Publications
List of Publications
Business Informatics Group, TU Wien
Keywords: Modellversionierung, kollaborative Modellierung, Konflikttoleranz, Modell-getriebene Softwareentwicklung
Astract: Model-driven software engineering (MDSE), which has recently gained momentum in academia as well as in industry, changed the way in which modern software systems are built. In MDSE, the task of programming, i.e., writing code in a textual programming language, is replaced by modeling in a language such as the Unified Modeling Language (UML). The powerful abstraction mechanisms of models are not only used for documentation purposes, but also for compiling executable code directly out of models. With the rise of MDSE, several problems solved for traditional software engineering became urgent again because well established solutions are not directly transferable from code to models.
Among others, the collaborative development of models is currently only limited supported by modeling tools and, consequently, it is mostly a one-(wo)man show. Especially in the field of model versioning, which supports the asynchronous modification of modeling artifacts by multiple developers, only first solutions start to emerge.
The urgent need for a suitable infrastructure supporting effective model versioning has been widely recognized by researchers as well as practitioners. Currently, however, there is a lack of empirical studies on the needs of software developers in practice concerning the collaborative development of software systems. The first contribution of this thesis tackles this problem and provides an extensive survey about versioning in practice by the means of an online questionnaire and qualitative expert interviews. One result of the empirical study shows that conflicts due to parallel modifications are considered harmful and, thus, developers try to avoid them. Conflicts, however, should not be seen as negative result of collaboration but as chance for discussing ideas and for improving the system under development. As consequence, the second contribution is a conflict-tolerant model versioning approach, where the developers may commit their changes in the central repository without worrying about possible conflicts. This approach merges two or more parallel versions by applying dedicated merge rules and, by this, it incorporates all modifications of the developers. This builds a good basis for discussing and resolving conflicts collaboratively. Finally, when resolving conflicts a high degree of user interaction is required. When setting models under version control with state-of-the art tools, however, conflicts are hardly accessible for the users. Also the empirical study has shown, that current version control systems lack for a dedicated representation and visualization.
Moreover, user support is required to better understand the reasons behind the conflicting changes. The third contribution tackles these deficiencies by visualizing occurred conflicts in terms of model annotations and enriching them automatically with additional meta information to better understand the parallel evolution of the model under development. The implemented prototype is evaluated by means of a quasi-experimental study, which demonstrates the advantages of developing models in a collaborative manner.
Wieland, K. (2011). Conflict-tolerant model versioning [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-57048
User-oriented rule management for complex event processing applications
Hannes ObwegerStefan BifflChristian HuemerKeywords: Complex Event Processing, Event-Based Systems, Event-Pattern Rules, Reactive Rules, Rule Management, State Management, Pattern Modeling
Astract: Complex Event Processing (CEP) using event-pattern rules has emerged a new paradigm for automated, event-driven decision making. Yet, despite the vast potential CEP offers for agile business applications, its practical relevance rises and falls with the manageability within the organizational framework conditions of an enterprise.
In this thesis, we present a novel rule management framework for event-based systems. It caters to the needs of IT experts as well as technically less experienced domain experts through complementary, yet clearly decoupled workflows. IT experts model event-pattern rules in a single, comprehensive model, in parallel and fully integrated with the other elements of an event-processing application. The rule-management workflow for business users, by contrast, builds upon a sophisticated system of configurable building blocks of pattern-detection and reaction logic. Prepared by technically versed domain experts according to the general requirements of an application scenario, these building blocks can be assembled to concrete event-pattern rules by business users in a way that entirely abstracts from underlying complexity.
Other contributions of our work are novel approaches to entity-based state management and hierarchical pattern modeling. Entity-based state management enables the rule-based monitoring of complex, durable entities such as counters, queues, or customer accounts. Hierarchical pattern modeling enables users to compose complex event patterns from smaller, easier-to-understand sub-patterns. Both approaches naturally complement the proposed rule-management framework.
The presented concepts are thoroughly evaluated for technical feasibility, applicability, and utility in practical business scenarios.
Technical feasibility is demonstrated through their successful implementation as part of the event-processing framework Sense-and-Respond Infrastructure (SARI). Applicability and utility are demonstrated by means of a real-world event-processing application for event-based service assurance and a case study conducted at a leading manufacturer for agricultural machinery.
Obweger, H. (2011). User-oriented rule management for complex event processing applications [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-54547
Elektronische Verfahrenskommunikation in der öffentlichen Verwaltung : relevante Verfahren, Zustellungsproblematik und Anreize zur Beteiligung
Johann HöchtlA Min TjoaChristian HuemerKeywords:
Astract: E-Government als Methodensammlung unterschiedlicher wissenschaftlicher Disziplinen unterliegt einem ständigen Wandel.
Während in der Frühphase E-Government vorwiegend als Instrument zur Effizienzsteigerung der Verwaltung durch elektronische Verfahrenskommunikation aufgefasst wurde, hat sich diese Sichtweise in den letzten Jahren grundlegend gewandelt. Ursprünglich als Top-Down-Strategie der Verwaltung konzipiert, sollen und wollen sich die BürgerInnen in staatliche Diskussions- und Entscheidungsprozesse einbringen. Zunehmend werden diese Initiativen von der Zivilgesellschaft ergriffen. Die Ermächtigung der Zivilgesellschaft durch soziale Netzwerke als Instrument zur Selbstorganisation setzt zunehmend die Politik und Verwaltung unter Druck, diese Instrumente ebenfalls als Bestandteil einer E-Government Strategie einzusetzen. Die von der EU gewünschte Beteiligung hat aber noch nicht in dem Maß eingesetzt wie erhofft. Die BürgerInnen vertrauen den staatlichen Organisationen nicht ausreichend bzw. sehen ihre Stimme als zu schwach gegenüber lobbyierenden Kräften. Transparente Methoden und die Offenlegung von Daten und Informationen soll das notwendige Vertrauen für einen Diskurs auf Augenhöhe schaffen. Die Notwendigkeit föderaler und supernationaler Zusammenarbeit stellt die Grenze technisch möglicher Konventionen als Grundlage der Interoperabilität dar. Semantische Methoden sind notwendig, um die Fülle an Daten und Informationen automatisiert verarbeiten zu können.
Im ersten Teil der Dissertation werden die Ergebnisse einer Befragung der österreichischen Gemeinden zum Status der Umsetzung der österreichischen E-Government Strategie dargestellt und interpretiert.
Ein wesentliches Ziel der Befragung war die Erhebung häufig wiederkehrender Verfahren der Gemeinden mit Bund und Land. Daraus lässt sich ein Potential zur elektronischen Verfahrenskommunikation ableiten.
Der zweite Teil der Arbeit beschäftigt sich mit der behördlichen, elektronischen Zustellung. Rechnerisch verspricht die elektronische Zustellung von behördlichen Schriftstücken großes Einsparungspotential durch Wegfall der Zustellungsgebühr. Organisatorisch schließt ist die elektronische Zustellung die Lücke zur medienbruchfreien Abwicklung von Anbringung über Bearbeitung bis zu Ausfertigung. Dazu bedarf es eines speziellen Leitfadens für kleinere Organisationseinheiten, die dieses Thema aus der technisch-organisatorischen Perspektive betrachten.
Den Abschluss der Arbeit bildet das Thema Open Government - die Öffnung der Staatsverwaltung zur Nutzung des kreativen Potentials der BürgerInnen für bessere Services. Beteiligung wird nur stattfinden, wenn das notwendige Vertrauen gegeben ist. Offene Verwaltungsdaten verbunden mit der Möglichkeit darauf aufbauend eigene Dienste zu erstellen sollen dazu beitragen dieses Vertrauen zu schaffen. Auf semantischen Methoden beruhende Komponenten für ein Open Data Architekturmodell zur Realisierung einer staatlichen, föderalen, Open Data Strategie schließt die Betrachtungen.
Höchtl, J. (2011). Elektronische Verfahrenskommunikation in der öffentlichen Verwaltung : relevante Verfahren, Zustellungsproblematik und Anreize zur Beteiligung [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-51144
Keywords: Model Transformation, Debugging, Testing
Astract: Modellgetriebene Softwareentwicklung rückt Modelle ins Zentrum des Softwareentwicklungsprozesses. Dadurch nehmen Modelle die Rolle von Objekten in der objektorientierten Softwareentwicklung ein. Durch diese zentrale Rolle entsteht die Notwendigkeit Transformationen zwischen Modellen durchzuführen. Analog zur traditionellen Softwareentwicklung sollen Modelltransformationen auf fundierte Sprachen undWerkzeuge zurück greifen können. Aktuelle Transformationssprachen fokussieren allerdings nur auf die Implementierungsphase und berücksichtigen weitere Phasen wie Analyse, Design, Testen und Fehlersuche nur unzureichend. Für die Analyse- und Designphase werden Mittel benötigt, die es dem Transformationsentwickler erlauben, die Anforderungen formal zu spezifizieren und diese dann in der Testphase gegen die implementierte Transformation zu validieren. Für den Fall, dass Anforderungen nicht erfüllt sind, werden Werkzeuge und Mechanismen zur Fehlersuche benötigt.
Aktuell verwendete Transformationssprachen bieten hierbei aber nur unzureichende Unterstützung, da sie nur Informationen bereit stellen, die von den jeweiligen Laufzeitumgebungen zur Verfügung gestellt werden. Da diese typischerweise in einer Programmiersprache wie z.B. Java entwickelt sind, bestehen solche Informationen meist nur aus Werten von Variablenbelegungen. Des Weiteren verstecken die auf niedrigem Abstraktionsniveau arbeitenden Laufzeitumgebungen die Ausführungssemantik der Transformation, was die Fehlersuche zusätzlich erschwert.
Um diese Einschränkungen aufzuheben, werden im Rahmen der Arbeit drei Hauptbeiträge erarbeitet. Als erster Beitrag wird die deklarative Sprache PAMOMO vorgestellt, die eine Spezifikation von Transformations-Kontrakten ermöglicht. Um zu testen, ob Transformationen die Kontrakte erfüllen, wird QVT Relations verwendet, um im Fehlerfall Information zu erhalten, die im weiterem für die Fehlersuche verwendet werden kann. Transformationsnetze stellen als zweiten Hauptbeitrag ein explizites Laufzeitmodell für Transformationen zur Verfügung und legen dadurch deren operationale Semantik offen.
Dieses Laufzeitmodell bildet damit die Grundlage für Methoden zur Unterstützung bei der Fehlersuche.
Zur Evaluierung der Arbeit werden Vergleiche zu bestehenden Arbeiten gezogen. Mittels Fallbeispielen wird die Anwendbarkeit der vorgestellten Konzepte gezeigt. Um die Laufzeitumgebung zu evaluieren, wird die Ausführungssemantik existierender Transformationssprachen auf Transformationsnetze abgebildet. Dadurch können auch diese Sprachen von den vorgeschlagenen Methoden zur Fehlersuche profitieren, was wiederum mittels Fallbeispielen gezeigt wird.
Schönböck, J. (2011). Testing and debugging of model transformations [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-55833
Keywords: Social networks, Reverse Engineering, Data schema, Facebook, Analyse, Twitter, LinkedIn, GooglePlus, Google+, JSON
Astract: Social networks on the Web have seen enormous growth over the past few years, leading to a truly widespread adoption. Every social network is focused on serving specific human needs. Most networkers are present in a number of different networks, which leads to scattered social content. The development of such Web-based platforms is in an early stadium, which result in short feature release cycles. The evolving data schemas and the different ways to access social data are resulting in tedious and error-prone development and maintenance processes of social applications.
In this master thesis, evolution, main characteristics and features of social networks are surveyed. Four platforms, namely Facebook, LinkedIn, Twitter and GooglePlus, are examined. Class diagrams of the data schemas, based on the official documentation, give an overview of these platforms. Each social network has its individualities of accessing the data. A widespread data authorization system is oAuth, available in two versions, which are explained in this master thesis and implemented in a social adaptor for a project called TheHiddenU, to enable an easy access to the social data. To realize this access, the information about the data schema is needed. Because of the incomplete documentation of the API, in this thesis a tool called Json2Ontology is developed for an automatic reverse engineering of the data schema offered by the social networks.
In the first step the tool uses the currently implemented REST Web services. The response of the Web service is transformed into sentences of a domain specific language of TheHiddenU (THUDSL), which represent social user profiles and enable the generation of Java classes for data access. Starting at one or more request URLs, the Json2Ontology tool analyze the Json response and search for navigation possibilities, which are represented as relationships. The goal is to extract as much information about the data structure as possible. The Json2Ontology tool has been evaluated by comparing the information of the created class diagrams with the generated data schema. The result depends on the authorized user and the amount of personal data. In case of Facebook, a real world test user has been used to find the data produced by real social interactions. The Json2Ontology tool found 79% of the classes and 80% of the attributes. Even more important are the the newly found classes (namely 7) and attributes (namely 162).
Different settings have been evaluated to find a well balanced configuration for the tool.
Munk, A. (2011). Model-based reverse engineering of social networks [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-60570
User-guided information extraction from print-oriented documents
Tamir HassanGerti KappelGeorg GottlobKeywords: wrapping, PDF, information extraction, print-oriented, document analysis, document understanding, graph matching
Astract: In recent years, a number of systems have been developed in the academic and commercial domain for wrapping, or user-guided information extraction, from Web sources. An important feature of Web documents is their inherent tree structure, which is used by wrapping systems such as the Lixto Visual Wrapper to locate instances of the data to be extracted. Because this tree structure somewhat represents the logical structure of the content, such wrapping methods work successfully.
This dissertation is concerned with extending these wrapping techniques to PDF documents. This is a challenging task, as the logical structure of a PDF is (usually) not explicitly available in the file. The use of document analysis and document understanding techniques to rediscover this structure from the layout conventions that are used in the document's presentation is therefore a central theme of this thesis.
We present two approaches to wrapping PDF documents: the conversion approach and the graph-based approach. The conversion approach is based on an automated, structured conversion of PDF documents into HTML, which are then used as input to the Lixto Visual Wrapper to extract the desired information. In this approach, we place particular emphasis on detecting tables and representing them in a structured manner in HTML.
The graph-based approach represents a novel method for specifying wrapping programs directly on the physical structure of the document.
Using an algorithm based on subgraph isomorphism, other instances of the data are found. As this approach is not reliant on the complete and accurate detection of structures in the document, it is more robust and enables a much wider range of documents to be wrapped. Because the physical structure is more intuitive for the user, this approach also enables wrapper programs to be created in a user friendly, interactive way.
Hassan, T. (2010). User-guided information extraction from print-oriented documents [Dissertation, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-31713
BSopt choreographies : transforming global choreographies into workflow deployment artifacts
Mario TopfMarco ZapletalChristian HuemerKeywords:
Astract: This thesis covers the transformation of interorganizational business processes in the area of business-to-business (B2B) electronic commerce. It builds upon the approach devised as part of the Business Semantics on top of Process Technology (BSOPT) project. BSopt aims to integrate management-, administration- and IT perspectives in B2B collaborations as inspired by the Open-edi reference model into one consistent tool environment. The resulting BSopt Designer tool was extended by the use of visual domain specific languages (DSLs) encompassing the concepts given in Open-edi. Additionally, C# developed transformation wizards were created to support a semi-automatic mapping from business models to business process models and, finally, to technologically dependent executable deployment artifacts. The thesis describes the contributions to the BSopt approach starting with the transformation of business process descriptions as seen by a neutral observer into a participant-view dependent design. It continues to show, how these so called ``local choreographies'' are transformed further into concrete Microsoft Windows Workflow Foundation (WF) 4.0 based workflow artifacts ready for integration into the service oriented architecture (SOA) of IT environments. In doing so we also accommodate adapted business document specifications into the transformation process. These specifications are used in business processes to define which messages are sent or received at any point in time during a B2B collaboration. The last contribution to the BSopt approach comes in the form of an example business application. It supports the one-click hosting of generated workflow artifacts and acts as a tool to test the validity and correct functionality of the generated workflows. An accompanying example scenario involving both buyer and seller in a typical ordering process is introduced early in the thesis. It acts as an ongoing demonstration of the different views on business processes and finally illustrates, how the decisions of the involved parties influence the outcome of the business process in the example business application.
Topf, M. (2010). BSopt choreographies : transforming global choreographies into workflow deployment artifacts [Diploma Thesis, Technische Universität Wien]. reposiTUm. https://resolver.obvsg.at/urn:nbn:at:at-ubtuw:1-44713
Keywords: Model transformation, CPN, Verification
Astract: Model-Driven Engineering (MDE) places models in the center of the software lifecycle. Model transformations play a vital role in this context whereas several model transformation languages and types of model transformations are available. This diploma theseis only addressed the issue of the model-to-model transformation (M2M). All this languages or approaches have the problem that they are not easy to understand respectively irreproducible. This makes them hard to debug and to analyse. This problem excites from the execution of the transformation in the form of a black-box which hides the operational sematic.
Therefore there are only marginal informations about the transformation process. A comprehensive analysis is important because errors in model transformations can appear on various points for instance on the source and target metamodel, source and target model and on the transformation logic. All this has a direct consequence to the correctness of the transformation and all following steps in the software lifecycle. The main problem of the MDE is currently the so far only unsatisfying answered question of analysing model transformations.
This diploma thesis pickes up the described problems in the analysis of model transformations and tries on the basis of transformation nets to go into detail of the veri cation. The transformation net formalism is based on coloured petri nets which offer a set of analysis methods. This thesis explores if the mentioned analysis methodes can be applied after the reduction of transformation nets to coloured petri nets and in which kind transformation net speci fics have an impact on this process. Beyond that this thesis investigates the support of widespread and already in industrial environment used tools for coloured petri nets. As a final step the already existing "Transformations On Petri Nets In Color" prototype for transformation nets gets extended to support analytical properties for model transformations.
Pessenlehner, M. (2010). Modelltransformationsanalyse basierend auf Petri Netzen [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/159770
Requirements management for B2B processes: a worksheet driven approach from e3-Value and REA to UMM
Rainer SchusterChristian HuemerHannes WerthnerKeywords: Business Modeling, Business Process Modeling, Requirements Engineering, e3-Value, REA, B2B, UMM, electronic commerce
Astract: Inter-organizational B2B systems are most likely tending to change their business requirements over time - e.g., establishing new partnerships or change existing ones. The problem is, that business analysts disregard the economic drivers when they start to design the business processes from scratch. Those economic drivers are captured by business models representing the business value perspective. In order to quickly adapt the B2B processes on the business process perspective to changing business requirements without the need to change the overall architecture, a link between business models and business process models is needed. Traditional requirements engineering approaches do not incorporate such methods. Thus, we propose a comprehensive approach that is tailored for gathering the requirements without disregarding such aspects. We incorporate three well established methods in the field of B2B modeling - e3-Value, REA (Resource-Event-Agent), and UMM (UN/CEFACT's Modeling Methodology). The first two methods are business modeling ontologies that are used for ensuring the basic economic principle within a partner network, which is called economic reciprocity. The latter method is used for modeling the global choreography of inter-organizational business processes. The scientific challenge of this thesis is the integration of traditional requirements engineering techniques into our approach and the combination of the three methods by specifying conceptual mappings as well as a formalized model transformation approach. Finally, we introduce a worksheet driven approach to support the business analyst during the requirements elicitation by the use of pre-defined forms and a prototypical tool implementation. As a proof-of-concept we use a real life business scenario out of the print media domain.
Schuster, R. (2010). Requirements management for B2B processes: a worksheet driven approach from e3-Value and REA to UMM [Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/160235
SOMA, a service-oriented mobile learning architecture
Fabian KromerAndreas KuntnerPhilipp LieglChristian HuemerKeywords: e-learning, teaching, mobile learning
Astract: Service-Oriented Mobile learning Architecture (SOMA) is a project focusing on interactive learning using mobile devices, with the main focus on devices running the Google Android operating system. While state-of-the-art solutions mainly cover text-based, multiple choice interrogator-responder concepts, our approach is characterized by interactivity, allowing multimedia-based e-learning concepts. Providing access to different hardware features enables a variety of novel input methods. Examples include obtaining user input through hardware accelerometers or cameras. In order to provide these advanced features we implemented the SOMA framework as part of this work, which acts as wrapper between the e-learning application and the underlying hardware components. Additional features can be developed using the SOMA plugin environment, which enables almost unlimited extension of the main application. Besides that, developers are encouraged to use any functionality provided by the SOMA framework. We use a custom implementation of Java Reflection for the plugin environment to guarantee extendibility.
We will capture all user input needed for detection of learning styles, while the implementation of automatic recognition of learning styles is part of future work. Another important aspect is the integration of the e-learning process into social networks. The system allows users to publish their results online and invite friends to take the same course.
We assume this will improve learning motivation significantly. Users can compete and incite each other to enhance their learning progress.
Besides the SOMA framework itself, several sample plugins have been developed as part of this work. For evaluating our solution, we provide a sample course that uses these basic plugins. This sample course that covers basic first aid content has been created in cooperation with the Youth Red Cross Klosterneuburg.
Future work includes the automatic recognition of learning styles, as mentioned before, as well as the implementation of a graphical user interface for editing content used with the SOMA application.
Kromer, F., & Kuntner, A. (2010). SOMA, a service-oriented mobile learning architecture [Diploma Thesis, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/160306