首页 > 最新文献

2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)最新文献

英文 中文
When Interactive Graphic Storytelling Fails 当交互式图像故事叙述失败时
James Barela, T. Gasiba, S. Suppan, Marc Berges, Kristian Beckers
Many people are unaware of the digital dangers that lie around each cyber-corner. Teaching people how to recognize dangerous situations is crucial, especially for those who work on or with computers. We postulated that interactive graphic vignettes could be a great way to expose professionals to dangerous situations and demonstrate the effects of their choices in these situations. In that way, we aimed to inoculate employees against cybersecurity threats. We used the Comic-BEE platform to create interactive security awareness vignettes and evaluated for how employees of a major industrial company perceived them. For analysing the potential of these comics, we ran an evaluation study as part of a capture-the-flag (CTF) event, a interactive exercise for hacking vulnerable software. We evaluated whether the comics fulfilled our requirements based on the responses of the participants. We showed the comics, on various cybersecurity concepts, to 20 volunteers. In the context of a CTF event, our requirements were not fulfilled. Most participants considered the images distracting, stating a preference for text-only material.
许多人没有意识到每个网络角落都存在着数字危险。教会人们如何识别危险情况是至关重要的,尤其是对那些在电脑上工作或与电脑打交道的人。我们假设,交互式图形小插图可能是一种很好的方式,让专业人员暴露在危险的情况下,并展示他们在这些情况下的选择的影响。通过这种方式,我们的目标是让员工预防网络安全威胁。我们使用Comic-BEE平台创建了交互式安全意识小插图,并评估了一家大型工业公司的员工对它们的看法。为了分析这些漫画的潜力,我们进行了一项评估研究,作为捕获旗帜(CTF)活动的一部分,这是一项针对黑客攻击易受攻击软件的交互式练习。我们根据参与者的反应来评估漫画是否符合我们的要求。我们向20名志愿者展示了关于各种网络安全概念的漫画。在CTF事件的上下文中,我们的需求没有得到满足。大多数参与者认为图片会分散注意力,他们更喜欢纯文字的材料。
{"title":"When Interactive Graphic Storytelling Fails","authors":"James Barela, T. Gasiba, S. Suppan, Marc Berges, Kristian Beckers","doi":"10.1109/REW.2019.00034","DOIUrl":"https://doi.org/10.1109/REW.2019.00034","url":null,"abstract":"Many people are unaware of the digital dangers that lie around each cyber-corner. Teaching people how to recognize dangerous situations is crucial, especially for those who work on or with computers. We postulated that interactive graphic vignettes could be a great way to expose professionals to dangerous situations and demonstrate the effects of their choices in these situations. In that way, we aimed to inoculate employees against cybersecurity threats. We used the Comic-BEE platform to create interactive security awareness vignettes and evaluated for how employees of a major industrial company perceived them. For analysing the potential of these comics, we ran an evaluation study as part of a capture-the-flag (CTF) event, a interactive exercise for hacking vulnerable software. We evaluated whether the comics fulfilled our requirements based on the responses of the participants. We showed the comics, on various cybersecurity concepts, to 20 volunteers. In the context of a CTF event, our requirements were not fulfilled. Most participants considered the images distracting, stating a preference for text-only material.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114081213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Emotion-Polarity Visualizer on Smartphone 智能手机上的情绪极性可视化器
Yui Yamashita, Masaru Onodera, Koichi Shimoda, Y. Tobe
There is a possibility that we can use a "mood" meter every day or regularly to see our own mental health condition similarly as in the case of weight meters. When performing emotion recognition using human speech, one of linguistic information and prosodic features included in speech is often used. However, by capturing both sides of speech, which is a means of human communication, it is considered that emotion recognition can be more accurately realized. Based on the background, we have developed PNViz, Positive-and-Negative Polarity Visualizer, an application running on an Android phone, to show the state of positive-ness of mental health by recording a short voice message. PNViz consists of the smartphone application and an analyzing server where the recorded voice is processed with both lexical and phonetic analyses and calculates a score ranging from -1 to 1. The calculated score is continuously logged and shown to the user and thus it is expected to encourage the user to take refreshing breaks or holidays.
有一种可能性是,我们可以像使用体重计一样,每天或定期使用“情绪”计来查看我们自己的心理健康状况。在使用人类语音进行情感识别时,通常会使用语音中包含的语言信息和韵律特征之一。然而,通过捕捉言语的双方,这是人类交流的一种手段,可以更准确地实现情感识别。基于此背景,我们开发了PNViz (Positive-and-Negative Polarity Visualizer),这是一个运行在Android手机上的应用程序,通过录制简短的语音信息来显示心理健康的积极状态。PNViz由智能手机应用程序和分析服务器组成,该服务器对录制的语音进行词汇和语音分析,并计算从-1到1的分数。计算出的分数会被持续记录并显示给用户,因此它有望鼓励用户休息或休假。
{"title":"Emotion-Polarity Visualizer on Smartphone","authors":"Yui Yamashita, Masaru Onodera, Koichi Shimoda, Y. Tobe","doi":"10.1109/REW.2019.00020","DOIUrl":"https://doi.org/10.1109/REW.2019.00020","url":null,"abstract":"There is a possibility that we can use a \"mood\" meter every day or regularly to see our own mental health condition similarly as in the case of weight meters. When performing emotion recognition using human speech, one of linguistic information and prosodic features included in speech is often used. However, by capturing both sides of speech, which is a means of human communication, it is considered that emotion recognition can be more accurately realized. Based on the background, we have developed PNViz, Positive-and-Negative Polarity Visualizer, an application running on an Android phone, to show the state of positive-ness of mental health by recording a short voice message. PNViz consists of the smartphone application and an analyzing server where the recorded voice is processed with both lexical and phonetic analyses and calculates a score ranging from -1 to 1. The calculated score is continuously logged and shown to the user and thus it is expected to encourage the user to take refreshing breaks or holidays.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123301754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User Story Writing in Crowd Requirements Engineering: The Case of a Web Application for Sports Tournament Planning 在人群需求工程中编写用户故事:一个用于体育赛事规划的Web应用程序的案例
A. Menkveld, S. Brinkkemper, F. Dalpiaz
Although users feel more engaged when they are involved in the elicitation, negotiation and prioritization of requirements for a product or service they are using, the quality of crowdsourced requirements remains an issue. Simple notations like user stories have been highly adopted by practitioners in agile development to capture requirements for a software product, but their utilization in crowdsourced requirements engineering is still scarce. Through a case study of a web application for sports tournament planning, we investigate how a dedicated platform for user story writing in crowd requirements engineering is valued by its users and we show that the delivered requirements are not inferior to those written by professionals.
虽然当用户参与到他们正在使用的产品或服务的需求的引出、协商和优先级排序时,他们会感到更投入,但众包需求的质量仍然是一个问题。像用户故事这样的简单符号已经被敏捷开发中的从业者高度采用,以捕获软件产品的需求,但是它们在众包需求工程中的应用仍然很少。通过对一个用于体育赛事规划的web应用程序的案例研究,我们调查了用户需求工程中用户故事编写的专用平台如何受到用户的重视,并且我们表明交付的需求并不逊于专业人员编写的需求。
{"title":"User Story Writing in Crowd Requirements Engineering: The Case of a Web Application for Sports Tournament Planning","authors":"A. Menkveld, S. Brinkkemper, F. Dalpiaz","doi":"10.1109/REW.2019.00037","DOIUrl":"https://doi.org/10.1109/REW.2019.00037","url":null,"abstract":"Although users feel more engaged when they are involved in the elicitation, negotiation and prioritization of requirements for a product or service they are using, the quality of crowdsourced requirements remains an issue. Simple notations like user stories have been highly adopted by practitioners in agile development to capture requirements for a software product, but their utilization in crowdsourced requirements engineering is still scarce. Through a case study of a web application for sports tournament planning, we investigate how a dedicated platform for user story writing in crowd requirements engineering is valued by its users and we show that the delivered requirements are not inferior to those written by professionals.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127976881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Raising Secure Coding Awareness for Software Developers in the Industry 提高业界软件开发人员的安全编码意识
T. Gasiba, U. Lechner
Many industrial IT security standards and policies mandate the usage of a secure coding methodology in the software development process. This implies two different aspects: secure coding must be based on a set of secure coding guidelines and software developers must be aware of these secure coding practices. On the one side, secure coding guidelines seems a bit like a black-art: while there exist abstract guidelines that are widely accepted, low-level secure coding guidelines for different programming languages are scarce. On the other side, once a set of secure coding guidelines is chosen, a good methodology is needed to make them known by the people which should be using them, i.e. software developers. Motivated both by the secure coding requirements from industry standards and also by the mandate to train staff on IT security by the global industry initiative "Charter of Trust", this paper presents an overview of important research questions on how to choose secure coding guidelines and on how to raise software developer awareness for secure coding using serious games.
许多工业IT安全标准和策略要求在软件开发过程中使用安全编码方法。这意味着两个不同的方面:安全编码必须基于一组安全编码指南,软件开发人员必须了解这些安全编码实践。一方面,安全编码指南看起来有点像黑艺术:虽然存在被广泛接受的抽象指南,但针对不同编程语言的低级安全编码指南却很少。另一方面,一旦选择了一套安全编码指南,就需要一个好的方法来让应该使用它们的人(即软件开发人员)了解它们。受行业标准的安全编码要求以及全球行业倡议“信任宪章”对员工进行IT安全培训的要求的推动,本文概述了如何选择安全编码指南以及如何使用严肃游戏提高软件开发人员对安全编码的认识的重要研究问题。
{"title":"Raising Secure Coding Awareness for Software Developers in the Industry","authors":"T. Gasiba, U. Lechner","doi":"10.1109/REW.2019.00030","DOIUrl":"https://doi.org/10.1109/REW.2019.00030","url":null,"abstract":"Many industrial IT security standards and policies mandate the usage of a secure coding methodology in the software development process. This implies two different aspects: secure coding must be based on a set of secure coding guidelines and software developers must be aware of these secure coding practices. On the one side, secure coding guidelines seems a bit like a black-art: while there exist abstract guidelines that are widely accepted, low-level secure coding guidelines for different programming languages are scarce. On the other side, once a set of secure coding guidelines is chosen, a good methodology is needed to make them known by the people which should be using them, i.e. software developers. Motivated both by the secure coding requirements from industry standards and also by the mandate to train staff on IT security by the global industry initiative \"Charter of Trust\", this paper presents an overview of important research questions on how to choose secure coding guidelines and on how to raise software developer awareness for secure coding using serious games.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125356231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Approach to Measure Confidence and Uncertainty in Assurance Cases 一种度量保证案例中可信度和不确定性的新方法
Alvine Boaye Belle, T. Lethbridge, Sègla Kpodjedo, O. Adesina, Miguel Garzón
Assurance cases are a well-established structured technique used to document a reasoned, auditable argument supporting that a system meets desirable properties (e.g., safety or security). Assurance cases are increasingly becoming popular, and are being used to make safety and cyber-security arguments about medical, automotive and aviation systems. Current methods usually assess confidence in assurance cases, but only with evidence available at design-time. However, real-world situations demand considerations of evidence that are also available at run-time. In this paper, we introduce a novel confidence measure called INCIDENCE (weIghted assuraNCe confIDENCE). The measure considers evidence available both at design and run times, and is suitable for the assessment of assurance cases represented using Goal Structuring Notation (GSN) – being a popular notation for representing assurance cases. We rely on the confidence measure to derive an uncertainty measure that can be used to measure technical debt (requirement debt) for software systems. We illustrate our work through an example focusing on feature identification.
保证用例是一种完善的结构化技术,用于记录一个合理的、可审计的论证,以支持系统满足所需的属性(例如,安全性或安全性)。保险案例越来越受欢迎,并被用于医疗、汽车和航空系统的安全和网络安全论证。目前的方法通常在保证案例中评估信心,但仅在设计时提供证据。然而,现实世界的情况需要考虑在运行时也可用的证据。本文引入了一种新的置信度度量——加权保证置信度。该度量考虑在设计和运行时可用的证据,并且适用于使用目标结构符号(GSN)表示的保证用例的评估——GSN是表示保证用例的流行符号。我们依靠置信度度量来导出一个不确定性度量,该不确定性度量可以用于度量软件系统的技术债务(需求债务)。我们通过一个专注于特征识别的示例来说明我们的工作。
{"title":"A Novel Approach to Measure Confidence and Uncertainty in Assurance Cases","authors":"Alvine Boaye Belle, T. Lethbridge, Sègla Kpodjedo, O. Adesina, Miguel Garzón","doi":"10.1109/REW.2019.00011","DOIUrl":"https://doi.org/10.1109/REW.2019.00011","url":null,"abstract":"Assurance cases are a well-established structured technique used to document a reasoned, auditable argument supporting that a system meets desirable properties (e.g., safety or security). Assurance cases are increasingly becoming popular, and are being used to make safety and cyber-security arguments about medical, automotive and aviation systems. Current methods usually assess confidence in assurance cases, but only with evidence available at design-time. However, real-world situations demand considerations of evidence that are also available at run-time. In this paper, we introduce a novel confidence measure called INCIDENCE (weIghted assuraNCe confIDENCE). The measure considers evidence available both at design and run times, and is suitable for the assessment of assurance cases represented using Goal Structuring Notation (GSN) – being a popular notation for representing assurance cases. We rely on the confidence measure to derive an uncertainty measure that can be used to measure technical debt (requirement debt) for software systems. We illustrate our work through an example focusing on feature identification.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116116287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/rew.2019.00003","DOIUrl":"https://doi.org/10.1109/rew.2019.00003","url":null,"abstract":"","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131397082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Specification of Requirements and Software Architecture for the Customisation of Enterprise Software: A Multi-case Study Based on the RE4SA Model 企业软件定制的需求规范和软件体系结构:基于RE4SA模型的多案例研究
T. Spijkman, S. Brinkkemper, F. Dalpiaz, Anne-Fleur Hemmer, Richard van de Bospoort
Many failed software projects can be traced to bad requirements management. Additionally, there is a big gap be-tween state of the art and practice in software architecture. For enterprise software customisation, not only do these issues apply, but additional challenges exist too. Instead of one standard soft-ware product, vendors often have to deal with customised ver-sions with additional maintenance challenges. In this research, we apply the Requirements Engineering for Software Architecture (RE4SA) model via a multi-case study to show how the require-ments engineering and software architecture disciplines can be linked, and in doing so provide improvements to both areas. Our multi-case study regards enterprise software customisation and shows improvements in requirements management and higher alignment between the software architecture and requirements.
许多失败的软件项目可以追溯到糟糕的需求管理。另外,在软件架构的技术水平和实践之间存在很大的差距。对于企业软件定制,不仅存在这些问题,而且还存在其他挑战。供应商通常不得不处理带有额外维护挑战的定制版本,而不是一个标准的软件产品。在本研究中,我们通过多案例研究应用软件架构需求工程(RE4SA)模型,以展示需求工程和软件架构学科如何联系起来,并在这样做的过程中为这两个领域提供改进。我们的多案例研究关注企业软件定制,并展示了需求管理方面的改进,以及软件架构和需求之间更高的一致性。
{"title":"Specification of Requirements and Software Architecture for the Customisation of Enterprise Software: A Multi-case Study Based on the RE4SA Model","authors":"T. Spijkman, S. Brinkkemper, F. Dalpiaz, Anne-Fleur Hemmer, Richard van de Bospoort","doi":"10.1109/REW.2019.00015","DOIUrl":"https://doi.org/10.1109/REW.2019.00015","url":null,"abstract":"Many failed software projects can be traced to bad requirements management. Additionally, there is a big gap be-tween state of the art and practice in software architecture. For enterprise software customisation, not only do these issues apply, but additional challenges exist too. Instead of one standard soft-ware product, vendors often have to deal with customised ver-sions with additional maintenance challenges. In this research, we apply the Requirements Engineering for Software Architecture (RE4SA) model via a multi-case study to show how the require-ments engineering and software architecture disciplines can be linked, and in doing so provide improvements to both areas. Our multi-case study regards enterprise software customisation and shows improvements in requirements management and higher alignment between the software architecture and requirements.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Preface Sixth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'19) 第六届安全与隐私要求工程国际研讨会(ESPRE'19)
Kristian Beckers, Duncan Ki-Aries, Seok-Won Lee, N. Mead
The preface provides an overview to the Sixth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'19)
前言概述了第六届安全与隐私需求工程国际研讨会(ESPRE'19)
{"title":"Preface Sixth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'19)","authors":"Kristian Beckers, Duncan Ki-Aries, Seok-Won Lee, N. Mead","doi":"10.1109/rew.2019.00028","DOIUrl":"https://doi.org/10.1109/rew.2019.00028","url":null,"abstract":"The preface provides an overview to the Sixth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'19)","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Preprocessing for Goal-Oriented Process Discovery 面向目标过程发现的数据预处理
Mahdi Ghasemi, Daniel Amyot
Goal-oriented process enhancement and discovery (GoPED) was recently proposed to take advantage of goal modeling capabilities in process mining activities. Conventional process mining aims to discover underlying process models from historical, crowdsourced event logs in an activity-oriented fashion. GoPED, however, infers goal-aligned process models from the event logs enhanced with some goal-related attributes. GoPED selects the historical behaviors that have yielded sufficient levels of satisfaction for (often conflicting) goals of different stakeholders. There are three algorithms available to select the subset of event logs from three different perspectives. The main input of all three algorithms is a version of the event log (EnhancedLog) that is (1) structured as a table showing each case and its trace in one row, (2) with rows enhanced with satisfaction levels of different goals. Therefore, typical event logs are not ready to be fed as-is to GoPED algorithms. This paper proposes a scheme for manipulating original event logs and turn them into EnhancedLog. Two tools were also developed and tested for this scheme: TraceMaker, to structure the log as explained above, and EnhancedLogMaker, to compute satisfaction levels of goals for all cases in the structured log.
最近提出了面向目标的过程增强和发现(gped),以利用过程挖掘活动中的目标建模能力。传统的流程挖掘旨在以面向活动的方式从历史的众包事件日志中发现底层流程模型。然而,gped从带有一些目标相关属性的事件日志中推断出与目标一致的流程模型。gped选择对不同涉众的目标(通常是相互冲突的)产生足够满意度的历史行为。有三种算法可用于从三个不同的角度选择事件日志子集。所有三种算法的主要输入是事件日志(EnhancedLog)的一个版本,该版本(1)结构为一个表,在一行中显示每种情况及其跟踪,(2)根据不同目标的满意度对行进行增强。因此,典型的事件日志不能按原样提供给gped算法。本文提出了一种处理原始事件日志并将其转化为增强日志的方案。针对该方案还开发并测试了两个工具:TraceMaker和EnhancedLogMaker,前者用于结构化日志,后者用于计算结构化日志中所有情况的目标满意度。
{"title":"Data Preprocessing for Goal-Oriented Process Discovery","authors":"Mahdi Ghasemi, Daniel Amyot","doi":"10.1109/REW.2019.00041","DOIUrl":"https://doi.org/10.1109/REW.2019.00041","url":null,"abstract":"Goal-oriented process enhancement and discovery (GoPED) was recently proposed to take advantage of goal modeling capabilities in process mining activities. Conventional process mining aims to discover underlying process models from historical, crowdsourced event logs in an activity-oriented fashion. GoPED, however, infers goal-aligned process models from the event logs enhanced with some goal-related attributes. GoPED selects the historical behaviors that have yielded sufficient levels of satisfaction for (often conflicting) goals of different stakeholders. There are three algorithms available to select the subset of event logs from three different perspectives. The main input of all three algorithms is a version of the event log (EnhancedLog) that is (1) structured as a table showing each case and its trace in one row, (2) with rows enhanced with satisfaction levels of different goals. Therefore, typical event logs are not ready to be fed as-is to GoPED algorithms. This paper proposes a scheme for manipulating original event logs and turn them into EnhancedLog. Two tools were also developed and tested for this scheme: TraceMaker, to structure the log as explained above, and EnhancedLogMaker, to compute satisfaction levels of goals for all cases in the structured log.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Method for Eliciting and Representing Emotional Requirements: Two Case Studies in e-Healthcare 情感需求的激发和表达方法:电子医疗中的两个案例研究
K. Taveter, L. Sterling, S. Pedell, Rachel Burrows, Eliise Marie Taveter
This paper describes a method for eliciting and representing emotional requirements for sociotechnical systems in a holistic manner along with eliciting and representing functional and quality requirements. As emotional requirements are crucial in designing sociotechnical systems for e-healthcare, the application of the method in two case studies of this problem domain is described.
本文描述了一种以整体方式引出和表示社会技术系统的情感需求以及引出和表示功能和质量需求的方法。由于情感需求在为电子医疗保健设计社会技术系统中是至关重要的,因此本文描述了该方法在该问题领域的两个案例研究中的应用。
{"title":"A Method for Eliciting and Representing Emotional Requirements: Two Case Studies in e-Healthcare","authors":"K. Taveter, L. Sterling, S. Pedell, Rachel Burrows, Eliise Marie Taveter","doi":"10.1109/REW.2019.00021","DOIUrl":"https://doi.org/10.1109/REW.2019.00021","url":null,"abstract":"This paper describes a method for eliciting and representing emotional requirements for sociotechnical systems in a holistic manner along with eliciting and representing functional and quality requirements. As emotional requirements are crucial in designing sociotechnical systems for e-healthcare, the application of the method in two case studies of this problem domain is described.","PeriodicalId":166923,"journal":{"name":"2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116936165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2019 IEEE 27th International Requirements Engineering Conference Workshops (REW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1