Skip to main content

Über dieses Buch

This book contains substantially extended and revised versions of the best papers from the 15th International Conference on Enterprise Information Systems, ICEIS 2013, held in Angers, France, in July 2013.

The 29 full and two invited papers included in this volume were carefully reviewed and selected from 321 submissions. They reflect state-of-the-art research focusing mainly on real-world applications and highlight the benefits of information systems and technology for industry and services, thus connecting academia with the world of real enterprises.

The topics covered are: databases and information systems integration, artificial intelligence and decision support systems, information systems analysis and specification, software agents and Internet computing, human–computer interaction, and enterprise architecture.



Invited Papers


Challenges in Bridging Social Semantics and Formal Semantics on the Web

This paper describes several results of Wimmics, a research lab which names stands for: web-instrumented man-machine interactions, communities, and semantics. The approaches introduced here rely on graph-oriented knowledge representation, reasoning and operationalization to model and support actors, actions and interactions in web-based epistemic communities. The research results are applied to support and foster interactions in online communities and manage their resources.

Fabien Gandon, Michel Buffa, Elena Cabrio, Olivier Corby, Catherine Faron-Zucker, Alain Giboin, Nhan Le Thanh, Isabelle Mirbel, Peter Sander, Andrea Tettamanzi, Serena Villata

Enterprise Architecture: Informed Steering of Enterprises in Motion

Enterprises are constantly in motion. Novel technologies, new markets opportunities, cost reduction, process improvement, service innovation, globalisation, mergers, acquisitions, etc., continuously trigger enterprises to change. This variety of change drivers also fuels the need for enterprises to seek the right balance between the many, quite often contradicting, drivers for change.

In this position paper, we aim to investigate the potential role of enterprise architecture as a means to support senior management in steering/influencing the direction in which an enterprise “moves” in response to, or in anticipation of, the many change drivers. In doing so, we aim to develop a fundamental understanding of the systemic playing field in which enterprise architecture is to play a role. To this end, we will start by exploring how enterprises can be seen as being continuously “in motion”. We then turn to the

control paradigm

to reflect on the need to steer this motion. We will also argue that the resulting steering system is a second order information system. Using this understanding we then identify the ingredients needed for enterprise architecture.

Henderik A. Proper

Databases and Information Systems Integration


An Evaluation of Multi-way Joins for Relational Database Systems

In database systems most join algorithms operate on only two inputs at a time. Research into joins on more than two inputs, called multi-way joins, has shown that the intermediate partitioning steps of a traditional hash join based query plan can be avoided. This decreases the amount of disk based input and output (I/Os) that the query requires. This work studies the advantages and disadvantages of implementing and using different multi-way join algorithms and their relative performance compared to traditional hash joins. Specifically, this work compares hash join with three multi-way join algorithms: hash teams, generalized hash teams and SHARP. The results of the experiments show that in some cases multi-way hash joins can provide a significant advantage over hash join but not always. The cases where hash teams and generalized hash teams have better performance is limited, and it does not make sense to implement these algorithms in a production database management system. SHARP provides enough of a performance advantage that it makes sense to implement it in a database system used for data warehousing.

Michael Henderson, Ramon Lawrence

What Do We Know About ERP Integration?

Enterprise Resource Planning (ERP) systems have been the major interest of companies to improve the business performance with integrated business systems during the last 15 years. As demands for collaborative business through supply chain increased, so did the integration requirements for ERPs that are today connected externally with customers, suppliers and business partners and internally with continuously changing system landscape of the enterprise. We conducted a systematic mapping study to investigate how ERP integration has been studied by the academia from 1998 to 2012. Studies about technological issues are mostly dealing with systems inside a company whereas studies on methodological issues focus on the integration of the supply chain management and e-business. However, these studies are often either carried out without a rigorous empirical research method or they are based on single cases only. Quantitative methods have been mainly used to investigate quality attributes of ERPs but issues related to ERP integration in terms of a network of stakeholders in an ERP project still need more research in the future.

Tommi Kähkönen, Andrey Maglyas, Kari Smolander

Fairtrace: Applying Semantic Web Tools and Techniques to the Textile Traceability

This paper presents solutions that leverage Semantic Web Technologies (SWT) to allow pragmatic traceability in supply-chains, especially for the textile industry. Objectives are the identification of the supply-chain, order management, tracking and problem reporting (such as dangerous substance detection). It is intended to be a generic platform supporting potentially any kind of industrial supply-chain, to be usable in harsh environments (mobile appliances) without any kind of communications possibility and to be fully usable to non-IT people, including for the modelling of the production processes. The developed solutions also allow the consumer to benefit from the traceability through information pages available by scanning the QR codes available on the finished products (clothes, clocks, etc.). This paper presents: (i) the methodology applied to achieve those functionalities, (ii) the design and implementation choices, and (iii) the test results. The main value of this paper is the usage of the Semantic Web in real-world industrial traceability solutions, which were tested in real supply-chains in Switzerland and India. The commercialization of the developed solutions has started.

Bruno Alves, Michael Schumacher, Fabian Cretton, Anne Le Calvé, Gilles Cherix, David Werlen, Christian Gapany, Bertrand Baeryswil, Doris Gerber, Philippe Cloux

Estimating Sufficient Sample Sizes for Approximate Decision Support Queries

Sampling schemes for approximate processing of highly selective decision support queries need to retrieve sufficient number of records that can provide reliable results within acceptable error limits. The


-MDI tree is an innovative index structure that supports drawing rich samples of relevant records for a given set of dimensional attribute ranges. This paper describes a method for estimating sufficient sample sizes for decision support queries based on inverse simple random sampling without replacement (SRSWOR). Combined with a


-MDI tree index, this method is shown to offer a reliable approach to approximate query processing for decision support.

Amit Rudra, Raj P. Gopalan, N. R. Achuthan

A Data-Driven Prediction Framework for Analyzing and Monitoring Business Process Performances

This paper presents a framework for analyzing and predicting the performances of a business process, based on historical data gathered during its past enactments. The framework hinges on an inductive-learning technique for discovering a special kind of predictive process models, which can support the run-time prediction of a given performance measure (e.g., the remaining processing time/steps) for an ongoing process instance, based on a modular representation of the process, where major performance-relevant variants of it are modeled with different regression models, and discriminated on the basis of context variables. The technique is an original combination of different data mining methods (ranging from pattern mining, to non-parametric regression and predictive clustering) and ad-hoc data transformation mechanisms, allowing for looking at the log traces at a proper level of abstraction, in a pretty automatic and transparent way. The technique has been integrated in a performance monitoring architecture, meant to provide managers and analysts (and possibly the process enactment environment) with continuously updated performance statistics, as well as with the anticipated notification of likely SLA violations. The approach has been validated on a real-life case study, with satisfactory results, in terms of both prediction accuracy and robustness.

Antonio Bevacqua, Marco Carnuccio, Francesco Folino, Massimo Guarascio, Luigi Pontieri

An Overview of Experimental Studies on Software Inspection Process

Software inspection process is an effective activity to find defects on software artifacts as soon as they are introduced. The development of experimental knowledge on this area is useful to everyone who needs to make decisions about inspection activity. This paper aims to map the empirical studies conducted in the software inspection process area. The steps of the Systematic Mapping (SM) process was performed with the support of the StArt tool. Seventy nine papers were accepted in this SM and attributes related to inspection process, techniques, tools, inspected artifacts, research groups and universities were extracted. The results show different inspection processes, which have been experimentally investigated. Fagan’s process is the most investigated of them. In relation to inspected artifacts, requirements document and source code were the most used. Moreover, different tools and techniques have been used to support these processes.

Elis Montoro Hernandes, Anderson Belgamo, Sandra Fabbri

Artificial Intelligence and Decision Support Systems


Coordinating Agents in Dynamic Environment

This paper presents strategies for speeding up the convergence of agents on swarm. Speeding up the learning of an agent is a complex task since the choice of inadequate updating techniques may cause delays in the learning process or even induce an unexpected acceleration that causes the agent to converge to a non-satisfactory policy. We have developed strategies for updating policies which combines local and global search using past policies. Experimental results in dynamic environments of different dimensions have shown that the proposed strategies are able to speed up the convergence of the agents while achieving optimal action policies, improving the coordination of agents in the swarm while deliberating.

Richardson Ribeiro, Adriano F. Ronszcka, Marco A. C. Barbosa, Fabrício Enembreck

Optimizing Power, Heating, and Cooling Capacity on a Decision-Guided Energy Investment Framework

We propose a Decision-Guided Energy Investment (DGEI) Framework to optimize power, heating, and cooling capacity. The DGEI framework is designed to support energy managers to (1) use the analytical and graphical methodology to determine the best investment option that satisfies the designed evaluation parameters, such as return on investment (ROI) and greenhouse gas (GHG) emissions; (2) develop a DGEI optimization model to solve energy investment problems that the operating expenses are minimal in each considered investment option; (3) implement the DGEI optimization model using the IBM Optimization Programming Language (OPL) with historical and projected energy demand data, i.e., electricity, heating, and cooling, to solve energy investment optimization problems; and (4) conduct an experimental case study for a university campus microgrid and utilize the DGEI optimization model and its OPL implementations, as well as the analytical and graphical methodology to make an investment decision and to measure trade-offs among cost savings, investment costs, maintenance expenditures, replacement charges, operating expenses, GHG emissions, and ROI for all the considered options.

Chun-Kit Ngan, Alexander Brodsky, Nathan Egge, Erik Backus

Combining Fuzzy Ontology Reasoning and Mamdani Fuzzy Inference System with HyFOM Reasoner

Representing and processing imprecise knowledge has been a requirement for a number of applications. Some real-world domains as well as human subjective perceptions are intrinsically fuzzy, therefore conventional formalisms may not be sufficient to capture the intended semantics. In this sense, fuzzy ontologies and Mamdani fuzzy inference systems have been successfully applied for knowledge representation and reasoning. Combining their reasoning approaches can lead to inferences involving fuzzy rules and numerical properties from ontologies, which can be required to perform other fuzzy ontology reasoning tasks such as the fuzzy instance check. To address this issue, this paper describes the HyFOM reasoner, which follows a hybrid architecture to combine fuzzy ontology reasoning with Mamdani fuzzy inference system. A real-world case study involving the domain of food safety is presented, including comparative results with a state-of-the-art fuzzy description logic reasoner.

Cristiane A. Yaguinuma, Walter C. P. Magalhães, Marilde T. P. Santos, Heloisa A. Camargo, Marek Reformat

Business Intelligence for Improving Supply Chain Risk Management

The risk management over a supply chain has to be founded on the management controls in each of the partner companies in the chain. Inevitably, the business relationship and operations dependence bind the control efforts of partner companies together. This proposes challenges for supply chain risk management and at the same time for the BI application. In this paper we analyse the management control situations where business intelligence technology can be applied and describe the concepts of systematic risk analysis to improve the management controls, based on causal analysis of business exceptions. The analysis process is driven by diagnostic drill-down operations following the equations of the information structure in which the data are organised. Using business intelligence, the analysis method can generate explanations supported by the data. A “risk template” is provided to assist analysts to fully comprehend the risk scenario in the practical business setting, so as to evaluate and re-design the existing controls, and to apply BI for management improvement.

Lingzhe Liu, Hennie Daniels, Wout Hofman

Information Systems Analysis and Specification


Bayesian Prediction of Fault-Proneness of Agile-Developed Object-Oriented System

Logistic regression (LR) and naïve Bayes (NB) extensively used for prediction of fault-proneness assume linear addition and independence that often cannot hold in practice. Hence, we propose a Bayesian network (BN) model with incorporation of data mining techniques as an integrative approach. Compared with LR and NB, BN provides a flexible modeling framework, thus avoiding the corresponding assumptions. Using the static metrics such as Chidamber and Kemerer’s (C-K) suite and complexity as predictors, the differences in performance between LR, NB and BN models were examined for fault-proneness prediction at the class level in continual releases (five versions) of Rhino, an open-source implementation of JavaScript, developed using the agile process. By cross validation and independent test of continual versions, we conclude that the proposed BN can achieve a better prediction than LR and NB for the agile software due to its flexible modeling framework and incorporation of multiple sophisticated learning algorithms.

Lianfa Li, Hareton Leung

Foundation for Fine-Grained Security and DRM Control Based on a Service Call Graph Context Identification

Maintaining service/data providers’ protection requirements in a dynamic service composition context requires a collaborative business process slicing method to capture the assets derivation pattern. Based on a brief discussion of sub-context modes in collaborative enterprise scenarios, we propose a service composition context identification method with Service Call Graph (SCG) model, extending the System Dependency Graph, to describe dependencies among partners in a business process. This graph is then analyzed to group partners into sub-context thanks to asset-based and request-based slicing strategies. By this way, downstream consumers’ security profile can be compared with upstream asset providers’ policies so that security requirements can be fulfilled.

Ziyi Su, Frédérique Biennier

SourceMiner: Towards an Extensible Multi-perspective Software Visualization Environment

In spite of the available resources provided by modern IDEs, program understanding remains as a difficult task in software engineering. This paper presents a software visualization environment named SourceMiner. Implemented as an Eclipse plug-in to enhance software comprehension activities, SourceMiner is an extensible, interactive and coordinated multi-perspective environment. This paper describes the principles behind the design of SourceMiner, and discusses how it has been used to support software comprehension activities such as the identification of code smells and the characterization of object-oriented software systems.

Glauco de Figueiredo Carneiro, Manoel Gomes de Mendonça Neto

Capturing Semiotic and Social Factors of Organizational Evolution

Enterprises are always subject to internal and external pressures for change. Organizational Semiotics explains the structure of social norms, which allows a group of people to act together in a coordinated way for certain purposes. When a novelty requires reshaping this structure, Actor-Network Theory provides sociological insights to understand the involved factors. This paper delineates a method combining these theoretical sources for clarifying and representing the social forces involved in organizational changes. All actors – people, technical devices and other objects – are modeled in the same social level, tracing the flow of interests back to their sources, enabling to negotiate changes with the appropriate stakeholders.

Alysson Bolognesi Prado, Maria Cecilia Calani Baranauskas

The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach

The Business Process Models describe and formalize the operations, constraints and policies of an organization. These models have firstly been used as abstract views of all the processes implied in an organisation. These served as inputs and outputs of the business analysis and re-engineering activities with no explicit relationship with the IT infrastructures which have been implementing business processes. In this paper, we deal with the BPM as higher abstraction level artefacts of software applications implementing the organisation processes. It presents our approach dealing with the change management of such applications. The approach is based on the graph based formalisation of all the software artefacts including the BPM ones. It provides an explicit management of various relationships conducting the change impact. The change operations are then formalized by graph rewriting (or transformation) rules. These rules implement both the change and the change impact propagation. The semantic knowledge concerning the various artefacts and the change operations is represented by an ontology. This ontology is intended to be able to automatically generate some change management rules. We use graph rewriting system (AGG) as a mean to formally specify and validate the result of our approach. The resulting specifications are then implemented using an integrated software change management platform appearing as a set of the Eclipse Workbench plug-ins.

Mourad Bouneffa, Adeel Ahmad

Reengineering of Object-Oriented Software into Aspect-Oriented Ones Supported by Class Models

Object-Oriented Software Reengineering (OO) into Aspect-Oriented Software (AO) is a challenging task, mainly when it is done by means of refactorings in the code-level. The reason is that direct transformation from OO code to AO one needs of several design decisions due to differences of both paradigms. To make this transformation more controlled and systematic, we propose the use of concern-based refactorings, supported by class models. It allows design decisions to be made during the reengineering process, improving the quality of the final models. An example is presented to assess the applicability of the proposed refactorings. Moreover, we also present a case study, in which AO class models created based on the refactorings are compared with another obtained without the aid of them. The data obtained indicated that the use of the proposed refactorings improved the efficacy and productivity of maintenance groups during the process of software reengineering.

Paulo Afonso Parreira Júnior, Rosângela Dellosso Penteado, Matheus Carvalho Viana, Rafael Serapilha Durelli, Valter Vieira de Camargo, Heitor Augustus Xavier Costa

Re-learning of Business Process Models from Legacy System Using Incremental Process Mining

Several approaches have already been proposed to extract both business processes and business rules from a legacy source code. These approaches usually consider static and dynamic source code analysis for re-learning of these models. However, business processes have components that cannot be directly extracted by static analysis (i.e., process participants and concurrent tasks). Moreover, most of well-known process mining algorithms used in dynamic analysis do not support all required operations of incremental extraction. Re-learning of large legacy systems can benefit from an incremental analysis strategy in order to provide iterative extraction of process models. This paper discusses an approach for business knowledge extraction from legacy systems through incremental process mining. Discovery results can be used in various ways by business analysts and software architects, e.g. documentation of legacy systems or for re-engineering purposes.

André Cristiano Kalsing, Cirano Iochpe, Lucinéia Heloisa Thom, Gleison Samuel do Nascimento

On the ‘Impossibility’ of Critical and Emancipatory Design Science Research

Popper’s [


] ‘piecemeal social change’ is an approach manifesting itself in science as critical and emancipatory (C&E) research. It is concerned with incrementally removing manifested inequalities to achieve a ‘better’ world. Although design science research in information systems seems to be a prime candidate for such endeavors, respective projects are clearly underrepresented. This can be attributed to the demand of justifying research ex post by an evaluation in practical settings. From the perspective of C&E research it is questionable if powerful actors grant access to their organization and support projects which ultimately challenge their position. Within the present inquiry it is argued that the idea of Lewis’s [


] ‘possible worlds’ can be leveraged as basis for C&E design science research. It is suggested that a theoretical approach, based on a synthesis of justificatory knowledge and ‘organizational options’, can complement the practical oriented design science research focus by allowing to design technical systems not only for factually existing contexts, but also for theoretically grounded, more desirable structures.

J. Marcel Heusinger

Software Agents and Internet Computing


Tweeting Politicians: An Analysis of the Usage of a Micro Blogging System

Political communication via social media is getting more and more important. Besides social websites like Facebook and the video platforms like Youtube, microblogging systems have been increasingly used by politicians as communication tools. Since its introduction in 2007, Twitter has become the leading microblogging system. Today it is used by common people and any kind of celebrity whether they are in the show business, in sports or in any other domain. Twitter is also used by politicians to communicate with their voters. Hence, the objective of our paper is to analyze how elected politicians, i. e. members of parliaments, exploit Twitter in three different countries - namely Australia, Germany and the U.S. For our study, we collected data from more than 1,400 politicians of these countries, in particular their almost one million tweets. Our research gives an insight into the usage of Twitter in politics and discloses areas where the usage of Twitter by parliamentarians, differs between Australia, Germany and the U.S.

Matthias Roth, Georg Peters, Jan Seruga

Cloud-Based Collaborative Business Services Provision

The notion of service-enhanced product, representing the association of services to manufactured products, offers an important mechanism for value creation and product differentiation. This is particularly relevant in the case of complex, highly customized and long-life products. Provision of suitable services in this context typically requires collaboration among multiple stakeholders. Furthermore, the involvement of the customer is not limited to service consumption but rather includes contributions to new services design and configuration. In response to these requirements, this paper contributes to the clarification of concepts and definition of a framework for collaborative business services design (co-creation) and delivery. At the base of the framework, a cloud-based collaboration platform supports the establishment and operation of the involved enterprise networks. Application examples are given for the solar energy sector.

Luis M. Camarinha-Matos, Hamideh Afsarmanesh, Ana Inês Oliveira, Filipa Ferrada

An Architecture for Health Information Exchange in Pervasive Healthcare Environment

This paper presents an architecture for health information exchange in pervasive healthcare environments meant to be generally applicable to different applications in the healthcare domain. Our architecture has been designed for message exchange by integrating ubiquitous computing technologies, intelligent agents and healthcare standards, in order to provide interoperability between healthcare systems. We conduct controlled experiments at three cardiology clinics, an analysis laboratory, and the cardiology sector of a hospital located in Marília (São Paulo, Brazil). Three scenarios were developed to evaluate this architecture, and the results showed that the architecture is suitable to facilitate the development of healthcare systems by offering generic and powerful message exchange capabilities. The proposed architecture facilitates health information exchange between various healthcare information systems, contributing in this way to the development of a pervasive healthcare environment that allows healthcare to be available anywhere, anytime and to anyone.

João Luís Cardoso de Moraes, Wanderley Lopes de Souza, Luís Ferreira Pires, Antonio Francisco do Prado

Human-Computer Interaction


Dealing with Usability in Model-Driven Development Method

Usability is crucial for the acceptance of Interactive Systems (IS) by end users. Unusable User Interfaces (UI) are probably the main reason why IS fail in actual use. This can explains the increasing number of Usability Evaluation Method proposed in the literature. However, most of these methods are focused on the final product which greatly reduced the ability to go back and makes major changes. Recently, and due to the increasing interest in Model Driven Engineering (MDE) paradigm, the conceptual models have become the backbone of the IS development process. Therefore, evaluating the usability from the conceptual models would be a significant advantage with regard to saving time and resources. The present chapter proposes an early usability evaluation method that is based on conceptual models. The usability evaluation can be automated taking as input the conceptual models that represent the system abstractly. As an output it provides a usability report which contains the detected usability problems. The usability report is analyzed in order to identify the source of problems and suggest changes in the development process.

Lassaad Ben Ammar, Abdelwaheb Trabelsi, Adel Mahfoudhi

Optimizing the User Interface of a First-Aid App: A “Realistic” Usability Study with the Smartphone Application “Defi Now!”

Millions of applications (apps) for smartphones exist and are gaining popularity since the introduction of smartphones in 2005. But, merely a small number of these applications were developed in support of

first aid

, in particular the use of a


device. Such apps support passers-by witnessing an emergency situation or allow refreshment of basic first-aid knowledge. Moreover, they inform about publicly available

automatic external defibrillators


and allow charting new devices. After a brief survey of various types of first-aid apps, we consider the question to what extent these apps are really helpful in emergency cases. To begin answering this question, we report the result of a usability study with 74 test subjects who used the “Defi Now!” app. In order to simulate “realistic” conditions where the user is agitated—as is the case when rescuing a person—, we induced fear by a psychologically recommended method. We discuss advantages and disadvantages of the app based on data from our questionnaires and the video material we collected. Basically, the app was judged to be very helpful as a first-aid support tool. Nevertheless, observations during the study suggested several software-ergonomic improvements.

Karin Harbusch, Janine Paschke

Self-Service Classroom Capture Generating Interactive Multivideo Objects

The capture of lectures for the generation of associated videos is mainstream in several locations. Alternative approaches include the capture of real lectures or studio-produced ones, the latter designed with the only purpose of generating the associated videos. The amount of control offered to instructors during the capture process varies from system to system. In cases in which the lectures are delivered in classrooms while regular classes take place, the capture may occur according to programmed schedules which are unaware of the presence of the instructor in the classroom, and may start before the instructor is in place and may end before the instructor concludes the lecture – the latter occurring when the instructor passes the scheduled time, a situation which is not uncommon in traditional courses. In cases in which the lectures are delivered in studios, the capture is usually directed by professionals that control start and ending times and orient the instructor to look at specific cameras, for instance. We built a prototype system that offers instructors facilities to control the starting and ending times of multiple segments so that the overall exposition is transformed into a corresponding interactive multivideo object, exploiting the multimodal and multi-device nature of the presentation. After a brief overview of our prototype, in this paper we present the document-based workflow which underlies the processes of capture, generation and presentation that offer instructors a self-service alternative to control the generation of a multimedia object composed of synchronized videos, audio, images and context information associated to the lecture. We illustrate the utility of the approach by summarizing data relative to the use of our prototype by a group of instructors.

Caio César Viel, Erick Lazaro Melo, Maria da Graça C. Pimentel, Cesar A. C. Teixeira

Enterprise Architecture


Analysing the M&A Preparedness Building Approach

One of the complex and dynamic changes on the organisation level is Mergers and Acquisitions (M&As). M&As have been practiced since several decades for growth and expansion purposes. Recent developments in the frequency of M&As has drawn attention from researchers resulting in findings that more than half of the deals fails to achieve the aimed synergies. Solution to this problem could be to build preparedness to allow organisations to prepare for future or announced mergers in a way that enable faster pre-merger planning and smoother post-merger integration (PMI). In this article we will analyse M&A Preparedness building using a retrospective case study to (a) demonstrate that the success of such strategic changes depends on several essential and largely overlooked factors, and (b) outline a possible approach of building preparedness for M&As.

Nilesh Vaniya, Peter Bernus, Ovidiu Noran

From Gaps to Transformation Paths in Enterprise Architecture Planning

Planning changes in an enterprise and its supporting IT can be supported by enterprise architecture (EA) models. The planned changes result in gaps which can be derived by a gap analysis. But, knowing the gaps is not enough. Also important is to know in which sequence gaps are to be closed for transformation path planning. In this paper we show how gaps are identified and reused for detailing a model of the target architecture. Based on this refinement further gaps become visible. Furthermore, we describe how it is possible to create with a transformation model and an action repository transformation paths towards a desired and detailed target architecture. Afterwards, we give a use case example and propose a technical realization of the solution.

Philipp Diefenthaler, Bernhard Bauer

An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis

Traditional methods of scenario-based software architecture evaluation rely on manual review and advanced skills from architects and developers. They are used when the system architecture has been specified, but before its implementation has begun. When the system implementation evolves, code analysis can enable the automation of this process and the reuse of architectural information. We propose an approach that introduces metadata about use case scenarios and quality attributes in the source code of the system in order to support automated architectural evaluation through of static and dynamic code analysis and produce reports about scenarios, quality attributes, code assets, and potential tradeoff points among quality attributes. Our work also describes the implementation of a code analysis tool that provides support to the approach. In addition, the paper also presents the preliminary results of its application for the architectural analysis of an enterprise web system and an e-commerce web system.

Felipe Pinto, Uirá Kulesza, Eduardo Guerra

Joining Data and Maps in the Government Enterprise Architecture by a Semantic Approach: Methodology, Ontology and Case Study

The problem of managing data and maps within an ontological approach is little studied in the Government Enterprise Architecture. Aim of this paper is to present a methodology to solve this problem in case we would join municipal and cadastral data bases. In particular, we aim at linking the information contained in the local taxation registry to the urban territory to allow the Public Administration managers to check if the taxes have been paid, and the citizens to compute the correct amount to pay. The paper presents in detail the adopted ontology and the technological architecture, whereas a case study clarifies how the methodology works in practice. We plan to extend this methodology to manage e-gov services needing to interconnect data stores of city interest to vector layers derived from the Cadastre or other CAD systems.

Daniela Giordano, Alfredo Torre, Carmelo Samperi, Salvatore Alessi, Alberto Faro

Blueprint of a Semantic Business Process-Aware Enterprise Information Architecture: The EIAOnt Ontology

A robust design of enterprise information resources and their optimal usage can significantly enhance the information management (IM) capability of an enterprise. Enterprise Information Architecture (EIA) is a critical success factor for this objective and needs to be business process-aware in order to add value to the firm’s IM capability and to obtain dynamic views of information through extended knowledge of business processes. We present the generic Enterprise Information Architecture Ontology (EIAOnt) that lays the foundation for the EIA design activity to use additional business information by incorporating the business process knowledge. We also present an approach that semantically derives EIA from Enterprise business process architecture (BPA) using Riva BPA methodology. A semantic representation of EIA through EIAOnt Ontology suggests a step forward to bridge the gap between business process architecture and enterprise information architecture.

Mahmood Ahmad, Mohammed Odeh


Weitere Informationen

Premium Partner