top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Engineering Multi-Agent Systems [[electronic resource] ] : Second International Workshop, EMAS 2014, Paris, France, May 5-6, 2014, Revised Selected Papers / / edited by Fabiano Dalpiaz, Jürgen Dix, M. Birna van Riemsdijk
Engineering Multi-Agent Systems [[electronic resource] ] : Second International Workshop, EMAS 2014, Paris, France, May 5-6, 2014, Revised Selected Papers / / edited by Fabiano Dalpiaz, Jürgen Dix, M. Birna van Riemsdijk
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 451 p. 125 illus.)
Disciplina 006.3
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Software engineering
Computer programming
Artificial Intelligence
Software Engineering
Programming Techniques
ISBN 3-319-14484-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intelligent agents -- Multi-agent systems -- Software design engineering -- Model-driven software engineering -- Reasoning about belief and knowledge -- Cooperation and coordination -- Constraint and logic programming -- Software verification -- Design patterns.
Record Nr. UNISA-996211262803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Engineering Multi-Agent Systems : Second International Workshop, EMAS 2014, Paris, France, May 5-6, 2014, Revised Selected Papers / / edited by Fabiano Dalpiaz, Jürgen Dix, M. Birna van Riemsdijk
Engineering Multi-Agent Systems : Second International Workshop, EMAS 2014, Paris, France, May 5-6, 2014, Revised Selected Papers / / edited by Fabiano Dalpiaz, Jürgen Dix, M. Birna van Riemsdijk
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 451 p. 125 illus.)
Disciplina 006.3
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Software engineering
Computer programming
Artificial Intelligence
Software Engineering
Programming Techniques
ISBN 3-319-14484-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intelligent agents -- Multi-agent systems -- Software design engineering -- Model-driven software engineering -- Reasoning about belief and knowledge -- Cooperation and coordination -- Constraint and logic programming -- Software verification -- Design patterns.
Record Nr. UNINA-9910483745603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Requirements engineering: foundation for software quality : 27th international working conference, refsq 2021, essen, germany, april 12-15, 2021, proceedings / / edited by Fabiano Dalpiaz, Paola Spoletini
Requirements engineering: foundation for software quality : 27th international working conference, refsq 2021, essen, germany, april 12-15, 2021, proceedings / / edited by Fabiano Dalpiaz, Paola Spoletini
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (241 pages) : illustrations
Disciplina 005.1
Collana Lecture Notes in Computer Science
Soggetto topico Artificial intelligence
ISBN 3-030-73128-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Keynotes -- Practicing (Whose?) Values: Requirements Engineering as a Catalyst for Technology Justice -- The Challenge(s) of Teaching Requirements Engineering -- What Makes Intelligent Visual Analytics Tools Really Intelligent? -- Contents -- Natural Language Processing and Machine Learning -- Is Requirements Similarity a Good Proxy for Software Similarity? An Empirical Investigation in Industry -- 1 Introduction -- 2 Related Work -- 3 Study Design -- 3.1 Study Context -- 3.2 Objective and Research Questions -- 3.3 Data Collection -- 3.4 Language Models for Requirements Similarity -- 3.5 Software Similarity Pipeline -- 3.6 Execution -- 3.7 Data Analysis -- 4 Results -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusion and Future Work -- References -- Automatic Detection of Causality in Requirement Artifacts: The CiRA Approach -- 1 Introduction -- 2 Terminology -- 3 Case Study: Causality in Requirement Documents -- 3.1 Research Questions -- 3.2 Study Objects -- 3.3 Study Design -- 3.4 Study Results -- 3.5 Implications for Causality Detection and Extraction -- 3.6 Threats to Validity -- 4 Approach: Detecting Causal Requirements -- 4.1 Methods -- 4.2 Evaluation Procedure -- 4.3 Experimental Results -- 5 Related Work -- 6 Conclusion and Next Steps -- References -- Improving Trace Link Recovery Using Semantic Relation Graphs and Spreading Activation -- 1 Introduction -- 2 Background -- 2.1 Trace Link Recovery -- 2.2 Knowledge Representation -- 2.3 Existing Approach -- 3 Datasets: Characteristics of Requirements -- 4 Approach Revisions -- 4.1 Knowledge Base Construction -- 4.2 Semantic Search -- 5 Evaluation -- 5.1 Metrics -- 5.2 Results for Datasets -- 5.3 Limitations -- 6 Discussion -- 7 Conclusion -- References -- CORG: A Component-Oriented Synthetic Textual Requirements Generator -- 1 Introduction.
2 Background -- 3 CORG Formal Grammar -- 4 CORG -- 4.1 Content Determination -- 4.2 Textual Structuring -- 4.3 Sentence Aggregation -- 4.4 Lexicalisation -- 4.5 Realisation -- 4.6 Requirements Checking -- 5 Evaluation -- 5.1 Generation Coverage -- 5.2 Time Performance -- 5.3 Diversity Evaluation -- 5.4 Correctness Evaluation -- 5.5 Realisticness Evaluation -- 5.6 Strengths and Limitations -- 6 Related Work -- 7 Conclusion -- References -- Automatically Classifying Non-functional Requirements with Feature Extraction and Supervised Machine Learning Techniques: A Research Preview -- 1 Introduction -- 2 Related Work -- 2.1 Analysis -- 3 Research Investigation -- 3.1 Datasets -- 3.2 Research Methodology -- 4 Preliminary Evaluation -- 4.1 Preliminary Analysis -- 4.2 Preliminary Validation -- 5 Conclusion and Future Work -- References -- RE for AI-Enabled Systems -- AdaptationExplore - A Process for Elicitation, Negotiation, and Documentation of Adaptive Requirements -- 1 Introduction -- 2 Related Work -- 3 Process Overview -- 4 Running Example -- 5 Initial Phase -- 6 Exploration Phase -- 6.1 Situation -- 6.2 Identification of Situations -- 6.3 Situation Analysis with Trigger Questions -- 7 Integration Phase -- 7.1 Situation Integration -- 7.2 Adaptation Analysis and Documentation -- 8 Discussion -- 9 Pilot Study -- 10 Conclusion -- References -- Trustworthy AI Services in the Public Sector: What Are Citizens Saying About It? -- 1 Introduction -- 2 Related Work -- 3 Research Methods -- 3.1 Overview of the Qualitative Study -- 3.2 Study Participants -- 3.3 Data Collection -- 3.4 Data Analysis -- 4 Results -- 4.1 Transparency -- 4.2 Purpose -- 4.3 Data -- 4.4 Core AI Process -- 4.5 Human Involvement -- 4.6 Service Overview -- 5 Discussion -- 5.1 Transparency -- 5.2 Other Requirements -- 5.3 Study Limitations -- 6 Conclusions -- References.
Defining Utility Functions for Multi-stakeholder Self-adaptive Systems -- 1 Introduction -- 2 Proposed Approach -- 3 Empirical Study -- 4 Related Work -- 5 Discussion, Conclusion, and Future Work -- References -- Risk-Driven Compliance Assurance for Collaborative AI Systems: A Vision Paper -- 1 Introduction -- 2 Illustrative Example -- 3 Research Challenges -- 4 Research Roadmap -- 5 Conclusion -- References -- From Software to Systems and Services -- Requirements Engineering in the Planning Phase of a Software Ecosystem -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Software Ecosystems -- 2.2 Requirements Engineering in Software Ecosystems -- 3 Research Methods -- 3.1 Research Question -- 3.2 Description of Case SECO -- 3.3 Research Process -- 4 Results -- 4.1 Overview of the Conceptualization Process of Digital Services -- 4.2 High-Level Conceptualization of Digital Services -- 4.3 Detailed Conceptualization of Digital Services -- 4.4 RE Activities of the Conceptualization Process of Digital Services -- 4.5 Challenges in the Conceptualization Process -- 5 Discussion -- 5.1 Requirement Engineering in the Planning Phase of a Software Ecosystem -- 5.2 Threats to Validity -- 6 Conclusions -- References -- Power and Privacy in Software Ecosystems: A Study on Data Breach Impact on Tech Giants -- 1 Introduction -- 2 Theoretical Foundation -- 2.1 Software Ecosystems -- 2.2 Power -- 3 Research Method -- 4 Results -- 4.1 Case 1 - YouTube (Google Ecosystem) -- 4.2 Case 2 - Alexa (Amazon Ecosystem) -- 4.3 Case 3 - Instagram (Facebook Ecosystem) -- 4.4 Case 4 - Siri (Apple Ecosystem) -- 5 Discussion and Conclusion -- 5.1 Implications for Research and Practice -- 5.2 Threats to Validity -- 5.3 Related Work -- 5.4 Future Work -- References -- Iterative and Scenario-Based Requirements Specification in a System of Systems Context -- 1 Introduction.
2 Background -- 2.1 System of Systems Engineering (SoSE) -- 2.2 Example of Application -- 2.3 Scenario Modeling Language for Kotlin (SMLK) -- 3 Scenario-Based Requirements Specification in a System of Systems Context -- 3.1 Inter-system Scenarios -- 3.2 Intra-system Scenarios -- 3.3 Specification Method -- 4 Proof of Concept -- 5 Related Work -- 6 Summary and Outlook -- References -- Specifying Requirements for Data Collection and Analysis in Data-Driven RE. A Research Preview -- 1 Introduction -- 2 Background and Related Work -- 3 Case Study -- 4 User Feedback Requirements and Related Tasks -- 5 Conclusion -- References -- Analysts' Competence and Training -- SaPeer Approach for Training Requirements Analysts: An Application Tailored to a Low-resource Context -- 1 Introduction -- 2 Related Work and Background -- 3 Tailored SaPeer -- 3.1 The SaPeer Approach -- 3.2 Rationale for Tailoring the SaPeer Approach -- 3.3 The Tailored SaPeer Approach -- 4 Research Design -- 4.1 Research Questions -- 4.2 Data Collection and Analysis Procedures -- 4.3 Threats to Validity -- 5 Results -- 6 Conclusions and Further Research -- References -- On Understanding the Relation of Knowledge and Confidence to Requirements Quality -- 1 Introduction -- 2 Background and Related Work -- 3 Research Methodology and Data Collection -- 4 Results of Data Analysis -- 5 Conclusions and Future Work -- Appendix -- References -- Author Index.
Record Nr. UNINA-9910483471303321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Requirements engineering: foundation for software quality : 27th international working conference, refsq 2021, essen, germany, april 12-15, 2021, proceedings / / edited by Fabiano Dalpiaz, Paola Spoletini
Requirements engineering: foundation for software quality : 27th international working conference, refsq 2021, essen, germany, april 12-15, 2021, proceedings / / edited by Fabiano Dalpiaz, Paola Spoletini
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (241 pages) : illustrations
Disciplina 005.1
Collana Lecture Notes in Computer Science
Soggetto topico Artificial intelligence
ISBN 3-030-73128-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Keynotes -- Practicing (Whose?) Values: Requirements Engineering as a Catalyst for Technology Justice -- The Challenge(s) of Teaching Requirements Engineering -- What Makes Intelligent Visual Analytics Tools Really Intelligent? -- Contents -- Natural Language Processing and Machine Learning -- Is Requirements Similarity a Good Proxy for Software Similarity? An Empirical Investigation in Industry -- 1 Introduction -- 2 Related Work -- 3 Study Design -- 3.1 Study Context -- 3.2 Objective and Research Questions -- 3.3 Data Collection -- 3.4 Language Models for Requirements Similarity -- 3.5 Software Similarity Pipeline -- 3.6 Execution -- 3.7 Data Analysis -- 4 Results -- 5 Discussion -- 6 Threats to Validity -- 7 Conclusion and Future Work -- References -- Automatic Detection of Causality in Requirement Artifacts: The CiRA Approach -- 1 Introduction -- 2 Terminology -- 3 Case Study: Causality in Requirement Documents -- 3.1 Research Questions -- 3.2 Study Objects -- 3.3 Study Design -- 3.4 Study Results -- 3.5 Implications for Causality Detection and Extraction -- 3.6 Threats to Validity -- 4 Approach: Detecting Causal Requirements -- 4.1 Methods -- 4.2 Evaluation Procedure -- 4.3 Experimental Results -- 5 Related Work -- 6 Conclusion and Next Steps -- References -- Improving Trace Link Recovery Using Semantic Relation Graphs and Spreading Activation -- 1 Introduction -- 2 Background -- 2.1 Trace Link Recovery -- 2.2 Knowledge Representation -- 2.3 Existing Approach -- 3 Datasets: Characteristics of Requirements -- 4 Approach Revisions -- 4.1 Knowledge Base Construction -- 4.2 Semantic Search -- 5 Evaluation -- 5.1 Metrics -- 5.2 Results for Datasets -- 5.3 Limitations -- 6 Discussion -- 7 Conclusion -- References -- CORG: A Component-Oriented Synthetic Textual Requirements Generator -- 1 Introduction.
2 Background -- 3 CORG Formal Grammar -- 4 CORG -- 4.1 Content Determination -- 4.2 Textual Structuring -- 4.3 Sentence Aggregation -- 4.4 Lexicalisation -- 4.5 Realisation -- 4.6 Requirements Checking -- 5 Evaluation -- 5.1 Generation Coverage -- 5.2 Time Performance -- 5.3 Diversity Evaluation -- 5.4 Correctness Evaluation -- 5.5 Realisticness Evaluation -- 5.6 Strengths and Limitations -- 6 Related Work -- 7 Conclusion -- References -- Automatically Classifying Non-functional Requirements with Feature Extraction and Supervised Machine Learning Techniques: A Research Preview -- 1 Introduction -- 2 Related Work -- 2.1 Analysis -- 3 Research Investigation -- 3.1 Datasets -- 3.2 Research Methodology -- 4 Preliminary Evaluation -- 4.1 Preliminary Analysis -- 4.2 Preliminary Validation -- 5 Conclusion and Future Work -- References -- RE for AI-Enabled Systems -- AdaptationExplore - A Process for Elicitation, Negotiation, and Documentation of Adaptive Requirements -- 1 Introduction -- 2 Related Work -- 3 Process Overview -- 4 Running Example -- 5 Initial Phase -- 6 Exploration Phase -- 6.1 Situation -- 6.2 Identification of Situations -- 6.3 Situation Analysis with Trigger Questions -- 7 Integration Phase -- 7.1 Situation Integration -- 7.2 Adaptation Analysis and Documentation -- 8 Discussion -- 9 Pilot Study -- 10 Conclusion -- References -- Trustworthy AI Services in the Public Sector: What Are Citizens Saying About It? -- 1 Introduction -- 2 Related Work -- 3 Research Methods -- 3.1 Overview of the Qualitative Study -- 3.2 Study Participants -- 3.3 Data Collection -- 3.4 Data Analysis -- 4 Results -- 4.1 Transparency -- 4.2 Purpose -- 4.3 Data -- 4.4 Core AI Process -- 4.5 Human Involvement -- 4.6 Service Overview -- 5 Discussion -- 5.1 Transparency -- 5.2 Other Requirements -- 5.3 Study Limitations -- 6 Conclusions -- References.
Defining Utility Functions for Multi-stakeholder Self-adaptive Systems -- 1 Introduction -- 2 Proposed Approach -- 3 Empirical Study -- 4 Related Work -- 5 Discussion, Conclusion, and Future Work -- References -- Risk-Driven Compliance Assurance for Collaborative AI Systems: A Vision Paper -- 1 Introduction -- 2 Illustrative Example -- 3 Research Challenges -- 4 Research Roadmap -- 5 Conclusion -- References -- From Software to Systems and Services -- Requirements Engineering in the Planning Phase of a Software Ecosystem -- 1 Introduction -- 2 Related Work -- 2.1 Overview of Software Ecosystems -- 2.2 Requirements Engineering in Software Ecosystems -- 3 Research Methods -- 3.1 Research Question -- 3.2 Description of Case SECO -- 3.3 Research Process -- 4 Results -- 4.1 Overview of the Conceptualization Process of Digital Services -- 4.2 High-Level Conceptualization of Digital Services -- 4.3 Detailed Conceptualization of Digital Services -- 4.4 RE Activities of the Conceptualization Process of Digital Services -- 4.5 Challenges in the Conceptualization Process -- 5 Discussion -- 5.1 Requirement Engineering in the Planning Phase of a Software Ecosystem -- 5.2 Threats to Validity -- 6 Conclusions -- References -- Power and Privacy in Software Ecosystems: A Study on Data Breach Impact on Tech Giants -- 1 Introduction -- 2 Theoretical Foundation -- 2.1 Software Ecosystems -- 2.2 Power -- 3 Research Method -- 4 Results -- 4.1 Case 1 - YouTube (Google Ecosystem) -- 4.2 Case 2 - Alexa (Amazon Ecosystem) -- 4.3 Case 3 - Instagram (Facebook Ecosystem) -- 4.4 Case 4 - Siri (Apple Ecosystem) -- 5 Discussion and Conclusion -- 5.1 Implications for Research and Practice -- 5.2 Threats to Validity -- 5.3 Related Work -- 5.4 Future Work -- References -- Iterative and Scenario-Based Requirements Specification in a System of Systems Context -- 1 Introduction.
2 Background -- 2.1 System of Systems Engineering (SoSE) -- 2.2 Example of Application -- 2.3 Scenario Modeling Language for Kotlin (SMLK) -- 3 Scenario-Based Requirements Specification in a System of Systems Context -- 3.1 Inter-system Scenarios -- 3.2 Intra-system Scenarios -- 3.3 Specification Method -- 4 Proof of Concept -- 5 Related Work -- 6 Summary and Outlook -- References -- Specifying Requirements for Data Collection and Analysis in Data-Driven RE. A Research Preview -- 1 Introduction -- 2 Background and Related Work -- 3 Case Study -- 4 User Feedback Requirements and Related Tasks -- 5 Conclusion -- References -- Analysts' Competence and Training -- SaPeer Approach for Training Requirements Analysts: An Application Tailored to a Low-resource Context -- 1 Introduction -- 2 Related Work and Background -- 3 Tailored SaPeer -- 3.1 The SaPeer Approach -- 3.2 Rationale for Tailoring the SaPeer Approach -- 3.3 The Tailored SaPeer Approach -- 4 Research Design -- 4.1 Research Questions -- 4.2 Data Collection and Analysis Procedures -- 4.3 Threats to Validity -- 5 Results -- 6 Conclusions and Further Research -- References -- On Understanding the Relation of Knowledge and Confidence to Requirements Quality -- 1 Introduction -- 2 Background and Related Work -- 3 Research Methodology and Data Collection -- 4 Results of Data Analysis -- 5 Conclusions and Future Work -- Appendix -- References -- Author Index.
Record Nr. UNISA-996464401703316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Requirements Engineering: Foundation for Software Quality [[electronic resource] ] : 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018, Proceedings / / edited by Erik Kamsties, Jennifer Horkoff, Fabiano Dalpiaz
Requirements Engineering: Foundation for Software Quality [[electronic resource] ] : 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018, Proceedings / / edited by Erik Kamsties, Jennifer Horkoff, Fabiano Dalpiaz
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVII, 369 p. 66 illus.)
Disciplina 005
Collana Programming and Software Engineering
Soggetto topico Software engineering
Programming languages (Electronic computers)
Application software
Artificial intelligence
User interfaces (Computer systems)
Software Engineering
Programming Languages, Compilers, Interpreters
Information Systems Applications (incl. Internet)
Artificial Intelligence
User Interfaces and Human Computer Interaction
ISBN 3-319-77243-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto RE in Industrial Practice -- NLP in Theory and Practice -- Empirical Insights into Traceability -- Taming Ambiguity -- Large-Scale RE -- Quality Requirements -- User and Job Stories -- Requirements Alignment -- RE Previews and Visions -- Big Data -- Mindmapping and Requirements Modeling.
Record Nr. UNISA-996465484603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Requirements Engineering: Foundation for Software Quality : 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018, Proceedings / / edited by Erik Kamsties, Jennifer Horkoff, Fabiano Dalpiaz
Requirements Engineering: Foundation for Software Quality : 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018, Proceedings / / edited by Erik Kamsties, Jennifer Horkoff, Fabiano Dalpiaz
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVII, 369 p. 66 illus.)
Disciplina 005
Collana Programming and Software Engineering
Soggetto topico Software engineering
Programming languages (Electronic computers)
Application software
Artificial intelligence
User interfaces (Computer systems)
Software Engineering
Programming Languages, Compilers, Interpreters
Information Systems Applications (incl. Internet)
Artificial Intelligence
User Interfaces and Human Computer Interaction
ISBN 3-319-77243-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto RE in Industrial Practice -- NLP in Theory and Practice -- Empirical Insights into Traceability -- Taming Ambiguity -- Large-Scale RE -- Quality Requirements -- User and Job Stories -- Requirements Alignment -- RE Previews and Visions -- Big Data -- Mindmapping and Requirements Modeling.
Record Nr. UNINA-9910349459503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Research Challenges in Information Science [[electronic resource] ] : 14th International Conference, RCIS 2020, Limassol, Cyprus, September 23–25, 2020, Proceedings / / edited by Fabiano Dalpiaz, Jelena Zdravkovic, Pericles Loucopoulos
Research Challenges in Information Science [[electronic resource] ] : 14th International Conference, RCIS 2020, Limassol, Cyprus, September 23–25, 2020, Proceedings / / edited by Fabiano Dalpiaz, Jelena Zdravkovic, Pericles Loucopoulos
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (659 pages)
Disciplina 020.72
Collana Lecture Notes in Business Information Processing
Soggetto topico Application software
Information technology
Business—Data processing
Database management
Software engineering
Information Systems Applications (incl. Internet)
IT in Business
Computer Applications
Database Management
Software Engineering
ISBN 3-030-50316-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Analytics and Business Intelligence -- Toward Becoming a Data-Driven Organization: Challenges and Benefits -- A Big Data Conceptual Model to Improve Quality of Business Analytics -- How to measure in uence in social networks -- Developing a real-time tra c reporting and forecasting back-end system -- IoT Analytics Architectures: Challenges, solution proposals and future research directions -- Digital Enterprise and Technologies Structural Coupling, Strategy and Fractal Enterprise Modeling -- Systems-Thinking Heuristics for the Reconciliation of Methodologies for Design and Analysis for Information Systems Engineering -- An Ontology of IS Design Science Research Artefacts -- Evolution of Enterprise Architecture for Intelligent Digital Systems -- Human Factors in Information Systems Online peer support groups for behaviour change: Moderation requirements -- User-Experience in Business Intelligence - A Quality Construct and Model to Design Supportive BI Dashboards -- FINESSE: Fair Incentives for Enterprise Employees -- Explainable Recommendations in Intelligent Systems: Delivery Methods, Modalities and Risks -- Participation in Hackathons: A Multi-Methods View on Motivators, Demotivators and Citizen Participation -- Information Systems Development and Testing A systematic literature review of blockchain-enabled smart contracts: platforms, languages, consensus, applications and choice criteria -- Scriptless testing at the GUI level in an industrial setting -- Improving Performance and Scalability of Model-Driven generated Web applications: An experience report -- TesCaV: An Approach for Learning Model-based Testing and Coverage in Practice -- Machine Learning and Text Processing Automatic Classi cation Rules for Anomaly Detection in Time-series -- Text Embeddings for Retrieval from a Large Knowledge Base -- Predicting Unemployment with Machine Learning Based on Registry Data -- Anomaly detection on data streams - A LSTM's diary -- Process Mining, Discovery, and Simulation Discovering Business Process Simulation Models in the Presence of Multitasking -- TLKC-Privacy Model for Process Mining -- Incremental Discovery of Hierarchical Process Models -- Security and Privacy -- Ontology Evolution in the Context of Model-based Secure Software Engineering -- Blockchain-Based Personal Health Records for Patients' Empowerment -- COPri - a Core Ontology for Privacy Requirements Engineering -- Privacy Preserving Real-Time Video Stream Change Detection Based on the Orthogonal Tensor Decomposition Models.
Record Nr. UNISA-996465463903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Research Challenges in Information Science : 14th International Conference, RCIS 2020, Limassol, Cyprus, September 23–25, 2020, Proceedings / / edited by Fabiano Dalpiaz, Jelena Zdravkovic, Pericles Loucopoulos
Research Challenges in Information Science : 14th International Conference, RCIS 2020, Limassol, Cyprus, September 23–25, 2020, Proceedings / / edited by Fabiano Dalpiaz, Jelena Zdravkovic, Pericles Loucopoulos
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (659 pages)
Disciplina 020.72
025.04
Collana Lecture Notes in Business Information Processing
Soggetto topico Application software
Information technology
Business—Data processing
Database management
Software engineering
Information Systems Applications (incl. Internet)
IT in Business
Computer Applications
Database Management
Software Engineering
ISBN 3-030-50316-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Analytics and Business Intelligence -- Toward Becoming a Data-Driven Organization: Challenges and Benefits -- A Big Data Conceptual Model to Improve Quality of Business Analytics -- How to measure in uence in social networks -- Developing a real-time tra c reporting and forecasting back-end system -- IoT Analytics Architectures: Challenges, solution proposals and future research directions -- Digital Enterprise and Technologies Structural Coupling, Strategy and Fractal Enterprise Modeling -- Systems-Thinking Heuristics for the Reconciliation of Methodologies for Design and Analysis for Information Systems Engineering -- An Ontology of IS Design Science Research Artefacts -- Evolution of Enterprise Architecture for Intelligent Digital Systems -- Human Factors in Information Systems Online peer support groups for behaviour change: Moderation requirements -- User-Experience in Business Intelligence - A Quality Construct and Model to Design Supportive BI Dashboards -- FINESSE: Fair Incentives for Enterprise Employees -- Explainable Recommendations in Intelligent Systems: Delivery Methods, Modalities and Risks -- Participation in Hackathons: A Multi-Methods View on Motivators, Demotivators and Citizen Participation -- Information Systems Development and Testing A systematic literature review of blockchain-enabled smart contracts: platforms, languages, consensus, applications and choice criteria -- Scriptless testing at the GUI level in an industrial setting -- Improving Performance and Scalability of Model-Driven generated Web applications: An experience report -- TesCaV: An Approach for Learning Model-based Testing and Coverage in Practice -- Machine Learning and Text Processing Automatic Classi cation Rules for Anomaly Detection in Time-series -- Text Embeddings for Retrieval from a Large Knowledge Base -- Predicting Unemployment with Machine Learning Based on Registry Data -- Anomaly detection on data streams - A LSTM's diary -- Process Mining, Discovery, and Simulation Discovering Business Process Simulation Models in the Presence of Multitasking -- TLKC-Privacy Model for Process Mining -- Incremental Discovery of Hierarchical Process Models -- Security and Privacy -- Ontology Evolution in the Context of Model-based Secure Software Engineering -- Blockchain-Based Personal Health Records for Patients' Empowerment -- COPri - a Core Ontology for Privacy Requirements Engineering -- Privacy Preserving Real-Time Video Stream Change Detection Based on the Orthogonal Tensor Decomposition Models.
Record Nr. UNINA-9910410038303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure and Trustworthy Service Composition [[electronic resource] ] : The Aniketos Approach / / edited by Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios
Secure and Trustworthy Service Composition [[electronic resource] ] : The Aniketos Approach / / edited by Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 247 p. 92 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Information technology
Business—Data processing
Computer communication systems
Systems and Data Security
Software Engineering
IT in Business
Computer Communication Networks
ISBN 3-319-13518-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Composite Services with Dynamic Behaviour -- Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions -- Adopting Existing Communication Platforms for Security Enabling Technologies -- The Aniketos Platform -- The Socio-technical Security Requirements Modelling Language for Secure Composite Services -- From Consumer Requirements to Policies in Secure Services -- Security Requirements Engineering with STS-Tool -- Using SecureBPMN for Modelling Security-Aware Service Compositions -- The Aniketos Service Composition Framework: Analysing and Ranking of Secure Services -- Compliance Validation of Secure Service Compositions -- Aggregation and Optimisation of Trustworthiness of Composite Services -- Monitoring Threats to Composite Services within the Aniketos Run-Time Framework -- Security Policy Monitoring of Composite Services -- The Aniketos Design-Time Framework Applied – A Case in Air Traffic Management -- Supporting Security and Trust in Complex e-Government Services -- Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome.
Record Nr. UNISA-996210519203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Secure and Trustworthy Service Composition : The Aniketos Approach / / edited by Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios
Secure and Trustworthy Service Composition : The Aniketos Approach / / edited by Achim Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 247 p. 92 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Information technology
Business—Data processing
Computer communication systems
Systems and Data Security
Software Engineering
IT in Business
Computer Communication Networks
ISBN 3-319-13518-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Composite Services with Dynamic Behaviour -- Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions -- Adopting Existing Communication Platforms for Security Enabling Technologies -- The Aniketos Platform -- The Socio-technical Security Requirements Modelling Language for Secure Composite Services -- From Consumer Requirements to Policies in Secure Services -- Security Requirements Engineering with STS-Tool -- Using SecureBPMN for Modelling Security-Aware Service Compositions -- The Aniketos Service Composition Framework: Analysing and Ranking of Secure Services -- Compliance Validation of Secure Service Compositions -- Aggregation and Optimisation of Trustworthiness of Composite Services -- Monitoring Threats to Composite Services within the Aniketos Run-Time Framework -- Security Policy Monitoring of Composite Services -- The Aniketos Design-Time Framework Applied – A Case in Air Traffic Management -- Supporting Security and Trust in Complex e-Government Services -- Characteristics and Addressed Challenges in Evaluating the Aniketos Project Outcome.
Record Nr. UNINA-9910484783903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui