Change search
Refine search result
4567 301 - 348 of 348
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 301.
    Stirna, Janis
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Persson, Anne
    Anti-patterns as a Means of Focusing on Critical Quality Aspects in Enterprise Modeling2009In: ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING    / [ed] Halpin T; Krogstie J; Nurcan S; Proper E; Schmidt R; Soffer P; Ukor R, 2009, Vol. 29, p. 407-418Conference paper (Refereed)
    Abstract [en]

    Enterprise Modeling (EM) is used for a wide range of purposes such as developing business strategies, business process restructuring, business process orientation and standardization, eliciting information system requirements, capturing best practices, etc. A common challenge impeding the value and impact of EM is insufficient model quality. Despite substantial attention from both researchers and commercial vendors of methods the current situation in practice with respect to the quality of models produced is not satisfactory. Many modeling projects produce bad models that are essentially useless. The objective of this paper is to introduce a format, anti-patterns, for documenting critical don'ts in EM and to demonstrate the potential of the format by using it to report a set of common and reoccurring pitfalls of real life EM projects. We use the format of anti-pattern for capturing the bad solutions to reoccurring problems and then explain what led to choosing the bad solution. The anti-patterns in this paper address three main aspects of EM - the modeling product, the modeling process, and the modeling tool support.

  • 302.
    Sundgren, David
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Distribution of expected utility in second-order decision analysis2007Licentiate thesis, comprehensive summary (Other scientific)
    Abstract [en]

    In decision analysis maximising the expected utility is an often used approach in choosing the optimal alternative. But when probabilities and utilities are vague or imprecise expected utility is fraught with complications. Studying second-order effects on decision analysis casts light on the importance of the structure of decision problems, pointing out some pitfalls in decision making and suggesting an easy to implement and easy to understand method of comparing decision alternatives. The topic of this thesis is such second-order effects of decision analysis, particularly with regards to expected utility and interval-bound probabilities. Explicit expressions for the second-order distributions inherent in interval-bound probabilities in general and likewise for distributions of expected utility for small decision problems are produced. By investigating these distributions the phenomenon of warping, that is concentration of belief, is studied.

  • 303. Sundgren, David
    et al.
    Danielson, Mats
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ekenberg, Love
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Warp effects on calculating interval probabilities2009In: International Journal of Approximate Reasoning, ISSN 0888-613X, E-ISSN 1873-4731, Vol. 50, no 9, p. 1360-1368Article in journal (Refereed)
    Abstract [en]

    in real-life decision analysis, the probabilities and utilities of consequences are in general vague and imprecise. One way to model imprecise probabilities is to represent a probability with the interval between the lowest possible and the highest possible probability, respectively. However, there are disadvantages with this approach; one being that when an event has several possible outcomes, the distributions of belief in the different probabilities are heavily concentrated toward their centres of mass, meaning that much of the information of the original intervals are lost. Representing an imprecise probability with the distribution's centre of mass therefore in practice gives much the same result as using an interval, but a single number instead of an interval is computationally easier and avoids problems such as overlapping intervals. We demonstrate why second-order calculations add information when handling imprecise representations, as is the case of decision trees or probabilistic networks. We suggest a measure of belief density for such intervals. We also discuss properties applicable to general distributions. The results herein apply also to approaches which do not explicitly deal with second-order distributions, instead using only first-order concepts such as upper and lower bounds.

  • 304.
    Sundgren, David
    et al.
    Dept. of Mathematics, Natural and Computer Sciences, University of G¨avle,.
    Ekenberg, Love
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Danielsson, Mats
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Some properties of aggregated distributions over expected values2008In: / [ed] Gelbukh A., Morales E.F., Berlin: Springer Verlag , 2008, p. 699-709Conference paper (Refereed)
    Abstract [en]

    Software agents and humans alike face severe difficulties in making decisions in uncertain contexts. One approach is to formalise the decision situation by means of decision theory, i.e. probabilities and utilities leading to the principle of maximising the expected utility. Expected utility is here considered as a stochastic variable; under the assumption that all utility values are equally likely; and that each vector of probability values is equally likely, the probability distribution of expected utility is calculated for two, three, and four possible outcomes. The effect of these probability distributions concentrating around the middle value is explored and its significance for making decisions.

  • 305.
    Sundholm, Hillevi
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Social conventions and issues of space for distributed collaboration2007In: Intercultural Collaboration / [ed] Ishida, T; Fussell, SR; Vossen, PTJM, 2007, Vol. 4568, p. 306-320Conference paper (Refereed)
    Abstract [en]

    We followed the work of an international research network that holds regular meetings in technology-enhanced environments. The team is geographically distributed and to support its collaborative work it uses a set of technical artifacts, including audio- and videoconferencing systems and a media space. We have been studying some of the techniques and social conventions the team develops for its collaboration, and different aspects of what it mean to be located in a shared but distributed workspace. Our approach has been to analyze the initiatives and responses made by the team members. Over time the group created conventions; e.g. the chair introduces team members participating only by audio and members turn off their microphones when not talking. The latter convention led to the side effect of faster decision making. We also identified two characteristics, implicit excluding and explicit including, in a situation where the majority of the team members were co-located.

  • 306.
    Sundholm, Hillevi
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    To Share or Not to Share - Distributed Collaboration in Interactive Workspaces: SEAMLESS INTEGRATION OF ARTIFACTS AND CONVERSATIONS - ENHANCED CONCEPTS OF INFRASTRUCTURE FOR COMMUNICATION2006In: FR ART INT / [ed] Hassanaly P, Herrmann T, Kunau G, Zacklad M, Amsterdam: IOS Press , 2006, Vol. 137, p. 270-285Conference paper (Refereed)
    Abstract [en]

    We followed an international research network that holds regular meetings in technology-enhanced working environments. The team is geographically distributed and uses a set of technical artefacts to support their collaborative work, including a videoconferencing system and a media space. We have been studying how mutual understanding is created between the team members and the role that visual representations play in this work. Our approach has been to analyse the initiatives and responses made by the team members. The meeting situation is complex because the team members are participating either in both video and audio, or audio only. In this multi-channel setting it often has to be clarified who is attending, and there is also a risk of team members being forgotten when they are present only on audio. The communication space is limited; when many want to participate in the communicative activity, it becomes harder to make successful initiatives; moreover, the roles of the team members seem to become accentuated in the distributed setting. The media space is restricted in that it only allows one person to be active at the time; this causes problems when several persons want to contribute simultaneously. Some of these limitations in the system are overcome through verbal articulations of actions.

  • 307.
    Sundström, Petra
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ståhl, A
    Höök, Kristina
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    A user-centered approach to affective interaction2005In: AFFECTIVE COMPUTING AND INTELLIGENT INTERACTION, PROCEEDINGS / [ed] Tao, J; Picard, RW, BERLIN: SPRINGER-VERLAG BERLIN , 2005, Vol. 3784, p. 931-938Conference paper (Refereed)
    Abstract [en]

    We have built eMoto, a mobile service for sending and receiving affective messages, with the explicit aim of addressing the inner experience of emotions. eMoto is a designed artifact that carries emotional experiences only achieved through interaction. Following on the theories of embodiment, we argue emotional experiences can not be design in only design for. eMoto is the result of a user-centered design approach, realized through a set of initial brainstorming methods, a persona, a Laban-analysis of body language and a two-tiered evaluation method. eMoto is not a system that could have been designed from theory only, but require an iterative engagement with end-users, however, in combination with theoretical work. More specifically, we will show how we have managed to design an ambiguous and open system that allows for users' emotional engagement.

  • 308.
    Sundström, Petra
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. SICS.
    Ståhl, Anna
    SICS.
    Höök, Kristina
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. SICS.
    In situ informants exploring an emotional mobile messaging system in their everyday practice2007In: International journal of human-computer studies, ISSN 1071-5819, E-ISSN 1095-9300, Vol. 65, no 4, p. 388-403Article in journal (Refereed)
    Abstract [en]

    We have designed and built a mobile emotional messaging system named eMoto. With it, users can compose messages through using emotion-related gestures as input, rendering a message background of colours, shapes and animations expressing the emotional content. The design intent behind eMoto was that it should be engaging physically, intellectually and socially, and allow users to express themselves emotionally in all those dimensions, involving them in an affective loop experience. In here, we describe the user-centred design process that lead to the eMoto system, but focus mainly on the final study where we let five friends use eMoto for two weeks. The study method, which we name in situ informants, helped us enter and explore the subjective and distributed experiences of use, as well as how emotional communication unfolds in everyday practice when channelled through a system like eMoto. The in situ informants are on the one hand users of eMoto, but also spectators, that is close friends who observe and document user behaviour. Design conclusions include the need to support the sometimes fragile communication rhythm that friendships require – expressing memories of the past, sharing the present and planning for the future. We saw that emotions are not singular state that exist within one person alone, but permeates the total situation, changing and drifting as a process between the two friends communicating. We also gained insights into the under-estimated but still important physical, sensual aspects of emotional communication. Experiences of the in situ informants method include the need to involve participants in the interpretation of the data obtained, as well as establishing a closer connection with the spectators.

  • 309. Sutinen, M.
    et al.
    Danielson, M.
    Ekenberg, Love
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. Stockholm University, Sweden.
    Larsson, A.
    Web-based analytical decision support system2010In: Proceedings of the 2010 10th International Conference on Intelligent Systems Design and Applications, ISDA'10, 2010, p. 575-579Conference paper (Refereed)
    Abstract [en]

    This paper presents a web-application supporting structured decision modelling and analysis. The application allows for decision modelling with respect to different preferences and views, allowing for numerically imprecise and vague background probabilities, values, and criteria weights, which further can be adjusted in an interactive fashion when considering calculated decision outcomes. The web-application is based on a decision tool that has been used in a large number of different domains over the last 15 years, ranging from investment decision analysis for companies to public decision support for local governments.

  • 310.
    Suzic, Robert
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Stochastic Multi-Agent Plan Recognition, Knowledge Representation and Simulations for Efficient Decision Making2006Doctoral thesis, monograph (Other scientific)
    Abstract [en]

    Advances in information technology produce large sets of data for decision makers. In both military and civilian efforts to achieve decision superiority, decision makers have to act agilely with proper, adequate and relevant information available. Information fusion is a process aimed to support decision makers’ situation awareness. This involves a process of combining data and information from disparate sources with prior information or knowledge to obtain an improved state estimate about an agent or other relevant phenomena.

    The important issue in decision making is not only assessing the current situation but also envisioning how a situation may evolve. In this work we focus on the prediction part of decision making called predictive situation awareness. We introduce new methodology where simulations and plan recognition are tools for achieving improved predictive situation awareness.

    Plan recognition is the term given to the process of inferring an agent’s intentions from a set of actions and is intended to support decision making. Beside its main task that is to support decision makers’ predictive situation awareness, plan recognition could also be used for coordination of actions and for developing computer-game agents that possess cognitive ability to recognize other agents’ behaviour.

    Successful plan recognition is heavily dependent on the data that is supplied. Therefore we introduce a bridge between plan recognition and sensor management where results of our plan recognition are reused to the control of, to give focus of attention to, the sensors that are expected to acquire the most important/relevant information. Our methodologies include knowledge representation, embedded stochastic simulations, microeconomics, imprecise knowledge and statistical inference issues.

  • 311. Tholander, J.
    et al.
    Karlgren, Klas
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ramberg, Robert
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Sökjer, P.
    Where all the interaction is sketching in interaction design as an embodied practice2008In: Proc Conf Des Interact Syst Process Pract Methods Tech DIS, 2008, p. 445-454Conference paper (Refereed)
    Abstract [en]

    Sketching and design sketches are often recognized as key elements of successful interaction design practice and a central skill in interaction design expertise. Interaction design is a relatively young field without well-developed conventions, tools, and formalisms. We analyze the practical work and the conduct of interaction designers in how they express interaction and dynamics through whiteboard drawings. We focus on how talk and action were used to shape the meaning of the drawings. The ways the designers imagined that users would interact with the system and how it would mediate communication between users became topical through a web of drawings, talk, and embodied action. Our analysis forefronts three aspects of interaction design: 1) the role of the design material 2) the role of embodied action in interaction design, and 3) talk and embodied action as central means of doing design. We argue that the qualities of a design material need to be understood in relation to the activity in which it is taken into use and through the kinds of actions that the participants engage in. This implies that design representations do not carry meaning in themselves but are made meaningful through design activity.

  • 312.
    Tholander, Jakob
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Children's perspectives in a game programming discourse2005In: The Journal of Interactive Learning Research, ISSN 1093-023X, Vol. 16, no 1, p. 51-82Article in journal (Refereed)
    Abstract [en]

    In the Playground project, we applied a constructionist learning perspective in order to build a computational learning environment in which children could design and build their own video games. In this paper, we present results from a study where children were given semi-structured programming tasks in an adventure game designed to investigate their understanding of program mechanisms. We analyze two children's solutions and approaches to a task as a matter of adaptation of talk and actions to different perspectives involved in the ongoing discourse. The establishment of a common perspective between child and investigator throughout the work sessions proved to be central to how the children approached their work. The analysis showed that in order for children to learn to understand how mechanisms that control a game work, they must learn to adapt their perspective to the expectations of each subtask and to the task as a whole. We show how one child is able to see the expected perspective in each subtask, whereas the other child finds that this is much harder. The support given by the investigators was also of great importance in facilitating these processes.

  • 313.
    Toghian, Mehrnoush
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ciobanu-Morogan, Matei
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Suggesting a method to improve encryption key management in wireless sensor networks2015In: Indian Journal of Science and Technology, ISSN 0974-6846, E-ISSN 0974-5645, Vol. 8, no 19, article id 75986Article in journal (Refereed)
    Abstract [en]

    Background/Objectives: Recent technology achievements in electronics and wireless communication makes it possible to provide sensor nodes in low cost, low power, small size, and ability to communicate with other nodes in vicinity, which results in design of wireless sensor networks. Nowadays there are many different applications for wireless sensor networks such as in medicine, military, business, etc. Methods/Statistical Analysis: Considering the structure of such networks that is based on wireless communication, also the variety of usage in different critical domains such as military domain, information and communication security is one of the major aspects that must be exactly considered to design and implement wireless sensor networks. Proposing a method to provide security in wireless sensor networks is depended on structure and properties of each node, thus it is more difficult and more complex than in other types of networks. Findings: Considering the vulnerability of this type of networks against different attacks, finding out a low cost method to guarantee a reasonable level of security in wireless sensor networks has become an issue of interest these days. There are several methods to provide security in such environments. One of them is data encryption using encryption keys. When it comes to wireless sensor networks, the issue of key management is different because of the different structure of these networks. In other words, considering mobility of nodes, structure of wireless communication and message broadcasting, limited energy resources, variety of application domains, and widespread nodes, providing security in such networks is totally different from other similar environments. Application/Improvements: A lot of research has been done in this area and different methods have been proposed. However there still are lots of aspects in this area that need to be studied more. In this study we are going to find a new expansive method to distribute the encryption keys in wireless sensor networks based on some of special properties of such network.

  • 314.
    Van, Nguyen Hong
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Popov, O.
    Popova, I.
    Combined model for congestion control2006In: Proceedings of the International Conference on Information Technology Interfaces, ITI, 2006, p. 657-662Conference paper (Refereed)
    Abstract [en]

    The growth of multimedia applications on the Internet made at least one fifth of the total network traffic to run over UDP. Unlike TCP, UDP is unresponsive to network congestion. This may cause, inter alia, bandwidth starvation of responsive flows, severe and prolonged congestions or in the worst-case scenario a congestion collapse. Hence, the coexistence of both protocols on fair-share premises converges towards impossibility. The paper deals with a new approach to solving the problem of taming down the unresponsive flows. By using some of the desirable properties of mobile agents, the system is able to control the influx of non-TCP or unresponsive flows into the network. Various functions performed by mobile agents monitor non-TCP flows, calculate sending rates and modify their intensity according to the needs of the network to attain as good performance as it is possible.

  • 315.
    Vargas Chevez, Norman
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    A unified strategic business and IT alignment model: A study in the public universities of Nicaragua2010Licentiate thesis, monograph (Other academic)
    Abstract [en]

    A number of attempts have been made to define strategic business and information technology (IT) alignment; several representations of what it is are available in academic and practitioners’ fields. The literature suggests that firms need to achieve strategic business and IT alignment to be competitive. Strategic business and IT alignment impact business performance and IT effectiveness. We propose a unified strategic business and IT alignment model based on four strategic business and IT alignment models: Strategic Alignment Model (SAM), Strategic Alignment Maturity Model (SAMM), information system strategic alignment model and an operational model of strategic alignment. I argue that such a unified model will provide a better understanding of the nature and key aspects of strategic business and IT alignment from different, and sometimes complementary, theories. The unified model represents the concepts and instruments used in these four strategic businesses and IT alignment models. Our principal research goal is to pave the way to develop a common understanding between the different models. The components of the unified strategic business and IT alignment model were ranked with a group of IT experts and business experts from four public universities in Nicaragua. The result can be used as a basis for improving strategic business and IT alignment.

  • 316. Wangler, B.
    et al.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Conceptual models and levels of modeling2006In: 5th International Conference on Business Informatics Research, BIR 2006, International Conference on Business Informatics Research , 2006, p. 9-16Conference paper (Refereed)
    Abstract [en]

    Conceptual modeling is a powerful tool for describing, defining and understanding some world under consideration. To properly understand conceptual modeling one can turn conceptual modeling on itself and develop meta models. In this paper we inquiry into the relation between conceptual models and meta models. We identify and discuss some issues in modeling and in meta modeling that have puzzled our minds in recent work with ontologies.

  • 317.
    Wei, Li
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Kilander, Fredrik
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Jansson, Carl-Gustaf
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Extending instant messaging to provide pervasive personal communication2006Conference paper (Refereed)
    Abstract [en]

    This paper proposes a personal software architecture to provide a user with a pervasive communication capability. The core of this architecture is a Personal Communication Server (PCS) which bridges between different Instant Messaging networks and extends them with a unified access to the user. A SIP-based implementation of such a communication server is presented, which solves various interoperability problems, and also provides many value-added features, e.g., extended user presence with location information, adaptive communication, better privacy protection, etc. This implementation enables various existing SIP-compatible resources to be re-used and thus simplifies the construction of the proposed software architecture.

  • 318. Weigand, H.
    et al.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Arachchige, J. J.
    Describing coordination services with REA2010In: CAiSE 2010 Workshop BUSITAL’10, 2010, p. 120-134Conference paper (Refereed)
    Abstract [en]

    Coordination services are services, possibly implemented as web services, that support the coordination of (real-world) services that a consumer would like to take. To support users of a future Internet of Services, the effect of the coordination services must be described in such a way that users are not only able to discover services but also to detect and prevent possible conflicts in their composition. In this paper, REA is applied as a solution approach to this requirement. The REA business ontology has proven to be a good foundation for the description of services, but we argue that its conceptualization of commitments can be improved.

  • 319. Weigand, H.
    et al.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    The value of a META perspective in social innovation2016In: CEUR Workshop Proceedings, CEUR-WS , 2016, p. 50-64Conference paper (Refereed)
    Abstract [en]

    Collective Awareness Platforms (CAP) have been promoted as an enabler of social innovation. A CAP supports the collection of data (quantitative and qualitative, and using all the technical possibilities that are rapidly becoming available, e.g. sensors), the integration of the data, and the presentation of results to the community in order to adapt their behavior or develop new behavior patterns. Typically, a CAP has many stakeholders. To support the development and maintenance of CAPs, we propose the notion of META-CAP, a platform that allows participants to reflect on the CAP from a value and collaboration perspective. The META-CAP architecture described in this paper is evaluated from the perspective of socio-technical design.

  • 320. Weigand, H.
    et al.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Value-based service modeling and design: Toward a unified view of services2009In: Advanced Information Systems Engineering, Proceedings, Springer, 2009, p. 410-424Conference paper (Refereed)
    Abstract [en]

    Service-oriented architectures are the upcoming business standard for realizing enterprise information systems, thus creating a need for analysis and design methods that are truly service-oriented. Most research on this topic so far takes a software engineering perspective. For a proper alignment between business and IT, a service perspective at the business level is needed as well. In this paper, a unified view of services is introduced by means of a service ontology, service classification and service layer architecture. On the basis of these service models, a service design method is proposed and applied to a case from the literature. The design method capitalizes on existing value modeling approaches.

  • 321. Weigand, H.
    et al.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Arachchige, J. J.
    Closing the user-centric service coordination cycle2010In: CAiSE Forum'10, 2010, p. 1-8Conference paper (Refereed)
    Abstract [en]

    In the future vision of an Internet of Services, users take an active role in service selection and composition. In this context, web services are mostly interfaces to real services and can be classified as coordination services with respect to the latter. To enable users to perform service composition, the effect of the coordination services must be described in such a way that users are not only able to discover services but also to detect and prevent possible conflicts in their composition. To meet these requirements, a service description language for coordination services is proposed based on the REA business ontology.

  • 322. Weigand, H.
    et al.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Arachchige, J. J.
    Closing the user-centric service coordination cycle by means of coordination services2011In: CAiSE Forum 2010 on Information Systems Evolution, 2011, p. 267-282Conference paper (Refereed)
    Abstract [en]

    In the future vision of an Internet of Services, users take an active role in service selection and composition. In this context, web services are mostly interfaces to real services and can be classified as coordination services with respect to the latter. To enable users to perform service composition, the effect of the coordination services must be described in such a way that users are not only able to discover services but also to detect and prevent possible conflicts in their composition. To meet these requirements, a service description language for coordination services is proposed based on the REA business ontology.

  • 323. Weigand, H.
    et al.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Edirisuriya, Ananda
    Dayperuma, Tharaka
    Strategic analysis using value modeling - The c3-value approach2007In: 40th Annual Hawaii International Conference on System Sciences, 2007. HICSS 2007, IEEE Computer Society, 2007, p. 4076731-Conference paper (Refereed)
    Abstract [en]

    E3-value has proven to be a useful modeling technique and method to support the analysis of business models. However, for strategic analysis, the representation of a business model is not sufficient, as it does not include the rationale behind the model. In this paper, yve propose an extension of e3-value to support strategic analysis on three dimensions competition analysis, customer analysis and capability analysis.

  • 324. Weigand, H.
    et al.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Edirisuriya, Ananda
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ilayperuma, Tharaka
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    On the notion of value object2006Conference paper (Refereed)
    Abstract [en]

    It is increasingly recognized that business models offer an abstraction that is useful not only in the exploration of new business networks but also for the design and redesign of operational business processes. Among others, they can be used as input for a risk analysis that is crucial in cross-organizational business process design. However, the notion of value object is up till now not clearly defined. In this paper we investigate the notion of value, value objects and the activities involved when transferring value objects between business actors. We illustrate the proposed value object model by applying it on the well-known conference case.

  • 325. Weigand, H.
    et al.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Edirisuriya, Ananda
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ilayperuma, Tharaka
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Zdravkovic, Jelena
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Value-based service design based on a general service architecture2008In: CEUR Workshop Proc., 2008, p. 88-103Conference paper (Refereed)
    Abstract [en]

    Service-oriented architectures are the upcoming business standard for realizing enterprise information systems, thus creating a need for analysis and design methods that are truly service-oriented. Most research on this topic so far takes a software engineering perspective. For a proper alignment between the business and the IT, a service perspective at the business level is needed as well. In this paper, definitions of "service" are analyzed, resulting in a set of models for the service concept. On the basis of this service architecture, a service design method is proposed and applied to a case from the literature. The design method capitalizes on existing value modeling approaches.

  • 326. Weigand, H.
    et al.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Jayasinghe Arachchige, J.
    Bergholtz, Maria
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Management services - A framework for design2011In: 23rd International Conference on Advanced Information Systems Engineering, CAiSE 2011, 2011, p. 582-596Conference paper (Refereed)
    Abstract [en]

    The Service-Oriented Architecture has rapidly become the de facto standard for modern information systems. Although recently considerable research attention has been paid to the management of services, several gaps can still be observed. Service management as far as it is automated is either mixed up with the operational service logic itself, or handled in a separate not service-oriented system, such as a BAM platform. In addition, there is a growing business demand for value-driven service management. In this paper, a general framework for management service design is presented that covers both business services and software services and is rooted in the business ontology REA, extended with a REA management ontology. The framework is applied to two different case studies, one in the Italian wine industry and one related to a robot cleaner.

  • 327. Wohed, P.
    et al.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Meta-modelling as a means for improved communication and interoperability: The case of frisco2005Conference paper (Refereed)
    Abstract [en]

    Unclear and disparate terminology are causing problems in the area of information system development. To address these issues, modelling frameworks and ontologies based on solid philosophical and logical foundations have been developed. Hypothesizing that a diagrammatic interface will be beneficial for comprehension and communication resulting in wider dissemination, we propose a UML-based meta-model of one of those frameworks-Frisco. The analysis done during the development of the meta-model resulted in identification of a number of ambiguities in the framework. Discussion of these as well as suggestions of ways to solve them are also presented.

  • 328. Wohed, P.
    et al.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Reconciliation of two business modelling frameworks2005Conference paper (Refereed)
    Abstract [en]

    Addressed in this paper is the problem of conceptual heterogeneity within the field of information systems. Two frameworks, Frisco and Söderström, each reflecting this heterogeneity, are presented. They are analysed and an reconciliation attempt of them is provided. The reconciliation points at some strengths and weaknesses in each framework.

  • 329. Wohed, P
    et al.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Panetto, H
    Facilitating interoperability: A cross-analysis of the language UEML and the standard ISO/DIS 194402006In: BUSINESS PROCESS MANAGEMENT WORKSHOPS / [ed] Bussler, C; Haller, A, BERLIN: SPRINGER-VERLAG BERLIN , 2006, Vol. 3812, p. 257-268Conference paper (Refereed)
    Abstract [en]

    During recent years Interoperability and Interoperable Enterprise Applications has gained a central place on the IS development arena. Presented in this paper is a cross-analysis of two languages for enterprise modelling and information systems development. The languages are the Unified Enterprise Modelling Language (UEML) and ISO/DIS 19440. The purpose of this cross-analysis is to make the languages more complete and well defined. The analysis includes a mapping between the languages. The results of the analysis can be used for further development of the languages which in the long run will beneficial for the interoperability of enterprises modelled in them.

  • 330.
    Wohed, Petia
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Johannesson, P.
    Open source workflow systems2010In: Modern Business Process Automation: YAWL and its Support Environment, Springer Berlin/Heidelberg, 2010, p. 401-434Chapter in book (Refereed)
    Abstract [en]

    The goal of this chapter is to broaden the reader's knowledge in the area of open sourceWfMS. To achieve this we introduce three other open sourceWfMSs. These are OpenWFE, jBPM and Enhydra Shark, which according to download statistics (July 2008) are the open source systems with the largest number of downloads (closely followed by YAWL). The purpose of the presentation is not to provide detailed insight into each of these systems, but rather to expose the reader to different approaches and to discuss the similarities and differences of these approaches with regard to YAWL. The chapter is divided into three parts, each describing one system. The descriptions follow the same format as much as possible. First, some background information is given. Subsequently, the architecture is described. Then an introduction to the underlying process modeling language is given from control-flow, data, and resource perspectives. After that, a part of the Order Fulfillment case is modeled and the solution briefly discussed. Each description concludes with a brief comparison of the system and YAWL. All files containing the discussed examples are distributed for test-runs with the electronic supplement of the book.

  • 331.
    Wohed, Petia
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Russell, Nick
    ter Hofstede, Arthur H. M.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    van der Aalst, Wil M. P.
    Open source workflow: A viable direction for BPM? Extended abstract2008In: Advanced Information Systems Engineering, Proceedings / [ed] Bellahsene, Z; Leonard, M, 2008, Vol. 5074, p. 583-586Conference paper (Refereed)
    Abstract [en]

    With the growing interest in open source software in general and business process management and workflow systems in particular, it is worthwhile investigating the state of open source workflow management. The plethora of these offerings (recent surveys such as [4,6], each contain more than 30 such systems) triggers the following two obvious questions: (1) how do these systems compare to each other; and (2) how do they compare to their commercial counterparts. To answer these questions we have undertaken a detailed analysis of three of the most widely used open source workflow management systems [1]: jBPM, OpenWFE, and Enhydra Shark. Another obvious candidate would have been the open-source workflow management system YAWL ( www.yawlfoundation.org ). However, given the authors’ close involvement in the development of YAWL, we did not include it in our evaluation.

  • 332.
    Wohed, Petia
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Russell, Nick
    ter Hofstede, Arthur H. M.
    Andersson, Birger
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    van der Aalst, Wil M. P.
    Patterns-based evaluation of open source BPM systems: The cases of jBPM, OpenWFE, and Enhydra Shark2009In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 51, no 8, p. 1187-1216Article in journal (Refereed)
    Abstract [en]

    In keeping with the proliferation of free software development initiatives and the increased interest in the business process management domain, many open source workflow and business process management systems have appeared during the last few years and are now under active development. This upsurge gives rise to two important questions: What are the capabilities of these systems? and How do they compare to each other and to their closed source counterparts? In other words: What is the state-of-the-art in the area?. To gain an insight into these questions, we have conducted an in-depth analysis of three of the major open source workflow management systems - jBPM, OpenWFE, and Enhydra Shark, the results of which are reported here. This analysis is based on the workflow patterns framework and provides a continuation of the series of evaluations performed using the same framework on closed source systems, business process modelling languages, and web-service composition standards. The results from evaluations of the three open source systems are compared with each other and also with the results from evaluations of three representative closed source systems: Staffware, WebSphere MQ and Oracle BPEL PM. The overall conclusion is that open source systems are targeted more toward developers rather than business analysts. They generally provide less support for the patterns than closed source systems, particularly with respect to the resource perspective, i.e. the various ways in which work is distributed amongst business users and managed through to completion.

  • 333.
    Wohed, Petia
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Van Der Aalst, W. M. P.
    Dumas, M.
    Ter Hofstede, A. H. M.
    Russell, N.
    On the suitability of BPMN for business process modelling2006Conference paper (Refereed)
    Abstract [en]

    In this paper we examine the suitability of the Business Process Modelling Notation (BPMN) for business process modelling, using the Workflow Patterns as an evaluation framework. The Workflow Patterns are a collection of patterns developed for assessing control-flow, data and resource capabilities in the area of Process Aware Information Systems (PAISs). In doing so, we provide a comprehensive evaluation of the capabilities of BPMN, and its strengths and weaknesses when utilised for business process modelling. The analysis provided for BPMN is part of a larger effort aiming at an unbiased and vendor-independent survey of the suitability and the expressive power of some mainstream process modelling languages. It is a sequel to previous work in which languages including BPEL and UML Activity Diagrams were evaluated.

  • 334.
    Wrigstad, Tobias
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ownership-Based Alias Managemant2006Doctoral thesis, monograph (Other scientific)
    Abstract [en]

    Object-oriented programming relies on sharing and the mutable states of objects for common data structures, patterns and programming idioms. Sharing and mutable state is a powerful but dangerous combination. Uncontrolled aliasing risks causing representation exposure, where an object's state is exposed and modifiable out of the control of its conceptually owning object. This breaks encapsulation, and hence, in extension, abstraction.

    Contemporary object-oriented programming languages' support for alias encapsulation is mediocre and easily circumvented. To this end, several proposals have been put forward that strengthen encapsulation to enable construction of more reliable systems and formally reasoning about properties of programs. These systems are vastly superior to the constructs found in for example C++, Java or C#, but have yet to gain acceptance outside the research community.

    In this thesis, we present three constructs for alias management on top of a deep ownership types system in the context of the Joline programming language. Our constructs are fully statically checkable and impose little run-time overhead. We show the formal semantics and soundness proof for our constructs as well as their formal and informal aliasing properties. We show applications and extensions and perform a practical evaluation of our system with our implemented Joline compiler. The evaluation suggests that our constructs are compatible with real-world programming, makes use of some of our own proposed patterns, and encourages further practical studies of programming with ownership-based constructs for alias management.

  • 335.
    Wrigstad, Tobias
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Clarke, D.
    Existential owners for ownership types2007In: Journal of Object Technology, ISSN 1660-1769, E-ISSN 1660-1769, Vol. 6, no 4, p. 141-159Article in journal (Refereed)
    Abstract [en]

    This paper describes a lightweight approach to adding run-time checked downcasts to a language in the presence of ownership types without the need for a run-time representation of owners. Previous systems [6] have required owners of objects to be tracked and matched at run-time which is costly in terms of memory and performance. Our proposal avoids run-time overhead to deal with owners and also extends the expressiveness of ownership-based systems enough to handle the Java equals idiom for structural equality comparison. The price is that it is sometimes impossible to downcast a type into a type that can be statically aliased. Our proposal is completely orthogonal and combinable with previous work.

  • 336.
    Yngström, Louise
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Can we tune information security management into meeting corporate governance needs?: (invited paper)2005In: SECURITY MANAGEMENT, INTEGRITY, AND INTERNAL CONTROL IN INFORMATION SYSTEMS / [ed] Dowland, P; Furnell, S; Thuraisingham, B; Wang, XS, 2005, Vol. 193, p. 237-245Conference paper (Refereed)
    Abstract [en]

    This paper intends to stimulate discussion, research and new points-of-action for IS/IT security management from the background of corporate governance, contemporary debates of how to express observable consequences of IT and IT security, and of didactic issues. It is concluded that empirical research within IT security management is rare as compared to theoretical approaches but needed in order to have IS/IT security management on par with general management.

  • 337.
    Zdravkovic, Jelena
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Process Integration for the Extended Enterprise2006Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    In many industries today, the speed and costs with which new products are delivered to customers provide the basis for competitive advantage. Electronic business (e-business) is a concept that shortens the “time to market” and enables transacting at lower costs. Currently, one of the main limitations in the exploitation of e-business is the lack of efficient Information System (IS) integration, both in intra- and cross-enterprise environments. Intra-enterprise integration is complex, as the business needs and the underlying information systems do not evolve in accordance. In the cross-enterprise context, transparent system integration is hardly achievable due to the incompatibility of the services of the involved partners. This means that the future success of the integration depends heavily on the possibilities offered in terms of interoperability among the involved enterprises. The Business Process Management (BPM) discipline addresses this challenge, as processes have been recognized as key mechanisms through which most intra- and cross-enterprise interactions take place. The development of methods for successful integration of process models is one of the essential issues for the use of the BPM approach in the application and evolution of e-business.

    In this thesis, we address two topics in the area of business process management: 1) intra-enterprise process integration which concerns alignment between the internal business processes and information systems enclosed in the form of software services and 2) cross-enterprise integration which concerns coordination of the internal business processes of an enterprise with the processes of its suppliers, intermediaries, or customers. The goal of the thesis is to add theoretical and applicable knowledge to the field of business process management by using the proposed approaches for improvement of process integration in intra- and cross-enterprise contexts.

  • 338.
    Zdravkovic, Jelena
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Henkel, Martin
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Enabling Flexible Modeling of Service-Based Processes2005In: International Journal of IT and ManagementArticle in journal (Other academic)
    Abstract [en]

    When designing executable enterprise processes the assumption of a transparent integration with existing systems is unrealistic. These systems, represented by software services, may impose various constraints. Using a process description framework, in this paper we examine how the design of executable business processes is affected by technical issues. Furthermore, we examine rules to which system designers should adhere to when designing services, to enable a larger scope of “as-is” realizations of business processes.

  • 339.
    Zdravkovic, Jelena
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Henkel, Martin
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Flexible realization of business processes using existing services2006In: ICEIS 2006: Proceedings of the Eighth International Conference on Enterprise Information Systems, 2006, p. 165-172Conference paper (Refereed)
    Abstract [en]

    When realizing executable business process models, in most situations process specifications collide with specific properties of existing services. In this paper we propose an approach for relaxation of the business process specification to enable flexible integration between the process and existing services. The approach is based on the notion of visibility, which allows a categorized relaxation of the process specification by not requiring every process state to be distinguished after the process is realised with existing services. The categories of visibility presented in this paper are applied by indicating flexible elements in the process design phase. The presented approach stimulates the alignment between business processes and existing services, facilitating a larger scale of transparent process realisations.

  • 340.
    Zdravkovic, Jelena
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Henkel, Martin
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Moving from business to technology with service-based processes2005In: IEEE Internet Computing, ISSN 1089-7801, E-ISSN 1941-0131, Vol. 9, no 3, p. 73-81Article in journal (Refereed)
    Abstract [en]

    In most organizations, business process realizations must be aligned with existing systems,which can impose specific requirements. Currently, however, there is no way to track the alignment between business processes and corresponding technical implementations. The authors' proposed framework offers a systematic way to classify and assess technical realizations of business processes.

  • 341.
    Zdravkovic, Jelena
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. Stockholm University, Sweden.
    Ilayperuma, Tharaka
    Exploring business value models for e-service design2010In: Model-Driven Domain Analysis and Software Development: Architectures and Functions, IGI Global, 2010, p. 232-253Chapter in book (Refereed)
    Abstract [en]

    Contemporary enterprises face strong pressures to increase competitiveness by engaging in alliances of several kinds. In a rapidly increasing degree, traditional organizational structures evolve towards online business using modern ICT - such as the Internet, semantic standards, process- and service-oriented architectures. For efficient applications of inter-organizational information systems, the alignment between business and ICT is a key factor. At the ICT level, Web services are used as the cornerstones for modeling the interaction points of Web applications. So far, development of Web services has focused on a technical perspective, such as the development of standards for message exchanges and service coordination. Thereby, business concepts, such as economic values exchanged among the cooperating actors, cannot be traced in Web service specifications. As a consequence, business and ICT models become difficult to keep aligned. To address this issue, the authors propose a MDA-based approach for design of software services which may be implemented using Web services and Web service coordinations. The proposal focuses on a value-explorative analysis and modeling of business services at the CIM level, and model transformations using UML 2 to the PIM level, by utilizing well-defined mappings.

  • 342.
    Zdravkovic, Jelena
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ilayperuma, Tharaka
    Exploring REA and Open-edi business frameworks for service modeling2010In: CEUR Workshop Proceedings, 2010, p. 106-119Conference paper (Refereed)
    Abstract [en]

    Contemporary business collaborations foster enterprises to make their offerings available to partners and consumers as e-services. In this setting, high-level enterprise models, such as business models, provide an economically aware perspective for elicitation of business services, and thereby, e-services. Recently, REA and Open-edi business frameworks have been jointly considered to provide the Open-edi Business Transaction Ontology (OeBTO) for exploring concepts, relationships and actors involved in business collaborations. In this study, we use these frameworks and supporting architectures to propose a service-centric business model. From a model-based development perspective, the model that we propose is intended to be transformed to a system-centric service model, and further to Web service specifications and coordinations. The purpose of this study is primarily aimed toward an explorative and business-founded identification of services. An example from the insurance business sector is used to argument the way we ground and apply our proposed method.

  • 343.
    Zdravkovic, Jelena
    et al.
    KTH, Superseded Departments, Computer and Systems Sciences, DSV.
    Johannesson, Paul
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Cooperation of Processes through Message Level Agreement2004In: ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2004, p. 564-579Conference paper (Refereed)
    Abstract [en]

    E-Business is constantly growing as organizations are trying to integrate electronically in order to automate exchange of information and services. To construct inter-organizational processes, the involved enterprises must agree on ways how to invoke process services on the business partner's system. A problem is that existing processes are so diverse in protocols, activity and message forms that it is impossible to start collaboration without comprehensive adaptations. In this paper, we propose a framework for interoperation of processes, which is based on requirements for equivalence of document exchanges. We argue that this level of equivalence is sufficient to enable existing enterprise processes to collaborate without internal redesign. The proposed framework is aimed to facilitate process collaboration by using a mediator layer to perform necessary adaptations, while minimizing requirements for process similarity.

  • 344.
    Zdravkovic, Jelena
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Zikra, Iyad
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Ilayperuma, Tharaka
    An MDA method for service modeling by formalizing REA and open-edi business frameworks with SBVR2011In: 4th IFIP WG 8.1 Working Conference on Method Engineering, ME 2011, 2011, p. 219-224Conference paper (Refereed)
    Abstract [en]

    Business frameworks offer great opportunities of communication between people for working on the enterprise system engineering processes, as well as for eliciting services that the enterprise can offer in collaboration contexts. However, these kinds of frameworks, such as Resource-Event-Agent and Open-edi, recently unified in Open-edi Business Ontology (OeBTO), lack formal representations. This fact considerably limits their use in system development, particularly in model-driven development methods where the efficiency of transformations is of great importance. In this paper we suggest a formalization of OeBTO using OMG's standard Semantics of Business Vocabulary and Business Rules (SBVR), as a method for creating a service-centric business model. This makes it possible to provide the necessary formal logic foundation to allow automatic processing of the business model and its transformation to a system-level service model. An example from the bank loan business sector is used to argument the application of the method.

  • 345.
    Zdravkovic, Jelena
    et al.
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. University of Gävle, Sweden .
    Östman, A.
    An agile method for automated provisioning of the geographical information in public services2008In: Proceedings of the Urban and Regional Data Management - UDMS Annual 2007, 2008, p. 319-331Conference paper (Refereed)
    Abstract [en]

    Lately we face broad emergence of the efforts for automation of business assets across organization boundaries in the form of electronic services (e-services). In the public services for spatial information provisioning, there is a strong need to improve efficiency of the current services by automating them in a uniform way across the country (Sweden) and further within the EU. However, a number of obstacles prohibits a comprehensive automation of the existing business services in a short run - for instance, the lack of schema standards for spatial concepts discourage digitalization of documents, whereas complexity of geographic maps depress their direct use by ordinary users. On the other side, ubiquity of the Web and increasing customer demands for obtaining services with the highest possible convenience, foster design of e-services in a short time. Following this, in this paper, we propose a method for an iterative approach to service automation. Using business goal analysis we identify the overall needs for the automation and then, in accordance to the present obstacles, we assess an appropriate level of automation. In a next iteration, i.e. when the goal model and/or obstacles are about to change, the service design is updated, and if needed, re-assessed from the economic perspective. The key aim of our approach is to foster a simple and step-wised automation of services for spatial information management, with possibilities for further iterative-based improvements. A case study from the domain of provisioning building permissions is used to ground and apply our proposed approach.

  • 346. Åhlén, J.
    et al.
    Sundgren, David
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bengtsson, E.
    Application of underwater hyperspectral data for color correction purposes2007In: Pattern Recognition and Image Analysis, ISSN 1054-6618, Vol. 17, no 1, p. 170-173Article in journal (Refereed)
    Abstract [en]

    Color correction of underwater images has been considered a difficult task for a number of reasons. Those include severe absorption of the water column, the unpredictable behavior of light under the water surface, limited access to reliable data for correction purposes, and the fact that we are only able to process three spectral channels, which is insufficient for most color correction applications. Here, the authors present a method to estimate a hyperspectral image from an RGB image and pointwise hyperspectral data. This is then used to color correct the hyperspectral underwater image and transform it back into RGB color space.

  • 347. Åhlén, J.
    et al.
    Sundgren, David
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Bengtsson, E.
    Pre-processing of underwater images taken in shallow water for color reconstruction purposes2005In: Proc. Seventh IASTED Int. Conf. Sign. Imag. Proc., 2005, p. 560-564Conference paper (Refereed)
    Abstract [en]

    Coral reefs are monitored with different techniques in order to examine their health. Digital cameras, which provide an economically defendable tool for marine scientists to collect underwater data, tend to produce bluish images due to severe absorption of light at longer wavelengths. In this paper we study the possibilities of correcting for this color distortion through image processing. The decrease of red light by depth can be predicted by Beer's Law. Another parameter that has been taken into account is the image enhancement functions built into the camera. We use a spectrometer and a reflectance standard to obtain the data needed to approximate the joint effect of these functions. This model is used to pre-process the underwater images taken by digital cameras so that the red, green and blue channels show correct values before the images are subjected to correction for the effects of the water column through application of Beer's Law. This process is fully automatic and the amount of processed images is limited only by the speed of computer system. Experimental results show that the proposed method works well for correcting images taken at different depths with two different cameras.

  • 348. Åhlén, J.
    et al.
    Sundgren, David
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Lindell, T.
    Bengtsson, E.
    Dissolved organic matters impact on colour reconstruction in underwater images2005In: IMAGE ANALYSIS, PROCEEDINGS / [ed] Kalviainen, H; Parkkinen, J; Kaarna, A, 2005, Vol. 3540, p. 1148-1156Conference paper (Refereed)
    Abstract [en]

    The natural properties of water column usually affect underwater imagery by suppressing high-energy light. In application such as color correction of underwater images estimation of water column parameters is crucial. Diffuse attenuation coefficients are estimated and used for further processing of underwater taken data. The coefficients will give information on how fast light of different wavelengths decreases with increasing depth. Based on the exact depth measurements and data from a spectrometer the calculation of downwelling irradiance will be done. Chlorophyll concentration and a yellow substance factor contribute to a great variety of values of attenuation coefficients at different depth. By taking advantage of variations in depth, a method is presented to estimate the influence of dissolved organic matters and chlorophyll on color correction. Attenuation coefficients that depends on concentration of dissolved organic matters in water gives an indication on how well any spectral band is suited for color correction algorithm.

4567 301 - 348 of 348
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf