Multiattribute Decision Modeling Techniques: A Comparative Analysis

Author(s):  
Jonathan C. Fast ◽  
Larry T. Looper
2019 ◽  
Vol 4 (6) ◽  
pp. 246-256
Author(s):  
V.V. Smirnjakov ◽  
◽  
D.S. Pekarchuk ◽  
M.M. Popov ◽  
E.V. Mazanik ◽  
...  

Author(s):  
Saleh Alwahaishi ◽  
Ahmad Jaffar ◽  
Ivo Vondrák ◽  
Václav Snášel

Through quantitative analysis, previous researchers have proven a significant preference towards a specific set of notations for modeling business processes. The drawn conclusion revealed a significantly correlated coefficient preference to Norm Process Chart for using easily recognizable symbols to intuitively elicit understanding in representing business process models. Further interpretative analysis to qualitatively enhance these findings will only prove and strengthen the above claimed beyond reasonable doubt. The approach is to measure respondent level of accuracy in interpreting 3 different case studies modeled using 3 different modeling techniques shown to respondents in 3 different randomized sequences. The analysis includes correlating the finding against the time taken as well as respondents’ level of confidence in interpreting these models. The significantly correlated results again confirmed beyond reasonable doubt Norm Process Chart being respondents ultimate choice. Further comparative analysis between results from an earlier investigation against the latter, revealed similar patterns in respondents’ responses despite respondents dispersed ethnicity and educational backgrounds.


Author(s):  
Kenneth Smith ◽  
Mark Roberts

2012 ◽  
Vol 3 (4) ◽  
pp. 65-83
Author(s):  
K. Shantha Kumari ◽  
T.Chithraleka

Access control policies (ACPs) characterize the high-level rules according to which the access control of a system is regulated. Generally they are defined separately from the functional requirements (FRs) of an application and added to the system as an afterthought after being built. But, many problems arose during the integration of ACPs and FRs. Hence, over the past years, researchers have suggested for the modifying the design phase to include an earlier focus on access control issues through various modeling techniques. This paper reviews the important approaches in ACP modeling and makes a comparative analysis of the advantages and limitations of those techniques especially in addressing complex ACPs. Based on the comparative analysis, this paper presents directions for further work needed in handling the intricate nature of today’s ACPs.


Author(s):  
Wesley J. Wildman

To appreciate the risks and benefits of anthropomorphism, it is important (1) to appreciate the genius and limitations of human cognition, (2) to compare ultimacy models to see what difference anthropomorphic modeling techniques make, and (3) to entertain the possibility of an apophatic approach to ultimate reality that relativizes and relates ultimacy models. An apophatic approach to ultimate reality relativizes ultimacy models but also implies a disintegrating metric that serves to relate ultimacy models to one another. Degree of anthropomorphism is an important component of this disintegrating metric. Comparative analysis helps manifest internal complexity in the idea of anthropomorphism by distinguishing three relatively independent dimensions: Intentionality Attribution, Rational Practicality, and Narrative Comprehensibility. Educational efforts stabilized in cultural traditions can confer on people the desire and ability to resist one or more dimensions of the anthropomorphic default modes of cognition to some degree.


Sign in / Sign up

Export Citation Format

Share Document