SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Zdravkovic Jelena) srt2:(2020-2024)"

Search: WFRF:(Zdravkovic Jelena) > (2020-2024)

  • Result 1-10 of 41
Sort/group result
   
EnumerationReferenceCoverFind
1.
  •  
2.
  • Berger-Reinhartz, Iris, et al. (author)
  • Guest editorial for EMMSAD’2019 special section
  • 2021
  • In: Software and Systems Modeling. - : Springer Nature. - 1619-1366 .- 1619-1374. ; 20, s. 25-26
  • Journal article (other academic/artistic)abstract
    • The EMMSAD (Exploring Modeling Methods for Systems Analysis and Development) conference series organized 24 events from 1996 to 2019, associated with CAiSE (Conference on Advanced Information Systems Engineering). From 2009, EMMSAD has become a two-days working conference. From 2017, EMMSAD best papers are invited to submit extended versions for considering their publication in the Journal of Software and Systems Modeling (SoSyM). The main topics of the EMMSAD series have the focus on models and modeling methods for software and information systems development, requirements engineering, enterprise modeling and architecture, and business process management. The conference further addresses evaluation of modeling methods through a variety of empirical and nonempirical approaches.
  •  
3.
  • Bork, Dominik, et al. (author)
  • Enterprise Modeling for Machine Learning : Case-Based Analysis and Initial Framework Proposal
  • 2023
  • In: Research Challenges in Information Science: Information Science and the Connected World. - : Springer. - 9783031330797 - 9783031330803 ; , s. 518-525
  • Conference paper (peer-reviewed)abstract
    • Artificial Intelligence (AI) continuously paves its way into even the most traditional business domains. This particularly applies to data-driven AI, like machine learning (ML). Several data-driven approaches like CRISP-DM and KKD exist that help develop and engineer new ML-enhanced solutions. A new breed of approaches, often called canvas-driven or visual ideation approaches, extend the scope by a perspective on the business value an ML-enhanced solution shall enable. In this paper, we reflect on two recent ML projects. We show that the data-driven and canvas-driven approaches cover only some necessary information for developing and operating ML-enhanced solutions. Consequently, we propose to put ML into an enterprise context for which we sketch a first framework and spark the role enterprise modeling can play.
  •  
4.
  • Chan, Anouck, et al. (author)
  • Towards a New Method for Designing Manufacturing Capabilities
  • 2024
  • In: Digital Business and Intelligent Systems. - : Springer Nature. - 9783031635427 - 9783031635434 ; , s. 34-49
  • Conference paper (peer-reviewed)abstract
    • Many industries are experiencing the challenges and opportunities associated with the rapid pace of technological change. In manufacturing, the adoption of new materials and manufacturing processes is a common concern, for example, the use of new composite materials offer significant advantages in terms of energy efficiency and performance. However, their use poses challenges in terms of manufacturing and assembly. On the side of technological advances, the exploration of digitalisation, automation and robotics to improve efficiency is a strong trend. However, implementing these technologies requires investment and significant changes to existing assembly processes. To meet these challenges, fostering collaboration between design and manufacturing, as well as between manufacturer and its suppliers is often seen as the key solution for various industries. In this work, we present how capability modelling can help both parties to describe their demands and offers with respect to needed and provided quality properties such as set-up times or ecological footprint. These serve as input for a digital business ecosystem in which the pareto-optimal factory design can be chosen supported by a digital platform integrating the manufacturer and its suppliers.
  •  
5.
  •  
6.
  •  
7.
  •  
8.
  • Franch, Xavier, et al. (author)
  • Data-Driven Agile Requirements Elicitation through the Lenses of Situational Method Engineering
  • 2021
  • In: 2021 IEEE 29th International Requirements Engineering Conference (RE). - : IEEE. - 9781665428569 ; , s. 402-407
  • Conference paper (peer-reviewed)abstract
    • Ubiquitous digitalization has led to the continuous generation of large amounts of digital data, both in organizations and in society at large. In the requirements engineering community, there has been a growing interest in considering digital data as new sources for requirements elicitation, in addition to stake-holders. The volume, dynamics, and variety of data makes iterative requirements elicitation increasingly continuous, but also unstructured and complex, which current agile methods are unable to consider and manage in a systematic and efficient manner. There is also the need to support software evolution by enabling a synergy of stakeholder-driven requirements elicitation and management with data-driven approaches. In this study, we propose extension of agile requirements elicitation by applying situational method engineering. The research is grounded on two studies in the business domains of video games and online banking.
  •  
9.
  • Georgiadis, Stylianos, et al. (author)
  • An approach for eliciting requirements from digital sources in organisations using the Scrum method
  • 2024
  • In: Companion Proceedings of the 16th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling and the 13th Enterprise Design and Engineering Working Conference, November 28 – December 1, 2023, Vienna, Austria.
  • Conference paper (peer-reviewed)abstract
    • The business world is nowadays characterized by complexity due to rapidly evolving market and customer requirements. As a consequence, software providers are facing the challenge of delivering products with higher pace and innovation. The agile methodology has a big impact on how software systems are developed - it should facilitate business value in short iterations. Requirements are the base of all software systems, and consequently, Requirements Engineering (RE) plays one of the most important roles in system development. Traditional elicitation techniques relying on stakeholders’ requests do not cover the increasing demands for considering unintended data from organisations' related digital sources, internal (transaction logs, sensors) or external (e.g., microblogs), amplifying thus the need for the elicitation of data-driven requirements. This study proposes a process that combines data-driven and traditional RE approaches for Agile software development, and specifically for the Scrum method. The process intends to assist Agile professionals to elicit requirements from digital sources in combination with intended data derived from the stakeholders without impacting the main Agile practices. The motivation for the research origins from the case studies carried in few companies having the challenge to include data-driven requirements into their Agile approaches. The usage of the proposal is illustrated on an enterprise software case, while several Scrum professionals were interviewed to evaluate its correctness and importance.
  •  
10.
  • Grabis, Jānis, et al. (author)
  • A Capability Based Method for Development of Resilient Digital Services
  • 2021
  • In: Enterprise Information Systems. - Cham : Springer. - 9783030754174 - 9783030754181 ; , s. 498-516
  • Conference paper (peer-reviewed)abstract
    • Capability Driven Development (CDD) is a capability-based method for developing context-aware and adaptive systems. This paper proposes to extend CDD to address security and resilience concerns in organizational networks. A method extension defining modeling concepts and development procedure is elaborated. It includes development of a data-driven digital twin, which represents the security and resilience concerns of the network and is used to diagnose security incidents and to formulate a resilient response to these incidents. Application of the proposed method extension is illustrated using examples of secure computer network governance and secure supplier onboarding.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 41
Type of publication
conference paper (20)
journal article (9)
editorial collection (3)
editorial proceedings (3)
doctoral thesis (3)
research review (1)
show more...
book chapter (1)
licentiate thesis (1)
show less...
Type of content
peer-reviewed (30)
other academic/artistic (11)
Author/Editor
Zdravkovic, Jelena (31)
Tsai, Chen Hsi (11)
Stirna, Janis, 1969- (8)
Stirna, Janis (6)
Zdravkovic, Jelena, ... (6)
Henriksson, Aron (4)
show more...
Grabis, Janis (4)
Reinhartz-Berger, Ir ... (3)
Dalpiaz, Fabiano (2)
Serral, Estefania (2)
Papapetrou, Panagiot ... (2)
Ralyté, Jolita (2)
Fors, Uno, Professor (2)
Koutsopoulos, Georgi ... (2)
Nurcan, Selmin (2)
Gill, Asif (2)
Hacks, Simon, 1988- (1)
Sandkuhl, Kurt (1)
Horkoff, Jennifer, 1 ... (1)
Franch, Xavier (1)
Mouratidis, Haralamb ... (1)
Horkhoff, Jennifer (1)
Fors, Uno, 1956- (1)
Sandkuhl, Kurt, 1963 ... (1)
Ilayperuma, Tharaka (1)
Öberg, Johanna (1)
Magnusson, Jonathan (1)
Berger-Reinhartz, Ir ... (1)
Kampars, Janis (1)
Bork, Dominik (1)
Schmidt, Rainer (1)
Chan, Anouck (1)
Polacsek, Thomas (1)
Favi, Claudio (1)
Almeida, João Paolo ... (1)
Borbinha, José (1)
Guizzardi, Giancarlo (1)
Link, Sebastian (1)
Martinez, Alejandro (1)
Soffer, Pnina (1)
Augusto, Adriano (1)
Georgiadis, Styliano ... (1)
Grabis, Jänis (1)
Xiong, Wenjun (1)
Hellmanzik, Ben (1)
Stirna, Janis, Profe ... (1)
Kjellvard, Niklas (1)
Kreuzer, Tim, 1999- (1)
Lim, Sachiko (1)
Melin, Marcus (1)
show less...
University
Stockholm University (38)
University of Gothenburg (1)
Royal Institute of Technology (1)
Jönköping University (1)
Chalmers University of Technology (1)
Language
English (39)
Swedish (2)
Research subject (UKÄ/SCB)
Natural sciences (38)
Social Sciences (4)
Engineering and Technology (1)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view