TY - BOOK A1 - Giese, Holger T1 - Quo vadis, Modellierung? : Antrittsvorlesung 2008-12-11 N2 - Zum Thema "Quo vadis, Modellierung?" hält Prof. Dr. Holger Giese am 11. Dezember 2008 seine Antrittsvorlesung an der Universität Potsdam. Der Wissenschaftler bekleidet eine Professur für Systemanalyse und Modellierung. Es handelt sich um eine gemeinsame Berufung der Universität Potsdam mit dem Hasso-Plattner- Institut für Softwaresystemtechnik an der Universität Potsdam. Seit den Anfängen der Informatik vollzieht sich die Entwicklung von detaillierten, lösungsorientierten und eher technisch geprägten Modellen hin zu solchen, die immer abstrakter und eher an den Problemen beziehungsweise Anwendungsbereichen orientiert sind. Diese ermöglichen es, die Komplexität heutiger Systeme besser zu beherrschen. Der Einsatz führt in einigen Anwendungsbereichen heute schon zu bedeutend höherer Produktivität und Qualität sowie geringeren Entwicklungszeiten. Anderseits hat sich aber auch in anderen Anwendungsgebieten gezeigt, dass die ständige Anpassung der Software an sich ändernde Anforderungen oder Organisationsstrukturen dazu führt, dass in frühen Entwicklungsphasen entstandene Modelle in der Praxis oft sehr schnell nicht mehr mit der Software übereinstimmen. In seiner Antrittsvorlesung will Holger Giese diese Entwicklung Revue passieren lassen und der Frage nachgehen, was dies für die Zukunft der Modellierung bedeutet, mit welchen aktuellen Ansätzen man diesem Problem zu begegnen versucht und welche zukünftigen Entwicklungen für die Modellierung zu erwarten sind. Y1 - 2008 UR - http://info.ub.uni-potsdam.de/multimedia/show_projekt.php?projekt_id=24 PB - Univ.-Bibl. CY - Potsdam ER - TY - JOUR A1 - Glander, Tassilo A1 - Döllner, Jürgen Roland Friedrich T1 - Abstract representations for interactive visualization of virtual 3D city models N2 - Virtual 3D city models increasingly cover whole city areas; hence, the perception of complex urban structures becomes increasingly difficult. Using abstract visualization, complexity of these models can be hidden where its visibility is unnecessary, while important features are maintained and highlighted for better comprehension and communication. We present a technique to automatically generalize a given virtual 3D city model consisting of building models, an infrastructure network and optional land coverage data; this technique creates several representations of increasing levels of abstraction. Using the infrastructure network, our technique groups building models and replaces them with cell blocks, while preserving local landmarks. By computing a landmark hierarchy, we reduce the set of initial landmarks in a spatially balanced manner for use in higher levels of abstraction. In four application examples, we demonstrate smooth visualization of transitions between precomputed representations; dynamic landmark highlighting according to virtual camera distance; an implementation of a cognitively enhanced route representation, and generalization lenses to combine precomputed representations in focus + context visualization. Y1 - 2009 UR - http://www.sciencedirect.com/science/journal/01989715 U6 - https://doi.org/10.1016/j.compenvurbsys.2009.07.003 SN - 0198-9715 ER - TY - JOUR A1 - Decker, Gero A1 - Kopp, Oliver A1 - Leymann, Frank A1 - Weske, Mathias T1 - Interacting services : from specification to execution N2 - Interacting services play a key role to realize business process integration among different business partners by means of electronic message exchange. In order to provide seamless integration of these services, the messages exchanged as well as their dependencies must be well-defined. Service choreographies are a means to describe the allowed conversations. This article presents a requirements framework for service choreography languages, along which existing choreography languages are assessed. The requirements framework provides the basis for introducing the language BPEL4Chor, which extends the industry standard WS-BPEL with choreography-specific concepts. A validation is provided and integration with executable service orchestrations is discussed. Y1 - 2009 UR - http://www.sciencedirect.com/science/journal/0169023X U6 - https://doi.org/10.1016/j.datak.2009.04.003 SN - 0169-023X ER - TY - JOUR A1 - Decker, Gero A1 - Mendling, Jan T1 - Process instantiation N2 - Although several process modeling languages allow one to specify processes with multiple start elements, the precise semantics of such models are often unclear, both from a pragmatic and from a theoretical point of view. This paper addresses the lack of research on this problem and introduces the CASU framework (from Creation, Activation, subscription, Unsubscription). The contribution of this framework is a systematic description of design alternatives for the specification of instantiation semantics of process modeling languages. We classify six prominent languages by the help of this framework. We validate the relevance of the CASU framework through empirical investigations involving a large set of process models from practice. Our work provides the basis for the design of new correctness criteria as well as for the formalization of Event-driven Process Chains (EPCs) and extension of the Business Process Modeling Notation (BPMN). It complements research such as the workflow patterns. Y1 - 2009 UR - http://www.sciencedirect.com/science/journal/0169023X U6 - https://doi.org/10.1016/j.datak.2009.02.013 SN - 0169-023X ER - TY - JOUR A1 - Troeger, Peter A1 - Polze, Andreas T1 - Object and process migration in .NET N2 - Many of today's distributed computing systems in the field do not Support the migration of execution entities among computing nodes (luring runtime. The relatively static association between units of processing and computing nodes makes it difficult to implement fault-tolerant behavior or load-balancing schemes. The concept of code migration may provide a solution to the above-mentioned problems. it can be defined as the movement of processes, objects, or components from one computing node to another during system runtime in a distributed environment. With the advent of the virtual machine-based NET framework, many of the cross-language heterogeneity issues have been resolved. With the commercial implementation, the shared source "Rotor", and the open-source "Mono" implementation on hand, we have focused on cross-operating system heterogeneity issues and present interoperability and migration schemes for applications distributed over different operating systems (namely Linux and Windows 2000) as well as various NET implementations. Within this paper, we describe the integration of a migration facility with the hell) of Aspect- Oriented Programming (AOP) into the NET framework. AOP is interesting as it addresses non-functional system properties on the middleware level, without the need to manipulate lower system layers like the operating system itself. Most features required to implement object or process migration (such as reflection mechanisms or a machine-independent executable format) are already present in the NET frameworks, so the integration of such a concept is a natural extension of the system capabilities. We have implemented several proof-of-concept applications for different use case scenarios. The paper contains an experimental evaluation of the performance impact of object migration in context of those applications. Y1 - 2009 SN - 0267-6192 ER - TY - JOUR A1 - Wist, Dominic A1 - Wollowski, Ralf A1 - Schaefer, Mark A1 - Vogler, Walter T1 - Avoiding irreducible CSC conflicts by internal communication N2 - Resynthesis of handshake specifications obtained e. g. from BALSA or TANGRAM with speed-independent logic synthesis from STGs is a promising approach. To deal with state-space explosion, we suggested STG decomposition; a problem is that decomposition can lead to irreducible CSC conflicts. Here, we present a new approach to solve such conflicts by introducing internal communication between the components. We give some first, very encouraging results for very large STGs concerning synthesis time and circuit area. Y1 - 2009 UR - http://iospress.metapress.com/content/300178/ U6 - https://doi.org/10.3233/Fi-2009-140 SN - 0169-2968 ER - TY - GEN A1 - Fink, Hans-Peter T1 - Von Biopolymeren und Biokunststoffen : Antrittsvorlesung 2009-06-04 N2 - Prof. Fink wird zum einen auf die industriell schon lange genutzten natürlichen Polymere wie Cellulose, Stärke und Lignin eingehen, zum anderen auf neue Entwicklungen bei biobasierten Kunststoffen. Von besonderer Bedeutung ist dabei die Aufklärung von Zusammenhängen zwischen Prozessparametern, Strukturen und Eigenschaften. Y1 - 2009 UR - http://info.ub.uni-potsdam.de/multimedia/show_projekt.php?projekt_id=35 PB - Univ.-Bibl. CY - Potsdam ER - TY - JOUR A1 - Khomenko, Victor A1 - Schäfer, Mark A1 - Vogler, Walter A1 - Wollowski, Ralf T1 - STG decomposition strategies in combination with unfolding N2 - For synthesising efficient asynchronous circuits one has to deal with the state space explosion problem. In order to alleviate this problem one can decompose the STG into smaller components. This paper deals with the decomposition method of Vogler and Wollowski and introduces several strategies for its efficient implementations. Furthermore, this approach is combined with another method to alleviate state space explosion, which is based on Petri net unfoldings. The developed algorithms are compared by means of benchmark examples, and the experimental results show significant improvement in terms of memory usage and runtime compared with other existing methods. Y1 - 2009 UR - http://www.springerlink.com/content/100460 U6 - https://doi.org/10.1007/s00236-009-0102-y SN - 0001-5903 ER - TY - JOUR A1 - Haupt, Michael A1 - Adams, Bram A1 - Timbermont, Stijn A1 - Gibbs, Celina A1 - Coady, Yvonne A1 - Hirschfeld, Robert T1 - Disentangling virtual machine architecture N2 - Virtual machine (VM) implementations are made of intricately intertwined subsystems, interacting largely through implicit dependencies. As the degree of crosscutting present in VMs is very high, VM implementations exhibit significant internal complexity. This study proposes an architecture approach for VMs that regards a VM as a composite of service modules coordinated through explicit bidirectional interfaces. Aspect-oriented programming techniques are used to establish these interfaces, to coordinate module interaction, and to declaratively express concrete VM architectures. A VM architecture description language is presented in a case study, illustrating the application of the proposed architectural principles. Y1 - 2009 UR - http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=4124007 U6 - https://doi.org/10.1049/iet-sen.2007.0121 SN - 1751-8806 ER - TY - JOUR A1 - Giese, Holger A1 - Wagner, Robert T1 - From model transformation to incremental bidirectional model synchronization N2 - The model-driven software development paradigm requires that appropriate model transformations are applicable in different stages of the development process. The transformations have to consistently propagate changes between the different involved models and thus ensure a proper model synchronization. However, most approaches today do not fully support the requirements for model synchronization and focus only on classical one-way batch-oriented transformations. In this paper, we present our approach for an incremental model transformation which supports model synchronization. Our approach employs the visual, formal, and bidirectional transformation technique of triple graph grammars. Using this declarative specification formalism, we focus on the efficient execution of the transformation rules and how to achieve an incremental model transformation for synchronization purposes. We present an evaluation of our approach and demonstrate that due to the speedup for the incremental processing in the average case even larger models can be tackled. Y1 - 2009 UR - http://www.springerlink.com/content/109378 U6 - https://doi.org/10.1007/s10270-008-0089-9 SN - 1619-1366 ER - TY - JOUR A1 - Seibel, Andreas A1 - Neumann, Stefan A1 - Giese, Holger T1 - Dynamic hierarchical mega models : comprehensive traceability and its efficient maintenance N2 - In the world of model-driven engineering (MDE) support for traceability and maintenance of traceability information is essential. On the one hand, classical traceability approaches for MDE address this need by supporting automated creation of traceability information on the model element level. On the other hand, global model management approaches manually capture traceability information on the model level. However, there is currently no approach that supports comprehensive traceability, comprising traceability information on both levels, and efficient maintenance of traceability information, which requires a high-degree of automation and scalability. In this article, we present a comprehensive traceability approach that combines classical traceability approaches for MDE and global model management in form of dynamic hierarchical mega models. We further integrate efficient maintenance of traceability information based on top of dynamic hierarchical mega models. The proposed approach is further outlined by using an industrial case study and by presenting an implementation of the concepts in form of a prototype. Y1 - 2010 UR - http://www.springerlink.com/content/109378 U6 - https://doi.org/10.1007/s10270-009-0146-z SN - 1619-1366 ER - TY - JOUR A1 - Hildebrandt, Dieter A1 - Döllner, Jürgen T1 - Service-oriented, standards-based 3D geovisualization : potential and challenges N2 - The application of the architectural concept of service-oriented architectures (SOA) in combination with open standards when building distributed, 3D geovisualization systems offers the potential to cover and take advantage of the opportunities and demands created by the rise of ubiquitous computer networks and the Internet as well as to overcome prevalent interoperability barriers. In this paper, based on a literature study and our own experiences, we discuss the potential and challenges that arise when building standards-based, distributed systems according to the SOA paradigm for 3D geovisualization, with a particular focus on 3D geovirtual environments and virtual 3D city models. First, we briefly introduce fundamentals of the SOA paradigm, identify requirements for service-oriented 3D geovisualization systems, and present an architectural framework that relates SOA concepts, geovisualization concepts, and standardization proposals by the Open Geospatial Consortium in a common frame of reference. Next, we discuss the potential and challenges driven by the SOA paradigm on four different levels of abstraction, namely service fundamentals, service composition, interaction services, performance, and overarching aspects, and we discuss those driven by standardization. We further exemplify and substantiate the discussion in the scope of a case study and the image-based provisioning of and interaction with visual representations of remote virtual 3D city models. Y1 - 2010 UR - http://www.sciencedirect.com/science/journal/01989715 U6 - https://doi.org/10.1016/j.compenvurbsys.2010.05.003 SN - 0198-9715 ER - TY - JOUR A1 - Richter, Rico A1 - Döllner, Jürgen Roland Friedrich T1 - Integrated real-time visualisation of massive 3D-Point clouds and geo-referenced textured dates JF - Photogrammetrie, Fernerkundung, Geoinformation Y1 - 2011 SN - 1432-8364 IS - 3 SP - 145 EP - 154 PB - Schweizerbart CY - Stuttgart ER - TY - JOUR A1 - Kühne, Ralph A1 - Huitema, George A1 - Carle, Georg T1 - A simple distributed mechanism for accounting system self-configuration in next-generation charging and billing JF - Computer communications N2 - Modern communication systems are becoming increasingly dynamic and complex. In this article a novel mechanism for next generation charging and billing is presented that enables self-configurability for accounting systems consisting of heterogeneous components. The mechanism is required to be simple, effective, efficient, scalable and fault-tolerant. Based on simulation results it is shown that the proposed simple distributed mechanism is competitive with usual cost-based or random mechanisms under realistic assumptions and up to non-extreme workload situations as well as fulfilling the posed requirements. KW - Charging KW - Billing KW - Accounting KW - Self-configuration KW - Communication systems Y1 - 2011 U6 - https://doi.org/10.1016/j.comcom.2010.10.012 SN - 0140-3664 VL - 34 IS - 7 SP - 898 EP - 920 PB - Elsevier CY - Amsterdam ER - TY - JOUR A1 - Bog, Anja A1 - Plattner, Hasso A1 - Zeier, Alexander T1 - A mixed transaction processing and operational reporting benchmark JF - Information systems frontiers N2 - The importance of reporting is ever increasing in today's fast-paced market environments and the availability of up-to-date information for reporting has become indispensable. Current reporting systems are separated from the online transaction processing systems (OLTP) with periodic updates pushed in. A pre-defined and aggregated subset of the OLTP data, however, does not provide the flexibility, detail, and timeliness needed for today's operational reporting. As technology advances, this separation has to be re-evaluated and means to study and evaluate new trends in data storage management have to be provided. This article proposes a benchmark for combined OLTP and operational reporting, providing means to evaluate the performance of enterprise data management systems for mixed workloads of OLTP and operational reporting queries. Such systems offer up-to-date information and the flexibility of the entire data set for reporting. We describe how the benchmark provokes the conflicts that are the reason for separating the two workloads on different systems. In this article, we introduce the concepts, logical data schema, transactions and queries of the benchmark, which are entirely based on the original data sets and real workloads of existing, globally operating enterprises. KW - Benchmarking KW - Mixed workload KW - OLTP KW - Operational reporting Y1 - 2011 U6 - https://doi.org/10.1007/s10796-010-9283-8 SN - 1387-3326 VL - 13 IS - 3 SP - 321 EP - 335 PB - Springer CY - Dordrecht ER - TY - JOUR A1 - Lincke, Jens A1 - Appeltauer, Malte A1 - Steinert, Bastian A1 - Hirschfeld, Robert T1 - An open implementation for context-oriented layer composition in ContextJS JF - Science of computer programming N2 - Context-oriented programming (COP) provides dedicated support for defining and composing variations to a basic program behavior. A variation, which is defined within a layer, can be de-/activated for the dynamic extent of a code block. While this mechanism allows for control flow-specific scoping, expressing behavior adaptations can demand alternative scopes. For instance, adaptations can depend on dynamic object structure rather than control flow. We present scenarios for behavior adaptation and identify the need for new scoping mechanisms. The increasing number of scoping mechanisms calls for new language abstractions representing them. We suggest to open the implementation of scoping mechanisms so that developers can extend the COP language core according to their specific needs. Our open implementation moves layer composition into objects to be affected and with that closer to the method dispatch to be changed. We discuss the implementation of established COP scoping mechanisms using our approach and present new scoping mechanisms developed for our enhancements to Lively Kernel. KW - ContextJS KW - Context-oriented programming KW - Open implementations KW - Dynamic adaptation KW - Scope Y1 - 2011 U6 - https://doi.org/10.1016/j.scico.2010.11.013 SN - 0167-6423 VL - 76 IS - 12 SP - 1194 EP - 1209 PB - Elsevier CY - Amsterdam ER - TY - JOUR A1 - Henkler, Stefan A1 - Oberthuer, Simon A1 - Giese, Holger A1 - Seibel, Andreas T1 - Model-driven runtime resource predictions for advanced mechatronic systems with dynamic data structures JF - Computer systems science and engineering N2 - The next generation of advanced mechatronic systems is expected to enhance their functionality and improve their performance by context-dependent behavior. Therefore, these systems require to represent information about their complex environment and changing sets of collaboration partners internally. This requirement is in contrast to the usually assumed static structures of embedded systems. In this paper, we present a model-driven approach which overcomes this situation by supporting dynamic data structures while still guaranteeing that valid worst-case execution times can be derived. It supports a flexible resource manager which avoids to operate with the prohibitive coarse worst-case boundaries but instead supports to run applications in different profiles which guarantee different resource requirements and put unused resources in a profile at other applications' disposal. By supporting the proper estimation of worst case execution time (WCET) and worst case number of iteration (WCNI) at runtime, we can further support to create new profiles, add or remove them at runtime in order to minimize the over-approximation of the resource consumption resulting from the dynamic data structures required for the outlined class of advanced systems. KW - Model-Driven Engineering KW - Safety Critical Systems KW - Dynamic Data Structures KW - Flexible Resource Manager KW - Runtime WCET Analysis Y1 - 2011 SN - 0267-6192 VL - 26 IS - 6 SP - 505 EP - 518 PB - IOP Publ. Ltd. CY - Leicester ER - TY - JOUR A1 - Decker, Gero A1 - Weske, Mathias T1 - Interaction-centric modeling of process choreographies JF - Information systems N2 - With the rise of electronic integration between organizations, the need for a precise specification of interaction behavior increases. Information systems, replacing interaction previously carried out by humans via phone, faxes and emails, require a precise specification for handling all possible situations. Such interaction behavior is described in process choreographies. While many proposals for choreography languages have already been made, most of them fall into the category of interconnection models, where the observable behavior of the different partners is described and then related via message flow. As this article will show, this modeling approach fails to support fundamental design principles of choreographies and typically leads to modeling errors. This motivates an alternative modeling style, namely interaction modeling, for overcoming these limitations. While the main concepts are independent of a concrete modeling language, iBPMN is introduced as novel interaction modeling language. Formal execution semantics are provided and a comprehensive toolset implementing the approach is presented. KW - Choreographies KW - B2B process integration KW - Interaction modeling KW - Business Process Modeling Notation Y1 - 2011 U6 - https://doi.org/10.1016/j.is.2010.06.005 SN - 0306-4379 VL - 36 IS - 2 SP - 292 EP - 312 PB - Elsevier CY - Oxford ER - TY - JOUR A1 - Awad, Ahmed Mahmoud Hany Aly A1 - Weidlich, Matthias A1 - Weske, Mathias T1 - Visually specifying compliance rules and explaining their violations for business processes JF - Journal of visual languages and computing N2 - A business process is a set of steps designed to be executed in a certain order to achieve a business value. Such processes are often driven by and documented using process models. Nowadays, process models are also applied to drive process execution. Thus, correctness of business process models is a must. Much of the work has been devoted to check general, domain-independent correctness criteria, such as soundness. However, business processes must also adhere to and show compliance with various regulations and constraints, the so-called compliance requirements. These are domain-dependent requirements. In many situations, verifying compliance on a model level is of great value, since violations can be resolved in an early stage prior to execution. However, this calls for using formal verification techniques, e.g., model checking, that are too complex for business experts to apply. In this paper, we utilize a visual language. BPMN-Q to express compliance requirements visually in a way similar to that used by business experts to build process models. Still, using a pattern based approach, each BPMN-Qgraph has a formal temporal logic expression in computational tree logic (CTL). Moreover, the user is able to express constraints, i.e., compliance rules, regarding control flow and data flow aspects. In order to provide valuable feedback to a user in case of violations, we depend on temporal logic querying approaches as well as BPMN-Q to visually highlight paths in a process model whose execution causes violations. KW - Business process modeling KW - Compliance checking KW - Visual modeling KW - Anti-patterns Y1 - 2011 U6 - https://doi.org/10.1016/j.jvlc.2010.11.002 SN - 1045-926X VL - 22 IS - 1 SP - 30 EP - 55 PB - Elsevier CY - London ER - TY - JOUR A1 - Weidlich, Matthias A1 - Polyvyanyy, Artem A1 - Mendling, Jan A1 - Weske, Mathias T1 - Causal behavioural profiles - efficient computation, applications, and evaluation JF - Fundamenta informaticae N2 - Analysis of behavioural consistency is an important aspect of software engineering. In process and service management, consistency verification of behavioural models has manifold applications. For instance, a business process model used as system specification and a corresponding workflow model used as implementation have to be consistent. Another example would be the analysis to what degree a process log of executed business operations is consistent with the corresponding normative process model. Typically, existing notions of behaviour equivalence, such as bisimulation and trace equivalence, are applied as consistency notions. Still, these notions are exponential in computation and yield a Boolean result. In many cases, however, a quantification of behavioural deviation is needed along with concepts to isolate the source of deviation. In this article, we propose causal behavioural profiles as the basis for a consistency notion. These profiles capture essential behavioural information, such as order, exclusiveness, and causality between pairs of activities of a process model. Consistency based on these profiles is weaker than trace equivalence, but can be computed efficiently for a broad class of models. In this article, we introduce techniques for the computation of causal behavioural profiles using structural decomposition techniques for sound free-choice workflow systems if unstructured net fragments are acyclic or can be traced back to S-or T-nets. We also elaborate on the findings of applying our technique to three industry model collections. KW - Causal Behavioural Profiles KW - Formal Methods KW - Behavioural Abstraction KW - Structural Decomposition KW - Exclusiveness KW - Concurrency KW - Order Relations KW - Causality KW - Optionality Y1 - 2011 U6 - https://doi.org/10.3233/FI-2011-614 SN - 0169-2968 VL - 113 IS - 3-4 SP - 399 EP - 435 PB - IOS Press CY - Amsterdam ER - TY - JOUR A1 - Weidlich, Matthias A1 - Polyvyanyy, Artem A1 - Desai, Nirmit A1 - Mendling, Jan A1 - Weske, Mathias T1 - Process compliance analysis based on behavioural profiles JF - Information systems N2 - Process compliance measurement is getting increasing attention in companies due to stricter legal requirements and market pressure for operational excellence. In order to judge on compliance of the business processing, the degree of behavioural deviation of a case, i.e., an observed execution sequence, is quantified with respect to a process model (referred to as fitness, or recall). Recently, different compliance measures have been proposed. Still, nearly all of them are grounded on state-based techniques and the trace equivalence criterion, in particular. As a consequence, these approaches have to deal with the state explosion problem. In this paper, we argue that a behavioural abstraction may be leveraged to measure the compliance of a process log - a collection of cases. To this end, we utilise causal behavioural profiles that capture the behavioural characteristics of process models and cases, and can be computed efficiently. We propose different compliance measures based on these profiles, discuss the impact of noise in process logs on our measures, and show how diagnostic information on non-compliance is derived. As a validation, we report on findings of applying our approach in a case study with an international service provider. KW - Process compliance KW - Compliance measurement KW - Log conformance KW - Root cause analysis Y1 - 2011 U6 - https://doi.org/10.1016/j.is.2011.04.002 SN - 0306-4379 VL - 36 IS - 7 SP - 1009 EP - 1025 PB - Elsevier CY - Oxford ER - TY - JOUR A1 - Laue, Ralf A1 - Awad, Ahmed Mahmoud Hany Aly T1 - Visual suggestions for improvements in business process diagrams JF - Journal of visual languages and computing N2 - Business processes are commonly modeled using a graphical modeling language. The most widespread notation for this purpose is business process diagrams in the Business Process Modeling Notation (BPMN). In this article, we use the visual query language BPMN-Q for expressing patterns that are related to possible problems in such business process diagrams. We discuss two classes of problems that can be found frequently in real-world models: sequence flow errors and model fragments that can make the model difficult to understand. By using a query processor, a business process modeler is able to identify possible errors in business process diagrams. Moreover, the erroneous parts of the business process diagram can be highlighted when an instance of an error pattern is found. This way, the modeler gets an easy-to-understand feedback in the visual modeling language he or she is familiar with. This is an advantage over current validation methods, which usually lack this kind of intuitive feedback. KW - Business process model KW - Business process diagram KW - BPMN-Q KW - Visualization Y1 - 2011 U6 - https://doi.org/10.1016/j.jvlc.2011.04.003 SN - 1045-926X VL - 22 IS - 5 SP - 385 EP - 399 PB - Elsevier CY - London ER - TY - JOUR A1 - Protzmann, Robert A1 - Schünemann, Bjoern A1 - Radusch, Ilja T1 - The Influences of communication models on the simulated effectiveness of V2X Applications JF - IEEE communications magazine N2 - In this article, we aim to evaluate the influences of different propagation models on the results of V2X simulations. First, we analyze how the models free space propagation, Rayleigh fading, and Ricean fading in synthetic scenarios with and without background communication influence the simulation of communication in general. After that, we investigate the impact of the models on the simulated behavior of a V2X traffic efficiency application in a real inner city scenario. Our results show that the selection of the propagation model affects the number of delivered messages, but exerts no significant influence on the simulated effectiveness of a V2X traffic efficiency application in urban areas. Under those circumstances, a simplified propagation model is sufficient. Y1 - 2011 SN - 0163-6804 VL - 49 IS - 11 SP - 149 EP - 155 PB - Inst. of Electr. and Electronics Engineers CY - Piscataway ER - TY - JOUR A1 - Wist, Dominic A1 - Schaefer, Mark A1 - Vogler, Walter A1 - Wollowski, Ralf T1 - Signal transition graph decomposition internal communication for speed independent circuit implementation JF - IET Computers and digital techniques N2 - Logic synthesis of speed independent circuits based on signal transition graph (STG) decomposition is a promising approach to tackle complexity problems like state-space explosion. Unfortunately, decomposition can result in components that in isolation have irreducible complete state coding conflicts. In earlier work, the authors showed how to resolve such conflicts by introducing internal communication between components, but only for very restricted specification structures. Here, they improve their former work by presenting algorithms for identifying delay transitions and inserting gyroscopes for specifications having a much more general structure. Thus, the authors are now able to synthesise controllers from real-life specifications. For all algorithms, they present correctness proofs and show their successful application to benchmarks, including very complex STGs arising in the context of control resynthesis. Y1 - 2011 U6 - https://doi.org/10.1049/iet-cdt.2010.0162 SN - 1751-8601 VL - 5 IS - 6 SP - 440 EP - 451 PB - Institution of Engineering and Technology CY - Hertford ER - TY - JOUR A1 - Yeung, Ching-man Au A1 - Noll, Michael G. A1 - Gibbins, Nicholas A1 - Meinel, Christoph A1 - Shadbolt, Nigel T1 - Spear spamming-resistant expertise analysis and ranking incollaborative tagging systems JF - Computational intelligence N2 - In this article, we discuss the notions of experts and expertise in resource discovery in the context of collaborative tagging systems. We propose that the level of expertise of a user with respect to a particular topic is mainly determined by two factors. First, an expert should possess a high-quality collection of resources, while the quality of a Web resource in turn depends on the expertise of the users who have assigned tags to it, forming a mutual reinforcement relationship. Second, an expert should be one who tends to identify interesting or useful resources before other users discover them, thus bringing these resources to the attention of the community of users. We propose a graph-based algorithm, SPEAR (spamming-resistant expertise analysis and ranking), which implements the above ideas for ranking users in a folksonomy. Our experiments show that our assumptions on expertise in resource discovery, and SPEAR as an implementation of these ideas, allow us to promote experts and demote spammers at the same time, with performance significantly better than the original hypertext-induced topic search algorithm and simple statistical measures currently used in most collaborative tagging systems. KW - collaborative tagging KW - expertise KW - folksonomy KW - HITS KW - ranking KW - spamming Y1 - 2011 U6 - https://doi.org/10.1111/j.1467-8640.2011.00384.x SN - 0824-7935 SN - 1467-8640 VL - 27 IS - 3 SP - 458 EP - 488 PB - Wiley-Blackwell CY - Hoboken ER - TY - BOOK A1 - Plattner, Hasso A1 - Zeier, Alexander T1 - In-Memory Data Management BT - Ein Wendepunkt für Unternehmensanwendungen N2 - Nach 50 Jahren erfolgreicher Entwicklunghat die Business-IT einen neuenWendepunkt erreicht. Hier zeigen die Autoren erstmalig, wieIn-Memory Computing dieUnternehmensprozesse künftig verändern wird. Bisher wurden Unternehmensdaten aus Performance-Gründen auf verschiedene Datenbanken verteilt: Analytische Datenresidieren in Data Warehouses und werden regelmäßig mithilfe transaktionaler Systeme synchronisiert. Diese Aufspaltung macht flexibles Echtzeit-Reporting aktueller Daten unmöglich. Doch dank leistungsfähigerMulti-Core-CPUs, großer Hauptspeicher, Cloud Computing und immerbesserer mobiler Endgeräte lassen die Unternehmen dieses restriktive Modell zunehmend hinter sich. Die Autoren stellen Techniken vor, die eine analytische und transaktionale Verarbeitung in Echtzeit erlauben und so dem Geschäftsleben neue Wege bahnen. Y1 - 2012 SN - 978-3-8349-4378-1 PB - Springer CY - Wiesbaden ER - TY - JOUR A1 - Semmo, Amir A1 - Hildebrandt, Dieter A1 - Trapp, Matthias A1 - Döllner, Jürgen Roland Friedrich T1 - Concepts for cartography-oriented visualization of virtual 3D city models JF - Photogrammetrie, Fernerkundung, Geoinformation N2 - Virtual 3D city models serve as an effective medium with manifold applications in geoinformation systems and services. To date, most 3D city models are visualized using photorealistic graphics. But an effective communication of geoinformation significantly depends on how important information is designed and cognitively processed in the given application context. One possibility to visually emphasize important information is based on non-photorealistic rendering, which comprehends artistic depiction styles and is characterized by its expressiveness and communication aspects. However, a direct application of non-photorealistic rendering techniques primarily results in monotonic visualization that lacks cartographic design aspects. In this work, we present concepts for cartography-oriented visualization of virtual 3D city models. These are based on coupling non-photorealistic rendering techniques and semantics-based information for a user, context, and media-dependent representation of thematic information. This work highlights challenges for cartography-oriented visualization of 3D geovirtual environments, presents stylization techniques and discusses their applications and ideas for a standardized visualization. In particular, the presented concepts enable a real-time and dynamic visualization of thematic geoinformation. KW - 3D city models KW - cartography-oriented visualization KW - style description languages KW - real-time rendering Y1 - 2012 U6 - https://doi.org/10.1127/1432-8364/2012/0131 SN - 1432-8364 IS - 4 SP - 455 EP - 465 PB - Schweizerbart CY - Stuttgart ER - TY - JOUR A1 - Semmo, Amir A1 - Trapp, Matthias A1 - Kyprianidis, Jan Eric A1 - Döllner, Jürgen Roland Friedrich T1 - Interactive visualization of generalized virtual 3D city models using level-of-abstraction transitions JF - Computer graphics forum : journal of the European Association for Computer Graphics N2 - Virtual 3D city models play an important role in the communication of complex geospatial information in a growing number of applications, such as urban planning, navigation, tourist information, and disaster management. In general, homogeneous graphic styles are used for visualization. For instance, photorealism is suitable for detailed presentations, and non-photorealism or abstract stylization is used to facilitate guidance of a viewer's gaze to prioritized information. However, to adapt visualization to different contexts and contents and to support saliency-guided visualization based on user interaction or dynamically changing thematic information, a combination of different graphic styles is necessary. Design and implementation of such combined graphic styles pose a number of challenges, specifically from the perspective of real-time 3D visualization. In this paper, the authors present a concept and an implementation of a system that enables different presentation styles, their seamless integration within a single view, and parametrized transitions between them, which are defined according to tasks, camera view, and image resolution. The paper outlines potential usage scenarios and application fields together with a performance evaluation of the implementation. Y1 - 2012 U6 - https://doi.org/10.1111/j.1467-8659.2012.03081.x SN - 0167-7055 VL - 31 IS - 3 SP - 885 EP - 894 PB - Wiley-Blackwell CY - Hoboken ER - TY - JOUR A1 - Hirschfeld, Robert A1 - Perscheid, Michael A1 - Haupt, Michael T1 - Explicit use-case representation in object-oriented programming languages JF - ACM SIGPLAN notices N2 - Use-cases are considered an integral part of most contemporary development processes since they describe a software system's expected behavior from the perspective of its prospective users. However, the presence of and traceability to use-cases is increasingly lost in later more code-centric development activities. Use-cases, being well-encapsulated at the level of requirements descriptions, eventually lead to crosscutting concerns in system design and source code. Tracing which parts of the system contribute to which use-cases is therefore hard and so limits understandability. In this paper, we propose an approach to making use-cases first-class entities in both the programming language and the runtime environment. Having use-cases present in the code and the running system will allow developers, maintainers, and operators to easily associate their units of work with what matters to the users. We suggest the combination of use-cases, acceptance tests, and dynamic analysis to automatically associate source code with use-cases. We present UseCasePy, an implementation of our approach to use-case-centered development in Python, and its application to the Django Web framework. KW - design KW - languages KW - use-cases KW - separation of concerns KW - traceability Y1 - 2012 U6 - https://doi.org/10.1145/2168696.2047856 SN - 0362-1340 VL - 47 IS - 2 SP - 51 EP - 60 PB - Association for Computing Machinery CY - New York ER - TY - INPR A1 - Weske, Mathias A1 - Yang, Jian A1 - Maglio, Paul P. T1 - Special issue service oriented computing (ICSOC) guest editors' introduction T2 - International journal of cooperative information systems Y1 - 2012 U6 - https://doi.org/10.1142/S0218843012020017 SN - 0218-8430 VL - 21 IS - 1 SP - 1 EP - 2 PB - World Scientific CY - Singapore ER - TY - JOUR A1 - Weidlich, Matthias A1 - Mendling, Jan T1 - Perceived consistency between process models JF - Information systems N2 - Process-aware information systems typically involve various kinds of process stakeholders. That, in turn, leads to multiple process models that capture a common process from different perspectives and at different levels of abstraction. In order to guarantee a certain degree of uniformity, the consistency of such related process models is evaluated using formal criteria. However, it is unclear how modelling experts assess the consistency between process models, and which kind of notion they perceive to be appropriate. In this paper, we focus on control flow aspects and investigate the adequacy of consistency notions. In particular, we report findings from an online experiment, which allows us to compare in how far trace equivalence and two notions based on behavioural profiles approximate expert perceptions on consistency. Analysing 69 expert statements from process analysts, we conclude that trace equivalence is not suited to be applied as a consistency notion, whereas the notions based on behavioural profiles approximate the perceived consistency of our subjects significantly. Therefore, our contribution is an empirically founded answer to the correlation of behaviour consistency notions and the consistency perception by experts in the field of business process modelling. KW - Process model consistency KW - Consistency perception KW - Behavior equivalence KW - Model refinement Y1 - 2012 U6 - https://doi.org/10.1016/j.is.2010.12.004 SN - 0306-4379 VL - 37 IS - 2 SP - 80 EP - 98 PB - Elsevier CY - Oxford ER - TY - JOUR A1 - Yang, Yong A1 - Dumas, Marlon A1 - Garcia-Banuelos, Luciano A1 - Polyvyanyy, Artem A1 - Zhang, Liang T1 - Generalized aggregate quality of service computation for composite services JF - The journal of systems and software N2 - This article addresses the problem of estimating the Quality of Service (QoS) of a composite service given the QoS of the services participating in the composition. Previous solutions to this problem impose restrictions on the topology of the orchestration models, limiting their applicability to well-structured orchestration models for example. This article lifts these restrictions by proposing a method for aggregate QoS computation that deals with more general types of unstructured orchestration models. The applicability and scalability of the proposed method are validated using a collection of models from industrial practice. KW - Service-oriented computing KW - Service composition KW - Service orchestration KW - Quality of service Y1 - 2012 U6 - https://doi.org/10.1016/j.jss.2012.03.005 SN - 0164-1212 VL - 85 IS - 8 SP - 1818 EP - 1830 PB - Elsevier CY - New York ER - TY - JOUR A1 - Weidlich, Matthias A1 - Mendling, Jan A1 - Weske, Mathias T1 - Propagating changes between aligned process models JF - The journal of systems and software N2 - There is a wide variety of drivers for business process modelling initiatives, reaching from organisational redesign to the development of information systems. Consequently, a common business process is often captured in multiple models that overlap in content due to serving different purposes. Business process management aims at flexible adaptation to changing business needs. Hence, changes of business processes occur frequently and have to be incorporated in the respective process models. Once a process model is changed, related process models have to be updated accordingly, despite the fact that those process models may only be loosely coupled. In this article, we introduce an approach that supports change propagation between related process models. Given a change in one process model, we leverage the behavioural abstraction of behavioural profiles for corresponding activities in order to determine a change region in another model. Our approach is able to cope with changes in pairs of models that are not related by hierarchical refinement and show behavioural inconsistencies. We evaluate the applicability of our approach with two real-world process model collections. To this end, we either deduce change operations from different model revisions or rely on synthetic change operations. KW - Change propagation KW - Model synchronisation KW - Behavioural analysis KW - Process model alignment Y1 - 2012 U6 - https://doi.org/10.1016/j.jss.2012.02.044 SN - 0164-1212 VL - 85 IS - 8 SP - 1885 EP - 1898 PB - Elsevier CY - New York ER - TY - JOUR A1 - Ehrig, Hartmut A1 - Golas, Ulrike A1 - Habel, Annegret A1 - Lambers, Leen A1 - Orejas, Fernando T1 - M-Adhesive Transformation Systems with Nested Application Conditions Part 2: Embedding, Critical Pairs and Local Confluence JF - Fundamenta informaticae N2 - Graph transformation systems have been studied extensively and applied to several areas of computer science like formal language theory, the modeling of databases, concurrent or distributed systems, and visual, logical, and functional programming. In most kinds of applications it is necessary to have the possibility of restricting the applicability of rules. This is usually done by means of application conditions. In this paper, we continue the work of extending the fundamental theory of graph transformation to the case where rules may use arbitrary (nested) application conditions. More precisely, we generalize the Embedding theorem, and we study how local confluence can be checked in this context. In particular, we define a new notion of critical pair which allows us to formulate and prove a Local Confluence Theorem for the general case of rules with nested application conditions. All our results are presented, not for a specific class of graphs, but for any arbitrary M-adhesive category, which means that our results apply to most kinds of graphical structures. We demonstrate our theory on the modeling of an elevator control by a typed graph transformation system with positive and negative application conditions. KW - M-adhesive transformation systems KW - M-adhesive categories KW - graph replacement categories KW - nested application conditions KW - embedding KW - critical pairs KW - local confluence Y1 - 2012 U6 - https://doi.org/10.3233/FI-2012-705 SN - 0169-2968 VL - 118 IS - 1-2 SP - 35 EP - 63 PB - IOS Press CY - Amsterdam ER - TY - JOUR A1 - Orejas, Fernando A1 - Lambers, Leen T1 - Lazy graph transformation JF - Fundamenta informaticae N2 - Applying an attributed graph transformation rule to a given object graph always implies some kind of constraint solving. In many cases, the given constraints are almost trivial to solve. For instance, this is the case when a rule describes a transformation G double right arrow H, where the attributes of H are obtained by some simple computation from the attributes of G. However there are many other cases where the constraints to solve may be not so trivial and, moreover, may have several answers. This is the case, for instance, when the transformation process includes some kind of searching. In the current approaches to attributed graph transformation these constraints must be completely solved when defining the matching of the given transformation rule. This kind of early binding is well-known from other areas of Computer Science to be inadequate. For instance, the solution chosen for the constraints associated to a given transformation step may be not fully adequate, meaning that later, in the search for a better solution, we may need to backtrack this transformation step. In this paper, based on our previous work on the use of symbolic graphs to deal with different aspects related with attributed graphs, including attributed graph transformation, we present a new approach that, based on the new notion of narrowing graph transformation rule, allows us to delay constraint solving when doing attributed graph transformation, in a way that resembles lazy computation. For this reason, we have called lazy this new kind of transformation. Moreover, we show that the approach is sound and complete with respect to standard attributed graph transformation. A running example, where a graph transformation system describes some basic operations of a travel agency, shows the practical interest of the approach. KW - Attributed graph transformation KW - symbolic graph transformation KW - lazy transformation Y1 - 2012 U6 - https://doi.org/10.3233/FI-2012-706 SN - 0169-2968 VL - 118 IS - 1-2 SP - 65 EP - 96 PB - IOS Press CY - Amsterdam ER - TY - JOUR A1 - Weidlich, Matthias A1 - Dijkman, Remco A1 - Weske, Mathias T1 - Behaviour equivalence and compatibility of business process models with complex correspondences JF - The computer journal : a publication of the British Computer Society N2 - Once multiple models of a business process are created for different purposes or to capture different variants, verification of behaviour equivalence or compatibility is needed. Equivalence verification ensures that two business process models specify the same behaviour. Since different process models are likely to differ with respect to their assumed level of abstraction and the actions that they take into account, equivalence notions have to cope with correspondences between sets of actions and actions that exist in one process but not in the other. In this paper, we present notions of equivalence and compatibility that can handle these problems. In essence, we present a notion of equivalence that works on correspondences between sets of actions rather than single actions. We then integrate our equivalence notion with work on behaviour inheritance that copes with actions that exist in one process but not in the other, leading to notions of behaviour compatibility. Compatibility notions verify that two models have the same behaviour with respect to the actions that they have in common. As such, our contribution is a collection of behaviour equivalence and compatibility notions that are applicable in more general settings than existing ones. KW - behaviour equivalence KW - behaviour compatibility KW - model verification KW - behavioural models Y1 - 2012 U6 - https://doi.org/10.1093/comjnl/bxs014 SN - 0010-4620 SN - 1460-2067 VL - 55 IS - 11 SP - 1398 EP - 1418 PB - Oxford Univ. Press CY - Oxford ER - TY - JOUR A1 - Polyvyanyy, Artem A1 - Garcia-Banuelos, Luciano A1 - Dumas, Marlon T1 - Structuring acyclic process models JF - Information systems N2 - This article studies the problem of transforming a process model with an arbitrary topology into an equivalent well-structured process model. While this problem has received significant attention, there is still no full characterization of the class of unstructured process models that can be transformed into well-structured ones, nor an automated method for structuring any process model that belongs to this class. This article fills this gap in the context of acyclic process models. The article defines a necessary and sufficient condition for an unstructured acyclic process model to have an equivalent well-structured process model under fully concurrent bisimulation, as well as a complete structuring method. The method has been implemented as a tool that takes process models captured in the BPMN and EPC notations as input. The article also reports on an empirical evaluation of the structuring method using a repository of process models from commercial practice. KW - Process modeling KW - Structured modeling KW - Structuring KW - Model equivalence KW - Petri net unfolding KW - Modular decomposition Y1 - 2012 U6 - https://doi.org/10.1016/j.is.2011.10.005 SN - 0306-4379 VL - 37 IS - 6 SP - 518 EP - 538 PB - Elsevier CY - Oxford ER - TY - JOUR A1 - Kühne, Ralph A1 - Huitema, George A1 - Carle, George T1 - Charging and billing in modern communications networks a comprehensive survey of the state of the art and future requirements JF - IEEE communications surveys & tutorials N2 - In mobile telecommunication networks the trend for an increasing heterogeneity of access networks, the convergence with fixed networks as well as with the Internet are apparent. The resulting future converged network with an expected wide variety of services and a possibly stiff competition between the different market participants as well as legal issues will bring about requirements for charging systems that demand for more flexibility, scalability and efficiency than is available in today's systems. This article surveys recent developments in charging and billing architectures comprising both standardisation work as well as research projects. The second main contribution of this article is a comparison of key features of these developments thus giving a list of essential charging and billing ingredients for tomorrow's communication and service environments. KW - charging KW - billing KW - accounting KW - communication network KW - architectures KW - requirements Y1 - 2012 U6 - https://doi.org/10.1109/SURV.2011.122310.000084 SN - 1553-877X VL - 14 IS - 1 SP - 170 EP - 192 PB - Inst. of Electr. and Electronics Engineers CY - Piscataway ER - TY - JOUR A1 - Roschke, Sebastian A1 - Cheng, Feng A1 - Meinel, Christoph T1 - An alert correlation platform for memory-supported techniques JF - Concurrency and computation : practice & experience N2 - Intrusion Detection Systems (IDS) have been widely deployed in practice for detecting malicious behavior on network communication and hosts. False-positive alerts are a popular problem for most IDS approaches. The solution to address this problem is to enhance the detection process by correlation and clustering of alerts. To meet the practical requirements, this process needs to be finished fast, which is a challenging task as the amount of alerts in large-scale IDS deployments is significantly high. We identifytextitdata storage and processing algorithms to be the most important factors influencing the performance of clustering and correlation. We propose and implement a highly efficient alert correlation platform. For storage, a column-based database, an In-Memory alert storage, and memory-based index tables lead to significant improvements of the performance. For processing, algorithms are designed and implemented which are optimized for In-Memory databases, e.g. an attack graph-based correlation algorithm. The platform can be distributed over multiple processing units to share memory and processing power. A standardized interface is designed to provide a unified view of result reports for end users. The efficiency of the platform is tested by practical experiments with several alert storage approaches, multiple algorithms, as well as a local and a distributed deployment. KW - memory-based correlation KW - memory-based clustering KW - memory-based databases KW - IDS management Y1 - 2012 U6 - https://doi.org/10.1002/cpe.1750 SN - 1532-0626 VL - 24 IS - 10 SP - 1123 EP - 1136 PB - Wiley-Blackwell CY - Hoboken ER - TY - JOUR A1 - Quasthoff, Matthias A1 - Meinel, Christoph T1 - Supporting object-oriented programming of semantic-web software JF - IEEE transactions on systems, man, and cybernetics : Part C, Applications and reviews N2 - This paper presents the state of the art in the development of Semantic-Web-enabled software using object-oriented programming languages. Object triple mapping (OTM) is a frequently used method to simplify the development of such software. A case study that is based on interviews with developers of OTM frameworks is presented at the core of this paper. Following the results of the case study, the formalization of OTM is kept separate from optional but desirable extensions of OTM with regard to metadata, schema matching, and integration into the Semantic-Web infrastructure. The material that is presented is expected to not only explain the development of Semantic-Web software by the usage of OTM, but also explain what properties of Semantic-Web software made developers come up with OTM. Understanding the latter will be essential to get nonexpert software developers to use Semantic-Web technologies in their software. KW - Resource description framework KW - Software KW - Java KW - Data models KW - Programming KW - Interviews Y1 - 2012 U6 - https://doi.org/10.1109/TSMCC.2011.2151282 SN - 1094-6977 VL - 42 IS - 1 SP - 15 EP - 24 PB - Inst. of Electr. and Electronics Engineers CY - Piscataway ER - TY - JOUR A1 - Rafiee, Hosnieh A1 - von Loewis, Martin A1 - Meinel, Christoph T1 - IPv6 Deployment and Spam Challenges JF - IEEE Internet computing N2 - Spam has posed a serious problem for users of email since its infancy. Today, automated strategies are required to deal with the massive amount of spam traffic. IPv4 networks offer a variety of solutions to reduce spam, but IPv6 networks' large address space and use of temporary addresses - both of which are particularly vulnerable to spam attacks - makes dealing with spam and the use of automated approaches much more difficult. IPv6 thus poses a unique security issue for ISPs because it's more difficult for them to differentiate between good IP addresses and those that are known to originate spam messages. Y1 - 2012 SN - 1089-7801 VL - 16 IS - 6 SP - 22 EP - 29 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - JOUR A1 - AlSa'deh, Ahmad A1 - Meinel, Christoph T1 - Secure neighbor discovery Review, challenges, perspectives, and recommendations JF - IEEE security & privacy : building confidence in a networked world N2 - Secure Neighbor Discovery is designed as a countermeasure to Neighbor Discovery Protocol threats. The authors discuss Secure Neighbor Discovery implementation and deployment challenges and review proposals to optimize it. Y1 - 2012 SN - 1540-7993 VL - 10 IS - 4 SP - 26 EP - 34 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - JOUR A1 - Momtazi, Saeedeh A1 - Naumann, Felix T1 - Topic modeling for expert finding using latent Dirichlet allocation JF - Wiley interdisciplinary reviews : Data mining and knowledge discovery N2 - The task of expert finding is to rank the experts in the search space given a field of expertise as an input query. In this paper, we propose a topic modeling approach for this task. The proposed model uses latent Dirichlet allocation (LDA) to induce probabilistic topics. In the first step of our algorithm, the main topics of a document collection are extracted using LDA. The extracted topics present the connection between expert candidates and user queries. In the second step, the topics are used as a bridge to find the probability of selecting each candidate for a given query. The candidates are then ranked based on these probabilities. The experimental results on the Text REtrieval Conference (TREC) Enterprise track for 2005 and 2006 show that the proposed topic-based approach outperforms the state-of-the-art profile- and document-based models, which use information retrieval methods to rank experts. Moreover, we present the superiority of the proposed topic-based approach to the improved document-based expert finding systems, which consider additional information such as local context, candidate prior, and query expansion. Y1 - 2013 U6 - https://doi.org/10.1002/widm.1102 SN - 1942-4787 VL - 3 IS - 5 SP - 346 EP - 353 PB - Wiley CY - San Fransisco ER - TY - INPR A1 - Fish, Andrew A1 - Lambers, Leen T1 - Special issue on graph transformation and visual modeling techniques - guest editors' introduction T2 - Journal of visual languages and computing Y1 - 2013 U6 - https://doi.org/10.1016/j.jvlc.2013.08.004 SN - 1045-926X SN - 1095-8533 VL - 24 IS - 6 SP - 419 EP - 420 PB - Elsevier CY - London ER - TY - JOUR A1 - Roschke, Sebastian A1 - Cheng, Feng A1 - Meinel, Christoph T1 - High-quality attack graph-based IDS correlation JF - Logic journal of the IGPL N2 - Intrusion Detection Systems are widely deployed in computer networks. As modern attacks are getting more sophisticated and the number of sensors and network nodes grow, the problem of false positives and alert analysis becomes more difficult to solve. Alert correlation was proposed to analyse alerts and to decrease false positives. Knowledge about the target system or environment is usually necessary for efficient alert correlation. For representing the environment information as well as potential exploits, the existing vulnerabilities and their Attack Graph (AG) is used. It is useful for networks to generate an AG and to organize certain vulnerabilities in a reasonable way. In this article, a correlation algorithm based on AGs is designed that is capable of detecting multiple attack scenarios for forensic analysis. It can be parameterized to adjust the robustness and accuracy. A formal model of the algorithm is presented and an implementation is tested to analyse the different parameters on a real set of alerts from a local network. To improve the speed of the algorithm, a multi-core version is proposed and a HMM-supported version can be used to further improve the quality. The parallel implementation is tested on a multi-core correlation platform, using CPUs and GPUs. KW - Correlation KW - attack graph KW - HMM KW - multi-core KW - IDS Y1 - 2013 U6 - https://doi.org/10.1093/jigpal/jzs034 SN - 1367-0751 VL - 21 IS - 4 SP - 571 EP - 591 PB - Oxford Univ. Press CY - Oxford ER - TY - JOUR A1 - Richter, Rico A1 - Döllner, Jürgen Roland Friedrich T1 - Concepts and techniques for integration, analysis and visualization of massive 3D point clouds JF - Computers, environment and urban systems N2 - Remote sensing methods, such as LiDAR and image-based photogrammetry, are established approaches for capturing the physical world. Professional and low-cost scanning devices are capable of generating dense 3D point clouds. Typically, these 3D point clouds are preprocessed by GIS and are then used as input data in a variety of applications such as urban planning, environmental monitoring, disaster management, and simulation. The availability of area-wide 3D point clouds will drastically increase in the future due to the availability of novel capturing methods (e.g., driver assistance systems) and low-cost scanning devices. Applications, systems, and workflows will therefore face large collections of redundant, up-to-date 3D point clouds and have to cope with massive amounts of data. Hence, approaches are required that will efficiently integrate, update, manage, analyze, and visualize 3D point clouds. In this paper, we define requirements for a system infrastructure that enables the integration of 3D point clouds from heterogeneous capturing devices and different timestamps. Change detection and update strategies for 3D point clouds are presented that reduce storage requirements and offer new insights for analysis purposes. We also present an approach that attributes 3D point clouds with semantic information (e.g., object class category information), which enables more effective data processing, analysis, and visualization. Out-of-core real-time rendering techniques then allow for an interactive exploration of the entire 3D point cloud and the corresponding analysis results. Web-based visualization services are utilized to make 3D point clouds available to a large community. The proposed concepts and techniques are designed to establish 3D point clouds as base datasets, as well as rendering primitives for analysis and visualization tasks, which allow operations to be performed directly on the point data. Finally, we evaluate the presented system, report on its applications, and discuss further research challenges. KW - 3D point clouds KW - System architecture KW - Classification KW - Out-of-core KW - Visualization Y1 - 2014 U6 - https://doi.org/10.1016/j.compenvurbsys.2013.07.004 SN - 0198-9715 SN - 1873-7587 VL - 45 SP - 114 EP - 124 PB - Elsevier CY - Oxford ER - TY - JOUR A1 - Marr, Stefan A1 - Pape, Tobias A1 - De Meuter, Wolfgang T1 - Are we there yet? Simple language implementation techniques for the 21st century JF - IEEE software Y1 - 2014 SN - 0740-7459 SN - 1937-4194 VL - 31 IS - 5 SP - 60 EP - 67 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - JOUR A1 - Weidlich, Matthias A1 - Ziekow, Holger A1 - Gal, Avigdor A1 - Mendling, Jan A1 - Weske, Mathias T1 - Optimizing event pattern matching using business process models JF - IEEE transactions on knowledge and data engineering N2 - A growing number of enterprises use complex event processing for monitoring and controlling their operations, while business process models are used to document working procedures. In this work, we propose a comprehensive method for complex event processing optimization using business process models. Our proposed method is based on the extraction of behaviorial constraints that are used, in turn, to rewrite patterns for event detection, and select and transform execution plans. We offer a set of rewriting rules that is shown to be complete with respect to the all, seq, and any patterns. The effectiveness of our method is demonstrated in an experimental evaluation with a large number of processes from an insurance company. We illustrate that the proposed optimization leads to significant savings in query processing. By integrating the optimization in state-of-the-art systems for event pattern matching, we demonstrate that these savings materialize in different technical infrastructures and can be combined with existing optimization techniques. KW - Event processing KW - query optimisation KW - query rewriting Y1 - 2014 U6 - https://doi.org/10.1109/TKDE.2014.2302306 SN - 1041-4347 SN - 1558-2191 VL - 26 IS - 11 SP - 2759 EP - 2773 PB - Inst. of Electr. and Electronics Engineers CY - Los Alamitos ER - TY - JOUR A1 - Hildebrandt, Dieter A1 - Timm, Robert T1 - An assisting, constrained 3D navigation technique for multiscale virtual 3D city models JF - Geoinformatica : an international journal on advances of computer science for geographic information systems N2 - Virtual 3D city models serve as integration platforms for complex geospatial and georeferenced information and as medium for effective communication of spatial information. In order to explore these information spaces, navigation techniques for controlling the virtual camera are required to facilitate wayfinding and movement. However, navigation is not a trivial task and many available navigation techniques do not support users effectively and efficiently with their respective skills and tasks. In this article, we present an assisting, constrained navigation technique for multiscale virtual 3D city models that is based on three basic principles: users point to navigate, users are lead by suggestions, and the exploitation of semantic, multiscale, hierarchical structurings of city models. The technique particularly supports users with low navigation and virtual camera control skills but is also valuable for experienced users. It supports exploration, search, inspection, and presentation tasks, is easy to learn and use, supports orientation, is efficient, and yields effective view properties. In particular, the technique is suitable for interactive kiosks and mobile devices with a touch display and low computing resources and for use in mobile situations where users only have restricted resources for operating the application. We demonstrate the validity of the proposed navigation technique by presenting an implementation and evaluation results. The implementation is based on service-oriented architectures, standards, and image-based representations and allows exploring massive virtual 3D city models particularly on mobile devices with limited computing resources. Results of a user study comparing the proposed navigation technique with standard techniques suggest that the proposed technique provides the targeted properties, and that it is more advantageous to novice than to expert users. KW - Virtual 3D city model KW - Multiscale modeling KW - View navigation KW - Virtual camera control KW - Mobile device KW - Distributed 3D geovisualization Y1 - 2014 U6 - https://doi.org/10.1007/s10707-013-0189-8 SN - 1384-6175 SN - 1573-7624 VL - 18 IS - 3 SP - 537 EP - 567 PB - Springer CY - Dordrecht ER - TY - JOUR A1 - Yang, Haojin A1 - Quehl, Bernhard A1 - Sack, Harald T1 - A framework for improved video text detection and recognition JF - Multimedia tools and applications : an international journal N2 - Text displayed in a video is an essential part for the high-level semantic information of the video content. Therefore, video text can be used as a valuable source for automated video indexing in digital video libraries. In this paper, we propose a workflow for video text detection and recognition. In the text detection stage, we have developed a fast localization-verification scheme, in which an edge-based multi-scale text detector first identifies potential text candidates with high recall rate. Then, detected candidate text lines are refined by using an image entropy-based filter. Finally, Stroke Width Transform (SWT)- and Support Vector Machine (SVM)-based verification procedures are applied to eliminate the false alarms. For text recognition, we have developed a novel skeleton-based binarization method in order to separate text from complex backgrounds to make it processible for standard OCR (Optical Character Recognition) software. Operability and accuracy of proposed text detection and binarization methods have been evaluated by using publicly available test data sets. KW - Video OCR KW - Video indexing KW - Multimedia retrieval Y1 - 2014 U6 - https://doi.org/10.1007/s11042-012-1250-6 SN - 1380-7501 SN - 1573-7721 VL - 69 IS - 1 SP - 217 EP - 245 PB - Springer CY - Dordrecht ER -