D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
D.3.3 ALGORITHMS FOR INCREMENTAL ... - SecureChange
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Dealing with Known Unknowns: A Goal-based Approach 25<br />
measure the level of usefulness of design alternatives. This provides a quantitative<br />
analysis that supports decision makers in deciding which is the optimal configuration<br />
for their enterprise.<br />
To exemplify our approach, we discussed a case study in ATM domain. This<br />
case study is about deploying AMAN to the working position of ATCOs, and its<br />
applicability aspects have been subject to a number of sessions with ATM experts.<br />
From that case study, we have drawn several examples to explain our idea, and<br />
also to show the promising applicability of our approach.<br />
Our future work is geared towards providing an interaction protocol with stakeholders<br />
that allow a simple elicitation and validation of the probability estimates.<br />
A promising avenue seems to use the Analytic Hierarchy Process (AHP) method<br />
for a first cut description and then use our game semantics to validate and refine<br />
them.<br />
References<br />
1. C. Anderson. The long tail. Wired, October 2004.<br />
2. A. I. Antón and C. Potts. Functional paleontology: The evolution of user-visible system<br />
services. IEEE Transactions on Software Engineering, 29(2):151–166, 2003.<br />
3. S. Ba, A. B. Whinston, and K. R. Lang. An enterprise modeling approach to organizational<br />
decision support. In Proceedings of the twenty-eighth annual Hawaii International<br />
Conference on System Sciences, pages 312–320, 1995.<br />
4. J. Barrios and S. Nurcan. Model driven architectures for enterprise information systems.<br />
In Proceedings of the 16th Conference On Advanced Information Systems Engineering,<br />
pages 3–19, 2004.<br />
5. P. Bernus. GERAM: Generalised enterprise reference architecture and methodology.<br />
version 1.6.3, March 1999.<br />
6. D. Boyd. A new management technique. Enterprise models: Industrial Management<br />
Review, 8(1), 1966.<br />
7. CIMOSA. Computer integrated manufacturing open system architecture: A primer on<br />
key concepts, purpose and business value. Online primer, Accessed April 2009.<br />
8. N. P. Dalal, W. J. Kolarik, and E. Sivaraman. Toward an integrated framework for<br />
modeling enterprise processes. Commun. ACM, 47(3):83–87, March 2004.<br />
9. G. Dougmeingts, Y. Ducq, B. Vallespir, and S. Kleinhans. Production management and<br />
enterprise modelling. Comput. Ind., 42:245–263, July 2000.<br />
10. A. Elberse. Should you invest in the long tail? Harvard Business Review, 2008.<br />
11. J. L. Fiadeiro. On the challenge of engineering socio-technical systems. In Software-<br />
Intensive Systems and New Computing Paradigms, volume 5380 of Lecture Notes in<br />
Computer Science, pages 80–91. Springer-Verlag, 2008.<br />
12. J. Hassine, J. Rilling, J. Hewitt, and R. Dssouli. Change impact analysis for requirement<br />
evolution using use case maps. In IWPSE ’05, 2005.<br />
13. M. Kassem, N. N. Dawood, and D. Mitchell. A structured methodology for enterprise<br />
modeling: a case study for modeling the operation of a british organization. Journal of<br />
Information Technology in Construction, 16:381–410, 2011.<br />
14. C. F. Kemerer and S. Slaughter. An empirical approach to studying software evolution.<br />
IEEE Transactions on Software Engineering, 25(4):493–509, 1999.<br />
15. W. Lam and M. Loomes. Requirements evolution in the midst of environmental change:<br />
a managed approach. In CSMR ’98, 1998.