首页 > 最新文献

Computer Standards & Interfaces最新文献

英文 中文
Quality assessment for software data validation in automotive industry: A systematic literature review 汽车工业软件数据验证的质量评估:系统的文献综述
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2025-12-04 DOI: 10.1016/j.csi.2025.104110
Gilmar Pagoto , Luiz Eduardo Galvão Martins , Jefferson Seide Molléri

Context

The complexity of automotive systems continues to grow, making software quality assessment crucial for vehicle performance, safety, and cybersecurity.

Objectives

This study explores Quality Assessment (QA) in this context, focusing on its key characteristics, practical implications, and expected deliverables.

Method

We performed a systematic literature review (SLR) by selecting 60 studies from digital libraries.

Results

This SLR highlighted essential QA characteristics that should be incorporated into a software validation phase. Our insights encourage the exploration of advanced techniques, such as Artificial Intelligence (AI), and Machine Learning (ML), to support safety-critical software quality assessments in the automotive domain.

Conclusion

The QA of software data validation requires a holistic approach that combines safety, security, and customer expectations, aligned with industry standards, requirements, and specifications. The relevance of AI and ML in managing complex technologies is evidenced, and the traditional real-world validation dependencies bring risks for safety-critical systems validation.
汽车系统的复杂性持续增长,使得软件质量评估对车辆性能、安全和网络安全至关重要。本研究在此背景下探讨了质量评估(QA),重点关注其关键特征、实际意义和预期可交付成果。方法从数字图书馆中选取60篇文献进行系统文献回顾(SLR)。结果:该单反突出了应纳入软件验证阶段的基本QA特征。我们的见解鼓励探索先进技术,如人工智能(AI)和机器学习(ML),以支持汽车领域安全关键软件质量评估。软件数据验证的QA需要一个整体的方法,将安全、保障和客户期望结合起来,并与行业标准、需求和规范保持一致。人工智能和机器学习在管理复杂技术方面的相关性得到了证明,传统的现实世界验证依赖关系为安全关键系统验证带来了风险。
{"title":"Quality assessment for software data validation in automotive industry: A systematic literature review","authors":"Gilmar Pagoto ,&nbsp;Luiz Eduardo Galvão Martins ,&nbsp;Jefferson Seide Molléri","doi":"10.1016/j.csi.2025.104110","DOIUrl":"10.1016/j.csi.2025.104110","url":null,"abstract":"<div><h3>Context</h3><div>The complexity of automotive systems continues to grow, making software quality assessment crucial for vehicle performance, safety, and cybersecurity.</div></div><div><h3>Objectives</h3><div>This study explores Quality Assessment (QA) in this context, focusing on its key characteristics, practical implications, and expected deliverables.</div></div><div><h3>Method</h3><div>We performed a systematic literature review (SLR) by selecting 60 studies from digital libraries.</div></div><div><h3>Results</h3><div>This SLR highlighted essential QA characteristics that should be incorporated into a software validation phase. Our insights encourage the exploration of advanced techniques, such as Artificial Intelligence (AI), and Machine Learning (ML), to support safety-critical software quality assessments in the automotive domain.</div></div><div><h3>Conclusion</h3><div>The QA of software data validation requires a holistic approach that combines safety, security, and customer expectations, aligned with industry standards, requirements, and specifications. The relevance of AI and ML in managing complex technologies is evidenced, and the traditional real-world validation dependencies bring risks for safety-critical systems validation.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"97 ","pages":"Article 104110"},"PeriodicalIF":3.1,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145737269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep convolutional spiking neural network and block chain based intrusion detection framework for enhancing privacy and security in cloud computing environment 基于深度卷积尖峰神经网络和区块链的云计算环境下增强隐私和安全的入侵检测框架
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2025-12-31 DOI: 10.1016/j.csi.2025.104126
B. Muthusenthil , K. Devi
Since Cloud Computing (CC) expands and makes use of information technology (IT) infrastructure, conventional operating systems and applications, it is now susceptible to IT threats. Therefore, a Deep Convolutional Spiking Neural Network and Block Chain based Dynamic Random Byzantine Fault Tolerance Consensus Algorithm fostered Intrusion Detection System is proposed in this paper for improving Privacy and Safety in the Cloud Computing Environment (DCSNN-BC-DRBFT-IDS-CC). Here, the data are gathered through NSL-KDD and CICIDS-2017 benchmark datasets. First-level privacy procedure is performed by the block chain-dependent Dynamic Random Byzantine Fault Tolerance Consensus Algorithm (DRBFT). The secondary level privacy procedure is performed by pre-processing. During data processing, the Markov Chain Random Field (MCRF) is used to remove the unwanted content and filter relevant data. The pre-processing output is provided into feature selection. The optimum feature is selected by using Dynamic Recursive Feature Selection (DRFS). The Deep Convolutional Spiking Neural Network (DCSNN) is employed for classifying data as normal and abnormal. The proposed DCSNN-BC-DRBFT-IDS-CC method is implemented using performance metrics. The DCSNN-BC-DRBFT-IDS-CC achieves 39.185 %, 14.37 %, 31.8 % and 27.06 % better accuracy,25.13 %, 21.75 %, 27.54 % and 23.08 % less computation time,8.15 %, 2.57 %, 3.64 %, 5.85 % higher AUC when compared to other existing models.
由于云计算(CC)扩展并利用了信息技术(IT)基础设施、传统操作系统和应用程序,它现在很容易受到IT威胁。为此,本文提出了一种基于深度卷积尖峰神经网络和区块链的动态随机拜占庭容错一致性算法的入侵检测系统(DCSNN-BC-DRBFT-IDS-CC),以提高云计算环境下的隐私和安全。这里的数据是通过NSL-KDD和CICIDS-2017基准数据集收集的。第一级隐私过程由区块链相关的动态随机拜占庭容错共识算法(DRBFT)执行。二级隐私过程通过预处理来执行。在数据处理过程中,利用马尔可夫链随机场(Markov Chain Random Field, MCRF)去除不需要的内容,过滤相关数据。将预处理输出提供给特征选择。采用动态递归特征选择(DRFS)方法选择最优特征。采用深度卷积脉冲神经网络(DCSNN)对数据进行正常和异常分类。采用性能指标实现了DCSNN-BC-DRBFT-IDS-CC方法。与其他模型相比,dcsnn - bc - drbft - ads - cc的准确率分别提高了39.185%、14.37%、31.8%和27.06%,计算时间分别减少了25.13%、21.75%、27.54%和23.08%,AUC分别提高了8.15%、2.57%、3.64%、5.85%。
{"title":"Deep convolutional spiking neural network and block chain based intrusion detection framework for enhancing privacy and security in cloud computing environment","authors":"B. Muthusenthil ,&nbsp;K. Devi","doi":"10.1016/j.csi.2025.104126","DOIUrl":"10.1016/j.csi.2025.104126","url":null,"abstract":"<div><div>Since Cloud Computing (CC) expands and makes use of information technology (IT) infrastructure, conventional operating systems and applications, it is now susceptible to IT threats. Therefore, a Deep Convolutional Spiking Neural Network and Block Chain based Dynamic Random Byzantine Fault Tolerance Consensus Algorithm fostered Intrusion Detection System is proposed in this paper for improving Privacy and Safety in the Cloud Computing Environment (DCSNN-BC-DRBFT-IDS-CC). Here, the data are gathered through NSL-KDD and CICIDS-2017 benchmark datasets. First-level privacy procedure is performed by the block chain-dependent Dynamic Random Byzantine Fault Tolerance Consensus Algorithm (DRBFT). The secondary level privacy procedure is performed by pre-processing. During data processing, the Markov Chain Random Field (MCRF) is used to remove the unwanted content and filter relevant data. The pre-processing output is provided into feature selection. The optimum feature is selected by using Dynamic Recursive Feature Selection (DRFS). The Deep Convolutional Spiking Neural Network (DCSNN) is employed for classifying data as normal and abnormal. The proposed DCSNN-BC-DRBFT-IDS-CC method is implemented using performance metrics. The DCSNN-BC-DRBFT-IDS-CC achieves 39.185 %, 14.37 %, 31.8 % and 27.06 % better accuracy,25.13 %, 21.75 %, 27.54 % and 23.08 % less computation time,8.15 %, 2.57 %, 3.64 %, 5.85 % higher AUC when compared to other existing models.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"97 ","pages":"Article 104126"},"PeriodicalIF":3.1,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146037246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-controlled proxy searchable re-encryption against collusion attacks 时间控制的代理搜索可重新加密对抗共谋攻击
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-02-02 DOI: 10.1016/j.csi.2026.104139
Hui Zhang , Junjun Fu , Xiaojuan Liao , Guangzhu Chen , Haichuan Ma , Rang Zhou
Proxy Re-Encryption with Keyword Search (PREKS) enables the secure delegation of search authority over encrypted data, which is highly valuable in scenarios such as electronic health systems: patients (data owners) upload encrypted Electronic Health Data (EHD) and keywords to the cloud, granting initial search permissions to attending doctors (delegators); delegators can share these permissions with consulting doctors (delegatees) by re-encrypting keywords via a proxy server, without the need to consult data owners again. Existing PREKS schemes require a trusted proxy to avoid collusion risks between the proxy and delegatees, resulting in high communication overhead. To address this issue, this paper proposes a Time-controlled public key Proxy Searchable Re-Encryption scheme against Collusion Attacks (TcPSRE-CA), which innovatively integrates proxy functionality with cloud servers to reduce overhead. The scheme supports time-limited authorization and conjunctive keyword search, with its security proven under the random oracle model. Experimental results demonstrate that the proposed scheme effectively reduces communication and storage overhead while maintaining high computational efficiency.
带关键字搜索的代理重新加密(PREKS)实现了对加密数据的搜索权限的安全委托,这在电子医疗系统等场景中非常有价值:患者(数据所有者)将加密的电子健康数据(EHD)和关键字上传到云端,授予主诊医生(代理人)初始搜索权限;代理人可以通过代理服务器重新加密关键字,与咨询医生(被代理人)共享这些权限,而无需再次咨询数据所有者。现有的PREKS方案需要一个可信的代理,以避免代理和被委托之间的串通风险,从而导致较高的通信开销。为了解决这一问题,本文提出了一种时间控制的公钥代理可搜索再加密方案(TcPSRE-CA),该方案创新地将代理功能与云服务器集成在一起,以减少开销。该方案支持限时授权和联合关键字搜索,并在随机oracle模型下证明了其安全性。实验结果表明,该方案在保持较高的计算效率的同时,有效地降低了通信和存储开销。
{"title":"Time-controlled proxy searchable re-encryption against collusion attacks","authors":"Hui Zhang ,&nbsp;Junjun Fu ,&nbsp;Xiaojuan Liao ,&nbsp;Guangzhu Chen ,&nbsp;Haichuan Ma ,&nbsp;Rang Zhou","doi":"10.1016/j.csi.2026.104139","DOIUrl":"10.1016/j.csi.2026.104139","url":null,"abstract":"<div><div>Proxy Re-Encryption with Keyword Search (PREKS) enables the secure delegation of search authority over encrypted data, which is highly valuable in scenarios such as electronic health systems: patients (data owners) upload encrypted Electronic Health Data (EHD) and keywords to the cloud, granting initial search permissions to attending doctors (delegators); delegators can share these permissions with consulting doctors (delegatees) by re-encrypting keywords via a proxy server, without the need to consult data owners again. Existing PREKS schemes require a trusted proxy to avoid collusion risks between the proxy and delegatees, resulting in high communication overhead. To address this issue, this paper proposes a Time-controlled public key Proxy Searchable Re-Encryption scheme against Collusion Attacks (TcPSRE-CA), which innovatively integrates proxy functionality with cloud servers to reduce overhead. The scheme supports time-limited authorization and conjunctive keyword search, with its security proven under the random oracle model. Experimental results demonstrate that the proposed scheme effectively reduces communication and storage overhead while maintaining high computational efficiency.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"97 ","pages":"Article 104139"},"PeriodicalIF":3.1,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146187316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sharing as You Desire: A fuzzy certificateless proxy re-encryption scheme for efficient and privacy-preserving cloud data sharing 随心所欲地共享:一种模糊无证书代理再加密方案,用于高效和保护隐私的云数据共享
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2025-12-23 DOI: 10.1016/j.csi.2025.104121
Jiasheng Chen , Zhenfu Cao , Liangliang Wang , Jiachen Shen , Xiaolei Dong
Secure sharing mechanism in the cloud environment not only needs to realize efficient ciphertext storage of resource-constrained clients, but also needs to build a trusted data sharing system. Aiming at the limitations of existing schemes in terms of user identity privacy protection, insufficient access control granularity, and data sharing security, we propose a fuzzy certificateless proxy re-encryption (FCL-PRE) scheme. In order to achieve much better fine-grained delegation and effective conditional privacy, our scheme regards the conditions as an attribute set associated with pseudo-identities, and re-encryption can be performed if and only if the overlap distance of the sender’s and receiver’s attribute sets meets a specific threshold. Moreover, the FCL-PRE scheme ensures anonymity, preventing the exposure of users’ real identities through ciphertexts containing identity information during transmission. In the random oracle model, FCL-PRE not only guarantees confidentiality, anonymity, and collusion resistance but also leverages the fuzziness of re-encryption to provide a certain level of error tolerance in the cloud-sharing architecture. Experimental results indicate that, compared to other existing schemes, FCL-PRE offers up to a 44.6% increase in decryption efficiency while maintaining the lowest overall computational overhead.
云环境下的安全共享机制不仅需要实现资源受限客户端的高效密文存储,还需要构建可信的数据共享系统。针对现有方案在用户身份隐私保护、访问控制粒度不足、数据共享安全性等方面的局限性,提出了一种模糊无证书代理重加密(FCL-PRE)方案。为了实现更好的细粒度委托和有效的条件隐私,我们的方案将条件视为与伪身份相关联的属性集,当且仅当发送方和接收方属性集的重叠距离满足特定阈值时才能执行重新加密。此外,FCL-PRE方案保证了匿名性,防止用户的真实身份在传输过程中被包含身份信息的密文泄露。在随机oracle模型中,FCL-PRE不仅保证了机密性、匿名性和抗合谋性,而且利用了重新加密的模糊性,在云共享架构中提供了一定程度的容错能力。实验结果表明,与其他现有方案相比,FCL-PRE的解密效率提高了44.6%,同时保持了最低的总体计算开销。
{"title":"Sharing as You Desire: A fuzzy certificateless proxy re-encryption scheme for efficient and privacy-preserving cloud data sharing","authors":"Jiasheng Chen ,&nbsp;Zhenfu Cao ,&nbsp;Liangliang Wang ,&nbsp;Jiachen Shen ,&nbsp;Xiaolei Dong","doi":"10.1016/j.csi.2025.104121","DOIUrl":"10.1016/j.csi.2025.104121","url":null,"abstract":"<div><div>Secure sharing mechanism in the cloud environment not only needs to realize efficient ciphertext storage of resource-constrained clients, but also needs to build a trusted data sharing system. Aiming at the limitations of existing schemes in terms of user identity privacy protection, insufficient access control granularity, and data sharing security, we propose a fuzzy certificateless proxy re-encryption (FCL-PRE) scheme. In order to achieve much better fine-grained delegation and effective conditional privacy, our scheme regards the conditions as an attribute set associated with pseudo-identities, and re-encryption can be performed if and only if the overlap distance of the sender’s and receiver’s attribute sets meets a specific threshold. Moreover, the FCL-PRE scheme ensures anonymity, preventing the exposure of users’ real identities through ciphertexts containing identity information during transmission. In the random oracle model, FCL-PRE not only guarantees confidentiality, anonymity, and collusion resistance but also leverages the fuzziness of re-encryption to provide a certain level of error tolerance in the cloud-sharing architecture. Experimental results indicate that, compared to other existing schemes, FCL-PRE offers up to a 44.6% increase in decryption efficiency while maintaining the lowest overall computational overhead.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"97 ","pages":"Article 104121"},"PeriodicalIF":3.1,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145839848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal shard number determination algorithm based on security and performance in sharded blockchain 基于安全性和性能的区块链分片数确定算法
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-01-12 DOI: 10.1016/j.csi.2026.104128
Shangping Wang, Haotong Cao, Ruoxin Yan
Sharding technique has significantly increased the transaction processing capacity and scalability in blockchain systems but compromise security, particularly with increased vulnerability to “1/3 attacks” as shard numbers rise. Clearly, more shards are not always better, how to determine the optimal number of shards is essential yet often overlooked in existing research. To address the aforementioned issues, we propose a broadly applicable algorithm for determining the optimal number of shards in sharded blockchain based on security and performance (SPSN). Firstly, this work proposes a novel optimization model for sharded blockchain by considering the impacts of sharding on system security and performance. The idea is to find an optimal shard number that balances system efficiency (time required to process transactions) and security (system failure probability), ensuring that the system failure probability within acceptable limits while maximizing efficiency. Secondly, we propose a widely applicable algorithm to determine the optimal number of shards, which can be executed independently before sharding operations to ascertain the shard count that maximizes performance while ensuring system security. Lastly, experiments are conducted under four different system settings to demonstrate the specific methods. The results show that the proposed algorithm can effectively calculate the optimal shard number for most systems, demonstrating broad applicability and effectiveness, helping achieve a high-security, high-performance sharded blockchain system.
分片技术极大地提高了区块链系统的事务处理能力和可伸缩性,但也损害了安全性,特别是随着分片数量的增加,“1/3攻击”的脆弱性增加。显然,更多的分片并不总是更好,如何确定最佳的分片数量是至关重要的,但在现有的研究中经常被忽视。为了解决上述问题,我们提出了一种广泛适用的算法,用于根据安全性和性能(SPSN)确定分片区块链中的最佳分片数量。首先,本文通过考虑分片对系统安全性和性能的影响,提出了一种新的区块链分片优化模型。其思想是找到一个平衡系统效率(处理事务所需的时间)和安全性(系统故障概率)的最优分片数,确保系统故障概率在可接受的范围内,同时最大化效率。其次,我们提出了一种广泛适用的算法来确定最优分片数,该算法可以在分片操作之前独立执行,以确定在保证系统安全的同时最大限度地提高性能的分片数。最后,在四种不同的系统设置下进行了实验,验证了具体方法。结果表明,该算法可以有效地计算出大多数系统的最优分片数,具有广泛的适用性和有效性,有助于实现高安全性、高性能的分片区块链系统。
{"title":"Optimal shard number determination algorithm based on security and performance in sharded blockchain","authors":"Shangping Wang,&nbsp;Haotong Cao,&nbsp;Ruoxin Yan","doi":"10.1016/j.csi.2026.104128","DOIUrl":"10.1016/j.csi.2026.104128","url":null,"abstract":"<div><div>Sharding technique has significantly increased the transaction processing capacity and scalability in blockchain systems but compromise security, particularly with increased vulnerability to “1/3 attacks” as shard numbers rise. Clearly, more shards are not always better, how to determine the optimal number of shards is essential yet often overlooked in existing research. To address the aforementioned issues, we propose a broadly applicable algorithm for determining the optimal number of shards in sharded blockchain based on security and performance (SPSN). Firstly, this work proposes a novel optimization model for sharded blockchain by considering the impacts of sharding on system security and performance. The idea is to find an optimal shard number that balances system efficiency (time required to process transactions) and security (system failure probability), ensuring that the system failure probability within acceptable limits while maximizing efficiency. Secondly, we propose a widely applicable algorithm to determine the optimal number of shards, which can be executed independently before sharding operations to ascertain the shard count that maximizes performance while ensuring system security. Lastly, experiments are conducted under four different system settings to demonstrate the specific methods. The results show that the proposed algorithm can effectively calculate the optimal shard number for most systems, demonstrating broad applicability and effectiveness, helping achieve a high-security, high-performance sharded blockchain system.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"97 ","pages":"Article 104128"},"PeriodicalIF":3.1,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146077330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel hybrid WOA–GWO algorithm for multi-objective optimization of energy efficiency and reliability in heterogeneous computing 一种新的混合WOA-GWO算法用于异构计算中能效和可靠性的多目标优化
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2025-12-07 DOI: 10.1016/j.csi.2025.104106
Karishma, Harendra Kumar
Heterogeneous computing systems are widely adopted for their capacity to optimize performance and energy efficiency across diverse computational environments. However, most existing task scheduling techniques address either energy reduction or reliability enhancement, rarely achieving both simultaneously. This study proposes a novel hybrid whale optimization algorithm–grey wolf optimizer (WOA–GWO) integrated with dynamic voltage and frequency scaling (DVFS) and an insert-reversed block operation to overcome this dual challenge. The proposed Hybrid WOA–GWO (HWWO) framework enhances task prioritization using the dynamic variant rank heterogeneous earliest-finish-time (DVR-HEFT) approach to ensure efficient processor allocation and reduced computation time. The algorithm’s performance was evaluated on real-world constrained optimization problems from CEC 2020, as well as Fast Fourier Transform (FFT) and Gaussian Elimination (GE) applications. Experimental results demonstrate that HWWO achieves substantial gains in both energy efficiency and reliability, reducing total energy consumption by 55% (from 170.52 to 75.67 units) while increasing system reliability from 0.8804 to 0.9785 compared to state-of-the-art methods such as SASS, EnMODE, sCMAgES, and COLSHADE. The experimental results, implemented on varying tasks and processor counts, further demonstrate that the proposed algorithmic approach outperforms existing state-of-the-art and metaheuristic algorithms by delivering superior energy efficiency, maximizing reliability, minimizing computation time, reducing schedule length ratio (SLR), optimizing the communication-to-computation ratio (CCR), enhancing resource utilization, and minimizing sensitivity analysis. These findings confirm that the proposed model effectively bridges the existing research gap by providing a robust, energy-aware, and reliability-optimized scheduling framework for heterogeneous computing environments.
异构计算系统因其在不同计算环境中优化性能和能源效率的能力而被广泛采用。然而,大多数现有的任务调度技术要么解决能耗降低问题,要么解决可靠性提高问题,很少同时实现这两个目标。为了克服这一双重挑战,本研究提出了一种新的混合鲸鱼优化算法-灰狼优化器(WOA-GWO),该算法集成了动态电压和频率缩放(DVFS)和插入反转块操作。提出的混合WOA-GWO (HWWO)框架利用动态可变等级异构最早完成时间(DVR-HEFT)方法增强任务优先级,以确保高效的处理器分配和减少计算时间。该算法的性能在CEC 2020的实际约束优化问题以及快速傅里叶变换(FFT)和高斯消去(GE)应用中进行了评估。实验结果表明,与SASS、EnMODE、sCMAgES和COLSHADE等最先进的方法相比,HWWO在能源效率和可靠性方面都取得了巨大的进步,将总能耗降低了55%(从170.52单位降低到75.67单位),同时将系统可靠性从0.8804提高到0.9785。在不同任务和处理器数量上的实验结果进一步表明,该算法通过提供卓越的能效、最大限度的可靠性、最小的计算时间、降低调度长度比(SLR)、优化通信与计算比(CCR)、提高资源利用率和最小化灵敏度分析,优于现有的最先进的和元启发式算法。这些发现证实了所提出的模型通过为异构计算环境提供鲁棒性、能量感知和可靠性优化的调度框架,有效地弥补了现有的研究差距。
{"title":"A novel hybrid WOA–GWO algorithm for multi-objective optimization of energy efficiency and reliability in heterogeneous computing","authors":"Karishma,&nbsp;Harendra Kumar","doi":"10.1016/j.csi.2025.104106","DOIUrl":"10.1016/j.csi.2025.104106","url":null,"abstract":"<div><div>Heterogeneous computing systems are widely adopted for their capacity to optimize performance and energy efficiency across diverse computational environments. However, most existing task scheduling techniques address either energy reduction or reliability enhancement, rarely achieving both simultaneously. This study proposes a novel hybrid whale optimization algorithm–grey wolf optimizer (WOA–GWO) integrated with dynamic voltage and frequency scaling (DVFS) and an insert-reversed block operation to overcome this dual challenge. The proposed Hybrid WOA–GWO (HWWO) framework enhances task prioritization using the dynamic variant rank heterogeneous earliest-finish-time (DVR-HEFT) approach to ensure efficient processor allocation and reduced computation time. The algorithm’s performance was evaluated on real-world constrained optimization problems from CEC 2020, as well as Fast Fourier Transform (FFT) and Gaussian Elimination (GE) applications. Experimental results demonstrate that HWWO achieves substantial gains in both energy efficiency and reliability, reducing total energy consumption by 55% (from 170.52 to 75.67 units) while increasing system reliability from 0.8804 to 0.9785 compared to state-of-the-art methods such as SASS, EnMODE, sCMAgES, and COLSHADE. The experimental results, implemented on varying tasks and processor counts, further demonstrate that the proposed algorithmic approach outperforms existing state-of-the-art and metaheuristic algorithms by delivering superior energy efficiency, maximizing reliability, minimizing computation time, reducing schedule length ratio (SLR), optimizing the communication-to-computation ratio (CCR), enhancing resource utilization, and minimizing sensitivity analysis. These findings confirm that the proposed model effectively bridges the existing research gap by providing a robust, energy-aware, and reliability-optimized scheduling framework for heterogeneous computing environments.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"97 ","pages":"Article 104106"},"PeriodicalIF":3.1,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145737268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Multimodal Causal Graph framework for standardized Emotion Recognition in Conversations 对话中标准化情绪识别的动态多模态因果图框架
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-01-16 DOI: 10.1016/j.csi.2026.104130
Ronghao Pan, José Antonio García-Díaz, Rafael Valencia-García
Understanding emotions in conversations is a fundamental challenge in affective computing. Emotional expressions evolve dynamically across dialogue turns and depend on multimodal cues such as speech, text, and facial behavior. However, existing multimodal models often rely on global attention mechanisms that overlook causal constraints. This allows information leakage from future turns and neglect of the speaker’s emotional evolution. To address these limitations, we propose the Dynamic Multimodal Causal Graph Emotion System (DMCGES). DMCGES integrates a restricted dynamic causal graph to ensure temporal coherence, as well as a speaker-specific memory module to capture affective trajectories and enhance multimodal alignment and robustness. The framework aligns with the IEEE 7010-2020 standard, which emphasizes integrating human well-being as a fundamental design principle in autonomous and intelligent systems. Experiments on the IEMOCAP and MELD benchmark datasets demonstrate that DMCGES outperforms state-of-the-art approaches in terms of accuracy and F1 score. On the IEMOCAP dataset, DMCGES achieved an accuracy of 69.36% and an F1 score of 69.49%, representing relative improvements of 1.95% and 2.39%, respectively. On the MELD dataset, our model achieved an accuracy of 62.38% and an F1 score of 62.03%, improving upon SACCMA’s results by 0.1% in accuracy and 2.73% in F1 score.
理解对话中的情绪是情感计算的一个基本挑战。情感表达在对话回合中动态演变,并依赖于多模态线索,如语音、文本和面部行为。然而,现有的多模态模型往往依赖于忽视因果约束的全局注意机制。这使得信息从未来的转折中泄露出来,并且忽略了说话者的情绪演变。为了解决这些限制,我们提出了动态多模态因果图情感系统(DMCGES)。DMCGES集成了一个受限制的动态因果图,以确保时间一致性,以及一个特定于说话人的记忆模块,以捕捉情感轨迹,增强多模态对齐和鲁棒性。该框架与IEEE 7010-2020标准保持一致,该标准强调将人类福祉作为自主和智能系统的基本设计原则。在IEMOCAP和MELD基准数据集上的实验表明,DMCGES在准确性和F1分数方面优于最先进的方法。在IEMOCAP数据集上,DMCGES的准确率为69.36%,F1得分为69.49%,分别相对提高了1.95%和2.39%。在MELD数据集上,我们的模型实现了62.38%的准确率和62.03%的F1分数,比sacma的结果提高了0.1%的准确率和2.73%的F1分数。
{"title":"A Dynamic Multimodal Causal Graph framework for standardized Emotion Recognition in Conversations","authors":"Ronghao Pan,&nbsp;José Antonio García-Díaz,&nbsp;Rafael Valencia-García","doi":"10.1016/j.csi.2026.104130","DOIUrl":"10.1016/j.csi.2026.104130","url":null,"abstract":"<div><div>Understanding emotions in conversations is a fundamental challenge in affective computing. Emotional expressions evolve dynamically across dialogue turns and depend on multimodal cues such as speech, text, and facial behavior. However, existing multimodal models often rely on global attention mechanisms that overlook causal constraints. This allows information leakage from future turns and neglect of the speaker’s emotional evolution. To address these limitations, we propose the Dynamic Multimodal Causal Graph Emotion System (DMCGES). DMCGES integrates a restricted dynamic causal graph to ensure temporal coherence, as well as a speaker-specific memory module to capture affective trajectories and enhance multimodal alignment and robustness. The framework aligns with the IEEE 7010-2020 standard, which emphasizes integrating human well-being as a fundamental design principle in autonomous and intelligent systems. Experiments on the IEMOCAP and MELD benchmark datasets demonstrate that DMCGES outperforms state-of-the-art approaches in terms of accuracy and F1 score. On the IEMOCAP dataset, DMCGES achieved an accuracy of 69.36% and an F1 score of 69.49%, representing relative improvements of 1.95% and 2.39%, respectively. On the MELD dataset, our model achieved an accuracy of 62.38% and an F1 score of 62.03%, improving upon SACCMA’s results by 0.1% in accuracy and 2.73% in F1 score.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"97 ","pages":"Article 104130"},"PeriodicalIF":3.1,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146037245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving kNN classification for cross-platform electric vehicle data analytics 跨平台电动汽车数据分析的隐私保护kNN分类
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2026-01-16 DOI: 10.1016/j.csi.2026.104134
Zhicheng Li , Jian Xu , Nan Zhang , Teng Lu , Peijun Li , Nian Wang , Qiuyue Wang
Cloud and edge platforms increasingly host machine learning workloads, yet outsourcing k-Nearest Neighbors (kNN) raises acute risks to data privacy and computation integrity. Existing perturbation and partially homomorphic approaches either leak information or fail to scale, while conventional FHE comparisons and interactive MPC protocols impose heavy costs. We propose two complementary schemes for privacy-preserving kNN tailored to cross-platform EV analytics. First, a single-server FHE design performs encrypted inner products and exact squared Euclidean distances using matrix-optimized packing to parallelize feature-wise operations and batch queries, reducing ciphertext count and multiplicative depth. Second, a two-server MPC design executes distance evaluation, fixed-network Top-k, and majority voting entirely on additive shares, with re-sharing to refresh randomness and hide access patterns. We formalize semi-honest threat models and prove input privacy and correctness. Additive-share MPC demonstrates plaintext-level accuracy, with FHE achieving non-interactive cloud processing and MPC delivering near real-time online latency at practical communication cost. The combined results show that strong privacy and practical efficiency for kNN can be achieved without exposing training data, queries, or intermediate computations.
云和边缘平台越来越多地托管机器学习工作负载,但外包k-近邻(kNN)会给数据隐私和计算完整性带来严重风险。现有的微扰和部分同态方法要么泄露信息,要么无法扩展,而传统的FHE比较和交互式MPC协议则带来了高昂的成本。我们提出了两种针对跨平台EV分析的隐私保护kNN互补方案。首先,单服务器FHE设计使用矩阵优化封装执行加密的内积和精确平方欧几里得距离,以并行化特征操作和批处理查询,减少密文计数和乘法深度。其次,双服务器MPC设计完全在附加共享上执行距离评估、固定网络Top-k和多数投票,并通过重新共享来刷新随机性和隐藏访问模式。我们形式化了半诚实的威胁模型,并证明了输入的隐私性和正确性。加法共享MPC展示了纯文本级别的准确性,FHE实现了非交互式云处理,MPC在实际通信成本下提供了接近实时的在线延迟。综合结果表明,在不暴露训练数据、查询或中间计算的情况下,可以实现kNN的强隐私性和实用效率。
{"title":"Privacy-preserving kNN classification for cross-platform electric vehicle data analytics","authors":"Zhicheng Li ,&nbsp;Jian Xu ,&nbsp;Nan Zhang ,&nbsp;Teng Lu ,&nbsp;Peijun Li ,&nbsp;Nian Wang ,&nbsp;Qiuyue Wang","doi":"10.1016/j.csi.2026.104134","DOIUrl":"10.1016/j.csi.2026.104134","url":null,"abstract":"<div><div>Cloud and edge platforms increasingly host machine learning workloads, yet outsourcing <span><math><mi>k</mi></math></span>-Nearest Neighbors (<span><math><mi>k</mi></math></span>NN) raises acute risks to data privacy and computation integrity. Existing perturbation and partially homomorphic approaches either leak information or fail to scale, while conventional FHE comparisons and interactive MPC protocols impose heavy costs. We propose two complementary schemes for privacy-preserving <span><math><mi>k</mi></math></span>NN tailored to cross-platform EV analytics. First, a single-server FHE design performs encrypted inner products and exact squared Euclidean distances using matrix-optimized packing to parallelize feature-wise operations and batch queries, reducing ciphertext count and multiplicative depth. Second, a two-server MPC design executes distance evaluation, fixed-network Top-<span><math><mi>k</mi></math></span>, and majority voting entirely on additive shares, with re-sharing to refresh randomness and hide access patterns. We formalize semi-honest threat models and prove input privacy and correctness. Additive-share MPC demonstrates plaintext-level accuracy, with FHE achieving non-interactive cloud processing and MPC delivering near real-time online latency at practical communication cost. The combined results show that strong privacy and practical efficiency for <span><math><mi>k</mi></math></span>NN can be achieved without exposing training data, queries, or intermediate computations.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"97 ","pages":"Article 104134"},"PeriodicalIF":3.1,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146077245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MExpm: Fair computation offloading for batch modular exponentiation with improved privacy and checkability in IoV MExpm: IoV中批量模块化幂运算的公平计算卸载,改进了隐私性和可检查性
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2025-12-03 DOI: 10.1016/j.csi.2025.104107
Sipeng Shen , Qiang Wang , Fucai Zhou, Jian Xu, Mingxing Jin
Modular exponentiation is a fundamental cryptographic operation extensively applied in the Internet of Vehicles (IoV). However, its computational intensity imposes significant resource and time demands on intelligent vehicles. Offloading such computations to Mobile Edge Computing (MEC) servers has emerged as a promising approach. Nonetheless, existing schemes are generally impractical, as they either fail to ensure fairness between intelligent vehicles and MEC servers, lack privacy protection for the bases and exponents, or cannot guarantee the correctness of results with overwhelming probability due to potential misbehavior by MEC servers. To address these limitations, we propose MExpm, a fair and efficient computation offloading scheme for batch modular exponentiation under a single untrusted server model. Our scheme leverages blockchain technology to ensure fairness through publicly verifiable results. Furthermore, MExpm achieves high checkability, offering a near-perfect probability of checkability. To enhance privacy, we introduce secure obfuscation and logical split techniques, effectively protecting both the bases and the exponents. Extensive theoretical analysis and experimental results demonstrate that our scheme is not only efficient in terms of computation, communication, and storage overheads but also significantly improves privacy protection and checkability.
模幂运算是一种广泛应用于车联网(IoV)的基本加密运算。然而,其计算强度给智能汽车带来了巨大的资源和时间需求。将此类计算卸载到移动边缘计算(MEC)服务器已成为一种有前途的方法。然而,现有的方案要么无法保证智能车辆与MEC服务器之间的公平性,要么缺乏对基数和指数的隐私保护,要么由于MEC服务器可能存在的不当行为,无法保证结果的绝大多数概率的正确性,这些都是不切实际的。为了解决这些限制,我们提出了MExpm,这是一个公平有效的计算卸载方案,用于在单个不受信任的服务器模型下进行批量模块化幂运算。我们的方案利用区块链技术,通过可公开验证的结果来确保公平性。此外,MExpm实现了高可检查性,提供了近乎完美的可检查性概率。为了增强隐私性,我们引入了安全混淆和逻辑分割技术,有效地保护了基数和指数。大量的理论分析和实验结果表明,我们的方案不仅在计算、通信和存储开销方面有效,而且显著提高了隐私保护和可检查性。
{"title":"MExpm: Fair computation offloading for batch modular exponentiation with improved privacy and checkability in IoV","authors":"Sipeng Shen ,&nbsp;Qiang Wang ,&nbsp;Fucai Zhou,&nbsp;Jian Xu,&nbsp;Mingxing Jin","doi":"10.1016/j.csi.2025.104107","DOIUrl":"10.1016/j.csi.2025.104107","url":null,"abstract":"<div><div>Modular exponentiation is a fundamental cryptographic operation extensively applied in the Internet of Vehicles (IoV). However, its computational intensity imposes significant resource and time demands on intelligent vehicles. Offloading such computations to Mobile Edge Computing (MEC) servers has emerged as a promising approach. Nonetheless, existing schemes are generally impractical, as they either fail to ensure fairness between intelligent vehicles and MEC servers, lack privacy protection for the bases and exponents, or cannot guarantee the correctness of results with overwhelming probability due to potential misbehavior by MEC servers. To address these limitations, we propose MExpm, a fair and efficient computation offloading scheme for batch modular exponentiation under a single untrusted server model. Our scheme leverages blockchain technology to ensure fairness through publicly verifiable results. Furthermore, MExpm achieves high checkability, offering a near-perfect probability of checkability. To enhance privacy, we introduce secure obfuscation and logical split techniques, effectively protecting both the bases and the exponents. Extensive theoretical analysis and experimental results demonstrate that our scheme is not only efficient in terms of computation, communication, and storage overheads but also significantly improves privacy protection and checkability.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"97 ","pages":"Article 104107"},"PeriodicalIF":3.1,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145737265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A requirement-driven method for process mining based on model-driven engineering 基于模型驱动工程的需求驱动过程挖掘方法
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-04-01 Epub Date: 2025-12-04 DOI: 10.1016/j.csi.2025.104108
Selsabil Ines Bouhidel , Mohammed Mounir Bouhamed , Gregorio Diaz , Nabil Belala
Process mining analyzes business processes using event logs. Existing tools generate models to facilitate this task and improve the original business process, but the results are often unsatisfactory due to the complexity of the obtained models. Among the challenges faced in this context, we identify the misalignment with specific business requirements, preventing managers from accessing key data and making effective decisions. In this paper, we propose a requirement-driven approach centered on meta-modeling, which can help the development of process mining tools specially tailored to organizational needs. Thus, we introduce a requirement-driven method to address the critical challenge of model misalignment with required information. The method employs Model-Driven Engineering to simplify how process mining results are formulated, analyzed, and interpreted. The proposed method is iterative and involves several steps. First, a service manager defines a specific business question. Second, service managers and developers collaboratively establish a meta-model representing the target data. Third, developers extract relevant data using appropriate analysis techniques and visualize it. Finally, service managers and developers jointly interpret these visualizations to inform strategic decisions. This requirement-driven methodology empowers developers to concentrate on relevant information. Unlike general-purpose frameworks (e.g., ProM, Disco), this method emphasizes specificity, iterative refinement, and close stakeholder collaboration. By reducing cognitive overload through focused modeling and filtering of irrelevant data, organizations adopting this approach can achieve faster response times to business questions and develop specialized in-house analytical tools. This requirement-driven methodology, therefore, improves decision-making capabilities within process mining and across related analytical domains. We illustrate our methodology through a real business process taken from the literature owned by the VOLVO group. We use several examples of process mining to illustrate the benefits of the proposed methodology compared to existing tools which are unable to provide the required information.
流程挖掘使用事件日志分析业务流程。现有的工具生成模型来促进此任务并改进原始业务流程,但是由于所获得的模型的复杂性,结果往往不令人满意。在此上下文中面临的挑战中,我们确定了与特定业务需求的不一致,从而阻止了管理人员访问关键数据并做出有效决策。在本文中,我们提出了一种以元建模为中心的需求驱动方法,它可以帮助开发专门针对组织需求的过程挖掘工具。因此,我们引入了一种需求驱动的方法来解决模型与所需信息不一致的关键挑战。该方法采用模型驱动工程来简化过程挖掘结果的表述、分析和解释。所提出的方法是迭代的,涉及几个步骤。首先,服务管理器定义一个特定的业务问题。其次,服务管理人员和开发人员协作建立表示目标数据的元模型。第三,开发人员使用适当的分析技术提取相关数据并将其可视化。最后,服务经理和开发人员共同解释这些可视化,以告知战略决策。这种需求驱动的方法使开发人员能够专注于相关信息。与通用框架(例如,ProM、Disco)不同,该方法强调专一性、迭代细化和密切涉众协作。通过集中建模和过滤无关数据来减少认知超载,采用这种方法的组织可以实现对业务问题更快的响应时间,并开发专门的内部分析工具。因此,这种需求驱动的方法提高了过程挖掘和跨相关分析领域的决策能力。我们通过从沃尔沃集团拥有的文献中提取的真实业务流程来说明我们的方法。我们使用几个过程挖掘的例子来说明所提出的方法与现有工具相比的好处,这些工具无法提供所需的信息。
{"title":"A requirement-driven method for process mining based on model-driven engineering","authors":"Selsabil Ines Bouhidel ,&nbsp;Mohammed Mounir Bouhamed ,&nbsp;Gregorio Diaz ,&nbsp;Nabil Belala","doi":"10.1016/j.csi.2025.104108","DOIUrl":"10.1016/j.csi.2025.104108","url":null,"abstract":"<div><div>Process mining analyzes business processes using event logs. Existing tools generate models to facilitate this task and improve the original business process, but the results are often unsatisfactory due to the complexity of the obtained models. Among the challenges faced in this context, we identify the misalignment with specific business requirements, preventing managers from accessing key data and making effective decisions. In this paper, we propose a requirement-driven approach centered on meta-modeling, which can help the development of process mining tools specially tailored to organizational needs. Thus, we introduce a requirement-driven method to address the critical challenge of model misalignment with required information. The method employs Model-Driven Engineering to simplify how process mining results are formulated, analyzed, and interpreted. The proposed method is iterative and involves several steps. First, a service manager defines a specific business question. Second, service managers and developers collaboratively establish a meta-model representing the target data. Third, developers extract relevant data using appropriate analysis techniques and visualize it. Finally, service managers and developers jointly interpret these visualizations to inform strategic decisions. This requirement-driven methodology empowers developers to concentrate on relevant information. Unlike general-purpose frameworks (e.g., ProM, Disco), this method emphasizes specificity, iterative refinement, and close stakeholder collaboration. By reducing cognitive overload through focused modeling and filtering of irrelevant data, organizations adopting this approach can achieve faster response times to business questions and develop specialized in-house analytical tools. This requirement-driven methodology, therefore, improves decision-making capabilities within process mining and across related analytical domains. We illustrate our methodology through a real business process taken from the literature owned by the VOLVO group. We use several examples of process mining to illustrate the benefits of the proposed methodology compared to existing tools which are unable to provide the required information.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"97 ","pages":"Article 104108"},"PeriodicalIF":3.1,"publicationDate":"2026-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145737267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Standards & Interfaces
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1