Dr Hatem Ahriz h.ahriz@rgu.ac.uk
Principal Lecturer
A methodology for the elicitation of redesign knowledge.
Ahriz, Hatem; Arana, In�s
Authors
Dr Ines Arana i.arana@rgu.ac.uk
Associate Dean for ESCD
Contributors
E. Damiani
Editor
R.J. Howlett
Editor
L.C. Jain
Editor
N. Ichalkaranje
Editor
Abstract
We present MADAM, a methodology which allows the elicitation, capture, analysis and management of redesign knowledge. This area is characterised by the high reusability of problem solutions and is represented using three views: physical, functional and process. The methodology supports the analysis of the knowledge elicited and, therefore, the inconsistencies are detected. In addition, the knowledge is normalised so unnecessary (subsumed) parts and technical solutions can be removed with the aid of the expert. MADAM thus contributes towards better and faster redesign.
Citation
AHRIZ, H. and ARANA, I. 2002. A methodology for the elicitation of redesign knowledge. In Damiani, E., Howlett, R.J., Jain, L.C. and Ichalkaranje, N. (eds.) Knowledge-based intelligent information engineering systems and allied technologies: proceedings of the 6th International conference on knowledge-based intelligent information and engineering systems (KES 2002), 16-18 September 2002, Crema, Italy. Frontiers in artificial intelligence and applications, 82. Amsterdam: IOS Press.
Conference Name | 6th International conference on knowledge-based intelligent information and engineering systems (KES 2002) |
---|---|
Conference Location | Crema, Italy |
Start Date | Sep 16, 2002 |
End Date | Sep 18, 2002 |
Acceptance Date | Sep 16, 2002 |
Publication Date | Dec 31, 2002 |
Deposit Date | Apr 6, 2009 |
Publicly Available Date | Apr 6, 2009 |
Publisher | IOS Press |
Series Title | Frontiers in artificial intelligence and applications |
Series Number | 82 |
ISBN | 9781586032807 |
Keywords | Redesign knowledge |
Public URL | http://hdl.handle.net/10059/332 |
Files
AHRIZ 2002 A methodology for the elicitation
(48 Kb)
PDF
Publisher Licence URL
https://creativecommons.org/licenses/by-nc-nd/4.0/
You might also like
Detection of false command and response injection attacks for cyber physical systems security and resilience.
(2020)
Conference Proceeding
Predicting permeability based on core analysis.
(2020)
Conference Proceeding
The use of machine learning algorithms for detecting advanced persistent threats.
(2019)
Conference Proceeding
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search