Enterprise Design, Operations, and Computing: 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2022
|
Ausgabe: | 1st ed |
Schriftenreihe: | Lecture Notes in Computer Science Series
v.13585 |
Schlagworte: | |
Online-Zugang: | DE-2070s |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (283 Seiten) |
ISBN: | 9783031176043 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV049408628 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 231114s2022 xx o|||| 00||| eng d | ||
020 | |a 9783031176043 |9 978-3-031-17604-3 | ||
035 | |a (ZDB-30-PQE)EBC7101898 | ||
035 | |a (ZDB-30-PAD)EBC7101898 | ||
035 | |a (ZDB-89-EBL)EBL7101898 | ||
035 | |a (OCoLC)1346571400 | ||
035 | |a (DE-599)BVBBV049408628 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 658.054678 | |
100 | 1 | |a Almeida, João Paulo A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Enterprise Design, Operations, and Computing |b 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings |
250 | |a 1st ed | ||
264 | 1 | |a Cham |b Springer International Publishing AG |c 2022 | |
264 | 4 | |c ©2022 | |
300 | |a 1 Online-Ressource (283 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes in Computer Science Series |v v.13585 | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Preface -- Organization -- Keynote Speeches -- "We Are All Digital Now": Platform Systems and Flow Processes in Modern Enterprises -- Smart Modeling of Smart Software -- Modelling Ethical and Legal Norms/Explaining Compliance and Violation -- Tutorial -- Business Process Modeling and Simulation with DPMN -- Contents -- Enterprise Security -- Computable Consent - From Regulatory, Legislative, and Organizational Policies to Security Policies -- 1 Introduction -- 1.1 Problem and Contributions -- 1.2 Related Work -- 2 Towards Consent Automation - FHIR Approach -- 2.1 FHIR Consent Resource - Basic Policy and Computable Policy Expressions -- 2.2 Link with Smart on FHIR Architecture Pattern -- 2.3 Analysis -- 3 Computable Policy Framework -- 3.1 Modelling Concepts for Policy Rules -- 3.2 Policy Language Options -- 3.3 Example - Privacy Consent -- 4 Positioning with FHIR Ecosystem -- 5 Conclusion and Future Work -- References -- A Multi-level Cyber-Security Reference Model in Support of Vulnerability Analysis -- 1 Introduction -- 2 Main Goals, Requirements and Design Decisions -- 3 A Multi-level Reference Model in Support of Vulnerability Analysis -- 4 Demonstration -- 5 Related Work -- 6 Conclusions -- References -- Security Ontologies: A Systematic Literature Review -- 1 Introduction -- 2 Background and Related Work -- 2.1 Security Ontologies -- 2.2 Existing Systematic Literature Review of Security Ontologies -- 3 The Systematic Literature Review -- 3.1 Planning the Systematic Literature Review -- 3.2 Conducting the Systematic Literature Review -- 3.3 Reporting the Systematic Literature Review -- 4 Conclusions and Future Work -- References -- Enterprise Architecture -- Model-Based Construction of Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background -- 2.1 Enterprise Architecture Analysis | |
505 | 8 | |a 2.2 Graph-Based Analysis of EA Models -- 2.3 Knowledge Graphs and Enterprise Architecture -- 3 Model-Based EA Knowledge Graph Construction -- 3.1 Knowledge Graph Creation -- 3.2 Knowledge Graph Enrichment -- 3.3 Knowledge Graph Deployment and Application -- 4 An EAKG Archi Plugin -- 5 Case-Based Evaluation -- 6 Conclusive Discussion -- References -- Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterprises: A Case Study at a European Mobility Provider -- 1 Introduction -- 2 Theoretical Foundations and Related Work -- 2.1 Enterprise Architecture -- 2.2 Digital Transformation -- 2.3 Enterprise Architecture Support for DT Projects -- 3 Research Approach -- 3.1 Research Method -- 3.2 Context of the Case Study -- 3.3 Data Gathering: Qualitative Expert Interviews -- 3.4 Data Analysis: Document Analysis and Qualitative Content Analysis of the Expert Interviews -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Interoperability of Digital Government Services: A Brazilian Reference Architecture Model to Promote Communication, Management, and Reuse of Solutions -- 1 Introduction -- 2 Materials and Methods -- 2.1 Environment: DT and the Brazilian Government Perspective -- 2.2 Knowledge Base -- 2.3 IS Research Cycle -- 3 The Reference Model for Interoperability Between Entities in the Delivery of Electronic Government Services -- 3.1 The Reference Model -- 3.2 A Proposal for the Model Implementation -- 3.3 Monitoring the Use and Evolving the Reference Model -- 4 Conclusions -- References -- Business Process Modeling and Monitoring -- Modeling, Executing and Monitoring IoT-Driven Business Rules with BPMN and DMN: Current Support and Challenges -- 1 Introduction -- 2 Current Support for IoT-Driven Business Rules in BPMN and BPMN + DMN -- 2.1 IoT-Driven Business Rules in BPMN. | |
505 | 8 | |a 2.2 IoT-Driven Business Rules in BPMN + DMN -- 3 Challenges -- 3.1 Modeling Challenges -- 3.2 Execution Challenges -- 3.3 Monitoring Challenges -- 4 Conclusion -- References -- Enhanced Transformation of BPMN Models with Cancellation Features -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Business Process Model and Notation -- 3.2 Reset Nets -- 4 Enhanced Transformation of BPMN Models -- 4.1 Modeling Assumptions -- 4.2 Building Reset Nets -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Results -- 5.3 Threats to Validity -- 6 Conclusion -- References -- Next-Activity Prediction for Non-stationary Processes with Unseen Data Variability -- 1 Introduction -- 2 Related Work -- 3 Challenges and Requirements -- 3.1 Data Variability -- 3.2 Challenges of Evidence Based Predictions with Unseen Activities and Sequences -- 3.3 Uncertainty of the Final Activity of a Trace -- 4 Approach -- 4.1 Data Encoding with Unseen Data Variability -- 4.2 Determining the Termination of a Sequence -- 4.3 Online Prediction Process -- 4.4 Prediction Model Update Strategies -- 5 Experiments -- 5.1 Online Prediction Simulation and Model Update -- 5.2 Datasets -- 5.3 Data Pre-processing -- 5.4 Event Data Encoding -- 5.5 LSTM Neural Networks and Model Training -- 5.6 Model Selection -- 5.7 Results -- 6 Conclusion -- References -- Business Process Mining and Discovery -- On the Origin of Questions in Process Mining Projects -- 1 Introduction -- 2 Background -- 3 Research Method -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Results -- 4.1 Question Formulation: From Event Logs to Questions -- 4.2 Question Refinement: Refining Questions with Process Mining -- 5 Discussion -- 6 Conclusion -- References -- Extracting Business Process Entities and Relations from Text Using Pre-trained Language Models and In-Context Learning -- 1 Introduction -- 2 Background | |
505 | 8 | |a 2.1 Process Extraction from Text -- 2.2 In-Context Learning -- 2.3 The PET Dataset -- 3 Process Extraction from Text via In-Context Learning -- 3.1 Implementing the Approach -- 4 Empirical Assessment -- 4.1 The Tasks -- 4.2 Experimental Setting -- 4.3 Validation Dataset -- 4.4 Answering the Research Questions -- 5 Further Insights -- 6 Related Work -- 7 Conclusion -- References -- Discovering Sound Free-Choice Workflow Nets with Non-block Structures -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Approach -- 4.1 Ordering Strategies for Adding Activities -- 4.2 Search Space Pruning -- 4.3 Patterns -- 4.4 Selection and Fall-Through -- 5 Evaluation -- 5.1 Experiment Setup -- 5.2 Results -- 6 Conclusion and Future Work -- References -- Shape Your Process: Discovering Declarative Business Processes from Positive and Negative Traces Taking into Account User Preferences -- 1 Introduction -- 2 The Modeling Language -- 3 Why Preferences on the Discovered Models? -- 3.1 Preferences over Process Activities -- 3.2 Preferences over Declare Templates -- 3.3 Preferences over both Activities and Templates -- 4 Discovering Business Processes from Positive and Negative Traces -- 5 Adding Preferences to Process Discovery: An Implementation Through ASPrin -- 5.1 Specifying the Preferences -- 5.2 Exploiting ASPrin for Searching Preferred Models -- 6 Evaluating the Discovery -- 6.1 The DREYERS Log -- 6.2 Evaluation on the CERV Log -- 7 Related Work -- 8 Conclusions -- References -- Process-Driven Applications -- Semi-automated Test Migration for BPMN-Based Process-Driven Applications -- 1 Introduction -- 2 No-Code Approach for Creating Regression Tests -- 3 Related Work -- 4 Overview of the Solution -- 5 Flow Assignment -- 6 Test Impact Analysis -- 6.1 Impact Analysis at Flow Level -- 6.2 Aggregation at Flow Level and Derivation at Test Level | |
505 | 8 | |a 7 Migration and Test Code Generation -- 8 Evaluation -- 8.1 Experiment Setting -- 8.2 Results and Discussion -- 9 Summary and Outlook -- References -- Splitting Quantum-Classical Scripts for the Generation of Quantum Workflows -- 1 Introduction -- 2 Fundamentals -- 2.1 Hybrid Quantum Algorithms -- 2.2 Quantum Workflows -- 2.3 Deployment Models -- 3 Script Splitting and Workflow Generation -- 3.1 Select Implementation -- 3.2 Add Splitting Markers -- 3.3 Split Script -- 3.4 Generate Quantum Workflow -- 3.5 Generate Incomplete Deployment Models -- 3.6 Complete Deployment Models -- 3.7 Deploy and Execute -- 4 Prototype -- 5 Case Study: Shor's Algorithm -- 6 Discussion -- 7 Related Work -- 8 Summary and Future Work -- References -- Author Index | |
650 | 4 | |a Computer networks-Congresses | |
650 | 4 | |a Management information systems-Congresses | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2022 |z Bozen |2 gnd-content | |
700 | 1 | |a Karastoyanova, Dimka |e Sonstige |4 oth | |
700 | 1 | |a Guizzardi, Giancarlo |e Sonstige |4 oth | |
700 | 1 | |a Montali, Marco |e Sonstige |4 oth | |
700 | 1 | |a Maggi, Fabrizio Maria |e Sonstige |4 oth | |
700 | 1 | |a Fonseca, Claudenir M. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Almeida, João Paulo A. |t Enterprise Design, Operations, and Computing |d Cham : Springer International Publishing AG,c2022 |z 9783031176036 |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034735712 | |
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7101898 |l DE-2070s |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1820875837271965696 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Almeida, João Paulo A. |
author_facet | Almeida, João Paulo A. |
author_role | aut |
author_sort | Almeida, João Paulo A. |
author_variant | j p a a jpa jpaa |
building | Verbundindex |
bvnumber | BV049408628 |
classification_rvk | SS 4800 |
collection | ZDB-30-PQE |
contents | Intro -- Preface -- Organization -- Keynote Speeches -- "We Are All Digital Now": Platform Systems and Flow Processes in Modern Enterprises -- Smart Modeling of Smart Software -- Modelling Ethical and Legal Norms/Explaining Compliance and Violation -- Tutorial -- Business Process Modeling and Simulation with DPMN -- Contents -- Enterprise Security -- Computable Consent - From Regulatory, Legislative, and Organizational Policies to Security Policies -- 1 Introduction -- 1.1 Problem and Contributions -- 1.2 Related Work -- 2 Towards Consent Automation - FHIR Approach -- 2.1 FHIR Consent Resource - Basic Policy and Computable Policy Expressions -- 2.2 Link with Smart on FHIR Architecture Pattern -- 2.3 Analysis -- 3 Computable Policy Framework -- 3.1 Modelling Concepts for Policy Rules -- 3.2 Policy Language Options -- 3.3 Example - Privacy Consent -- 4 Positioning with FHIR Ecosystem -- 5 Conclusion and Future Work -- References -- A Multi-level Cyber-Security Reference Model in Support of Vulnerability Analysis -- 1 Introduction -- 2 Main Goals, Requirements and Design Decisions -- 3 A Multi-level Reference Model in Support of Vulnerability Analysis -- 4 Demonstration -- 5 Related Work -- 6 Conclusions -- References -- Security Ontologies: A Systematic Literature Review -- 1 Introduction -- 2 Background and Related Work -- 2.1 Security Ontologies -- 2.2 Existing Systematic Literature Review of Security Ontologies -- 3 The Systematic Literature Review -- 3.1 Planning the Systematic Literature Review -- 3.2 Conducting the Systematic Literature Review -- 3.3 Reporting the Systematic Literature Review -- 4 Conclusions and Future Work -- References -- Enterprise Architecture -- Model-Based Construction of Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background -- 2.1 Enterprise Architecture Analysis 2.2 Graph-Based Analysis of EA Models -- 2.3 Knowledge Graphs and Enterprise Architecture -- 3 Model-Based EA Knowledge Graph Construction -- 3.1 Knowledge Graph Creation -- 3.2 Knowledge Graph Enrichment -- 3.3 Knowledge Graph Deployment and Application -- 4 An EAKG Archi Plugin -- 5 Case-Based Evaluation -- 6 Conclusive Discussion -- References -- Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterprises: A Case Study at a European Mobility Provider -- 1 Introduction -- 2 Theoretical Foundations and Related Work -- 2.1 Enterprise Architecture -- 2.2 Digital Transformation -- 2.3 Enterprise Architecture Support for DT Projects -- 3 Research Approach -- 3.1 Research Method -- 3.2 Context of the Case Study -- 3.3 Data Gathering: Qualitative Expert Interviews -- 3.4 Data Analysis: Document Analysis and Qualitative Content Analysis of the Expert Interviews -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Interoperability of Digital Government Services: A Brazilian Reference Architecture Model to Promote Communication, Management, and Reuse of Solutions -- 1 Introduction -- 2 Materials and Methods -- 2.1 Environment: DT and the Brazilian Government Perspective -- 2.2 Knowledge Base -- 2.3 IS Research Cycle -- 3 The Reference Model for Interoperability Between Entities in the Delivery of Electronic Government Services -- 3.1 The Reference Model -- 3.2 A Proposal for the Model Implementation -- 3.3 Monitoring the Use and Evolving the Reference Model -- 4 Conclusions -- References -- Business Process Modeling and Monitoring -- Modeling, Executing and Monitoring IoT-Driven Business Rules with BPMN and DMN: Current Support and Challenges -- 1 Introduction -- 2 Current Support for IoT-Driven Business Rules in BPMN and BPMN + DMN -- 2.1 IoT-Driven Business Rules in BPMN. 2.2 IoT-Driven Business Rules in BPMN + DMN -- 3 Challenges -- 3.1 Modeling Challenges -- 3.2 Execution Challenges -- 3.3 Monitoring Challenges -- 4 Conclusion -- References -- Enhanced Transformation of BPMN Models with Cancellation Features -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Business Process Model and Notation -- 3.2 Reset Nets -- 4 Enhanced Transformation of BPMN Models -- 4.1 Modeling Assumptions -- 4.2 Building Reset Nets -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Results -- 5.3 Threats to Validity -- 6 Conclusion -- References -- Next-Activity Prediction for Non-stationary Processes with Unseen Data Variability -- 1 Introduction -- 2 Related Work -- 3 Challenges and Requirements -- 3.1 Data Variability -- 3.2 Challenges of Evidence Based Predictions with Unseen Activities and Sequences -- 3.3 Uncertainty of the Final Activity of a Trace -- 4 Approach -- 4.1 Data Encoding with Unseen Data Variability -- 4.2 Determining the Termination of a Sequence -- 4.3 Online Prediction Process -- 4.4 Prediction Model Update Strategies -- 5 Experiments -- 5.1 Online Prediction Simulation and Model Update -- 5.2 Datasets -- 5.3 Data Pre-processing -- 5.4 Event Data Encoding -- 5.5 LSTM Neural Networks and Model Training -- 5.6 Model Selection -- 5.7 Results -- 6 Conclusion -- References -- Business Process Mining and Discovery -- On the Origin of Questions in Process Mining Projects -- 1 Introduction -- 2 Background -- 3 Research Method -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Results -- 4.1 Question Formulation: From Event Logs to Questions -- 4.2 Question Refinement: Refining Questions with Process Mining -- 5 Discussion -- 6 Conclusion -- References -- Extracting Business Process Entities and Relations from Text Using Pre-trained Language Models and In-Context Learning -- 1 Introduction -- 2 Background 2.1 Process Extraction from Text -- 2.2 In-Context Learning -- 2.3 The PET Dataset -- 3 Process Extraction from Text via In-Context Learning -- 3.1 Implementing the Approach -- 4 Empirical Assessment -- 4.1 The Tasks -- 4.2 Experimental Setting -- 4.3 Validation Dataset -- 4.4 Answering the Research Questions -- 5 Further Insights -- 6 Related Work -- 7 Conclusion -- References -- Discovering Sound Free-Choice Workflow Nets with Non-block Structures -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Approach -- 4.1 Ordering Strategies for Adding Activities -- 4.2 Search Space Pruning -- 4.3 Patterns -- 4.4 Selection and Fall-Through -- 5 Evaluation -- 5.1 Experiment Setup -- 5.2 Results -- 6 Conclusion and Future Work -- References -- Shape Your Process: Discovering Declarative Business Processes from Positive and Negative Traces Taking into Account User Preferences -- 1 Introduction -- 2 The Modeling Language -- 3 Why Preferences on the Discovered Models? -- 3.1 Preferences over Process Activities -- 3.2 Preferences over Declare Templates -- 3.3 Preferences over both Activities and Templates -- 4 Discovering Business Processes from Positive and Negative Traces -- 5 Adding Preferences to Process Discovery: An Implementation Through ASPrin -- 5.1 Specifying the Preferences -- 5.2 Exploiting ASPrin for Searching Preferred Models -- 6 Evaluating the Discovery -- 6.1 The DREYERS Log -- 6.2 Evaluation on the CERV Log -- 7 Related Work -- 8 Conclusions -- References -- Process-Driven Applications -- Semi-automated Test Migration for BPMN-Based Process-Driven Applications -- 1 Introduction -- 2 No-Code Approach for Creating Regression Tests -- 3 Related Work -- 4 Overview of the Solution -- 5 Flow Assignment -- 6 Test Impact Analysis -- 6.1 Impact Analysis at Flow Level -- 6.2 Aggregation at Flow Level and Derivation at Test Level 7 Migration and Test Code Generation -- 8 Evaluation -- 8.1 Experiment Setting -- 8.2 Results and Discussion -- 9 Summary and Outlook -- References -- Splitting Quantum-Classical Scripts for the Generation of Quantum Workflows -- 1 Introduction -- 2 Fundamentals -- 2.1 Hybrid Quantum Algorithms -- 2.2 Quantum Workflows -- 2.3 Deployment Models -- 3 Script Splitting and Workflow Generation -- 3.1 Select Implementation -- 3.2 Add Splitting Markers -- 3.3 Split Script -- 3.4 Generate Quantum Workflow -- 3.5 Generate Incomplete Deployment Models -- 3.6 Complete Deployment Models -- 3.7 Deploy and Execute -- 4 Prototype -- 5 Case Study: Shor's Algorithm -- 6 Discussion -- 7 Related Work -- 8 Summary and Future Work -- References -- Author Index |
ctrlnum | (ZDB-30-PQE)EBC7101898 (ZDB-30-PAD)EBC7101898 (ZDB-89-EBL)EBL7101898 (OCoLC)1346571400 (DE-599)BVBBV049408628 |
dewey-full | 658.054678 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.054678 |
dewey-search | 658.054678 |
dewey-sort | 3658.054678 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV049408628</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231114s2022 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031176043</subfield><subfield code="9">978-3-031-17604-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC7101898</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC7101898</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL7101898</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1346571400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049408628</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.054678</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Almeida, João Paulo A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Enterprise Design, Operations, and Computing</subfield><subfield code="b">26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (283 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes in Computer Science Series</subfield><subfield code="v">v.13585</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Keynote Speeches -- "We Are All Digital Now": Platform Systems and Flow Processes in Modern Enterprises -- Smart Modeling of Smart Software -- Modelling Ethical and Legal Norms/Explaining Compliance and Violation -- Tutorial -- Business Process Modeling and Simulation with DPMN -- Contents -- Enterprise Security -- Computable Consent - From Regulatory, Legislative, and Organizational Policies to Security Policies -- 1 Introduction -- 1.1 Problem and Contributions -- 1.2 Related Work -- 2 Towards Consent Automation - FHIR Approach -- 2.1 FHIR Consent Resource - Basic Policy and Computable Policy Expressions -- 2.2 Link with Smart on FHIR Architecture Pattern -- 2.3 Analysis -- 3 Computable Policy Framework -- 3.1 Modelling Concepts for Policy Rules -- 3.2 Policy Language Options -- 3.3 Example - Privacy Consent -- 4 Positioning with FHIR Ecosystem -- 5 Conclusion and Future Work -- References -- A Multi-level Cyber-Security Reference Model in Support of Vulnerability Analysis -- 1 Introduction -- 2 Main Goals, Requirements and Design Decisions -- 3 A Multi-level Reference Model in Support of Vulnerability Analysis -- 4 Demonstration -- 5 Related Work -- 6 Conclusions -- References -- Security Ontologies: A Systematic Literature Review -- 1 Introduction -- 2 Background and Related Work -- 2.1 Security Ontologies -- 2.2 Existing Systematic Literature Review of Security Ontologies -- 3 The Systematic Literature Review -- 3.1 Planning the Systematic Literature Review -- 3.2 Conducting the Systematic Literature Review -- 3.3 Reporting the Systematic Literature Review -- 4 Conclusions and Future Work -- References -- Enterprise Architecture -- Model-Based Construction of Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background -- 2.1 Enterprise Architecture Analysis</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.2 Graph-Based Analysis of EA Models -- 2.3 Knowledge Graphs and Enterprise Architecture -- 3 Model-Based EA Knowledge Graph Construction -- 3.1 Knowledge Graph Creation -- 3.2 Knowledge Graph Enrichment -- 3.3 Knowledge Graph Deployment and Application -- 4 An EAKG Archi Plugin -- 5 Case-Based Evaluation -- 6 Conclusive Discussion -- References -- Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterprises: A Case Study at a European Mobility Provider -- 1 Introduction -- 2 Theoretical Foundations and Related Work -- 2.1 Enterprise Architecture -- 2.2 Digital Transformation -- 2.3 Enterprise Architecture Support for DT Projects -- 3 Research Approach -- 3.1 Research Method -- 3.2 Context of the Case Study -- 3.3 Data Gathering: Qualitative Expert Interviews -- 3.4 Data Analysis: Document Analysis and Qualitative Content Analysis of the Expert Interviews -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Interoperability of Digital Government Services: A Brazilian Reference Architecture Model to Promote Communication, Management, and Reuse of Solutions -- 1 Introduction -- 2 Materials and Methods -- 2.1 Environment: DT and the Brazilian Government Perspective -- 2.2 Knowledge Base -- 2.3 IS Research Cycle -- 3 The Reference Model for Interoperability Between Entities in the Delivery of Electronic Government Services -- 3.1 The Reference Model -- 3.2 A Proposal for the Model Implementation -- 3.3 Monitoring the Use and Evolving the Reference Model -- 4 Conclusions -- References -- Business Process Modeling and Monitoring -- Modeling, Executing and Monitoring IoT-Driven Business Rules with BPMN and DMN: Current Support and Challenges -- 1 Introduction -- 2 Current Support for IoT-Driven Business Rules in BPMN and BPMN + DMN -- 2.1 IoT-Driven Business Rules in BPMN.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.2 IoT-Driven Business Rules in BPMN + DMN -- 3 Challenges -- 3.1 Modeling Challenges -- 3.2 Execution Challenges -- 3.3 Monitoring Challenges -- 4 Conclusion -- References -- Enhanced Transformation of BPMN Models with Cancellation Features -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Business Process Model and Notation -- 3.2 Reset Nets -- 4 Enhanced Transformation of BPMN Models -- 4.1 Modeling Assumptions -- 4.2 Building Reset Nets -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Results -- 5.3 Threats to Validity -- 6 Conclusion -- References -- Next-Activity Prediction for Non-stationary Processes with Unseen Data Variability -- 1 Introduction -- 2 Related Work -- 3 Challenges and Requirements -- 3.1 Data Variability -- 3.2 Challenges of Evidence Based Predictions with Unseen Activities and Sequences -- 3.3 Uncertainty of the Final Activity of a Trace -- 4 Approach -- 4.1 Data Encoding with Unseen Data Variability -- 4.2 Determining the Termination of a Sequence -- 4.3 Online Prediction Process -- 4.4 Prediction Model Update Strategies -- 5 Experiments -- 5.1 Online Prediction Simulation and Model Update -- 5.2 Datasets -- 5.3 Data Pre-processing -- 5.4 Event Data Encoding -- 5.5 LSTM Neural Networks and Model Training -- 5.6 Model Selection -- 5.7 Results -- 6 Conclusion -- References -- Business Process Mining and Discovery -- On the Origin of Questions in Process Mining Projects -- 1 Introduction -- 2 Background -- 3 Research Method -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Results -- 4.1 Question Formulation: From Event Logs to Questions -- 4.2 Question Refinement: Refining Questions with Process Mining -- 5 Discussion -- 6 Conclusion -- References -- Extracting Business Process Entities and Relations from Text Using Pre-trained Language Models and In-Context Learning -- 1 Introduction -- 2 Background</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.1 Process Extraction from Text -- 2.2 In-Context Learning -- 2.3 The PET Dataset -- 3 Process Extraction from Text via In-Context Learning -- 3.1 Implementing the Approach -- 4 Empirical Assessment -- 4.1 The Tasks -- 4.2 Experimental Setting -- 4.3 Validation Dataset -- 4.4 Answering the Research Questions -- 5 Further Insights -- 6 Related Work -- 7 Conclusion -- References -- Discovering Sound Free-Choice Workflow Nets with Non-block Structures -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Approach -- 4.1 Ordering Strategies for Adding Activities -- 4.2 Search Space Pruning -- 4.3 Patterns -- 4.4 Selection and Fall-Through -- 5 Evaluation -- 5.1 Experiment Setup -- 5.2 Results -- 6 Conclusion and Future Work -- References -- Shape Your Process: Discovering Declarative Business Processes from Positive and Negative Traces Taking into Account User Preferences -- 1 Introduction -- 2 The Modeling Language -- 3 Why Preferences on the Discovered Models? -- 3.1 Preferences over Process Activities -- 3.2 Preferences over Declare Templates -- 3.3 Preferences over both Activities and Templates -- 4 Discovering Business Processes from Positive and Negative Traces -- 5 Adding Preferences to Process Discovery: An Implementation Through ASPrin -- 5.1 Specifying the Preferences -- 5.2 Exploiting ASPrin for Searching Preferred Models -- 6 Evaluating the Discovery -- 6.1 The DREYERS Log -- 6.2 Evaluation on the CERV Log -- 7 Related Work -- 8 Conclusions -- References -- Process-Driven Applications -- Semi-automated Test Migration for BPMN-Based Process-Driven Applications -- 1 Introduction -- 2 No-Code Approach for Creating Regression Tests -- 3 Related Work -- 4 Overview of the Solution -- 5 Flow Assignment -- 6 Test Impact Analysis -- 6.1 Impact Analysis at Flow Level -- 6.2 Aggregation at Flow Level and Derivation at Test Level</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7 Migration and Test Code Generation -- 8 Evaluation -- 8.1 Experiment Setting -- 8.2 Results and Discussion -- 9 Summary and Outlook -- References -- Splitting Quantum-Classical Scripts for the Generation of Quantum Workflows -- 1 Introduction -- 2 Fundamentals -- 2.1 Hybrid Quantum Algorithms -- 2.2 Quantum Workflows -- 2.3 Deployment Models -- 3 Script Splitting and Workflow Generation -- 3.1 Select Implementation -- 3.2 Add Splitting Markers -- 3.3 Split Script -- 3.4 Generate Quantum Workflow -- 3.5 Generate Incomplete Deployment Models -- 3.6 Complete Deployment Models -- 3.7 Deploy and Execute -- 4 Prototype -- 5 Case Study: Shor's Algorithm -- 6 Discussion -- 7 Related Work -- 8 Summary and Future Work -- References -- Author Index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks-Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems-Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2022</subfield><subfield code="z">Bozen</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karastoyanova, Dimka</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Guizzardi, Giancarlo</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Montali, Marco</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maggi, Fabrizio Maria</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fonseca, Claudenir M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Almeida, João Paulo A.</subfield><subfield code="t">Enterprise Design, Operations, and Computing</subfield><subfield code="d">Cham : Springer International Publishing AG,c2022</subfield><subfield code="z">9783031176036</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034735712</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=7101898</subfield><subfield code="l">DE-2070s</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2022 Bozen gnd-content |
genre_facet | Konferenzschrift 2022 Bozen |
id | DE-604.BV049408628 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:05:37Z |
indexdate | 2025-01-10T15:21:59Z |
institution | BVB |
isbn | 9783031176043 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034735712 |
oclc_num | 1346571400 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 Online-Ressource (283 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer International Publishing AG |
record_format | marc |
series2 | Lecture Notes in Computer Science Series |
spelling | Almeida, João Paulo A. Verfasser aut Enterprise Design, Operations, and Computing 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings 1st ed Cham Springer International Publishing AG 2022 ©2022 1 Online-Ressource (283 Seiten) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science Series v.13585 Description based on publisher supplied metadata and other sources Intro -- Preface -- Organization -- Keynote Speeches -- "We Are All Digital Now": Platform Systems and Flow Processes in Modern Enterprises -- Smart Modeling of Smart Software -- Modelling Ethical and Legal Norms/Explaining Compliance and Violation -- Tutorial -- Business Process Modeling and Simulation with DPMN -- Contents -- Enterprise Security -- Computable Consent - From Regulatory, Legislative, and Organizational Policies to Security Policies -- 1 Introduction -- 1.1 Problem and Contributions -- 1.2 Related Work -- 2 Towards Consent Automation - FHIR Approach -- 2.1 FHIR Consent Resource - Basic Policy and Computable Policy Expressions -- 2.2 Link with Smart on FHIR Architecture Pattern -- 2.3 Analysis -- 3 Computable Policy Framework -- 3.1 Modelling Concepts for Policy Rules -- 3.2 Policy Language Options -- 3.3 Example - Privacy Consent -- 4 Positioning with FHIR Ecosystem -- 5 Conclusion and Future Work -- References -- A Multi-level Cyber-Security Reference Model in Support of Vulnerability Analysis -- 1 Introduction -- 2 Main Goals, Requirements and Design Decisions -- 3 A Multi-level Reference Model in Support of Vulnerability Analysis -- 4 Demonstration -- 5 Related Work -- 6 Conclusions -- References -- Security Ontologies: A Systematic Literature Review -- 1 Introduction -- 2 Background and Related Work -- 2.1 Security Ontologies -- 2.2 Existing Systematic Literature Review of Security Ontologies -- 3 The Systematic Literature Review -- 3.1 Planning the Systematic Literature Review -- 3.2 Conducting the Systematic Literature Review -- 3.3 Reporting the Systematic Literature Review -- 4 Conclusions and Future Work -- References -- Enterprise Architecture -- Model-Based Construction of Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background -- 2.1 Enterprise Architecture Analysis 2.2 Graph-Based Analysis of EA Models -- 2.3 Knowledge Graphs and Enterprise Architecture -- 3 Model-Based EA Knowledge Graph Construction -- 3.1 Knowledge Graph Creation -- 3.2 Knowledge Graph Enrichment -- 3.3 Knowledge Graph Deployment and Application -- 4 An EAKG Archi Plugin -- 5 Case-Based Evaluation -- 6 Conclusive Discussion -- References -- Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterprises: A Case Study at a European Mobility Provider -- 1 Introduction -- 2 Theoretical Foundations and Related Work -- 2.1 Enterprise Architecture -- 2.2 Digital Transformation -- 2.3 Enterprise Architecture Support for DT Projects -- 3 Research Approach -- 3.1 Research Method -- 3.2 Context of the Case Study -- 3.3 Data Gathering: Qualitative Expert Interviews -- 3.4 Data Analysis: Document Analysis and Qualitative Content Analysis of the Expert Interviews -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Interoperability of Digital Government Services: A Brazilian Reference Architecture Model to Promote Communication, Management, and Reuse of Solutions -- 1 Introduction -- 2 Materials and Methods -- 2.1 Environment: DT and the Brazilian Government Perspective -- 2.2 Knowledge Base -- 2.3 IS Research Cycle -- 3 The Reference Model for Interoperability Between Entities in the Delivery of Electronic Government Services -- 3.1 The Reference Model -- 3.2 A Proposal for the Model Implementation -- 3.3 Monitoring the Use and Evolving the Reference Model -- 4 Conclusions -- References -- Business Process Modeling and Monitoring -- Modeling, Executing and Monitoring IoT-Driven Business Rules with BPMN and DMN: Current Support and Challenges -- 1 Introduction -- 2 Current Support for IoT-Driven Business Rules in BPMN and BPMN + DMN -- 2.1 IoT-Driven Business Rules in BPMN. 2.2 IoT-Driven Business Rules in BPMN + DMN -- 3 Challenges -- 3.1 Modeling Challenges -- 3.2 Execution Challenges -- 3.3 Monitoring Challenges -- 4 Conclusion -- References -- Enhanced Transformation of BPMN Models with Cancellation Features -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Business Process Model and Notation -- 3.2 Reset Nets -- 4 Enhanced Transformation of BPMN Models -- 4.1 Modeling Assumptions -- 4.2 Building Reset Nets -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Results -- 5.3 Threats to Validity -- 6 Conclusion -- References -- Next-Activity Prediction for Non-stationary Processes with Unseen Data Variability -- 1 Introduction -- 2 Related Work -- 3 Challenges and Requirements -- 3.1 Data Variability -- 3.2 Challenges of Evidence Based Predictions with Unseen Activities and Sequences -- 3.3 Uncertainty of the Final Activity of a Trace -- 4 Approach -- 4.1 Data Encoding with Unseen Data Variability -- 4.2 Determining the Termination of a Sequence -- 4.3 Online Prediction Process -- 4.4 Prediction Model Update Strategies -- 5 Experiments -- 5.1 Online Prediction Simulation and Model Update -- 5.2 Datasets -- 5.3 Data Pre-processing -- 5.4 Event Data Encoding -- 5.5 LSTM Neural Networks and Model Training -- 5.6 Model Selection -- 5.7 Results -- 6 Conclusion -- References -- Business Process Mining and Discovery -- On the Origin of Questions in Process Mining Projects -- 1 Introduction -- 2 Background -- 3 Research Method -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Results -- 4.1 Question Formulation: From Event Logs to Questions -- 4.2 Question Refinement: Refining Questions with Process Mining -- 5 Discussion -- 6 Conclusion -- References -- Extracting Business Process Entities and Relations from Text Using Pre-trained Language Models and In-Context Learning -- 1 Introduction -- 2 Background 2.1 Process Extraction from Text -- 2.2 In-Context Learning -- 2.3 The PET Dataset -- 3 Process Extraction from Text via In-Context Learning -- 3.1 Implementing the Approach -- 4 Empirical Assessment -- 4.1 The Tasks -- 4.2 Experimental Setting -- 4.3 Validation Dataset -- 4.4 Answering the Research Questions -- 5 Further Insights -- 6 Related Work -- 7 Conclusion -- References -- Discovering Sound Free-Choice Workflow Nets with Non-block Structures -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Approach -- 4.1 Ordering Strategies for Adding Activities -- 4.2 Search Space Pruning -- 4.3 Patterns -- 4.4 Selection and Fall-Through -- 5 Evaluation -- 5.1 Experiment Setup -- 5.2 Results -- 6 Conclusion and Future Work -- References -- Shape Your Process: Discovering Declarative Business Processes from Positive and Negative Traces Taking into Account User Preferences -- 1 Introduction -- 2 The Modeling Language -- 3 Why Preferences on the Discovered Models? -- 3.1 Preferences over Process Activities -- 3.2 Preferences over Declare Templates -- 3.3 Preferences over both Activities and Templates -- 4 Discovering Business Processes from Positive and Negative Traces -- 5 Adding Preferences to Process Discovery: An Implementation Through ASPrin -- 5.1 Specifying the Preferences -- 5.2 Exploiting ASPrin for Searching Preferred Models -- 6 Evaluating the Discovery -- 6.1 The DREYERS Log -- 6.2 Evaluation on the CERV Log -- 7 Related Work -- 8 Conclusions -- References -- Process-Driven Applications -- Semi-automated Test Migration for BPMN-Based Process-Driven Applications -- 1 Introduction -- 2 No-Code Approach for Creating Regression Tests -- 3 Related Work -- 4 Overview of the Solution -- 5 Flow Assignment -- 6 Test Impact Analysis -- 6.1 Impact Analysis at Flow Level -- 6.2 Aggregation at Flow Level and Derivation at Test Level 7 Migration and Test Code Generation -- 8 Evaluation -- 8.1 Experiment Setting -- 8.2 Results and Discussion -- 9 Summary and Outlook -- References -- Splitting Quantum-Classical Scripts for the Generation of Quantum Workflows -- 1 Introduction -- 2 Fundamentals -- 2.1 Hybrid Quantum Algorithms -- 2.2 Quantum Workflows -- 2.3 Deployment Models -- 3 Script Splitting and Workflow Generation -- 3.1 Select Implementation -- 3.2 Add Splitting Markers -- 3.3 Split Script -- 3.4 Generate Quantum Workflow -- 3.5 Generate Incomplete Deployment Models -- 3.6 Complete Deployment Models -- 3.7 Deploy and Execute -- 4 Prototype -- 5 Case Study: Shor's Algorithm -- 6 Discussion -- 7 Related Work -- 8 Summary and Future Work -- References -- Author Index Computer networks-Congresses Management information systems-Congresses (DE-588)1071861417 Konferenzschrift 2022 Bozen gnd-content Karastoyanova, Dimka Sonstige oth Guizzardi, Giancarlo Sonstige oth Montali, Marco Sonstige oth Maggi, Fabrizio Maria Sonstige oth Fonseca, Claudenir M. Sonstige oth Erscheint auch als Druck-Ausgabe Almeida, João Paulo A. Enterprise Design, Operations, and Computing Cham : Springer International Publishing AG,c2022 9783031176036 |
spellingShingle | Almeida, João Paulo A. Enterprise Design, Operations, and Computing 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings Intro -- Preface -- Organization -- Keynote Speeches -- "We Are All Digital Now": Platform Systems and Flow Processes in Modern Enterprises -- Smart Modeling of Smart Software -- Modelling Ethical and Legal Norms/Explaining Compliance and Violation -- Tutorial -- Business Process Modeling and Simulation with DPMN -- Contents -- Enterprise Security -- Computable Consent - From Regulatory, Legislative, and Organizational Policies to Security Policies -- 1 Introduction -- 1.1 Problem and Contributions -- 1.2 Related Work -- 2 Towards Consent Automation - FHIR Approach -- 2.1 FHIR Consent Resource - Basic Policy and Computable Policy Expressions -- 2.2 Link with Smart on FHIR Architecture Pattern -- 2.3 Analysis -- 3 Computable Policy Framework -- 3.1 Modelling Concepts for Policy Rules -- 3.2 Policy Language Options -- 3.3 Example - Privacy Consent -- 4 Positioning with FHIR Ecosystem -- 5 Conclusion and Future Work -- References -- A Multi-level Cyber-Security Reference Model in Support of Vulnerability Analysis -- 1 Introduction -- 2 Main Goals, Requirements and Design Decisions -- 3 A Multi-level Reference Model in Support of Vulnerability Analysis -- 4 Demonstration -- 5 Related Work -- 6 Conclusions -- References -- Security Ontologies: A Systematic Literature Review -- 1 Introduction -- 2 Background and Related Work -- 2.1 Security Ontologies -- 2.2 Existing Systematic Literature Review of Security Ontologies -- 3 The Systematic Literature Review -- 3.1 Planning the Systematic Literature Review -- 3.2 Conducting the Systematic Literature Review -- 3.3 Reporting the Systematic Literature Review -- 4 Conclusions and Future Work -- References -- Enterprise Architecture -- Model-Based Construction of Enterprise Architecture Knowledge Graphs -- 1 Introduction -- 2 Background -- 2.1 Enterprise Architecture Analysis 2.2 Graph-Based Analysis of EA Models -- 2.3 Knowledge Graphs and Enterprise Architecture -- 3 Model-Based EA Knowledge Graph Construction -- 3.1 Knowledge Graph Creation -- 3.2 Knowledge Graph Enrichment -- 3.3 Knowledge Graph Deployment and Application -- 4 An EAKG Archi Plugin -- 5 Case-Based Evaluation -- 6 Conclusive Discussion -- References -- Enterprise Architecture Management Support for Digital Transformation Projects in Very Large Enterprises: A Case Study at a European Mobility Provider -- 1 Introduction -- 2 Theoretical Foundations and Related Work -- 2.1 Enterprise Architecture -- 2.2 Digital Transformation -- 2.3 Enterprise Architecture Support for DT Projects -- 3 Research Approach -- 3.1 Research Method -- 3.2 Context of the Case Study -- 3.3 Data Gathering: Qualitative Expert Interviews -- 3.4 Data Analysis: Document Analysis and Qualitative Content Analysis of the Expert Interviews -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Interoperability of Digital Government Services: A Brazilian Reference Architecture Model to Promote Communication, Management, and Reuse of Solutions -- 1 Introduction -- 2 Materials and Methods -- 2.1 Environment: DT and the Brazilian Government Perspective -- 2.2 Knowledge Base -- 2.3 IS Research Cycle -- 3 The Reference Model for Interoperability Between Entities in the Delivery of Electronic Government Services -- 3.1 The Reference Model -- 3.2 A Proposal for the Model Implementation -- 3.3 Monitoring the Use and Evolving the Reference Model -- 4 Conclusions -- References -- Business Process Modeling and Monitoring -- Modeling, Executing and Monitoring IoT-Driven Business Rules with BPMN and DMN: Current Support and Challenges -- 1 Introduction -- 2 Current Support for IoT-Driven Business Rules in BPMN and BPMN + DMN -- 2.1 IoT-Driven Business Rules in BPMN. 2.2 IoT-Driven Business Rules in BPMN + DMN -- 3 Challenges -- 3.1 Modeling Challenges -- 3.2 Execution Challenges -- 3.3 Monitoring Challenges -- 4 Conclusion -- References -- Enhanced Transformation of BPMN Models with Cancellation Features -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Business Process Model and Notation -- 3.2 Reset Nets -- 4 Enhanced Transformation of BPMN Models -- 4.1 Modeling Assumptions -- 4.2 Building Reset Nets -- 5 Evaluation -- 5.1 Experimental Setup -- 5.2 Results -- 5.3 Threats to Validity -- 6 Conclusion -- References -- Next-Activity Prediction for Non-stationary Processes with Unseen Data Variability -- 1 Introduction -- 2 Related Work -- 3 Challenges and Requirements -- 3.1 Data Variability -- 3.2 Challenges of Evidence Based Predictions with Unseen Activities and Sequences -- 3.3 Uncertainty of the Final Activity of a Trace -- 4 Approach -- 4.1 Data Encoding with Unseen Data Variability -- 4.2 Determining the Termination of a Sequence -- 4.3 Online Prediction Process -- 4.4 Prediction Model Update Strategies -- 5 Experiments -- 5.1 Online Prediction Simulation and Model Update -- 5.2 Datasets -- 5.3 Data Pre-processing -- 5.4 Event Data Encoding -- 5.5 LSTM Neural Networks and Model Training -- 5.6 Model Selection -- 5.7 Results -- 6 Conclusion -- References -- Business Process Mining and Discovery -- On the Origin of Questions in Process Mining Projects -- 1 Introduction -- 2 Background -- 3 Research Method -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Results -- 4.1 Question Formulation: From Event Logs to Questions -- 4.2 Question Refinement: Refining Questions with Process Mining -- 5 Discussion -- 6 Conclusion -- References -- Extracting Business Process Entities and Relations from Text Using Pre-trained Language Models and In-Context Learning -- 1 Introduction -- 2 Background 2.1 Process Extraction from Text -- 2.2 In-Context Learning -- 2.3 The PET Dataset -- 3 Process Extraction from Text via In-Context Learning -- 3.1 Implementing the Approach -- 4 Empirical Assessment -- 4.1 The Tasks -- 4.2 Experimental Setting -- 4.3 Validation Dataset -- 4.4 Answering the Research Questions -- 5 Further Insights -- 6 Related Work -- 7 Conclusion -- References -- Discovering Sound Free-Choice Workflow Nets with Non-block Structures -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Approach -- 4.1 Ordering Strategies for Adding Activities -- 4.2 Search Space Pruning -- 4.3 Patterns -- 4.4 Selection and Fall-Through -- 5 Evaluation -- 5.1 Experiment Setup -- 5.2 Results -- 6 Conclusion and Future Work -- References -- Shape Your Process: Discovering Declarative Business Processes from Positive and Negative Traces Taking into Account User Preferences -- 1 Introduction -- 2 The Modeling Language -- 3 Why Preferences on the Discovered Models? -- 3.1 Preferences over Process Activities -- 3.2 Preferences over Declare Templates -- 3.3 Preferences over both Activities and Templates -- 4 Discovering Business Processes from Positive and Negative Traces -- 5 Adding Preferences to Process Discovery: An Implementation Through ASPrin -- 5.1 Specifying the Preferences -- 5.2 Exploiting ASPrin for Searching Preferred Models -- 6 Evaluating the Discovery -- 6.1 The DREYERS Log -- 6.2 Evaluation on the CERV Log -- 7 Related Work -- 8 Conclusions -- References -- Process-Driven Applications -- Semi-automated Test Migration for BPMN-Based Process-Driven Applications -- 1 Introduction -- 2 No-Code Approach for Creating Regression Tests -- 3 Related Work -- 4 Overview of the Solution -- 5 Flow Assignment -- 6 Test Impact Analysis -- 6.1 Impact Analysis at Flow Level -- 6.2 Aggregation at Flow Level and Derivation at Test Level 7 Migration and Test Code Generation -- 8 Evaluation -- 8.1 Experiment Setting -- 8.2 Results and Discussion -- 9 Summary and Outlook -- References -- Splitting Quantum-Classical Scripts for the Generation of Quantum Workflows -- 1 Introduction -- 2 Fundamentals -- 2.1 Hybrid Quantum Algorithms -- 2.2 Quantum Workflows -- 2.3 Deployment Models -- 3 Script Splitting and Workflow Generation -- 3.1 Select Implementation -- 3.2 Add Splitting Markers -- 3.3 Split Script -- 3.4 Generate Quantum Workflow -- 3.5 Generate Incomplete Deployment Models -- 3.6 Complete Deployment Models -- 3.7 Deploy and Execute -- 4 Prototype -- 5 Case Study: Shor's Algorithm -- 6 Discussion -- 7 Related Work -- 8 Summary and Future Work -- References -- Author Index Computer networks-Congresses Management information systems-Congresses |
subject_GND | (DE-588)1071861417 |
title | Enterprise Design, Operations, and Computing 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings |
title_auth | Enterprise Design, Operations, and Computing 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings |
title_exact_search | Enterprise Design, Operations, and Computing 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings |
title_exact_search_txtP | Enterprise Design, Operations, and Computing 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings |
title_full | Enterprise Design, Operations, and Computing 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings |
title_fullStr | Enterprise Design, Operations, and Computing 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings |
title_full_unstemmed | Enterprise Design, Operations, and Computing 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings |
title_short | Enterprise Design, Operations, and Computing |
title_sort | enterprise design operations and computing 26th international conference edoc 2022 bozen bolzano italy october 3 7 2022 proceedings |
title_sub | 26th International Conference, EDOC 2022, Bozen-Bolzano, Italy, October 3-7, 2022, Proceedings |
topic | Computer networks-Congresses Management information systems-Congresses |
topic_facet | Computer networks-Congresses Management information systems-Congresses Konferenzschrift 2022 Bozen |
work_keys_str_mv | AT almeidajoaopauloa enterprisedesignoperationsandcomputing26thinternationalconferenceedoc2022bozenbolzanoitalyoctober372022proceedings AT karastoyanovadimka enterprisedesignoperationsandcomputing26thinternationalconferenceedoc2022bozenbolzanoitalyoctober372022proceedings AT guizzardigiancarlo enterprisedesignoperationsandcomputing26thinternationalconferenceedoc2022bozenbolzanoitalyoctober372022proceedings AT montalimarco enterprisedesignoperationsandcomputing26thinternationalconferenceedoc2022bozenbolzanoitalyoctober372022proceedings AT maggifabriziomaria enterprisedesignoperationsandcomputing26thinternationalconferenceedoc2022bozenbolzanoitalyoctober372022proceedings AT fonsecaclaudenirm enterprisedesignoperationsandcomputing26thinternationalconferenceedoc2022bozenbolzanoitalyoctober372022proceedings |