scispace - formally typeset
Search or ask a question

Showing papers in "Information Systems in 2015"


Journal ArticleDOI
TL;DR: The definition, characteristics, and classification of big data along with some discussions on cloud computing are introduced, and research challenges are investigated, with focus on scalability, availability, data integrity, data transformation, data quality, data heterogeneity, privacy, legal and regulatory issues, and governance.

2,141 citations


Journal ArticleDOI
TL;DR: This review will expose four main components of time-series clustering and is aimed to represent an updated investigation on the trend of improvements in efficiency, quality and complexity of clustering time- series approaches during the last decade and enlighten new paths for future works.

1,235 citations


Journal ArticleDOI
TL;DR: A novel architecture and its implementation for inter-organizational data sharing is presented, which provides a high level of security and privacy for patient data in semi-trusted cloud computing environments.

182 citations


Journal ArticleDOI
TL;DR: A framework for Compliance Monitoring Functionalities (CMF) is defined that enables the systematic comparison of existing and new approaches for monitoring compliance rules over business processes during runtime and provides powerful means to position existing and future compliance monitoring approaches.

164 citations


Journal ArticleDOI
TL;DR: This paper investigates the problem of repairing a process model w.r.t. a log such that the resulting model can replay the log and is as similar to the original model and uses an existing conformance checker that aligns the runs of the given process model to the traces in the log.

138 citations


Journal ArticleDOI
TL;DR: Initial experimental results indicate a clear superiority of the proposed techniques over the existing methods for SDP*, a cost-sensitive decision forest and voting technique which is an ensemble of decision trees.

129 citations


Journal ArticleDOI
TL;DR: An ontological analysis of the concepts introduced in the ArchiMate framework and language to include capability and resources, focusing in particular on the resource, capability and competence concepts, in terms of the Unified Foundational Ontology (UFO).

108 citations


Journal ArticleDOI
TL;DR: This work uses a specific kind of stochastic Petri nets that can capture arbitrary duration distributions to predict the remaining duration of business processes in an online setting and estimates the risk of breaching a temporal deadline.

108 citations


Journal ArticleDOI
TL;DR: A queueing perspective in process mining is established to address the online delay prediction problem, which refers to the time that the execution of an activity for a running instance of a service process is delayed due to queueing effects.

107 citations


Journal ArticleDOI
TL;DR: To increase efficiency and strengthen competitiveness, banks need to promote smart and practical branded services especially self-services at the same time promote a universal adoption of e-banking system services that add entertainment or extra convenience to customers.

99 citations


Journal ArticleDOI
TL;DR: An alignment-based approach for preprocessing and conformance checking using declarative process models has been implemented in ProMand and has been evaluated using both synthetic logs and real-life logs from a Dutch hospital.

Journal ArticleDOI
TL;DR: This paper addresses the commitments established between service providers and customers, and shows how such commitments affect the service lifecycle, and presents a core reference ontology for services called UFO-S, based on the notion of service commitments and claims.

Journal ArticleDOI
TL;DR: This paper presents a generic change propagation approach that is based on the Refined Process Structure Tree, i.e., the approach is independent of a specific process specification language, and considers a comprehensive set of change patterns.

Journal ArticleDOI
TL;DR: The physical characteristics of the power system are studied, and a relationship between the system stability indices and the FDI attacks are drawn, and it is shown that the nodes in the most vulnerable cluster exhibit higher likelihood of de-stabilizing system operation compared to other nodes.

Journal ArticleDOI
TL;DR: The wavelet matrix is introduced, an alternative representation for large alphabets that retains all the properties of wavelet trees but is significantly faster and also introduces Huffman compression on the sequence to further reduce space and time.

Journal ArticleDOI
TL;DR: It is found that combinations of placement controllers and periodic reallocations achieve the highest energy efficiency subject to predefined service levels, and aggressive VM placement in combination with VM reallocation strategies achieve highest efficiency.

Journal ArticleDOI
TL;DR: The proposed models are the first ones that take a holistic approach and consider individual, collective movement patterns and the similarity between trajectories in making prediction, and build models that are suited to different time periods.

Journal ArticleDOI
TL;DR: Established astronomical techniques are applied to visible light images captured at 0.1Hz to extract and analyze the light curves of 4147 sources in an urban scene over a period of 3 weeks, and it is found that both residential and commercial sources in the scene exhibit recurring aggregate patterns, while the individual sources decorrelate by an average of one hour after only one night.

Journal ArticleDOI
TL;DR: This study systematically reviews extant research on impact analysis and propagation in the BPM and SOA domains and indicates that graph-based techniques are extensively used, followed by formal dependency modeling in dependency analysis.

Journal ArticleDOI
TL;DR: This paper proposes an efficient and Secure Data Sharing (SDS) framework using homomorphic encryption and proxy re-encryption schemes that prevents the leakage of unauthorized data when a revoked user rejoins the system.

Journal ArticleDOI
TL;DR: A traffic state model based on a probabilistic topic model to describe the traffic states for a variety of roads is introduced and it is shown that the method discriminates successfully between anomalous car trajectories and the more usual, slowly moving traffic patterns.

Journal ArticleDOI
TL;DR: This paper provides new results on the translation between workflow graphs and free-choice workflow nets and provides various techniques to replace inclusive Or-joins by subgraphs without inclusive logic, thus giving rise to translations from workflow graphs to free- Choice nets.

Journal ArticleDOI
TL;DR: The proposed method for transforming controlled natural language specifications based on the Semantics of Business Vocabulary and Business Rules standard meets the criteria necessary to fulfil the three goals of shifting control of specification to non-technical business experts, reducing the manual effort involved in formalising specifications, and supporting business experts in creating well-formed sets of business vocabularies and rules.

Journal ArticleDOI
TL;DR: The paper proposes techniques for detecting clusters of approximate clones based on two well-known clustering algorithms: DBSCAN and Hierarchical Agglomerative Clustering (HAC).

Journal ArticleDOI
TL;DR: The reference architecture of the SG, with its components and communication interfaces used to exchange the energy-related information, is integrated with the results of SG systems security threat analysis to produce a comprehensive, integrated SG SSTM.

Journal ArticleDOI
TL;DR: This paper identifies and formally define seven design-time analysis operations related to how resources are involved in process activities and introduces seven analysis operations, which can be automated by leveraging Description Logic off-the-shelf reasoners.

Journal ArticleDOI
TL;DR: This paper considers purpose-oriented situations rather than conventional situations (e.g., user?s state) in proposing a generic situation-aware access control framework for software services, and takes situation to mean the states of the entities and their relationships that are relevant to the purpose of a resource access request.

Journal ArticleDOI
TL;DR: This paper proposes to estimate the urgency of urban issues by mining different emotions that are implicit in the text describing the issue, and indicates that emotions can be categorized efficiently with supervised learning algorithms, and the use of citizen emotions leads to accurate urgency estimates.

Journal ArticleDOI
TL;DR: In this paper, the authors propose to organize the Bloom filters in a hierarchical index structure akin to a B+ tree that they call Bloofi, and then they propose another data structure called Flat-Bloofi to exploit bit-level parallelism.

Journal ArticleDOI
TL;DR: A three-level hierarchical optimization approach is proposed to solve scalability, computational overhead, and minimize daily electricity cost through maximizing the used percentage of renewable energy.