Despite the wide acceptance and usage of use case models, there is still controversy among practitioners and researchers on issues such as correct applicability of use case models, levels of abstraction desirable in a use case model and the kind of rules that guide inspection of use cases. This work presents the findings of a review of the literature related to the challenges concerning use case models. This paper presents the lessons learned from literature review of use case models research studies published in the Journal of Object Technology and Requirements Engineering Journal published from 2000 to 2010 and International Requirements Engineering Conference proceedings from 2002 to 2010.
{"title":"Use cases in requirements capture - Trends and open issues","authors":"A. Amaechi, S. Counsell","doi":"10.2498/iti.2012.0359","DOIUrl":"https://doi.org/10.2498/iti.2012.0359","url":null,"abstract":"Despite the wide acceptance and usage of use case models, there is still controversy among practitioners and researchers on issues such as correct applicability of use case models, levels of abstraction desirable in a use case model and the kind of rules that guide inspection of use cases. This work presents the findings of a review of the literature related to the challenges concerning use case models. This paper presents the lessons learned from literature review of use case models research studies published in the Journal of Object Technology and Requirements Engineering Journal published from 2000 to 2010 and International Requirements Engineering Conference proceedings from 2002 to 2010.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114961703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Given a set of n linearly independent points in a Euclidean space Ed, P = {p1, ... , pn} with n >; d, a Delaunay tessellation with at lease one d-dimensional simplex can be constructed. This tessellation is unique up to degenerate linearity conditions. The cardinality of the set of unique k-dimensional simplexes, k ≤ d, in the tessellation is bounded and the bound can be computed, given the dimension of the space, d, and the number of points in the tessellation generating set, n. These bounds can be refined if the number of points on the convex hull of P, m, is known. The bounds on cardinality are developed using constructive geometric arguments presented in the sequence necessary to construct the tessellation. The cardinality of simplexes in the Voronoi diagram is then related to the Delaunay tessellation by geometric duality. An example is given.
给定欧几里德空间Ed中n个线性无关的点的集合,P = {p1,…, pn} with n >;d,可以构造至少具有一个d维单纯形的Delaunay镶嵌。这种镶嵌在退化线性条件下是唯一的。给定空间维数d和镶嵌生成集中的点数n,镶嵌中唯一k维简单体集合k≤d的基数是有界的,并且可以计算出该边界。如果已知P的凸壳上的点数m,则可以细化这些边界。使用构造镶嵌所必需的序列中的建设性几何参数来开发基数的界限。Voronoi图中简单体的基数然后通过几何对偶性与Delaunay镶嵌相关联。给出了一个例子。
{"title":"Cardinality of simplexes in a Delaunay tessellation","authors":"L. Hearne","doi":"10.2498/iti.2012.0472","DOIUrl":"https://doi.org/10.2498/iti.2012.0472","url":null,"abstract":"Given a set of n linearly independent points in a Euclidean space Ed, P = {p1, ... , pn} with n >; d, a Delaunay tessellation with at lease one d-dimensional simplex can be constructed. This tessellation is unique up to degenerate linearity conditions. The cardinality of the set of unique k-dimensional simplexes, k ≤ d, in the tessellation is bounded and the bound can be computed, given the dimension of the space, d, and the number of points in the tessellation generating set, n. These bounds can be refined if the number of points on the convex hull of P, m, is known. The bounds on cardinality are developed using constructive geometric arguments presented in the sequence necessary to construct the tessellation. The cardinality of simplexes in the Voronoi diagram is then related to the Delaunay tessellation by geometric duality. An example is given.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faced with the crisis of the Welfare State, France insists on a new territorialization of Health management and develops tools based on ICT. This crisis also concerns the methods of management and trust between actors. Informational and communicational issues exist at different levels with the challenges of traceability and interoperability. New uses of information for new managerial approaches can be considered, using interface organizations to overcome the divisions and promote cooperation. We aim at promoting a “Digital Humanism” adapted to the Health sector.
{"title":"Issues of information and communication for new managerial approaches: The challenges of the French health system","authors":"C. Bourret","doi":"10.2498/cit.1002097","DOIUrl":"https://doi.org/10.2498/cit.1002097","url":null,"abstract":"Faced with the crisis of the Welfare State, France insists on a new territorialization of Health management and develops tools based on ICT. This crisis also concerns the methods of management and trust between actors. Informational and communicational issues exist at different levels with the challenges of traceability and interoperability. New uses of information for new managerial approaches can be considered, using interface organizations to overcome the divisions and promote cooperation. We aim at promoting a “Digital Humanism” adapted to the Health sector.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130307381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Using XML data was initially applied in electronic data interchange and e-business, however the application of XML has been moved to several other fields. We nominate those fields of use as XML domains and presume that subsets of their characteristics significantly differ from one another. In this paper, we present the list of identified XML domains with high degree of XML Schema appearances, and for the XML domains, we identify common and distinctive characteristics. Additionally, we propose a function for transforming identified XML domains into known XML Schema patterns.
{"title":"XML schema domain identification","authors":"Maja Pusnik, Boštjan Šumak, M. Heričko","doi":"10.2498/iti.2012.0392","DOIUrl":"https://doi.org/10.2498/iti.2012.0392","url":null,"abstract":"Using XML data was initially applied in electronic data interchange and e-business, however the application of XML has been moved to several other fields. We nominate those fields of use as XML domains and presume that subsets of their characteristics significantly differ from one another. In this paper, we present the list of identified XML domains with high degree of XML Schema appearances, and for the XML domains, we identify common and distinctive characteristics. Additionally, we propose a function for transforming identified XML domains into known XML Schema patterns.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114056483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents a new method and results regarding the compressed sensing (CS) and classification of ECG waveforms using a general dictionary as well as specific dictionaries built using normal and pathological cardiac patterns. The proposed method has been validated by computation of the distortion errors between the original and the reconstructed signals and by the classification ratio of the reconstructed signals obtained with the k-nearest neighbors (KNN) algorithm.
{"title":"Results on ECG compressed sensing using specific dictionaries and its validation","authors":"M. Fira, L. Goras, Nicolae Cleju, C. Barabasa","doi":"10.2498/iti.2012.0362","DOIUrl":"https://doi.org/10.2498/iti.2012.0362","url":null,"abstract":"The paper presents a new method and results regarding the compressed sensing (CS) and classification of ECG waveforms using a general dictionary as well as specific dictionaries built using normal and pathological cardiac patterns. The proposed method has been validated by computation of the distortion errors between the original and the reconstructed signals and by the classification ratio of the reconstructed signals obtained with the k-nearest neighbors (KNN) algorithm.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper follows our theoretical research on the elasticity of substitution. We use the results derived to emphasize the new measure of savings in the production process resulting from the substitution of the more expensive production factor with the cheaper one [5]. The results are illustrated numerically due to their importance in empirical studies. Thus we demonstrate the practical application of general and abstract theoretical understanding of the economic savings in the production process and emphasize the didactic value of the paper. Numerical example also serves as the motivation for the new issue of compensating the change in elasticity of substitution with the corresponding change in scale.
{"title":"The measure of savings in the production process","authors":"Ilko Vrankic, Mira Oraic, Zrinka Lukač","doi":"10.2498/iti.2012.0372","DOIUrl":"https://doi.org/10.2498/iti.2012.0372","url":null,"abstract":"This paper follows our theoretical research on the elasticity of substitution. We use the results derived to emphasize the new measure of savings in the production process resulting from the substitution of the more expensive production factor with the cheaper one [5]. The results are illustrated numerically due to their importance in empirical studies. Thus we demonstrate the practical application of general and abstract theoretical understanding of the economic savings in the production process and emphasize the didactic value of the paper. Numerical example also serves as the motivation for the new issue of compensating the change in elasticity of substitution with the corresponding change in scale.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123385588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main idea of reference modelling is to reuse business knowledge to create efficient business processes to be deployed inside an organisation. Reference models provide a set of generally accepted recommended practices. One of the management challenges facing today's organisations involves the development and reuse of business process reference models. We present a reference model design approach with a focus on a business process merging phase. Process merging is an approach that brings together several business process models with the objective to create a new model. We base our findings on a case study of three big Slovenian companies from the metal industry sector.
{"title":"Reference model design: An approach and its application","authors":"Dejan Pajk, M. Stemberger, A. Kovačič","doi":"10.2498/iti.2012.0419","DOIUrl":"https://doi.org/10.2498/iti.2012.0419","url":null,"abstract":"The main idea of reference modelling is to reuse business knowledge to create efficient business processes to be deployed inside an organisation. Reference models provide a set of generally accepted recommended practices. One of the management challenges facing today's organisations involves the development and reuse of business process reference models. We present a reference model design approach with a focus on a business process merging phase. Process merging is an approach that brings together several business process models with the objective to create a new model. We base our findings on a case study of three big Slovenian companies from the metal industry sector.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127145863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current research with EEG devices in the user authentication context has some deficiencies that address expensive equipment, the requirement of laboratory conditions and applicability. In this paper we address this issue by using widely available and inexpensive EEG device to verify its capability for authentication. As a part of this research, we developed two phase authentication that enables users to enhance their password with the mental state by breaking the password into smaller elements, marry them with mental state, and generate one time pad for a secure session.
{"title":"Two factor authentication using EEG augmented passwords","authors":"Ivan Svogor, T. Kisasondi","doi":"10.2498/iti.2012.0441","DOIUrl":"https://doi.org/10.2498/iti.2012.0441","url":null,"abstract":"The current research with EEG devices in the user authentication context has some deficiencies that address expensive equipment, the requirement of laboratory conditions and applicability. In this paper we address this issue by using widely available and inexpensive EEG device to verify its capability for authentication. As a part of this research, we developed two phase authentication that enables users to enhance their password with the mental state by breaking the password into smaller elements, marry them with mental state, and generate one time pad for a secure session.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127080235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Application modeling is gaining its share as the next generation software development methodology. Model Driven Development (MDD) uses abstract models of software systems to yield concrete implementations. This process can be achieved in two fundamentally different ways: by generating end artifacts, or by applying model interpretation. Regardless of approach used, MDD still needs to surpass certain challenges to gain further appreciation among community. This paper classifies those challenges and proposes use of different methodologies which could enable simpler modeling solutions. Object Process Methodology (OPM) as software modeling tool is an adequate candidate yielding results in that direction.
{"title":"Rethinking Model Driven Development: analysis and opportunities","authors":"Nikola Tanković, Drazen Vukotic, M. Zagar","doi":"10.2498/iti.2012.0414","DOIUrl":"https://doi.org/10.2498/iti.2012.0414","url":null,"abstract":"Application modeling is gaining its share as the next generation software development methodology. Model Driven Development (MDD) uses abstract models of software systems to yield concrete implementations. This process can be achieved in two fundamentally different ways: by generating end artifacts, or by applying model interpretation. Regardless of approach used, MDD still needs to surpass certain challenges to gain further appreciation among community. This paper classifies those challenges and proposes use of different methodologies which could enable simpler modeling solutions. Object Process Methodology (OPM) as software modeling tool is an adequate candidate yielding results in that direction.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peer to peer Cloud computing and storage are defined. Several security features are recognised. Implementation of such system requires new types of communication protocols as well as new client applications. Paper proposes convenient business model for implementation of P2P cloud.
{"title":"Peer to peer distributed storage and computing cloud system","authors":"Boris Tomas, Bojan Vuksic","doi":"10.2498/iti.2012.0442","DOIUrl":"https://doi.org/10.2498/iti.2012.0442","url":null,"abstract":"Peer to peer Cloud computing and storage are defined. Several security features are recognised. Implementation of such system requires new types of communication protocols as well as new client applications. Paper proposes convenient business model for implementation of P2P cloud.","PeriodicalId":135105,"journal":{"name":"Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}