MODEL-BASED QUALITY MANAGEMENT

Size: px
Start display at page:

Download "MODEL-BASED QUALITY MANAGEMENT"

Transcription

1 MODEL-BASED QUALITY MANAGEMENT Jürgen Dorn and Riccardo Peratello Institut für Informationssysteme, Technische Universität Wien Wien, Austria ABSTRACT The paper describes an extension of PROSPEC, a system to represent enterprises model-based to derive from the deep knowledge of the business processes requirements for a Quality Management System. Especially, features demanded by the new ISO 9000:2000 for such systems such as continuos improvement and determination of customer requirements are addressed. The development of the enterprise model is guided by process templates and questionnaires to achieve a complete model that can be checked for completeness and integrity by knowledge-based techniques. This model supports also maintenance and continuos improvement. INTRODUCTION Developing a quality management system (QMS) is a tedious task especially for small and medium enterprises that cannot effort specialists for this task. Moreover, updating the QMS regularly to optimize the processes and to make the system reflect the actual practice of the enterprise is even more burdensome. Therefore, computer supported development and maintenance of a QMS is of great promise. However, the construction and maintenance work should not be regarded as a isolated task. Information flow and document handling is a task that is usually also be managed with information technology. Other tasks such as environmental management (ISO 14000) and resource management are also closely related to QM so that an integrated view on all these tasks should be prevalent. There are some tools applicable for supporting the development task. These are mainly drawing tools and tools to select from existing text blocks to facilitate the developing of a quality handbook. This is an approach to facilitate the certification process of ISO 9001 but for the internal quality management, this approach is rather incomplete. Since the quality management approach of ISO 9000 relates closely with business process reengineering (BPR), tools for BPR can also support QM. American institutions such as the Department of Defense (DoD) or the National Institute for Standardization (1) propose the IDEF0 language as a tool to model processes. However, this language s syntax does not distinguish between entities such as processes, activities, data, organizational units, and resources. Thus it may be used to analyze and design processes, but there is no possibility to support automatic consistency checking. More sophisticated tools such as ARIS-toolkit (2) enables a user to specify processes from different views (data, services, functions) where rules describe which entities must occur in a model and which relations may exist between entities. In this case, a program can check the consistency of a model. However, ARIS does not integrate QM issues yet. We have developed PROSPEC, an Internet-based tool to specify business processes (3). PROSPEC that is realized as a Java applet allows the graphical construction of process models and the storing of a model in a formal language. This tool is now extended to model QM related issues such as responsibility for functions, QM-instructions, and more. PROSPEC checks the completeness and the consistency of a developed enterprise model by means of model-based techniques from AI (4). Finally, PROSPEC shall be extended to support continuous improvement of processes by learning and optimization techniques from AI. These tasks rely on measuring the performance of actual processes and the reasoning on causal

2 dependencies. The formal language to describe enterprise models is realized with XML. XML allows the definition of different views on a knowledge structure, which can be used to distinguish views such as a control view, a quality management view, a resource view, or an information management view. By defining a deep knowledge-based view of a process, which includes especially causal and temporal dependencies between entities of a process, PROSPEC allows consistency checking of quality-related issues and intelligent reasoning about requirements. MODEL-BASED REASONING First expert systems (so-called first generation) were based on the representation of rules of thumb to model the experience of experts. This approach is rather application-dependent which would mean for QMS that heuristic knowledge must be modeled for each individual system anew. Although this approach was often successful many researchers and practitioners recognized drawbacks of such systems and proposed second generation expert systems. These systems incorporate a deeper model of knowledge enabling the reasoning by first principles. The deep model consists of the representation of components, causal and other dependencies between components, and the expected correct behavior of the system. A typical application field is diagnosis of technical devices. In contrast to biological systems (such as a human) which formed the domain of most first generation expert systems, the technical systems are almost completely understood. All components are known and the behavior of the whole can theoretically be predicted from the behavior of the parts. Maintaining technical systems involves diagnosing possible failures and planning actions to repair the system. First generation systems would use heuristics to identify malfunctions and to repair the system. Instead second generation expert systems would try to use first heuristic rules if applicable and if no such knowledge exist they would use the deep model to reason how the failure was caused. The advantages of model-based techniques are as follows: Pure rule-based systems are brittle in the sense that as soon as situations occur which fall outside the scope of the heuristic knowledge base, they are unable to function at all. In such a situation, second generation systems fall back on search that is not heuristic-driven and therefore potentially very inefficient. However, because these traditional search techniques can theoretically solve a wider class of problems, there is a graceful degradation of performance instead of abrupt failure. First generation systems base their explanations purely on a backtrace of the heuristic rules that were needed to find a solution. It is well known however, that the path followed to find a solution usually differs from convincing rational argument why the solution is valuable, particularly if a lot of heuristic knowledge entered into the reasoning process. Because second generation expert systems have access to a deeper understanding, they are capable to formulate a deeper and more convincing explanation, which goes beyond the mere recall of which rules fired. The most important advantage lies however in knowledge acquisition. Finding heuristic rules has turned out to be extremely difficult. Experts typically take a long time to come up with solid rules, the rule set seems never to be complete, is continuously changing and shows inconsistencies across experts. These inconsistencies are apparently due to different experiences which are the source of heuristic rule discovery. Second generation expert systems constitute a major jump forward in technology because they exhibit learning behavior in the sense that they are capable to acquire new heuristic rules. If we adopt the model-based approach for PROSPEC, we must model processes and their parts as well as the interrelations between processes and their components. An important foundation for a model-based approach is an appropriate process model. This model must support

3 the representation of all parts such as functions, required services and products, produced services and products, required information and resources, and more, the representation of interrelations between entities such as temporal and causal dependencies between functions and information flow, different views on the models, and finally integrity and completeness constraints between entities. In the following we describe part of the model and explain the basics for checking consistency and completeness in such a model. PROCESS GRAMMAR XML (5) is used to define a process grammar and to store enterprise models. XML allows defining a grammar that can be stored somewhere in the Internet in a dtd-file. The further elaboration on the process model shall be no discussion on XML features and syntax. To explain all details of the definition of a grammar would cost too much space here. On the other side, we want to show the full representational capabilities. Therefore we do use XML in an informal style and the following definitions are a mixture of grammar definition and representation with the grammar. XML is a promising standard for describing rich knowledge-based models because it allows defining different views on a model. Thus for an enterprise model we propose a basic control view and building upon it views to explore in deeper detail such aspects as the flow of information, the quality view and a resource view. A process model can be interpreted as graph consisting of nodes and edges between nodes. Nodes represent such entities as functions (main activities of the process, test activities, and decisions), events (typically, events occur asynchronously and they are conditions for further performance of functions), information that is used by different functions. Edges represent a flow of control and the flow of information between functions. Thus, an enterprise consisting of at least one process is defined as follows: enterprise ::= <ENTERPRISE>name process+</enterprise>. process ::= <PROCESS>(function event information)+ (control-flow information-flow)*</process>. The plus sign in the definition means that at least one element must exist (an enterprise must have a process and at least one node). The asterisk means that zero or more elements may exist (in a very simple process no control flow must be defined). The in the definition means a disjunction (a node may be a function, an event, or information). This process-oriented model could be easily extended with an organizational chart by adding an appropriate attribute to the enterprise definition. The main view of any process model is a control view that describes the sequence of activities (functions) and events as well as the causal and temporal dependencies between these entities. Since processes may become very complex, it should be possible to describe processes on different levels of granularity. Thus in an abstract process it possible to link to a refined subprocess. The quality view focuses besides other aspects on the fulfillment of customer requirements. Processes and single functions are performed to produce certain products or services for the client of the process. These services are outputs of a process. On the contrary, processes may also require certain inputs that are also products or services. For most functions as well as processes a single authority (a human or an organizational unit) should be responsible which must be

4 described in a QMS. Further attributes of any function or process are a name, an expected duration for performing it, a number of instructions that may give a framework how to perform the action. Since we may refer to entities in relations described later, it is necessary to give entities a unique identifier. Thus, we assume PROSPEC gives unique names to every defined object (node). While we use graphical elements (e.g. edges) in the user interface to describe relations, the formal language needs these unique identifiers to store information. In the following definitions we use the id attribute for XML elements to store this identifiers and the idref attribute of XML is used to reference these objects later. We assume a further classification of such references where the first character of the name is an abbreviation for object s type and the rest of the name is a unique number represented in the definitions as X. function ::= procedure test decision subprocess. procedure ::= <PROCEDURE id="fx">functional-descr</procedure>. test ::= <TEST id="tx" idref="sx">duration</test>. decision ::= <DECISION id="dx" idref="ix">authority, decisionstatement</decision>. subprocess ::= <SUBPROCESS id="fx">functional-descr</subprocess>. functional-descr ::= name duration instruction* input* output* information* responsibility* resource*. instruction ::= <INSTRUCTION id="xx">text</instruction> input ::= <INPUT>(service product)</input> output ::= <OUTPUT>(service product)</output> service ::= <SERVICE>name service-req*</service>. product ::= <PRODUCT>name product-req*</product>. product-req ::= <PRODUCT-REQUIREMENT type=(size,colour,price,date )>value </PRODUCT-REQUIREMENT>. service-req ::= <SERVICE-REQUIREMENT type=(date, )>value </SERVICE-REQUIREMENT>. event ::= <EVENT id="ex">name duration</event>. information ::= dataobject document. dataobject ::= <OBJECT id="ox">name super? attribute* </OBJECT>. document ::= <DOCUMENT>url</DOCUMENT>. responsibility ::= authority position. authority ::= <AUTHORITY id="ax">name</authority>. position ::= <POSITION id="px">name</position>. resource ::= <RESOURCE id="rx">name resource-type</resource>. control-flow ::= (temporal-relation causal-relation). temporal-relation ::= <BEFORE>event-ref function-ref</before> <BEFORE>function-ref function-ref</before> <BEFORE>function-ref event-ref</before>. causal-relation ::= <INITIATES>event-ref function-ref</initiates> <DEPENDS-ON>function-ref function-ref</depends-on> <RESULTS-IN>function-ref event-ref</results-in> information-flow ::= <USES>function-ref dataobject-ref</uses> <PRODUCES>function-ref dataobject-ref</produces> <SENDS>event-ref dataobject-ref function-ref</sends> <SENDS>function-ref dataobject-ref function-ref</sends>

5 If an enterprise is modeled with PROSPEC (with the graphical user interface), the model can be stored in the described grammar. The internal model used to reason about the model is of course optimized. We may use real references (pointers) instead of unique identifiers and whole program is object-oriented (with Java). However, the process grammar must contain all information to rebuild a formerly developed model by reading it from a file. If a user has specified a process or a whole enterprise model, a completeness check can be started. For reasoning about the completeness, the process is compared with a standard process. For the standard process defined also in XML, it is expected that it has an output delivered to a customer or some other process in the enterprise. Thus if no output is specified the developer is asked to define what service or product the process shall output. If the user specifies the output, PROSPEC asks about the customer s requirements and how they are determined. Typically, the determination of the requirements is modeled by additional functions of the process. These requirements are modeled also in the services or products. In a quality-oriented enterprise, the outputs should also be checked for correctness and satisfaction of the customer s expectations. This again should be a function (test) visible in the process model. A similar procedure must be performed for the inputs of a process. Furthermore, PROSPEC has to check whether outputs of a process are also declared as inputs of another process. Finally, for all functions it should be specified who performs the function (an organizational unit or a person), who is responsible, and how the performance is done (i.e. by instructions). Thus, the completeness of the process model is checked by comparing it with an idealized standard process behavior. If PROSPEC detects deviations, it asks the user to complete the model or it asks questions from which either the model is completed or explanations are added why the process deviates from the standard behavior. DISCUSSION We have presented a first approach to model-based quality management. Due to space limitations, we have omitted many details (e.g., the process model must also include graphical characteristics to rebuild a graphical model from the stored model). However, there are still important aspects not yet addressed here. The model-based approach as explained earlier builds on the cooperation of deep and heuristic knowledge. Heuristic knowledge should be incorporated by defining additional more specific process types. Such a library of processes can be used to develop first models and to classify processes inserted by a user. Further, we have not yet elaborated the model how the performance of a process is measured in order to improve it (continuously). ACKNOWLEDGEMENTS This work was funded by FWF, the Austrian Science Foundation under the grant number Z29-INF. REFERENCES 1 NIST (1993) Integration Definition for Function Modeling (IDEF0), Draft Federal Information Processing Standards Publication 183, Washington D.C.: National Institute for Standards and Technology. 2 Scheer, A.-W. (1998) ARIS - Vom Geschäftsprozess zum Anwendungssystem, 3. Auflage, Springer Verlag. 3 Aigner, Ch. (1999) Entwicklung eines Internet-basierten Systems zur Spezifikation von Prozessen, Diplomarbeit, Technische Universität Wien. 4 Steels, L. (1987) Second Generation Expert Systems, Proceedings of the Conference of the German Chapter of the ACM, Nürnberg, B.G. Teubner Verlag pp Prescod, P. and Goldfarb, C. (1998) The XML Handbook, Prentice Hall International.

Could a Resource be Simultaneously a Schedule according to the REA Ontology?

Could a Resource be Simultaneously a Schedule according to the REA Ontology? Could a Resource be Simultaneously a Schedule according to the REA Ontology? Frantisek Hunka 1, Miroslav Hucka 2, Josef Kasik 2, Dominik Vymetal 3 emails: frantisek.hunka@osu.cz, (miroslav.hucka, josef.kasik)@vsb.cz,

More information

An Experimental Command and Control Information System based on Enterprise Java Bean Technology

An Experimental Command and Control Information System based on Enterprise Java Bean Technology An Experimental Command and Control Information System based on Enterprise Java Technology Gerhard Bühler & Heinz Faßbender Research Establishment for Applied Sciences Research Institute for Communication,

More information

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. How to implement NIST Cybersecurity Framework using ISO 27001 WHITE PAPER Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

More information

Overview of Today s Lecture. Analytical Evaluation / Usability Testing. ex: find a book at Amazon.ca via search

Overview of Today s Lecture. Analytical Evaluation / Usability Testing. ex: find a book at Amazon.ca via search Overview of Today s Lecture Analytical Evaluation / Usability Testing November 17, 2017 Analytical Evaluation Inspections Recapping cognitive walkthrough Heuristic evaluation Performance modelling 1 2

More information

Data Mining Technology Based on Bayesian Network Structure Applied in Learning

Data Mining Technology Based on Bayesian Network Structure Applied in Learning , pp.67-71 http://dx.doi.org/10.14257/astl.2016.137.12 Data Mining Technology Based on Bayesian Network Structure Applied in Learning Chunhua Wang, Dong Han College of Information Engineering, Huanghuai

More information

QoS-aware model-driven SOA using SoaML

QoS-aware model-driven SOA using SoaML QoS-aware model-driven SOA using SoaML Niels Schot A thesis submitted for the degree of MSc Computer Science University of Twente EEMCS - TRESE: Software Engineering Group Examination committee: Luís Ferreira

More information

Requirements Engineering for Enterprise Systems

Requirements Engineering for Enterprise Systems Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) December 2001 Requirements Engineering for Enterprise Systems

More information

Towards Process-oriented Hospital Information Systems: Some Insights into Requirements, Technical Challenges and Possible Solutions

Towards Process-oriented Hospital Information Systems: Some Insights into Requirements, Technical Challenges and Possible Solutions Appeared in: Proc. 43. Jahrestagung der GMDS (GMDS 98), Bremen, 1998, pp. 175-180 Towards Process-oriented Hospital Information Systems: Some Insights into Requirements, Technical Challenges and Possible

More information

Using Electronic Document Repositories (EDR) for Collaboration A first definition of EDR and technical implementation

Using Electronic Document Repositories (EDR) for Collaboration A first definition of EDR and technical implementation Using Electronic Document Repositories (EDR) for Collaboration A first definition of EDR and technical implementation Hilda Tellioglu Vienna University of Technology, Department for CSCW Argentinierstrasse

More information

Spemmet - A Tool for Modeling Software Processes with SPEM

Spemmet - A Tool for Modeling Software Processes with SPEM Spemmet - A Tool for Modeling Software Processes with SPEM Tuomas Mäkilä tuomas.makila@it.utu.fi Antero Järvi antero.jarvi@it.utu.fi Abstract: The software development process has many unique attributes

More information

Towards Formalization of ARD+ Conceptual Design and Refinement Method

Towards Formalization of ARD+ Conceptual Design and Refinement Method Proceedings of the Twenty-First International FLAIRS Conference (2008) Towards Formalization of ARD+ Conceptual Design and Refinement Method Grzegorz J. Nalepa and Igor Wojnicki Institute of Automatics,

More information

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS

CS SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS 6403 - SOFTWARE ENGINEERING QUESTION BANK SIXTEEN MARKS 1. Explain iterative waterfall and spiral model for software life cycle and various activities

More information

Natural Language Requirements

Natural Language Requirements Natural Language Requirements Software Verification and Validation Laboratory Requirement Elaboration Heuristic Domain Model» Requirement Relationship Natural Language is elaborated via Requirement application

More information

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN NOTES ON OBJECT-ORIENTED MODELING AND DESIGN Stephen W. Clyde Brigham Young University Provo, UT 86402 Abstract: A review of the Object Modeling Technique (OMT) is presented. OMT is an object-oriented

More information

MEMOCenterNG A full-featured modeling environment for organization modeling and model-driven software development

MEMOCenterNG A full-featured modeling environment for organization modeling and model-driven software development MEMOCenterNG A full-featured modeling environment for organization modeling and model-driven software development Jens Gulden and Prof. Dr. Ulrich Frank University Duisburg-Essen, Universitaetsstr. 9,

More information

SEMANTIC WEB POWERED PORTAL INFRASTRUCTURE

SEMANTIC WEB POWERED PORTAL INFRASTRUCTURE SEMANTIC WEB POWERED PORTAL INFRASTRUCTURE YING DING 1 Digital Enterprise Research Institute Leopold-Franzens Universität Innsbruck Austria DIETER FENSEL Digital Enterprise Research Institute National

More information

Log System Based on Software Testing System Design And Implementation

Log System Based on Software Testing System Design And Implementation 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Log System Based on Software Testing System Design And Implementation Yan Liu1, a, Dahai Jin1,

More information

Report. Conceptual Framework for the DIAMONDS Project. SINTEF ICT Networked Systems and Services SINTEF A Unrestricted

Report. Conceptual Framework for the DIAMONDS Project. SINTEF ICT Networked Systems and Services SINTEF A Unrestricted SINTEF A22798- Unrestricted Report Conceptual Framework for the DIAMONDS Project Author(s) Gencer Erdogan, Yan Li, Ragnhild Kobro Runde, Fredrik Seehusen, Ketil Stølen SINTEF ICT Networked Systems and

More information

Open Work of Two-Hemisphere Model Transformation Definition into UML Class Diagram in the Context of MDA

Open Work of Two-Hemisphere Model Transformation Definition into UML Class Diagram in the Context of MDA Open Work of Two-Hemisphere Model Transformation Definition into UML Class Diagram in the Context of MDA Oksana Nikiforova and Natalja Pavlova Department of Applied Computer Science, Riga Technical University,

More information

Annotation for the Semantic Web During Website Development

Annotation for the Semantic Web During Website Development Annotation for the Semantic Web During Website Development Peter Plessers and Olga De Troyer Vrije Universiteit Brussel, Department of Computer Science, WISE, Pleinlaan 2, 1050 Brussel, Belgium {Peter.Plessers,

More information

Combining Different Business Rules Technologies:A Rationalization

Combining Different Business Rules Technologies:A Rationalization A research and education initiative at the MIT Sloan School of Management Combining Different Business Rules Technologies:A Rationalization Paper 116 Benjamin Grosof Isabelle Rouvellou Lou Degenaro Hoi

More information

Retrofitting Security into a Web-Based Information System

Retrofitting Security into a Web-Based Information System Retrofitting Security into a Web-Based Information System David Bettencourt da Cruz, Bernhard Rumpe, Guido Wimmel Software & Systems Engineering, Technische Universität München 85748 Munich/Garching, Germany

More information

Tools for Remote Web Usability Evaluation

Tools for Remote Web Usability Evaluation Tools for Remote Web Usability Evaluation Fabio Paternò ISTI-CNR Via G.Moruzzi, 1 56100 Pisa - Italy f.paterno@cnuce.cnr.it Abstract The dissemination of Web applications is enormous and still growing.

More information

A web application serving queries on renewable energy sources and energy management topics database, built on JSP technology

A web application serving queries on renewable energy sources and energy management topics database, built on JSP technology International Workshop on Energy Performance and Environmental 1 A web application serving queries on renewable energy sources and energy management topics database, built on JSP technology P.N. Christias

More information

Designing Survivable Services from Independent Components with Basic Functionality

Designing Survivable Services from Independent Components with Basic Functionality Designing Survivable Services from Independent Components with Basic Functionality Andreas Dittrich, Jon Kowal and Miroslaw Malek Institut für Informatik Humboldt-Universität zu Berlin Unter den Linden

More information

Higher Order Refinement Heuristics for Rule Validation

Higher Order Refinement Heuristics for Rule Validation From: FLAIRS-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Higher Order Refinement Heuristics for Rule Validation Hans - Werner Kelbassa Email: kelbassa@uni-paderborn.de Abstract

More information

4D CONSTRUCTION SEQUENCE PLANNING NEW PROCESS AND DATA MODEL

4D CONSTRUCTION SEQUENCE PLANNING NEW PROCESS AND DATA MODEL 4D CONSTRUCTION SEQUENCE PLANNING NEW PROCESS AND DATA MODEL Jan Tulke 1, Jochen Hanff 2 1 Bauhaus-University Weimar, Dept. Informatics in Construction, Germany 2 HOCHTIEF ViCon GmbH,Essen, Germany ABSTRACT:

More information

AGG: A Graph Transformation Environment for Modeling and Validation of Software

AGG: A Graph Transformation Environment for Modeling and Validation of Software AGG: A Graph Transformation Environment for Modeling and Validation of Software Gabriele Taentzer Technische Universität Berlin, Germany gabi@cs.tu-berlin.de Abstract. AGG is a general development environment

More information

C E R T I F I C A T I O N O F M A N A G E M E N T S Y S T E M S

C E R T I F I C A T I O N O F M A N A G E M E N T S Y S T E M S GENERAL INFORMATION Vseobecne_informace o_certifikaci_angl.doc 01/17 Request Diagram of the certification procedure in Informative meeting Completed application form + questionnaires Examining the application

More information

Security in the Web Services Framework

Security in the Web Services Framework Security in the Web Services Framework Chen Li and Claus Pahl Dublin City University School of Computing Dublin 9 Ireland Abstract The Web Services Framework provides techniques to enable the application-toapplication

More information

Proceedings of the 6th Educators Symposium: Software Modeling in Education at MODELS 2010 (EduSymp 2010)

Proceedings of the 6th Educators Symposium: Software Modeling in Education at MODELS 2010 (EduSymp 2010) Electronic Communications of the EASST Volume X (2010) Proceedings of the 6th Educators Symposium: Software Modeling in Education at MODELS 2010 (EduSymp 2010) m2n: Translating Models to Natural Language

More information

Enterprise Planning Model Using REA Ontology

Enterprise Planning Model Using REA Ontology Enterprise Planning Model Using REA Ontology Frantisek Hunka 1, Miroslav Hucka 2, Josef Kasik 2, Dominik Vymetal 3 1 University of Ostrava, Dvorakova 7, 701 03 Ostrava 1, Czech Republic, frantisek.hunka@osu.cz

More information

FlowBack: Providing Backward Recovery for Workflow Management Systems

FlowBack: Providing Backward Recovery for Workflow Management Systems FlowBack: Providing Backward Recovery for Workflow Management Systems Bartek Kiepuszewski, Ralf Muhlberger, Maria E. Orlowska Distributed Systems Technology Centre Distributed Databases Unit ABSTRACT The

More information

XML ALONE IS NOT SUFFICIENT FOR EFFECTIVE WEBEDI

XML ALONE IS NOT SUFFICIENT FOR EFFECTIVE WEBEDI Chapter 18 XML ALONE IS NOT SUFFICIENT FOR EFFECTIVE WEBEDI Fábio Ghignatti Beckenkamp and Wolfgang Pree Abstract: Key words: WebEDI relies on the Internet infrastructure for exchanging documents among

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

Category Theory in Ontology Research: Concrete Gain from an Abstract Approach

Category Theory in Ontology Research: Concrete Gain from an Abstract Approach Category Theory in Ontology Research: Concrete Gain from an Abstract Approach Markus Krötzsch Pascal Hitzler Marc Ehrig York Sure Institute AIFB, University of Karlsruhe, Germany; {mak,hitzler,ehrig,sure}@aifb.uni-karlsruhe.de

More information

A Model-Based Reference Workflow for the Development of Safety-Related Software

A Model-Based Reference Workflow for the Development of Safety-Related Software A Model-Based Reference Workflow for the Development of Safety-Related Software 2010-01-2338 Published 10/19/2010 Michael Beine dspace GmbH Dirk Fleischer dspace Inc. Copyright 2010 SAE International ABSTRACT

More information

Representing Symbolic Reasoning

Representing Symbolic Reasoning Representing Symbolic Reasoning Brian Mastenbrook and Eric Berkowitz 1400 N. Roosevelt Blvd. Schaumburg, IL 60173 chandler@acm.roosevelt.edu eric@cs.roosevelt.edu Abstract Introspection is a fundamental

More information

SOME ONTOLOGICAL ISSUES OF THE REA FRAMEWORK IN RELATION TO ENTERPRISE BUSINESS PROCESS

SOME ONTOLOGICAL ISSUES OF THE REA FRAMEWORK IN RELATION TO ENTERPRISE BUSINESS PROCESS SOME ONTOLOGICAL ISSUES OF THE REA FRAMEWORK IN RELATION TO ENTERPRISE BUSINESS PROCESS Frantisek HUNKA, Miroslav HUCKA University of Ostrava, Czech Republic frantisek.hunka@osu.cz Josef KASIK VSB-Technical

More information

9/23/2013. Chapter 2. Objectives. Introduction. Objectives (continued) Representing Algorithms. Representing Algorithms

9/23/2013. Chapter 2. Objectives. Introduction. Objectives (continued) Representing Algorithms. Representing Algorithms Chapter 2 The Algorithmic Foundations of Computer Science Objectives After studying this chapter, students will be able to: Explain the benefits of pseudocode over natural language or a programming language

More information

Universal Model Framework -- An Introduction

Universal Model Framework -- An Introduction Universal Model Framework -- An Introduction By Visible Systems Corporation www.visible.com This document provides an introductory description of the Universal Model Framework an overview of its construct

More information

Market Information Management in Agent-Based System: Subsystem of Information Agents

Market Information Management in Agent-Based System: Subsystem of Information Agents Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) December 2006 Market Information Management in Agent-Based System:

More information

Part 5. Verification and Validation

Part 5. Verification and Validation Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this

More information

Automatic Test Markup Language <ATML/> Sept 28, 2004

Automatic Test Markup Language <ATML/> Sept 28, 2004 Automatic Test Markup Language Sept 28, 2004 ATML Document Page 1 of 16 Contents Automatic Test Markup Language...1 ...1 1 Introduction...3 1.1 Mission Statement...3 1.2...3 1.3...3 1.4

More information

Rich Hilliard 20 February 2011

Rich Hilliard 20 February 2011 Metamodels in 42010 Executive summary: The purpose of this note is to investigate the use of metamodels in IEEE 1471 ISO/IEC 42010. In the present draft, metamodels serve two roles: (1) to describe the

More information

Generalized Document Data Model for Integrating Autonomous Applications

Generalized Document Data Model for Integrating Autonomous Applications 6 th International Conference on Applied Informatics Eger, Hungary, January 27 31, 2004. Generalized Document Data Model for Integrating Autonomous Applications Zsolt Hernáth, Zoltán Vincellér Abstract

More information

Applying the Semantic Web Layers to Access Control

Applying the Semantic Web Layers to Access Control J. Lopez, A. Mana, J. maria troya, and M. Yague, Applying the Semantic Web Layers to Access Control, IEEE International Workshop on Web Semantics (WebS03), pp. 622-626, 2003. NICS Lab. Publications: https://www.nics.uma.es/publications

More information

Analytical Evaluation

Analytical Evaluation Analytical Evaluation November 7, 2016 1 Questions? 2 Overview of Today s Lecture Analytical Evaluation Inspections Performance modelling 3 Analytical Evaluations Evaluations without involving users 4

More information

Code of Practice for the TL 9000 Certification Process. Release 8.0

Code of Practice for the TL 9000 Certification Process. Release 8.0 Code of Practice for the TL 9000 Certification Process Release 8.0 This document is a product of the Oversight Work Group of the TIA Business Performance Community ( BPC ). It is subject to change by the

More information

Application Use Strategies

Application Use Strategies Application Use Strategies Suresh K. Bhavnani Strategies for using complex computer applications such as word processors, and computer-aided drafting (CAD) systems, are general and goal-directed methods

More information

Supplementary Notes on Abstract Syntax

Supplementary Notes on Abstract Syntax Supplementary Notes on Abstract Syntax 15-312: Foundations of Programming Languages Frank Pfenning Lecture 3 September 3, 2002 Grammars, as we have discussed them so far, define a formal language as a

More information

RiMOM Results for OAEI 2009

RiMOM Results for OAEI 2009 RiMOM Results for OAEI 2009 Xiao Zhang, Qian Zhong, Feng Shi, Juanzi Li and Jie Tang Department of Computer Science and Technology, Tsinghua University, Beijing, China zhangxiao,zhongqian,shifeng,ljz,tangjie@keg.cs.tsinghua.edu.cn

More information

RDA Resource Description and Access

RDA Resource Description and Access 1 RDA Resource Description and Access Scope and Structure This document is one of three that define the framework for the development of RDA. The RDA Strategic Plan establishes long-term goals for RDA

More information

Chapter S:II. II. Search Space Representation

Chapter S:II. II. Search Space Representation Chapter S:II II. Search Space Representation Systematic Search Encoding of Problems State-Space Representation Problem-Reduction Representation Choosing a Representation S:II-1 Search Space Representation

More information

Session 609 Tuesday, October 22, 2:45 PM - 3:45 PM Track: IT Governance and Security

Session 609 Tuesday, October 22, 2:45 PM - 3:45 PM Track: IT Governance and Security Session 609 Tuesday, October 22, 2:45 PM - 3:45 PM Track: IT Governance and Security An Overview of Recent Changes to ISO 20000 Ron Lester Enterprise Service Management Consultant, Information Technology

More information

Structural and Syntactic Pattern Recognition

Structural and Syntactic Pattern Recognition Structural and Syntactic Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Fall 2017 CS 551, Fall 2017 c 2017, Selim Aksoy (Bilkent

More information

Refinement and Formalization of Semi-Formal Use Case Descriptions

Refinement and Formalization of Semi-Formal Use Case Descriptions Refinement and Formalization of Semi-Formal Use Case Descriptions Matthias Riebisch, Michael Hübner Ilmenau Technical University Max-Planck-Ring 14; 98684 Ilmenau; Germany {matthias.riebisch michael.huebner}@tu-ilmenau.de

More information

Synthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures

Synthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures Synthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures Dietmar Schreiner 1,2 and Karl M. Göschka 1 1 Vienna University of Technology Institute of Information

More information

A Framework for Source Code metrics

A Framework for Source Code metrics A Framework for Source Code metrics Neli Maneva, Nikolay Grozev, Delyan Lilov Abstract: The paper presents our approach to the systematic and tool-supported source code measurement for quality analysis.

More information

KEYWORD. Manufacturing, simulation, architectures, HLA, standards ABSTRACT

KEYWORD. Manufacturing, simulation, architectures, HLA, standards ABSTRACT INTEGRATION OF MANUFACTURING SIMULATIONS USING HLA Charles McLean and Frank Riddick Manufacturing Systems Integration Division National Institute of Standards and Technology (NIST) Gaithersburg, MD (USA)

More information

KNOWLEDGE-BASED MULTIMEDIA ADAPTATION DECISION-TAKING

KNOWLEDGE-BASED MULTIMEDIA ADAPTATION DECISION-TAKING K KNOWLEDGE-BASED MULTIMEDIA ADAPTATION DECISION-TAKING Dietmar Jannach a, Christian Timmerer b, and Hermann Hellwagner b a Department of Computer Science, Dortmund University of Technology, Germany b

More information

SXML: Streaming XML. Boris Rogge 1, Dimitri Van De Ville 1, Rik Van de Walle 1, Wilfried Philips 2 and Ignace Lemahieu 1

SXML: Streaming XML. Boris Rogge 1, Dimitri Van De Ville 1, Rik Van de Walle 1, Wilfried Philips 2 and Ignace Lemahieu 1 SXML: Streaming XML Boris Rogge 1, Dimitri Van De Ville 1, Rik Van de Walle 1, Wilfried Philips 2 and Ignace Lemahieu 1 1 University of Ghent 2 University of Ghent Elis - Medisip - Ibitech Telin Sint-Pietersnieuwstraat

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 13673 First edition 2000-05-01 Information technology Document processing and related communication Conformance testing for Standard Generalized Markup Language (SGML) systems

More information

Enhancing validation with Prototypes out of Requirements Model

Enhancing validation with Prototypes out of Requirements Model Enhancing validation with Prototypes out of Requirements Model Michael Deynet, Sabine Niebuhr, Björn Schindler Software Systems Engineering, Clausthal University of Technology, 38678 Clausthal-Zellerfeld,

More information

Test requirements in networked systems

Test requirements in networked systems Test requirements in networked systems Jürgen Klüser, Vector Informatik GmbH The use of CAN with J1939 or CANopen based higher layers leads to cost efficient and flexible solutions, but together with a

More information

User Interface Design: The WHO, the WHAT, and the HOW Revisited

User Interface Design: The WHO, the WHAT, and the HOW Revisited User Interface Design: The WHO, the WHAT, and the HOW Revisited Chris Stary T-Group at the University of Technology Vienna CD-Lab for Expert Systems and Department for Information Systems Paniglgasse 16,

More information

Construction of BPMN-based Business Process Model Base

Construction of BPMN-based Business Process Model Base Construction of BPMN-based Business Process Model Base Yanjie Lu Hongming Cai Lihong Jiang Shanghai Jiaotong University hmcai@sjtu.edu.cn doi:10.4156/ijiip.vol1. issue2.3 Shanghai Jiaotong University lvyanjie@sjtu.edu.cn

More information

Validating Plans with Durative Actions via Integrating Boolean and Numerical Constraints

Validating Plans with Durative Actions via Integrating Boolean and Numerical Constraints Validating Plans with Durative Actions via Integrating Boolean and Numerical Constraints Roman Barták Charles University in Prague, Faculty of Mathematics and Physics Institute for Theoretical Computer

More information

ISO/IEC Information technology Open Systems Interconnection The Directory. Part 6: Selected attribute types

ISO/IEC Information technology Open Systems Interconnection The Directory. Part 6: Selected attribute types INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-6 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 6: Selected

More information

CoE CENTRE of EXCELLENCE ON DATA WAREHOUSING

CoE CENTRE of EXCELLENCE ON DATA WAREHOUSING in partnership with Overall handbook to set up a S-DWH CoE: Deliverable: 4.6 Version: 3.1 Date: 3 November 2017 CoE CENTRE of EXCELLENCE ON DATA WAREHOUSING Handbook to set up a S-DWH 1 version 2.1 / 4

More information

Dealing with Artifact-Centric Systems: a Process Mining Approach

Dealing with Artifact-Centric Systems: a Process Mining Approach Dealing with Artifact-Centric Systems: a Process Mining Approach Guangming Li and Renata Medeiros de Carvalho 2 Abstract: Process mining provides a series of techniques to analyze business processes based

More information

Bringing Usability to Industrial Control Systems

Bringing Usability to Industrial Control Systems Bringing Usability to Industrial Control Systems Marcus Reul RWTH Aachen University 52056 Aachen, Germany marcus.reul@rwth-aachen.de Abstract Within my ongoing work at a manufacturer for industrial test

More information

Technology in Action. Chapter Topics. Scope creep occurs when: 3/20/2013. Information Systems include all EXCEPT the following:

Technology in Action. Chapter Topics. Scope creep occurs when: 3/20/2013. Information Systems include all EXCEPT the following: Technology in Action Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Chapter 10 Behind the Scenes: Software Programming Ninth Edition Chapter Topics Understanding software programming Life

More information

Towards Generating Domain-Specific Model Editors with Complex Editing Commands

Towards Generating Domain-Specific Model Editors with Complex Editing Commands Towards Generating Domain-Specific Model Editors with Complex Editing Commands Gabriele Taentzer Technical University of Berlin Germany gabi@cs.tu-berlin.de May 10, 2006 Abstract Domain specific modeling

More information

An integrated knowledge based assembly control system for automobile manufacturing

An integrated knowledge based assembly control system for automobile manufacturing An integrated knowledge based assembly control system for automobile manufacturing B. Fredtag Technische Universitat Munchen, Institut fur Informatik Lehrstuhl Prof. Bayer Orleansstr. 34, D-8000 Munchen

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

Conformance Requirements Guideline Version 0.1

Conformance Requirements Guideline Version 0.1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Editors: Conformance Requirements Guideline Version 0.1 Aug 22, 2001 Lynne Rosenthal (lynne.rosenthal@nist.gov)

More information

OIML-CS PD-08 Edition 1

OIML-CS PD-08 Edition 1 PROCEDURAL DOCUMENT OIML-CS PD-08 Edition 1 Signing the OIML-CS Declaration OIML-CS PD-08 Edition 1 ORGANISATION INTERNATIONALE DE METROLOGIE LEGALE INTERNATIONAL ORGANIZATION OF LEGAL METROLOGY Contents

More information

Recalling the definition of design as set of models let's consider the modeling of some real software.

Recalling the definition of design as set of models let's consider the modeling of some real software. Software Design and Architectures SE-2 / SE426 / CS446 / ECE426 Lecture 3 : Modeling Software Software uniquely combines abstract, purely mathematical stuff with physical representation. There are numerous

More information

1.1 Jadex - Engineering Goal-Oriented Agents

1.1 Jadex - Engineering Goal-Oriented Agents 1.1 Jadex - Engineering Goal-Oriented Agents In previous sections of the book agents have been considered as software artifacts that differ from objects mainly in their capability to autonomously execute

More information

- Table of Contents -

- Table of Contents - - Table of Contents - 1 INTRODUCTION... 1 1.1 OBJECTIVES OF THIS GUIDE... 1 1.2 ORGANIZATION OF THIS GUIDE... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 5 2 BASIC KNOWLEDGE

More information

Guideline for the application of COSMIC-FFP for sizing Business applications Software

Guideline for the application of COSMIC-FFP for sizing Business applications Software Abstract: Guideline for the application of COSMIC-FFP for sizing Business applications Software Arlan Lesterhuis (Sogeti Nederland B.V.) arlan.lesterhuis@sogeti.nl The COSMIC-FFP functional sizing method

More information

The Bizarre Truth! Automating the Automation. Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER

The Bizarre Truth! Automating the Automation. Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER The Bizarre Truth! Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER By Kimmo Nupponen 1 TABLE OF CONTENTS 1. The context Introduction 2. The approach Know the difference

More information

PRINCIPLES OF COMPILER DESIGN UNIT I INTRODUCTION TO COMPILERS

PRINCIPLES OF COMPILER DESIGN UNIT I INTRODUCTION TO COMPILERS Objective PRINCIPLES OF COMPILER DESIGN UNIT I INTRODUCTION TO COMPILERS Explain what is meant by compiler. Explain how the compiler works. Describe various analysis of the source program. Describe the

More information

Marking Guidelines for MVK Projects. MVK12. Version 6.2 (PPD, URD, RURD, ADD and software demo)

Marking Guidelines for MVK Projects. MVK12. Version 6.2 (PPD, URD, RURD, ADD and software demo) Marking Guidelines for MVK Projects. MVK12 Version 6.2 (PPD, URD, RURD, ADD and software demo) 2013-02- 13 Final Grade formulas: MVK DD1365 Grade = 33% PPD + 66% URD. Bachelor s Thesis DD143X Grade = ADD

More information

Performance Cockpit: An Extensible GUI Platform for Performance Tools

Performance Cockpit: An Extensible GUI Platform for Performance Tools Performance Cockpit: An Extensible GUI Platform for Performance Tools Tianchao Li and Michael Gerndt Institut für Informatik, Technische Universität München, Boltzmannstr. 3, D-85748 Garching bei Mu nchen,

More information

Flight Systems are Cyber-Physical Systems

Flight Systems are Cyber-Physical Systems Flight Systems are Cyber-Physical Systems Dr. Christopher Landauer Software Systems Analysis Department The Aerospace Corporation Computer Science Division / Software Engineering Subdivision 08 November

More information

Experiences from implementing CANDLE using the VARKON CAD system

Experiences from implementing CANDLE using the VARKON CAD system Experiences from implementing CANDLE using the VARKON CAD system Abstract Kjell Andersson Engineering Design Department of Machine Design KTH Telephone: +46 8 790 6374 Telefax: +46 8 106164 email: kan@damek.kth.se

More information

Process Mining Discovering Workflow Models from Event-Based Data

Process Mining Discovering Workflow Models from Event-Based Data Process Mining Discovering Workflow Models from Event-Based Data A.J.M.M. Weijters W.M.P van der Aalst Eindhoven University of Technology, P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands, +31 40 2473857/2290

More information

Content Management for the Defense Intelligence Enterprise

Content Management for the Defense Intelligence Enterprise Gilbane Beacon Guidance on Content Strategies, Practices and Technologies Content Management for the Defense Intelligence Enterprise How XML and the Digital Production Process Transform Information Sharing

More information

D3.1 Validation workshops Workplan v.0

D3.1 Validation workshops Workplan v.0 D3.1 Validation workshops Workplan v.0 D3.1 Validation workshops Tasks and Steps The objectives within this deliverable are: To involve relevant stakeholders in the drafting of a certification process

More information

First Steps Towards Conceptual Schema Testing

First Steps Towards Conceptual Schema Testing First Steps Towards Conceptual Schema Testing Albert Tort and Antoni Olivé Universitat Politècnica de Catalunya {atort,olive}@lsi.upc.edu Abstract. Like any software artifact, conceptual schemas of information

More information

Informatics 1: Data & Analysis

Informatics 1: Data & Analysis T O Y H Informatics 1: Data & Analysis Lecture 11: Navigating XML using XPath Ian Stark School of Informatics The University of Edinburgh Tuesday 26 February 2013 Semester 2 Week 6 E H U N I V E R S I

More information

CATI Scenario and Architecture

CATI Scenario and Architecture CATI Charging and Accounting Technology for the Internet SNF SPP Projects 5003-054559/1 and 5003-054560/1 CATI Scenario and Architecture Gabriel Dermler IBM Research Division, Zürich Laboratories Workpackage

More information

Software Testing and Maintenance

Software Testing and Maintenance Software Testing and Maintenance Testing Strategies Black Box Testing, also known as Behavioral Testing, is a software testing method in which the internal structure/ design/ implementation of the item

More information

UML-Based Conceptual Modeling of Pattern-Bases

UML-Based Conceptual Modeling of Pattern-Bases UML-Based Conceptual Modeling of Pattern-Bases Stefano Rizzi DEIS - University of Bologna Viale Risorgimento, 2 40136 Bologna - Italy srizzi@deis.unibo.it Abstract. The concept of pattern, meant as an

More information

2 nd UML 2 Semantics Symposium: Formal Semantics for UML

2 nd UML 2 Semantics Symposium: Formal Semantics for UML 2 nd UML 2 Semantics Symposium: Formal Semantics for UML Manfred Broy 1, Michelle L. Crane 2, Juergen Dingel 2, Alan Hartman 3, Bernhard Rumpe 4, and Bran Selic 5 1 Technische Universität München, Germany

More information

Recent Design Optimization Methods for Energy- Efficient Electric Motors and Derived Requirements for a New Improved Method Part 3

Recent Design Optimization Methods for Energy- Efficient Electric Motors and Derived Requirements for a New Improved Method Part 3 Proceedings Recent Design Optimization Methods for Energy- Efficient Electric Motors and Derived Requirements for a New Improved Method Part 3 Johannes Schmelcher 1, *, Max Kleine Büning 2, Kai Kreisköther

More information

Evaluating OO-CASE tools: OO research meets practice

Evaluating OO-CASE tools: OO research meets practice Evaluating OO-CASE tools: OO research meets practice Danny Greefhorst, Matthijs Maat, Rob Maijers {greefhorst, maat, maijers}@serc.nl Software Engineering Research Centre - SERC PO Box 424 3500 AK Utrecht

More information

AP SEMINAR 2015 SCORING GUIDELINES

AP SEMINAR 2015 SCORING GUIDELINES AP SEMINAR 2015 SCORING GUIDELINES AP SEMINAR END OF COURSE EXAM RUBRIC: SECTION 2 CONTENT AREA PERFORMANCE LEVELS 1 Selecting and Using Evidence The response repeats information from sources that provides

More information