related Work -- 6 Conclusion and Next Steps -- References -- Improving Trace Link Recovery Using Semantic Relation Graphs and Spreading Activation -- 1 Introduction -- 2 Background -- 2.1 Trace Link Recovery -- 2.2 Knowledge Representation -- 2.3 Existing Approach -- 3 Datasets: Characteristics of Requirements -- 4 Approach Revisions -- 4.1 Knowledge Base Construction -- 4.2 Semantic Search -- 5 Evaluation -- 5.1 Metrics -- 5.2 Results for Datasets -- 5.3 Limitations -- 6 Discussion -- 7 Conclusion -- References -- CORG: A Component-Oriented Synthetic Textual Requirements Generator -- 1 Introduction.
2 Background -- 3 CORG Formal Grammar -- 4 CORG -- 4.1 Content Determination -- 4.2 Textual Structuring -- 4.3 Sentence Aggregation -- 4.4 Lexicalisation -- 4.5 Realisation -- 4.6 Requirements Checking -- 5 Evaluation -- 5.1 Generation Coverage -- 5.2 Time Performance -- 5.3 Diversity Evaluation -- 5.4 Correctness Evaluation -- 5.5 Realisticness Evaluation -- 5.6 Strengths and Limitations -- 6 Related Work -- 7 Conclusion -- References -- Automatically Classifying Non-functional Requirements with Feature Extraction and Supervised Machine Learning Techniques: A Research Preview -- 1 Introduction -- 2 Related Work -- 2.1 Analysis -- 3 Research Investigation -- 3.1 Datasets -- 3.2 Research Methodology -- 4 Preliminary Evaluation -- 4.1 Preliminary Analysis -- 4.2 Preliminary Validation -- 5 Conclusion and Future Work -- References -- RE for AI-Enabled Systems -- AdaptationExplore - A Process for Elicitation, Negotiation, and Documentation of Adaptive Requirements -- 1 Introduction -- 2 Related Work -- 3 Process Overview -- 4 Running Example -- 5 Initial Phase -- 6 Exploration Phase -- 6.1 Situation -- 6.2 Identification of Situations -- 6.3 Situation Analysis with Trigger Questions -- 7 Integration Phase -- 7.1 Situation Integration -- 7.2 Adaptation Analysis and Documentation -- 8 Discussion -- 9 Pilot Study -- 10 Conclusion -- References -- Trustworthy AI Services in the Public Sector: What Are Citizens Saying About It? -- 1 Introduction -- 2 Related Work -- 3 Research Methods -- 3.1 Overview of the Qualitative Study -- 3.2 Study Participants -- 3.3 Data Collection -- 3.4 Data Analysis -- 4 Results -- 4.1 Transparency -- 4.2 Purpose -- 4.3 Data -- 4.4 Core AI Process -- 4.5 Human Involvement -- 4.6 Service Overview -- 5 Discussion -- 5.1 Transparency -- 5.2 Other Requirements -- 5.3 Study Limitations -- 6 Conclusions -- References. Defining Utility Functions for Multi-stakeholder Self-adaptive Systems -- 1 Introduction -- 2 Proposed Approach -- 3 Empirical Study -- 4 Related Work -- 5 Discussion, Conclusion, and Future Work -- References -- Risk-Driven Compliance Assurance for Collaborative AI Systems: A Vision Paper -- 1 Introduction -- 2 Illustrative Example -- 3 Research Challenges -- 4 Research Roadmap -- 5 Conclusion -- References -- From Software to Systems and Services -- Requirements Engineering in the Planning Phase of a Software Ecosystem -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Software Ecosystems -- 2.2 Requirements Engineering in Software Ecosystems -- 3 Research Methods -- 3.1 Research Question -- 3.2 Description of Case SECO -- 3.3 Research Process -- 4 Results -- 4.1 Overview of the Conceptualization Process of Digital Services -- 4.2 High-Level Conceptualization of Digital Services -- 4.3 Detailed Conceptualization of Digital Services -- 4.4 RE Activities of the Conceptualization Process of Digital Services -- 4.5 Challenges in the Conceptualization Process -- 5 Discussion -- 5.1 Requirement Engineering in the Planning Phase of a Software Ecosystem -- 5.2 Threats to Validity -- 6 Conclusions -- References -- Power and Privacy in Software Ecosystems: A Study on Data Breach Impact on Tech Giants -- 1 Introduction -- 2 Theoretical Foundation -- 2.1 Software Ecosystems -- 2.2 Power -- 3 Research Method -- 4 Results -- 4.1 Case 1 - YouTube (Google Ecosystem) -- 4.2 Case 2 - Alexa (Amazon Ecosystem) -- 4.3 Case 3 - Instagram (Facebook Ecosystem) -- 4.4 Case 4 - Siri (Apple Ecosystem) -- 5 Discussion and Conclusion -- 5.1 Implications for Research and Practice -- 5.2 Threats to Validity -- 5.3 Related Work -- 5.4 Future Work -- References -- Iterative and Scenario-Based Requirements Specification in a System of Systems Context -- 1 Introduction. 2 Background -- 2.1 System of Systems Engineering (SoSE) -- 2.2 Example of Application -- 2.3 Scenario Modeling Language for Kotlin (SMLK) -- 3 Scenario-Based Requirements Specification in a System of Systems Context -- 3.1 Inter-system Scenarios -- 3.2 Intra-system Scenarios -- 3.3 Specification Method -- 4 Proof of Concept -- 5 Related Work -- 6 Summary and Outlook -- References -- Specifying Requirements for Data Collection and Analysis in Data-Driven RE. A Research Preview -- 1 Introduction -- 2 Background and Related Work -- 3 Case Study -- 4 User Feedback Requirements and Related Tasks -- 5 Conclusion -- References -- Analysts' Competence and Training -- SaPeer Approach for Training Requirements Analysts: An Application Tailored to a Low-resource Context -- 1 Introduction -- 2 Related Work and Background -- 3 Tailored SaPeer -- 3.1 The SaPeer Approach -- 3.2 Rationale for Tailoring the SaPeer Approach -- 3.3 The Tailored SaPeer Approach -- 4 Research Design -- 4.1 Research Questions -- 4.2 Data Collection and Analysis Procedures -- 4.3 Threats to Validity -- 5 Results -- 6 Conclusions and Further Research -- References -- On Understanding the Relation of Knowledge and Confidence to Requirements Quality -- 1 Introduction -- 2 Background and Related Work -- 3 Research Methodology and Data Collection -- 4 Results of Data Analysis -- 5 Conclusions and Future Work -- Appendix -- References -- Author Index. |
Record Nr. | UNINA-9910483471303321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Requirements engineering: foundation for software quality : 27th international working conference, refsq 2021, essen, germany, april 12-15, 2021, proceedings / / edited by Fabiano Dalpiaz, Paola Spoletini |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (241 pages) : illustrations |
Disciplina | 005.1 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Artificial intelligence |
ISBN | 3-030-73128-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Keynotes -- Practicing (Whose?) Values: Requirements Engineering as a Catalyst for Technology Justice -- The Challenge(s) of Teaching Requirements Engineering -- What Makes Intelligent Visual Analytics Tools Really Intelligent? -- Contents -- Natural Language Processing and Machine Learning -- Is Requirements Similarity a Good Proxy for Software Similarity? An Empirical Investigation in Industry -- 1 Introduction -- 2 Related Work -- 3 Study Design -- 3.1 Study Context -- 3.2 Objective and Research Questions -- 3.3 Data Collection -- 3.4 Language Models for Requirements Similarity -- 3.5 Software Similarity Pipeline -- 3.6 Execution -- 3.7 Data Analysis -- 4 Results -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusion and Future Work -- References -- Automatic Detection of Causality in Requirement Artifacts: The CiRA Approach -- 1 Introduction -- 2 Terminology -- 3 Case Study: Causality in Requirement Documents -- 3.1 Research Questions -- 3.2 Study Objects -- 3.3 Study Design -- 3.4 Study Results -- 3.5 Implications for Causality Detection and Extraction -- 3.6 Threats to Validity -- 4 Approach: Detecting Causal Requirements -- 4.1 Methods -- 4.2 Evaluation Procedure -- 4.3 Experimental Results -- 5 Related Work -- 6 Conclusion and Next Steps -- References -- Improving Trace Link Recovery Using Semantic Relation Graphs and Spreading Activation -- 1 Introduction -- 2 Background -- 2.1 Trace Link Recovery -- 2.2 Knowledge Representation -- 2.3 Existing Approach -- 3 Datasets: Characteristics of Requirements -- 4 Approach Revisions -- 4.1 Knowledge Base Construction -- 4.2 Semantic Search -- 5 Evaluation -- 5.1 Metrics -- 5.2 Results for Datasets -- 5.3 Limitations -- 6 Discussion -- 7 Conclusion -- References -- CORG: A Component-Oriented Synthetic Textual Requirements Generator -- 1 Introduction.
2 Background -- 3 CORG Formal Grammar -- 4 CORG -- 4.1 Content Determination -- 4.2 Textual Structuring -- 4.3 Sentence Aggregation -- 4.4 Lexicalisation -- 4.5 Realisation -- 4.6 Requirements Checking -- 5 Evaluation -- 5.1 Generation Coverage -- 5.2 Time Performance -- 5.3 Diversity Evaluation -- 5.4 Correctness Evaluation -- 5.5 Realisticness Evaluation -- 5.6 Strengths and Limitations -- 6 Related Work -- 7 Conclusion -- References -- Automatically Classifying Non-functional Requirements with Feature Extraction and Supervised Machine Learning Techniques: A Research Preview -- 1 Introduction -- 2 Related Work -- 2.1 Analysis -- 3 Research Investigation -- 3.1 Datasets -- 3.2 Research Methodology -- 4 Preliminary Evaluation -- 4.1 Preliminary Analysis -- 4.2 Preliminary Validation -- 5 Conclusion and Future Work -- References -- RE for AI-Enabled Systems -- AdaptationExplore - A Process for Elicitation, Negotiation, and Documentation of Adaptive Requirements -- 1 Introduction -- 2 Related Work -- 3 Process Overview -- 4 Running Example -- 5 Initial Phase -- 6 Exploration Phase -- 6.1 Situation -- 6.2 Identification of Situations -- 6.3 Situation Analysis with Trigger Questions -- 7 Integration Phase -- 7.1 Situation Integration -- 7.2 Adaptation Analysis and Documentation -- 8 Discussion -- 9 Pilot Study -- 10 Conclusion -- References -- Trustworthy AI Services in the Public Sector: What Are Citizens Saying About It? -- 1 Introduction -- 2 Related Work -- 3 Research Methods -- 3.1 Overview of the Qualitative Study -- 3.2 Study Participants -- 3.3 Data Collection -- 3.4 Data Analysis -- 4 Results -- 4.1 Transparency -- 4.2 Purpose -- 4.3 Data -- 4.4 Core AI Process -- 4.5 Human Involvement -- 4.6 Service Overview -- 5 Discussion -- 5.1 Transparency -- 5.2 Other Requirements -- 5.3 Study Limitations -- 6 Conclusions -- References. Defining Utility Functions for Multi-stakeholder Self-adaptive Systems -- 1 Introduction -- 2 Proposed Approach -- 3 Empirical Study -- 4 Related Work -- 5 Discussion, Conclusion, and Future Work -- References -- Risk-Driven Compliance Assurance for Collaborative AI Systems: A Vision Paper -- 1 Introduction -- 2 Illustrative Example -- 3 Research Challenges -- 4 Research Roadmap -- 5 Conclusion -- References -- From Software to Systems and Services -- Requirements Engineering in the Planning Phase of a Software Ecosystem -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Software Ecosystems -- 2.2 Requirements Engineering in Software Ecosystems -- 3 Research Methods -- 3.1 Research Question -- 3.2 Description of Case SECO -- 3.3 Research Process -- 4 Results -- 4.1 Overview of the Conceptualization Process of Digital Services -- 4.2 High-Level Conceptualization of Digital Services -- 4.3 Detailed Conceptualization of Digital Services -- 4.4 RE Activities of the Conceptualization Process of Digital Services -- 4.5 Challenges in the Conceptualization Process -- 5 Discussion -- 5.1 Requirement Engineering in the Planning Phase of a Software Ecosystem -- 5.2 Threats to Validity -- 6 Conclusions -- References -- Power and Privacy in Software Ecosystems: A Study on Data Breach Impact on Tech Giants -- 1 Introduction -- 2 Theoretical Foundation -- 2.1 Software Ecosystems -- 2.2 Power -- 3 Research Method -- 4 Results -- 4.1 Case 1 - YouTube (Google Ecosystem) -- 4.2 Case 2 - Alexa (Amazon Ecosystem) -- 4.3 Case 3 - Instagram (Facebook Ecosystem) -- 4.4 Case 4 - Siri (Apple Ecosystem) -- 5 Discussion and Conclusion -- 5.1 Implications for Research and Practice -- 5.2 Threats to Validity -- 5.3 Related Work -- 5.4 Future Work -- References -- Iterative and Scenario-Based Requirements Specification in a System of Systems Context -- 1 Introduction. 2 Background -- 2.1 System of Systems Engineering (SoSE) -- 2.2 Example of Application -- 2.3 Scenario Modeling Language for Kotlin (SMLK) -- 3 Scenario-Based Requirements Specification in a System of Systems Context -- 3.1 Inter-system Scenarios -- 3.2 Intra-system Scenarios -- 3.3 Specification Method -- 4 Proof of Concept -- 5 Related Work -- 6 Summary and Outlook -- References -- Specifying Requirements for Data Collection and Analysis in Data-Driven RE. A Research Preview -- 1 Introduction -- 2 Background and Related Work -- 3 Case Study -- 4 User Feedback Requirements and Related Tasks -- 5 Conclusion -- References -- Analysts' Competence and Training -- SaPeer Approach for Training Requirements Analysts: An Application Tailored to a Low-resource Context -- 1 Introduction -- 2 Related Work and Background -- 3 Tailored SaPeer -- 3.1 The SaPeer Approach -- 3.2 Rationale for Tailoring the SaPeer Approach -- 3.3 The Tailored SaPeer Approach -- 4 Research Design -- 4.1 Research Questions -- 4.2 Data Collection and Analysis Procedures -- 4.3 Threats to Validity -- 5 Results -- 6 Conclusions and Further Research -- References -- On Understanding the Relation of Knowledge and Confidence to Requirements Quality -- 1 Introduction -- 2 Background and Related Work -- 3 Research Methodology and Data Collection -- 4 Results of Data Analysis -- 5 Conclusions and Future Work -- Appendix -- References -- Author Index. |
Record Nr. | UNISA-996464401703316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Requirements Engineering: Foundation for Software Quality [[electronic resource] ] : 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018, Proceedings / / edited by Erik Kamsties, Jennifer Horkoff, Fabiano Dalpiaz |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XVII, 369 p. 66 illus.) |
Disciplina | 005 |
Collana | Programming and Software Engineering |
Soggetto topico |
Software engineering
Programming languages (Electronic computers) Application software Artificial intelligence User interfaces (Computer systems) Software Engineering Programming Languages, Compilers, Interpreters Information Systems Applications (incl. Internet) Artificial Intelligence User Interfaces and Human Computer Interaction |
ISBN | 3-319-77243-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | RE in Industrial Practice -- NLP in Theory and Practice -- Empirical Insights into Traceability -- Taming Ambiguity -- Large-Scale RE -- Quality Requirements -- User and Job Stories -- Requirements Alignment -- RE Previews and Visions -- Big Data -- Mindmapping and Requirements Modeling. |
Record Nr. | UNISA-996465484603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Requirements Engineering: Foundation for Software Quality : 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018, Proceedings / / edited by Erik Kamsties, Jennifer Horkoff, Fabiano Dalpiaz |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XVII, 369 p. 66 illus.) |
Disciplina | 005 |
Collana | Programming and Software Engineering |
Soggetto topico |
Software engineering
Programming languages (Electronic computers) Application software Artificial intelligence User interfaces (Computer systems) Software Engineering Programming Languages, Compilers, Interpreters Information Systems Applications (incl. Internet) Artificial Intelligence User Interfaces and Human Computer Interaction |
ISBN | 3-319-77243-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | RE in Industrial Practice -- NLP in Theory and Practice -- Empirical Insights into Traceability -- Taming Ambiguity -- Large-Scale RE -- Quality Requirements -- User and Job Stories -- Requirements Alignment -- RE Previews and Visions -- Big Data -- Mindmapping and Requirements Modeling. |
Record Nr. | UNINA-9910349459503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Research Challenges in Information Science [[electronic resource] ] : 14th International Conference, RCIS 2020, Limassol, Cyprus, September 23–25, 2020, Proceedings / / edited by Fabiano Dalpiaz, Jelena Zdravkovic, Pericles Loucopoulos |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (659 pages) |
Disciplina | 020.72 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Application software
Information technology Business—Data processing Database management Software engineering Information Systems Applications (incl. Internet) IT in Business Computer Applications Database Management Software Engineering |
ISBN | 3-030-50316-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data Analytics and Business Intelligence -- Toward Becoming a Data-Driven Organization: Challenges and Benefits -- A Big Data Conceptual Model to Improve Quality of Business Analytics -- How to measure in uence in social networks -- Developing a real-time tra c reporting and forecasting back-end system -- IoT Analytics Architectures: Challenges, solution proposals and future research directions -- Digital Enterprise and Technologies Structural Coupling, Strategy and Fractal Enterprise Modeling -- Systems-Thinking Heuristics for the Reconciliation of Methodologies for Design and Analysis for Information Systems Engineering -- An Ontology of IS Design Science Research Artefacts -- Evolution of Enterprise Architecture for Intelligent Digital Systems -- Human Factors in Information Systems Online peer support groups for behaviour change: Moderation requirements -- User-Experience in Business Intelligence - A Quality Construct and Model to Design Supportive BI Dashboards -- FINESSE: Fair Incentives for Enterprise Employees -- Explainable Recommendations in Intelligent Systems: Delivery Methods, Modalities and Risks -- Participation in Hackathons: A Multi-Methods View on Motivators, Demotivators and Citizen Participation -- Information Systems Development and Testing A systematic literature review of blockchain-enabled smart contracts: platforms, languages, consensus, applications and choice criteria -- Scriptless testing at the GUI level in an industrial setting -- Improving Performance and Scalability of Model-Driven generated Web applications: An experience report -- TesCaV: An Approach for Learning Model-based Testing and Coverage in Practice -- Machine Learning and Text Processing Automatic Classi cation Rules for Anomaly Detection in Time-series -- Text Embeddings for Retrieval from a Large Knowledge Base -- Predicting Unemployment with Machine Learning Based on Registry Data -- Anomaly detection on data streams - A LSTM's diary -- Process Mining, Discovery, and Simulation Discovering Business Process Simulation Models in the Presence of Multitasking -- TLKC-Privacy Model for Process Mining -- Incremental Discovery of Hierarchical Process Models -- Security and Privacy -- Ontology Evolution in the Context of Model-based Secure Software Engineering -- Blockchain-Based Personal Health Records for Patients' Empowerment -- COPri - a Core Ontology for Privacy Requirements Engineering -- Privacy Preserving Real-Time Video Stream Change Detection Based on the Orthogonal Tensor Decomposition Models. |
Record Nr. | UNISA-996465463903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Research Challenges in Information Science : 14th International Conference, RCIS 2020, Limassol, Cyprus, September 23–25, 2020, Proceedings / / edited by Fabiano Dalpiaz, Jelena Zdravkovic, Pericles Loucopoulos |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (659 pages) |
Disciplina |
020.72
025.04 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Application software
Information technology Business—Data processing Database management Software engineering Information Systems Applications (incl. Internet) IT in Business Computer Applications Database Management Software Engineering |
ISBN | 3-030-50316-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data Analytics and Business Intelligence -- Toward Becoming a Data-Driven Organization: Challenges and Benefits -- A Big Data Conceptual Model to Improve Quality of Business Analytics -- How to measure in uence in social networks -- Developing a real-time tra c reporting and forecasting back-end system -- IoT Analytics Architectures: Challenges, solution proposals and future research directions -- Digital Enterprise and Technologies Structural Coupling, Strategy and Fractal Enterprise Modeling -- Systems-Thinking Heuristics for the Reconciliation of Methodologies for Design and Analysis for Information Systems Engineering -- An Ontology of IS Design Science Research Artefacts -- Evolution of Enterprise Architecture for Intelligent Digital Systems -- Human Factors in Information Systems Online peer support groups for behaviour change: Moderation requirements -- User-Experience in Business Intelligence - A Quality Construct and Model to Design Supportive BI Dashboards -- FINESSE: Fair Incentives for Enterprise Employees -- Explainable Recommendations in Intelligent Systems: Delivery Methods, Modalities and Risks -- Participation in Hackathons: A Multi-Methods View on Motivators, Demotivators and Citizen Participation -- Information Systems Development and Testing A systematic literature review of blockchain-enabled smart contracts: platforms, languages, consensus, applications and choice criteria -- Scriptless testing at the GUI level in an industrial setting -- Improving Performance and Scalability of Model-Driven generated Web applications: An experience report -- TesCaV: An Approach for Learning Model-based Testing and Coverage in Practice -- Machine Learning and Text Processing Automatic Classi cation Rules for Anomaly Detection in Time-series -- Text Embeddings for Retrieval from a Large Knowledge Base -- Predicting Unemployment with Machine Learning Based on Registry Data -- Anomaly detection on data streams - A LSTM's diary -- Process Mining, Discovery, and Simulation Discovering Business Process Simulation Models in the Presence of Multitasking -- TLKC-Privacy Model for Process Mining -- Incremental Discovery of Hierarchical Process Models -- Security and Privacy -- Ontology Evolution in the Context of Model-based Secure Software Engineering -- Blockchain-Based Personal Health Records for Patients' Empowerment -- COPri - a Core Ontology for Privacy Requirements Engineering -- Privacy Preserving Real-Time Video Stream Change Detection Based on the Orthogonal Tensor Decomposition Models. |
Record Nr. | UNINA-9910410038303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure and Trustworthy Service Composition [[electronic resource] ] : The Aniketos Approach / / edited by Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (X, 247 p. 92 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Information technology Business—Data processing Computer communication systems Systems and Data Security Software Engineering IT in Business Computer Communication Networks |
ISBN | 3-319-13518-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Composite Services with Dynamic Behaviour -- Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions -- Adopting Existing Communication Platforms for Security Enabling Technologies -- The Aniketos Platform -- The Socio-technical Security Requirements Modelling Language for Secure Composite Services -- From Consumer Requirements to Policies in Secure Services -- Security Requirements Engineering with STS-Tool -- Using SecureBPMN for Modelling Security-Aware Service Compositions -- The Aniketos Service Composition Framework: Analysing and Ranking of Secure Services -- Compliance Validation of Secure Service Compositions -- Aggregation and Optimisation of Trustworthiness of Composite Services -- Monitoring Threats to Composite Services within the Aniketos Run-Time Framework -- Security Policy Monitoring of Composite Services -- The Aniketos Design-Time Framework Applied – A Case in Air Traffic Management -- Supporting Security and Trust in Complex e-Government Services -- Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome. |
Record Nr. | UNISA-996210519203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Secure and Trustworthy Service Composition : The Aniketos Approach / / edited by Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (X, 247 p. 92 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Information technology Business—Data processing Computer communication systems Systems and Data Security Software Engineering IT in Business Computer Communication Networks |
ISBN | 3-319-13518-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Composite Services with Dynamic Behaviour -- Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions -- Adopting Existing Communication Platforms for Security Enabling Technologies -- The Aniketos Platform -- The Socio-technical Security Requirements Modelling Language for Secure Composite Services -- From Consumer Requirements to Policies in Secure Services -- Security Requirements Engineering with STS-Tool -- Using SecureBPMN for Modelling Security-Aware Service Compositions -- The Aniketos Service Composition Framework: Analysing and Ranking of Secure Services -- Compliance Validation of Secure Service Compositions -- Aggregation and Optimisation of Trustworthiness of Composite Services -- Monitoring Threats to Composite Services within the Aniketos Run-Time Framework -- Security Policy Monitoring of Composite Services -- The Aniketos Design-Time Framework Applied – A Case in Air Traffic Management -- Supporting Security and Trust in Complex e-Government Services -- Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome. |
Record Nr. | UNINA-9910484783903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|