420 results on '"Meersman, R."'
Search Results
2. Semantic ontology tools in IS design
- Author
-
Meersman, R. A., Carbonell, Jaime G., editor, Siekmann, Jörg, editor, Goos, G., editor, Hartmanis, J., editor, van Leeuwen, J., editor, Raś, Zbigniew W., editor, and Skowron, Andrzej, editor
- Published
- 1999
- Full Text
- View/download PDF
3. A logic framework for a semantics of object oriented data modelling
- Author
-
De Troyer, O., Meersman, R., Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, and Papazoglou, Michael P., editor
- Published
- 1995
- Full Text
- View/download PDF
4. 'Some methodology and representation problems for the semantics of prosaic application domains' : Extended abstract
- Author
-
Meersman, R. A., Carbonell, Jaime G., editor, Siekmann, Jörg, editor, Goos, G., editor, Hartmanis, J., editor, van Leeuwen, J., editor, Raś, Zbigniew W., editor, and Zemankova, Maria, editor
- Published
- 1994
- Full Text
- View/download PDF
5. Business semantics management: A case study for competency-centric HRM
- Author
-
De Leenheer, P., Christiaens, S., and Meersman, R.
- Published
- 2010
- Full Text
- View/download PDF
6. Dimensions for Scoping e-Government Enterprise Architecture Development Efforts
- Author
-
Nakakawa, A., Namagembe, F., Proper, Erik H.A., Panetto, H., Proper, H.A., Debruyne, C., Ardagna, C.A., Roman, D., Meersman, R., Panetto, H., Proper, H.A., Debruyne, C., Ardagna, C.A., Roman, D., and Meersman, R.
- Subjects
Software Science - Abstract
Item does not contain fulltext On the Move to Meaningful Internet Systems. OTM 2018 Conferences.Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018
- Published
- 2018
7. Baroreceptor sensitivity after Valsalva maneuver in women with chronic obstructive pulmonary disease
- Author
-
Bartels, Matthew N., Gates, G. J., Downey, J. A., Armstrong, H. F., and De Meersman, R. E.
- Published
- 2012
- Full Text
- View/download PDF
8. Exercise training favourably affects autonomic and blood pressure responses during mental and physical stressors in African-American men
- Author
-
Bond, V, Bartels, M N, Sloan, R P, Millis, R M, Zion, A S, Andrews, N, and De Meersman, R E
- Published
- 2009
- Full Text
- View/download PDF
9. A Conceptual Model of the Blockchain
- Author
-
Bollen, Peter, Debruyne, C, Panetto, H, Guedria, W, Bollen, P, Ciuciu, Karabatis, G, Meersman, R, Organisation,Strategy & Entrepreneurship, and RS: GSBE other - not theme-related research
- Subjects
Engineering ,Blockchain ,business.industry ,As is ,Foundation (engineering) ,Conceptual model (computer science) ,Hyperledger Fabric ,World state ,Blueprint ,Ledger ,Fact-based modeling ,Software engineering ,business - Abstract
Hyperledger Fabric is a very large project under the umbrella of the Linux Foundation, with hundreds of developers involved. In this paper we will illustrate how the application of fact-based modeling will help us in understanding some basic features of the blockchain concept as is used in Hyperledger Fabric (HLF) and that it can serve as a conceptual blueprint of HLF for all involved to use.
- Published
- 2020
10. Enhancing process models to improve business performance
- Author
-
Dees, M., de Leoni, M., Mannhardt, F., Panetto, H., Debruyne, C., Gaaloul, W., Papazoglou, M., Paschke, A., Agostino Ardagna, C., Meersman, R., and Process Science
- Subjects
Process management ,Process modeling ,Computer science ,Process (engineering) ,Business rule ,Business process ,Computer Science (all) ,Process mining ,020207 software engineering ,02 engineering and technology ,Theoretical Computer Science ,Conformance checking ,Work (electrical) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Relevance (information retrieval) - Abstract
Process mining is not only about discovery and conformance checking of business processes. It is also focused on enhancing processes to improve the business performance. While from a business perspective this third main stream is definitely as important as the others if not even more, little research work has been conducted. The existing body of work on process enhancement mainly focuses on ensuring that the process model is adapted to incorporate behavior that is observed in reality. It is less focused on improving the performance of the process. This paper reports on a methodology that creates an enhanced model with an improved performance level. The enhancements of the model limit incorporated behavior to only those parts that do not violate any business rules. Finally, the enhanced model is kept as close to the original model as possible. The practical relevance and feasibility of the methodology is assessed through two case studies. The result shows that the process models improved through our methodology, in comparison with state-of the art techniques, have improved KPI levels while still adhering to the desired prescriptive model.
- Published
- 2017
- Full Text
- View/download PDF
11. Availability and scalability optimized microservice discovery from enterprise systems
- Author
-
Panetto, H, Debruyne, C, Hepp, M, Lewis, D, Ardagna, CA, Meersman, R, De Alwis, AAC, Barros, A, Fidge, C, Polyvyanyy, A, Panetto, H, Debruyne, C, Hepp, M, Lewis, D, Ardagna, CA, Meersman, R, De Alwis, AAC, Barros, A, Fidge, C, and Polyvyanyy, A
- Abstract
Microservices have been introduced to industry as a novel architectural design for software development in cloud-based applications. This development has increased interest in finding new methodologies to migrate existing enterprise systems into microservices to achieve desirable performance characteristics such as high scalability, high availability, high cohesion and low coupling. A key challenge in this context is discovering microserviceable components with promising characteristics from a complex monolithic code base while predicting their resulting characteristics. This paper presents a technique to support such re-engineering of an enterprise system based on the fundamental mechanisms for structuring its architecture, i.e., business objects managed by software functions and their interactions. The technique relies on queuing theory and business object relationship analysis. A prototype for microservice discovery and characteristic analysis was developed using the NSGA II software clustering and optimization technique and has been validated against two open-source enterprise systems, SugarCRM and ChurchCRM. Our experiments demonstrate that the proposed approach can recommend microservice design which improves scalability, availability and execution efficiency of the system while achieving high cohesion and low coupling in software modules.
- Published
- 2019
12. Business object centric microservices patterns
- Author
-
Panetto, H, Debruyne, C, Hepp, M, Lewis, D, Ardagna, CA, Meersman, R, De Alwis, AAC, Barros, A, Fidge, C, Polyvyanyy, A, Panetto, H, Debruyne, C, Hepp, M, Lewis, D, Ardagna, CA, Meersman, R, De Alwis, AAC, Barros, A, Fidge, C, and Polyvyanyy, A
- Abstract
A key impediment towards maturing microservice architecture conceptions is the uncertainty about what it means to design fine-grained functionality for microservices. Under a traditional service-oriented architecture (SOA), the unit of functionality for software components concerns individual business domain objects and encapsulated operations, enabling desirable architectural properties such as high cohesion and loose-coupling of its components. However, at present it is not clear how this SOA design strategy should be refined for microservices nor, more generally, how design considerations for different degrees of granularity apply, in a consistent and systematic way, for large SOA systems to smaller microservices. This paper proposes microservice patterns, as a contribution to the maturity of microservice architectures, through the refinement of the functional structure of SOAs. The patterns are derived by considering the splitting of business object (BO) operations and salient types of BO relationships, which influence software structure (as captured in UML): object association, exclusive containment, inclusive containment and specialisation (i.e., subtyping). The viability of the patterns for evolving large SOA systems into microservices is demonstrated through automated microservices discovery algorithms, on two open-source enterprise systems used widely in practice, Dolibarr and SugarCRM.
- Published
- 2019
13. THE EFFECTS OF AN 8-WEEK OUTPATIENT PULMONARY REHABILITATION PROGRAM ON HEART RATE VARIABILITY AND RIGHT HEART FUNCTION IN PATIENTS WITH CHRONIC OBSTRUCTIVE PULMONARY DISEASE.
- Author
-
Gallucci, M, Lichtman, S, Pellicone, J, King, M, Wanstall, D, Domitrovich, P, Stein, P, and De Meersman, R
- Published
- 2003
14. A home-based resistance-training program using elastic bands for elderly patients with orthostatic hypotension
- Author
-
Zion, A. S., De Meersman, R., Diamond, B. E., and Bloomfield, D. M.
- Published
- 2003
- Full Text
- View/download PDF
15. AUTONOMIC RESPONSES TO TILT IN ATHLETES
- Author
-
Zion, A S., De Meersman, R E., Diamond, B E., and Bloomfield, D M.
- Published
- 2002
16. A generic framework for context-aware process performance analysis
- Author
-
Hompes, B.F.A., Buijs, J.C.A.M., van der Aalst, W.M.P., Debruyne, C., Panetto, H., Meersman, R., Dillon, T., Kuhn, E., O'Sullivan, G., Agostino Ardagna, C., and Process Science
- Subjects
Process modeling ,Context-aware ,Business process ,Process (engineering) ,Computer science ,Performance analysis ,Process mining ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,Conformance checking ,Business process discovery ,010104 statistics & probability ,0202 electrical engineering, electronic engineering, information engineering ,Root cause analysis ,020201 artificial intelligence & image processing ,Performance indicator ,Data mining ,0101 mathematics ,computer - Abstract
Process mining combines model-based process analysis with data-driven analysis techniques. The role of process mining is to extract knowledge and gain insights from event logs. Most existing techniques focus on process discovery (the automated extraction of process models) and conformance checking (aligning observed and modeled behavior). Relatively little research has been performed on the analysis of business process performance. Cooperative business processes often exhibit a high degree of variability and depend on many factors. Finding root causes for inefficiencies such as delays and long waiting times in such flexible processes remains an interesting challenge. This paper introduces a novel approach to analyze key process performance indicators by considering the process context. A generic context-aware analysis framework is presented that analyzes performance characteristics from multiple perspectives. A statistical approach is then utilized to evaluate and find significant differences in the results. Insights obtained can be used for finding high-impact points for optimization, prediction, and monitoring. The practical relevance of the approach is shown in a case study using real-life data.
- Published
- 2016
17. The semantics of hybrid process models
- Author
-
Slaats, T., Schunselaar, D.M.M., Maggi, F.M., Reijers, H.A., Debruyne, C., Panetto, H., Meersman, R., Dillon, T., Kuhn, E., O'Sullivan, D., Agostino Ardagna, C., Debruyne, Christophe, Panetto, Hervé, Meersman, Robert, Dillon, Tharam, Kühn, Eva, O'Sullivan, Declan, Ardagna, Claudio Agostino, Software and Sustainability (S2), Business Informatica, Network Institute, and Process Science
- Subjects
Process modeling ,Computer science ,Programming language ,Formal semantics (linguistics) ,02 engineering and technology ,Petri net ,Business process modeling ,computer.software_genre ,Notation ,Semantics ,020204 information systems ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,0202 electrical engineering, electronic engineering, information engineering ,Hybrid process model ,020201 artificial intelligence & image processing ,Declare ,SDG 7 - Affordable and Clean Energy ,computer - Abstract
In the area of business process modelling, declarative notations have been proposed as alternatives to notations that follow the dominant, imperative paradigm. Yet, the choice between an imperative or declarative style of modelling is not always easy to make. Instead, a mixture of these styles is sometimes preferable. This observation has underpinned recent calls for so-called hybrid process modelling notations. In this paper, we present a formal semantics for these. In our proposal, a hybrid process model is hierarchical, where each of its sub-processes may be specified in either an imperative or declarative fashion. The semantics we provide will allow modelling communities to build on the benefits of existing imperative and declarative modelling notations, instead of spending their energy on inventing new ones.
- Published
- 2016
- Full Text
- View/download PDF
18. A logic framework for a semantics of object oriented data modelling
- Author
-
De Troyer, O., primary and Meersman, R., additional
- Published
- 1995
- Full Text
- View/download PDF
19. On the Move to Meaningful Internet Systems. OTM 2018 Conferences - Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part II
- Author
-
Panetto, H., Debruyne, C., Proper, H.A., Ardagna, C.A., Roman, D., Meersman, R., and Proper, H.A.
- Subjects
020204 information systems ,Lecture notes in computer science ,Software Science ,0202 electrical engineering, electronic engineering, information engineering ,020207 software engineering ,02 engineering and technology - Abstract
Item does not contain fulltext 605 p.
- Published
- 2018
- Full Text
- View/download PDF
20. Enhancing Business Process Flexibility by Flexible Batch Processing
- Author
-
Karastoyanova, Dimka, Pufahl, Luise, Panetto, H, Debruyne, C, Proper, H, Ardagna, C., Roman, D, Meersman, R, and Information Systems
- Subjects
Flexibility (engineering) ,Business process ,business.industry ,Process (engineering) ,Computer science ,batch activities ,separation of concerns ,Separation of concerns ,02 engineering and technology ,Manufacturing engineering ,Business process management ,modular architecture ,020204 information systems ,business processes ,flexibility strategies ,0202 electrical engineering, electronic engineering, information engineering ,Batch processing ,Systems architecture ,020201 artificial intelligence & image processing ,business ,Adaptation (computer science) - Abstract
Business Process Management is a powerful approach forthe automation of collaborative business processes. Recently conceptshave been introduced to allow batch processing in business processesaddressing the needs of different industries. The existing batch activityconcepts are limited in their flexibility. In this paper we contribute differentstrategies for modeling and executing processes including batch workto improve the flexibility 1) of business processes in general and 2) of thebatch activity concept. The strategies support different flexibility aspects(i.e., variability, looseness, adaptation, and evolution) of batch activities.The strategies provide a systematic approach to categorize existing andfuture batch-enabled BPM systems. Furthermore, the paper provides asystem architecture independent from existing BPM systems, which allowsfor the support of all the strategies. The architecture can be usedwith different process languages and existing execution environments ina non-intrusive manner.
- Published
- 2018
21. Dimensions for Scoping e-Government Enterprise Architecture Development Efforts
- Author
-
Panetto, H., Proper, H.A., Debruyne, C., Ardagna, C.A., Roman, D., Meersman, R., Nakakawa, A., Namagembe, F., Proper, Erik H.A., Panetto, H., Proper, H.A., Debruyne, C., Ardagna, C.A., Roman, D., Meersman, R., Nakakawa, A., Namagembe, F., and Proper, Erik H.A.
- Abstract
On the Move to Meaningful Internet Systems. OTM 2018 Conferences.Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Item does not contain fulltext
- Published
- 2018
22. On the Move to Meaningful Internet Systems. OTM 2018 Conferences.Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018. Proceedings. Part I
- Author
-
Proper, H.A., Panetto, H., Debruyne, C., Ardagna, C.A., Roman, D., Meersman, R., Proper, H.A., Panetto, H., Debruyne, C., Ardagna, C.A., Roman, D., and Meersman, R.
- Abstract
Item does not contain fulltext
- Published
- 2018
23. Indulpet miner: Combining discovery algorithms
- Author
-
Roman, D, Panetto, H, Debruyne, C, Meersman, R, Proper HA Agostino Ardagna, C, Leemans, Sander, Tax, Niek, ter Hofstede, Arthur, Roman, D, Panetto, H, Debruyne, C, Meersman, R, Proper HA Agostino Ardagna, C, Leemans, Sander, Tax, Niek, and ter Hofstede, Arthur
- Abstract
In this work, we explore an approach to process discovery that is based on combining several existing process discovery algorithms. We focus on algorithms that generate process models in the process tree notation, which are sound by design. The main components of our proposed process discovery approach are the Inductive Miner, the Evolutionary Tree Miner, the Local Process Model Miner and a new bottom-up recursive technique. We conjecture that the combination of these process discovery algorithms can mitigate some of the weaknesses of the individual algorithms. In cases where the Inductive Miner results in overgeneralizing process models, the Evolutionary Tree Miner can often mine much more precise models. At the other hand, while the Evolutionary Tree Miner is computationally expensive, running it only on parts of the log that the Inductive Miner is not able to represent with a precise model fragment can considerably limit the search space size of the Evolutionary Tree Miner. Local Process Models and bottom-up recursion aid the Evolutionary Tree Miner further by instantiating it with frequent process model fragments. We evaluate our approaches on a collection of real-life event logs and find that it does combine the advantages of the miners and in some cases surpasses other discovery techniques.
- Published
- 2018
24. Towards event log querying for data quality: Let's start with detecting log imperfections
- Author
-
Roman, D, Panetto, H, Debruyne, C, Meersman, R, Proper HA Agostino Ardagna, C, Andrews, Robert, Suriadi, Suriadi, Ouyang, Chun, Poppe, Erik, Roman, D, Panetto, H, Debruyne, C, Meersman, R, Proper HA Agostino Ardagna, C, Andrews, Robert, Suriadi, Suriadi, Ouyang, Chun, and Poppe, Erik
- Abstract
Process mining is a relatively new data analysis discipline. As with other forms of data analysis, the quality and reliability of insights derived through analysis is directly related to the quality of the input (garbage in - garbage out). In the case of process mining, the input is an event log comprised of event data captured (in information systems) during the execution of the process. It is crucial then that the event log be treated as a first-class citizen. While data quality is an easily understood concept little effort has been directed towards systematically detecting data quality issues in event logs. Analysts still spend a large proportion of any project in `data cleaning', often involving manual and ad hoc tasks, and requiring more than one tool. While there are existing tools and languages that query event logs, the problem of different approaches for different log imperfections remains. In this paper we take the first steps to developing QUELI (Querying Event Log for Imperfections) a log query language that provides direct support for detecting log imperfections. We develop an approach that identifies capabilities required of QUELI and illustrate the approach by applying it to 5 of the 11 event log imperfection patterns described in [27]. We view this as a first step towards operationalising systematic, automated support for log cleaning.
- Published
- 2018
25. Discovering microservices in enterprise systems using a business object containment heuristic
- Author
-
Roman, D, Panetto, H, Debruyne, C, Meersman, R, Proper HA Agostino Ardagna, C, De Alwis, Adambarage, Barros, Alistair, Fidge, Colin, Polyvyanyy, Artem, Roman, D, Panetto, H, Debruyne, C, Meersman, R, Proper HA Agostino Ardagna, C, De Alwis, Adambarage, Barros, Alistair, Fidge, Colin, and Polyvyanyy, Artem
- Abstract
The growing impact of IoT and Blockchain platforms on business applications has increased interest in leveraging large enterprise systems as Cloud-enabled microservices. However, large and monolithic enterprise systems are unsuitable for flexible integration with such platforms. This paper presents a technique to support the re-engineering of an enterprise system based on the fundamental mechanisms for structuring its architecture, i.e., business objects managed by software functions and their relationships which influence business object interactions via the functions. The technique relies on a heuristic for deriving business object exclusive containment relationships based on analysis of source code and system logs. Furthermore, the paper provides an analysis of distributing enterprise systems based on the business object containment relationships using the NSGA II software clustering and optimization technique. The heuristics and the software clustering and optimization techniques have been validated against two open-source enterprise systems: SugarCRM and ChurchCRM. The experiments demonstrate that the proposed approach can identify microservice designs which support multiple desired microservice characteristics, such as high cohesion, low coupling, high scalability, high availability, and processing efficiency.
- Published
- 2018
26. Discovering microservices in enterprise systems using a business object containment heuristic
- Author
-
Panetto, H, Debruyne, C, Proper, HA, Ardagna, CA, Roman, D, Meersman, R, De Alwis, AAC, Barros, A, Fidge, C, Polyvyanyy, A, Panetto, H, Debruyne, C, Proper, HA, Ardagna, CA, Roman, D, Meersman, R, De Alwis, AAC, Barros, A, Fidge, C, and Polyvyanyy, A
- Abstract
© Springer Nature Switzerland AG 2018. The growing impact of IoT and Blockchain platforms on business applications has increased interest in leveraging large enterprise systems as Cloud-enabled microservices. However, large and monolithic enterprise systems are unsuitable for flexible integration with such platforms. This paper presents a technique to support the re-engineering of an enterprise system based on the fundamental mechanisms for structuring its architecture, i.e., business objects managed by software functions and their relationships which influence business object interactions via the functions. The technique relies on a heuristic for deriving business object exclusive containment relationships based on analysis of source code and system logs. Furthermore, the paper provides an analysis of distributing enterprise systems based on the business object containment relationships using the NSGA II software clustering and optimization technique. The heuristics and the software clustering and optimization techniques have been validated against two open-source enterprise systems: SugarCRM and ChurchCRM. The experiments demonstrate that the proposed approach can identify microservice designs which support multiple desired microservice characteristics, such as high cohesion, low coupling, high scalability, high availability, and processing efficiency.
- Published
- 2018
27. Semantic and Topological Patent Graphs: Analysis of Retrieval and Community Structure
- Author
-
Rattinger, A., Le Goff, J., Meersman, R., Guetl, Christian, Rattinger, A., Le Goff, J., Meersman, R., and Guetl, Christian
- Abstract
© 2018 IEEE. Classification systems are a common way to organize knowledge. The Cooperative Patent Classification (CPC) is a hierarchical patent classification system which intends to uniformly assign at least a single class to every document. The classification system is often successfully used as a filtering mechanism to improve patent retrieval performance. Semantic information on the other hand frequently fails to do this or only helps marginally. In this work, we build two graphs to address this: a semantic graph out of the full textual content of the patents and a topological graph out of the classification system. The semantic graph is then compared against the topological graph. This provides a basis on when semantic retrieval techniques can be useful in patent retrieval. In this work, we further visualize search result graphs and their communities to represent classification information before search result filtering.
- Published
- 2018
28. Ontologies for commitment-based smart contracts
- Author
-
de Kruijff, Joost, Weigand, Hans, Panetto, H, Debruyne, C., Gaaloul, W., Papazoglou, M., Paschke, A., Ardagna, C.A., Meersman, R., Department of Management, Research Group: Information & Supply Chain Management, and Center Ph. D. Students
- Subjects
enterprise ontology ,commitment-based smart contracts ,model driven architecture ,commitments ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,blockchan - Abstract
Smart contracts gain rapid exposure since the inception of blockchain technology. Yet there is no unified ontology for smart contracts. Being categorized as coded contracts or substitutes of conventional legal contracts, there is a need to reduce the conceptual ambiguity of smart contracts. We applied enterprise ontology and model driven architectures to abstract smart contracts at the essential, infological and datalogical level to explain the system behind computation and platform independent smart contracts rather than its functional behavior. This conceptual paper introduces commitment-based smart contracts, in which a contract is viewed as a business exchange consisting of a set of reciprocal commitments. A smart contract ensures the automated execution of most of these commitments.
- Published
- 2017
29. Methodological support for coordinating tasks in global product software engineering
- Author
-
Widiyatmoko, Carolus, Overbeek, S.J., Brinkkemper, S., Panetto, H., Debruyne, C., Gaaloul, W., Papazoglou, M., Paschke, A., Ardagna, C.A., Meersman, R., Sub Software Production, and Software Production
- Subjects
Social software engineering ,Software Engineering Process Group ,Resource-oriented architecture ,Computer science ,business.industry ,Global software engineering ,Software producing organization ,Software development ,Task coordination ,Software construction ,Component-based software engineering ,Personal software process ,Software requirements ,Software engineering ,business ,Design science ,Method engineering - Abstract
Distributing software processes by software producing organizations (SPOs) is emerging increasingly due to benefits that global software engineering (GSE) brings in terms of cost reduction, leveraging competencies, and market expansion. However, these organizations are facing communication and project control issues that can slow down the overall organization performance. Therefore, SPOs should be able to manage inter-dependencies among the tasks distributed to the globally dispersed teams. We analyze existing works and product software companies’ best practices in coordinating tasks in GSE. This paper specifically focuses on constructing methodological support for task coordination that can be influenced by the situational factors at the companies. The support comprises a framework and a method developed by using a method engineering approach. We introduce the framework that depicts the aspects that should be examined by companies and the method that elaborates the practices to guide companies to coordinate tasks in GSE projects. The validation results show that the framework and the method are accepted by experts regarding completeness and applicability to help SPOs in managing coordination among globally distributed teams.
- Published
- 2017
30. Finding process variants in event logs (short paper)
- Author
-
Bolt Iriondo, A.J., van der Aalst, W.M.P., de Leoni, M., Panetto, H., Debruyne, C., Gaaloul, W., Papazoglou, M., Paschke, A., Agostino Ardagna, C., Meersman, R., and Process Science
- Subjects
Event data ,Process variant detection ,Process mining - Abstract
The analysis of event data is particularly challenging when there is a lot of variability. Existing approaches can detect variants in very specific settings (e.g., changes of control-flow over time), or do not use statistical testing to decide whether a variant is relevant or not. In this paper, we introduce an unsupervised and generic technique to detect significant variants in event logs by applying existing, well-proven data mining techniques for recursive partitioning driven by conditional inference over event attributes. The approach has been fully implemented and is freely available as a ProM plugin. Finally, we validated our approach by applying it to a real-life event log obtained from a multinational Spanish telecommunications and broadband company, obtaining valuable insights directly from the event data.
- Published
- 2017
31. Exploring Modelling Strategies in a Meta--modelling Context
- Author
-
Bommel, P. van, Hoppenbrouwers, S.J.B.A., Proper, H.A., Weide, T.P. van der, Meersman, R., Tari, Z., Herrero, P., Meersman, R., Tari, Z., and Herrero, P.
- Subjects
Information Retrieval and Information Systems - Abstract
Contains fulltext : 35890.pdf (Publisher’s version ) (Closed access) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops,Montpellier, France,, 29 oktober 2006
- Published
- 2006
32. Vagal withdrawal as a function of audience
- Author
-
Meersman, R. De, Resiman, S., Daum, M., and Zorowitz, R.
- Subjects
Anxiety -- Physiological aspects ,Vagus nerve -- Physiological aspects ,Biological sciences - Abstract
People experience a sense of anxiety before and while speaking before a audience. This sense of anxiety is is characterized by diminished vagal regulation of heart rhythms which can be monitored by a portable holter system that records vagal cardiac activity in the form of electrocardiograms. However, subjects who spoke to an audience did not exhibit a change in respiratory function despite the change in vagal control.
- Published
- 1996
33. On the role of fitness, precision, generalization and simplicity in process discovery
- Author
-
Buijs, J.C.A.M., Dongen, van, B.F., Aalst, van der, W.M.P., Meersman, R., and Process Science
- Subjects
Process modeling ,Event (computing) ,business.industry ,Computer science ,Generalization ,media_common.quotation_subject ,Work in process ,Machine learning ,computer.software_genre ,Measure (mathematics) ,Business process discovery ,Quality (business) ,Simplicity ,Artificial intelligence ,business ,computer ,media_common - Abstract
Process discovery algorithms typically aim at discovering process models from event logs that best describe the recorded behavior. Often, the quality of a process discovery algorithm is measured by quantifying to what extent the resulting model can reproduce the behavior in the log, i.e. replay fitness. At the same time, there are many other metrics that compare a model with recorded behavior in terms of the precision of the model and the extent to which the model generalizes the behavior in the log. Furthermore, several metrics exist to measure the complexity of a model irrespective of the log. In this paper, we show that existing process discovery algorithms typically consider at most two out of the four main quality dimensions: replay fitness, precision, generalization and simplicity. Moreover, existing approaches can not steer the discovery process based on user-defined weights for the four quality dimensions. This paper also presents the ETM algorithm which allows the user to seamlessly steer the discovery process based on preferences with respect to the four quality dimensions. We show that all dimensions are important for process discovery. However, it only makes sense to consider precision, generalization and simplicity if the replay fitness is acceptable.
- Published
- 2013
- Full Text
- View/download PDF
34. Semi-supervised log pattern detection and exploration using event concurrence and contextual information
- Author
-
Panetto, H, Gaaloul, W, Paschke, A, Ardagna, C A, Debruyne, C, Meersman, R, Papazoglou, M, Lu, Xixi, Fahland, Dirk, Andrews, Robert, Suriadi, Suriadi, Wynn, Moe, ter Hofstede, Arthur, van der Aalst, Wil, Panetto, H, Gaaloul, W, Paschke, A, Ardagna, C A, Debruyne, C, Meersman, R, Papazoglou, M, Lu, Xixi, Fahland, Dirk, Andrews, Robert, Suriadi, Suriadi, Wynn, Moe, ter Hofstede, Arthur, and van der Aalst, Wil
- Abstract
Process mining offers a variety of techniques for analyzing process execution event logs. Although process discovery algorithms construct end-to-end process models, they often have difficulties dealing with the complexity of real-life event logs. Discovered models may contain either complex or over-generalized fragments, the interpretation of which is difficult, and can result in misleading insights. Detecting and visualizing behavioral patterns instead of creating model structures can reduce complexity and give more accurate insights into recorded behaviors. Unsupervised detection techniques, based on statistical properties of the log only, generate a multitude of patterns and lack domain context. Supervised pattern detection requires a domain expert to specify patterns manually and lacks the event log context. In this paper, we reconcile supervised and unsupervised pattern detection. We visualize the log and help users extract patterns of interest from the log or obtain patterns through unsupervised learning automatically. Pattern matches are visualized in the context of the event log (also showing concurrency and additional contextual information). Earlier patterns can be extended or modified based on the insights. This enables an interactive and iterative approach to identify complex and concrete behavioral patterns in event logs. We implemented our approach in the ProM framework and evaluated the tool using both the BPI Challenge 2012 log of a loan application process and an insurance claims log from a major Australian insurance company.
- Published
- 2017
35. Interactive and incremental business process model repair
- Author
-
Panetto, H, Gaaloul, W, Paschke, A, Ardagna, C A, Debruyne, C, Meersman, R, Papazoglou, M, Armas Cervantes, Abel, van Beest, Nick, La Rosa, Marcello, Dumas-Menijvar, Marlon, Garcia-Banuelos, Luciano, Panetto, H, Gaaloul, W, Paschke, A, Ardagna, C A, Debruyne, C, Meersman, R, Papazoglou, M, Armas Cervantes, Abel, van Beest, Nick, La Rosa, Marcello, Dumas-Menijvar, Marlon, and Garcia-Banuelos, Luciano
- Abstract
It is common for the observed behavior of a business process to differ from the behavior captured in its corresponding model, as workers devise workarounds to handle special circumstances, which over time become part of the norm. Process model repair methods help modelers to realign their models with the observed behavior as recorded in an event log. Given a process model and an event log, these methods produce a new process model that more closely matches the log, while resembling the original model as close as possible. Existing repair methods identify points in the process where the log deviates from the model, and fix these deviations by adding behavior to the model locally. In their quest for automation, these methods often add too much behavior to the model, so that the repaired model grossly over-generalizes the log. This paper advocates for an interactive and incremental approach to process model repair, where differences between the model and the log are visually displayed to the user, and the user repairs each difference manually based on the provided visual guidance. An empirical evaluation shows that the proposed method leads to repaired models that avoid the over-generalization pitfall of state-of-the-art automated repair methods.
- Published
- 2017
36. Scalable conformance checking of business processes
- Author
-
Panetto, H, Gaaloul, W, Paschke, A, Ardagna, C A, Debruyne, C, Meersman, R, Papazoglou, M, Reissner, Daniel, Conforti, Raffaele, Dumas-Menijvar, Marlon, La Rosa, Marcello, Armas Cervantes, Abel, Panetto, H, Gaaloul, W, Paschke, A, Ardagna, C A, Debruyne, C, Meersman, R, Papazoglou, M, Reissner, Daniel, Conforti, Raffaele, Dumas-Menijvar, Marlon, La Rosa, Marcello, and Armas Cervantes, Abel
- Abstract
Given a process model representing the expected behavior of a business process, and given an event log recording its actual execution, the problem of business process conformance checking is that of detecting and describing the differences between the process model and the event log. A desirable feature is to produce a minimal yet complete set of behavioral differences. Existing conformance checking techniques that achieve these properties do not scale up to real-life process models and event logs. This paper presents a technique that addresses this shortcoming by exploiting scalable automata-based techniques. A log is converted into a deterministic automaton in a lossless manner, the input process model is converted into another minimal automaton, and a minimal error- correcting synchronized product of the two automata is calculated using an admissible A* heuristic. The resulting automaton is used to extract alignments between traces produced by the model and traces in the log, or statements describing behavior observed in the log but not captured in the model. An evaluation based on real-life models and logs shows that the proposed technique significantly outperforms a state of the art technique for complete conformance checking.
- Published
- 2017
37. Methodological support for coordinating tasks in global product software engineering
- Author
-
Panetto, H., Debruyne, C., Gaaloul, W., Papazoglou, M., Paschke, A., Ardagna, C.A., Meersman, R., Widiyatmoko, Carolus, Overbeek, S.J., Brinkkemper, S., Panetto, H., Debruyne, C., Gaaloul, W., Papazoglou, M., Paschke, A., Ardagna, C.A., Meersman, R., Widiyatmoko, Carolus, Overbeek, S.J., and Brinkkemper, S.
- Published
- 2017
38. Efficient service variant analysis with Markov updates in Monte Carlo tree search (Short Paper)
- Author
-
Panetto, H, Gaaloul, W, Paschke, A, Ardagna, C A, Debruyne, C, Meersman, R, Papazoglou, M, Wei, Fuguo, Barros, Alistair, Rasmussen, Rune, De Alwis, Adambarage Anuruddha Chathuran, Panetto, H, Gaaloul, W, Paschke, A, Ardagna, C A, Debruyne, C, Meersman, R, Papazoglou, M, Wei, Fuguo, Barros, Alistair, Rasmussen, Rune, and De Alwis, Adambarage Anuruddha Chathuran
- Abstract
Static analysis techniques can be used to analyse and simplify interfaces of enterprise systems, such as those from SAP, Oracle and FedEx, which becoming more prominent on the internet and vying for new systems integration and extension opportunities. Web services of enterprise systems are notoriously complex, having hundreds of parameters per operation, multiple levels of nesting, leading to ambiguities about valid invocations of operations. To derive valid invocations, which in turn assists service users with invoking services correctly, this paper focuses on a challenging aspect of static interface analysis, namely, the identification of service variants in operations, in which the parameters are subtypes of business entities involved in a service. To efficiently search for which combinations of parameters are for a valid invocation, we have proposed a Monte Carlo method, based on likelihood-free Bayesian sampling, to identify higher probability parameters spaces, from which to test prospective invocations. A significant performance boost was found by extending Monte Carlo sampling with Markov look-up, with validation using a simulated FedEx service interface, whose structural complexity exceeds many web services of enterprise systems available on the internet.
- Published
- 2017
39. Methodological support for coordinating tasks in global product software engineering
- Author
-
Sub Software Production, Software Production, Widiyatmoko, Carolus, Overbeek, S.J., Brinkkemper, S., Panetto, H., Debruyne, C., Gaaloul, W., Papazoglou, M., Paschke, A., Ardagna, C.A., Meersman, R., Sub Software Production, Software Production, Widiyatmoko, Carolus, Overbeek, S.J., Brinkkemper, S., Panetto, H., Debruyne, C., Gaaloul, W., Papazoglou, M., Paschke, A., Ardagna, C.A., and Meersman, R.
- Published
- 2017
40. Two-level meta-controlled substitution grammars
- Author
-
Meersman, R., Rozenberg, G., Goos, G., editor, Hartmanis, J., editor, Brinch Hansen, P., editor, Gries, D., editor, Moler, C., editor, Seegmüller, G., editor, Stoer, J., editor, Wirth, N., editor, and Gruska, Jozef, editor
- Published
- 1977
- Full Text
- View/download PDF
41. Cooperating grammar systems
- Author
-
Meersman, R., Rozenberg, G., Goos, G., editor, Hartmanis, J., editor, Brinch Hansen, P., editor, Gries, D., editor, Moler, C., editor, Seegmüller, G., editor, Stoer, J., editor, Wirth, N., editor, and Winkowski, J., editor
- Published
- 1978
- Full Text
- View/download PDF
42. The Need for Second Order Interoperation
- Author
-
Guédria, W., Proper, H.A., Meersman, R., Panetto, H., Mishra, A., Valencia-García, R., Soares, A., Ciuciu, I., Ferri, F., Weichhart, G., Moser, T., Bezzi, M., Chan, H., Meersman, R., Panetto, H., Mishra, A., Valencia-García, R., Soares, A., Ciuciu, I., Ferri, F., Weichhart, G., Moser, T., Bezzi, M., and Chan, H.
- Subjects
Software Science ,Lecture Notes in Computer Science - Abstract
Item does not contain fulltext
- Published
- 2014
43. Online discovery of cooperative structures in business processes
- Author
-
van Zelst, S. J., van Dongen, B.F., van der Aalst, W.M.P., Debruyne, C., Panetto, H., Meersman, R., Dillon, T., Kühn, E., O'Sullivan, D., Agostino Ardagna, C., and Process Science
- Subjects
Focus (computing) ,Process enhancement ,Computer science ,Business process ,Event (computing) ,Process mining ,02 engineering and technology ,Network dynamics ,Data science ,Domain (software engineering) ,Business process discovery ,Open source ,Event streams ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Cooperative resource networks - Abstract
Process mining is a data-driven technique aiming to provide novel insights and help organizations to improve their business processes. In this paper, we focus on the cooperative aspect of process mining, i.e., discovering networks of cooperating resources that together perform processes. We use online streams of events as an input rather than event logs, which are typically used in an off-line setting. We present the Online Cooperative Network (OCN) framework, which defines online cooperative resource network discovery in a generic way. A prototypical implementation of the framework is available in the open source process mining toolkit ProM. By means of an empirical evaluation we show the applicability of the framework in the streaming domain. The techniques presented operate in a real time fashion and are able to handle unlimited amounts of data. Moreover, the implementation allows to visualize network dynamics, which helps in gaining insights in changes in the execution of the underlying business process.
- Published
- 2016
44. The Interplay of Mandatory Role and Set-Comparison constraints
- Author
-
Bollen, P.W.L., Herrero, P., Panetto, H., Meersman, R., Dillon, T., Organisation,Strategy & Entrepreneurship, and RS: GSBE ERD
- Subjects
Set (abstract data type) ,Subject-matter expert ,Focus (computing) ,Theoretical computer science ,Computer science - Abstract
In this paper we will focus on the interplay of mandatory role and set-comparison (equality-, subset- and exclusion-) constraints in fact based modeling. We will present an algorithm that can be used to derive mandatory role constraints in combination with non-implied set-comparison constraints as a result of the acceptance or rejection of real-life user examples by the domain expert.
- Published
- 2012
- Full Text
- View/download PDF
45. Efficient RDFS entailment in external memory
- Author
-
Haffmans, W.J., Fletcher, G.H.L., Meersman, R., Dillon, T., Herrero, P., and Database Group
- Subjects
Computer science ,RDF Schema ,Search engine indexing ,Internal memory ,Graph (abstract data type) ,Rdf graph ,computer.file_format ,RDF ,computer ,Logical consequence ,Algorithm ,Auxiliary memory - Abstract
The entailment of an RDF graph under the RDF Schema standard can easily become too costly to compute and maintain. It is often more desirable to compute on-demand whether a triple exists in the entailment. This is a non-trivial task likely to incur I/O costs, since RDF graphs are often too large to fit in internal memory. As disk I/O is expensive in terms of time, I/O costs should be minimized to achieve better performance. We investigate three physical indexing methods for RDF storage on disk, comparing them using the state of the art RDF Schema entailment algorithm of Muñoz et al. In particular, the I/O behavior during entailment checking over these graph representations is studied. Extensive empirical analysis shows that an enhanced version of the state of the art indexing method, which we propose here, yields in general the best I/O performance.
- Published
- 2011
- Full Text
- View/download PDF
46. A derivation procedure for set-comparison constraints in fact-based modeling
- Author
-
Bollen, P.W.L., Meersman, R., Dillon, T., Herrero, P., Organisation,Strategy & Entrepreneurship, RS: GSBE, and RS: GSBE ERD
- Subjects
Set (abstract data type) ,Subject-matter expert ,Focus (computing) ,Theoretical computer science ,Computer science ,Data mining ,computer.software_genre ,computer ,Conceptual schema ,Derivation procedure - Abstract
In this paper we will address the conceptual schema design procedure (CSDP) in fact-based modeling. We will focus on the modeling procedure of 'cook-book' for deriving set-comparison constraints. We will give an algorithm that can be applied by an analyst in an analyst-user dialogue in which all set-comparison constraints can be derived as a result of the acceptance or rejection of real-life user examples by the domain expert.
- Published
- 2011
- Full Text
- View/download PDF
47. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures
- Author
-
Bolzoni, D., Etalle, S., Meersman, R., Tari, Z., Mathematics and Computer Science, and Security
- Subjects
Boosting (machine learning) ,business.industry ,Computer science ,Anomaly-based intrusion detection system ,SCS-Cybersecurity ,Intrusion detection system ,computer.software_genre ,Web application security ,Regular language ,False positive paradox ,Web application ,Anomaly detection ,Data mining ,business ,computer - Abstract
We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying a new method for anomaly detection on the "regular" ones based on the inference of a regular language. We support our proposal by realizing Sphinx, an anomaly-based intrusion detection system based on it. Thorough benchmarks show that Sphinx performs better than current state-of-the-art systems, both in terms of false positives/false negatives as well as needing a shorter training period.
- Published
- 2008
- Full Text
- View/download PDF
48. A model-driven approach for the specification and analysis of access control policies
- Author
-
Fabio Massacci, Zannone, Nicola, Meersman, R., and Tari, Z.
- Subjects
Computer science ,business.industry ,Modeling language ,Process (engineering) ,Role-based access control ,Systems engineering ,System requirements specification ,Access control ,Software engineering ,business - Abstract
The last years have seen the definition of many languages, models and standards tailored to specify and enforce access control policies, but such frameworks do not provide methodological support during the policy specification process. In particular, they do not provide facilities for the analysis of the social context where the system operates. In this paper we propose a model-driven approach for the specification and analysis of access control policies. We build this framework on top of SI*, a modeling language tailored to capture and analyze functional and security requirements of socio-technical systems. The framework also provides formal mechanisms to assist policy writers and system administrators in the verification of access control policies and of the actual user-permission assignment.
- Published
- 2008
- Full Text
- View/download PDF
49. Modeling data federations in ORM
- Author
-
Balsters, Herman, Halpin, Terry, Meersman, R, Tari, Z, and Herrero, P
- Subjects
Information retrieval ,Computer science ,InformationSystems_DATABASEMANAGEMENT ,computer.software_genre ,Conceptual schema ,Data warehouse ,Data modeling ,Set (abstract data type) ,Consistency (database systems) ,Data extraction ,Star schema ,Schema (psychology) ,Component (UML) ,Global schema ,Data mining ,computer - Abstract
Two major problems in constructing data federations (for example, data warehouses and database federations) concern achieving and maintaining consistency and a uniform representation of the data on the global level of the federation. The first step in creating uniform representations of data is known as data extraction, whereas data reconciliation is concerned with resolving data inconsistencies. Our approach to constructing a global conceptual schema as the result of integrating a collection of (semantically) heterogeneous component schemas is based on the concept of exact views. We show that a global schema constructed in terms of exact views integrates component schemas in such a way that the global schema is populated by exactly those instances allowed by the local schemas (and in special cases, also the other way around). In this sense, the global schema is equivalent to the set of component schemas from which the global schema is derived. This paper describes a modeling framework for data federations based on the Object-Role Modeling (ORM) approach. In particular, we show that we can represent exact views within ORM, providing the means to resolve in a combined setting data extraction and reconciliation problems on the global level of the federation.
- Published
- 2007
- Full Text
- View/download PDF
50. Understanding the occurrence of errors in process models based on metrics
- Author
-
Mendling, J., Neumann, G., Aalst, van der, W.M.P., Meersman, R., Tari, Z., and Information Systems IE&IS
- Subjects
Process modeling ,Business process ,Computer science ,Process (engineering) ,Management science ,media_common.quotation_subject ,Information system ,Sample (statistics) ,Quality (business) ,Business process modeling ,Work in process ,Data science ,media_common - Abstract
Business process models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive application of process modeling in practice, there are hardly empirical results available on quality aspects of process models. This paper aims to advance the understanding of this matter by analyzing the connection between formal errors (such as deadlocks) and a set of metrics that capture various structural and behavioral aspects of a process model. In particular, we discuss the theoretical connection between errors and metrics, and provide a comprehensive validation based on an extensive sample of EPC process models from practice. Furthermore, we investigate the capability of the metrics to predict errors in a second independent sample of models. The high explanatory power of the metrics has considerable consequences for the design of future modeling guidelines and modeling tools.
- Published
- 2007
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.