Privacy regulations for data can be regarded as a major driver for data sovereignty measures. A specific example for this is the case of event data that is recorded by …
Process mining uses event data recorded by information systems to reveal the actual execution of business processes in organizations. By doing this, event logs can expose …
While the engineering of digital twins (DTs) of cyber-physical systems already faces a number of challenges, DTs of socio-technical systems are made even more complex by …
Engineering software and software intensive systems has become increasingly complex over the last decades. In the ongoing digitalization of all aspects of our lives in almost every …
Event log files are used as input to any process mining algorithm. A main assumption of process mining is that each event has been assigned to a distinct process activity already …
This book presents MontiArcAutomaton, a modeling language for architecture and be-havior modeling of Cyber-Physical Systems as interactive Component & Connector mod-els …
AM Borujeni, M Fathy, N Mozayani - Journal of biomedical informatics, 2019 - Elsevier
Heart failure is one of the most common cause of death in the world. The real-time health monitoring system with the advent of the Internet of things has attracted growing attention in …
Collecting, storing and processing data from machines, processes and workers in production processes is increasing with technological possibilities and the availability of …
HC Mayr, J Michael, S Ranasinghe… - Conceptual modeling …, 2017 - Springer
This paper advocates a rigorous model focused paradigm of information system development and use. We introduce the concept of “Model Centered Architecture” that sees …