Advanced Information Systems Engineering: 32Nd International Conference, Caise 2020, Grenoble, France, June 8-12, 2020, Proceedings Schahram Dustdar

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

Advanced Information Systems

Engineering: 32nd International


Conference, CAiSE 2020, Grenoble,
France, June 8–12, 2020, Proceedings
Schahram Dustdar
Visit to download the full and correct content document:
https://textbookfull.com/product/advanced-information-systems-engineering-32nd-inte
rnational-conference-caise-2020-grenoble-france-june-8-12-2020-proceedings-schahr
am-dustdar/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Advanced Information Systems Engineering: 32nd


International Conference, CAiSE 2020, Grenoble, France,
June 8–12, 2020, Proceedings Schahram Dustdar

https://textbookfull.com/product/advanced-information-systems-
engineering-32nd-international-conference-caise-2020-grenoble-
france-june-8-12-2020-proceedings-schahram-dustdar/

Advanced Information Systems Engineering: CAiSE Forum


2020, Grenoble, France, June 8–12, 2020, Proceedings
Nicolas Herbaut

https://textbookfull.com/product/advanced-information-systems-
engineering-caise-forum-2020-grenoble-france-
june-8-12-2020-proceedings-nicolas-herbaut/

Enterprise, Business-Process and Information Systems


Modeling: 21st International Conference, BPMDS 2020,
25th International Conference, EMMSAD 2020, Held at
CAiSE 2020, Grenoble, France, June 8–9, 2020,
Proceedings Selmin Nurcan
https://textbookfull.com/product/enterprise-business-process-and-
information-systems-modeling-21st-international-conference-
bpmds-2020-25th-international-conference-emmsad-2020-held-at-
caise-2020-grenoble-france-june-8/

Advanced Information Systems Engineering 27th


International Conference CAiSE 2015 Stockholm Sweden
June 8 12 2015 Proceedings 1st Edition Jelena
Zdravkovic
https://textbookfull.com/product/advanced-information-systems-
engineering-27th-international-conference-caise-2015-stockholm-
sweden-june-8-12-2015-proceedings-1st-edition-jelena-zdravkovic/
Business Information Systems: 23rd International
Conference, BIS 2020, Colorado Springs, CO, USA, June
8–10, 2020, Proceedings Witold Abramowicz

https://textbookfull.com/product/business-information-
systems-23rd-international-conference-bis-2020-colorado-springs-
co-usa-june-8-10-2020-proceedings-witold-abramowicz/

Advanced Information Systems Engineering: 29th


International Conference, CAiSE 2017, Essen, Germany,
June 12-16, 2017, Proceedings 1st Edition Eric Dubois

https://textbookfull.com/product/advanced-information-systems-
engineering-29th-international-conference-caise-2017-essen-
germany-june-12-16-2017-proceedings-1st-edition-eric-dubois/

Intelligent Tutoring Systems 16th International


Conference ITS 2020 Athens Greece June 8 12 2020
Proceedings Vivekanandan Kumar

https://textbookfull.com/product/intelligent-tutoring-
systems-16th-international-conference-its-2020-athens-greece-
june-8-12-2020-proceedings-vivekanandan-kumar/

Combinatorial Algorithms 31st International Workshop


IWOCA 2020 Bordeaux France June 8 10 2020 Proceedings
Leszek G■sieniec

https://textbookfull.com/product/combinatorial-algorithms-31st-
international-workshop-iwoca-2020-bordeaux-france-
june-8-10-2020-proceedings-leszek-gasieniec/

Advanced Information Systems Engineering Workshops:


CAiSE 2018 International Workshops, Tallinn, Estonia,
June 11-15, 2018, Proceedings Raimundas Matulevicius

https://textbookfull.com/product/advanced-information-systems-
engineering-workshops-caise-2018-international-workshops-tallinn-
estonia-june-11-15-2018-proceedings-raimundas-matulevicius/
Schahram Dustdar · Eric Yu ·
Camille Salinesi · Dominique Rieu ·
Vik Pant (Eds.)
LNCS 12127

Advanced Information
Systems Engineering
32nd International Conference, CAiSE 2020
Grenoble, France, June 8–12, 2020
Proceedings
Lecture Notes in Computer Science 12127

Founding Editors
Gerhard Goos
Karlsruhe Institute of Technology, Karlsruhe, Germany
Juris Hartmanis
Cornell University, Ithaca, NY, USA

Editorial Board Members


Elisa Bertino
Purdue University, West Lafayette, IN, USA
Wen Gao
Peking University, Beijing, China
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Gerhard Woeginger
RWTH Aachen, Aachen, Germany
Moti Yung
Columbia University, New York, NY, USA
More information about this series at http://www.springer.com/series/7409
Schahram Dustdar Eric Yu
• •

Camille Salinesi Dominique Rieu


• •

Vik Pant (Eds.)

Advanced Information
Systems Engineering
32nd International Conference, CAiSE 2020
Grenoble, France, June 8–12, 2020
Proceedings

123
Editors
Schahram Dustdar Eric Yu
TU Wien University of Toronto
Vienna, Austria Toronto, ON, Canada
Camille Salinesi Dominique Rieu
Université Paris 1 Panthéon-Sorbonne Université Grenoble Alpes
Paris, France Saint-Martin-d’Hères, France
Vik Pant
University of Toronto
Toronto, ON, Canada

ISSN 0302-9743 ISSN 1611-3349 (electronic)


Lecture Notes in Computer Science
ISBN 978-3-030-49434-6 ISBN 978-3-030-49435-3 (eBook)
https://doi.org/10.1007/978-3-030-49435-3
LNCS Sublibrary: SL3 – Information Systems and Applications, incl. Internet/Web, and HCI

© Springer Nature Switzerland AG 2020


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, expressed or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

The 32nd International Conference on Advanced Information Systems Engineering


(CAiSE 2020) was organized to be held in Grenoble, France, during June 8–12, 2020.
Due to the outbreak of the COVID-19 pandemic, the conference was eventually moved
online and held virtually over the same time period.
The CAiSE conference continues its tradition as the premiere venue for innovative
and rigorous research across the whole spectrum of information systems (IS) engi-
neering, with “Resilient Information Systems” as the special theme this year. When we
decided on this special theme, we could not have anticipated how timely and real it
would become. The circumstances brought about by the pandemic have highlighted the
need for resilience in IS, as well as the contributions that IS are making towards the
resilience of modern societies.
The CAiSE program included three invited keynotes, by Professor Edward Lee (UC
Berkeley, USA), Dr. Thomas Baudel (IBM, France), and Professor Matthias Jarke
(RWTH Aachen, Germany). The call for papers solicited research papers in the cate-
gories of formal and/or technical, empirical, experience, and exploratory papers, in all
areas of IS engineering, including novel approaches to IS engineering; models,
methods, and techniques in IS engineering; architectures and platforms for IS engi-
neering; and domain-specific and multi-aspect IS engineering. 185 full paper submis-
sions were received. We followed the selection process consolidated in the previous
years: each paper was initially reviewed by at least two Program Committee
(PC) members; papers with consistent negative evaluations were rejected; all papers
with at least one positive evaluation were reviewed by a member of the Program Board
(PB); all reviewers then engaged in an online discussion led by another PB member;
finally, during the physical meeting of the PB in Paris (February 20–21, 2020), the final
decision was made about the acceptance or rejection of each paper. The overall
evaluation process of the papers resulted in the selection of 33 high-quality papers,
which amounted to an acceptance rate of 15%. The final program of CAiSE 2020 was
complemented by the CAiSE Forum, workshops, co-located working conferences,
tutorials and panels, and a PhD consortium. For each of these events, separate
proceedings were published.
We would like to thank the general chairs, Camille Salinesi and Dominique Rieu,
organization chair, Agnes Front, and the whole organization team for their support and
incredible work. We thank also the forum chairs, Nicolas Herbaut and Marcello La
Rosa, workshop chairs, Sophie Dupuy-Chessa and Henderik A. Proper, tutorial and
panel chairs, Xavier Franch and Samira Si Saïd, doctoral consortium chairs, Oscar
Pastor and Mario Cortes-Cornax, publicity chairs, Sergio Espana, Naoufel Kraiem, Lin
Liu, Gloria Lucia Giraldo Gómez, Birgit Penzenstadler, Motoshi Saeki, and Claudia
Roncancio (coordinator), and web and social media chairs, Akram Idani and Sylvain
Bouveret, for their extraordinary and professional work. We thank all PC and PB
members, who played a fundamental role in the selection process. Finally, we would
vi Preface

like to express our deepest gratitude to all those who served as organizers, session
chairs, and hosts, who made great efforts to meet the online challenge to make the
virtual conference a real success.
CAiSE 2020 was organized with the support of Université Grenoble Alpes and
Université Paris 1 - Panthéon-Sorbonne.

April 2020 Schahram Dustdar


Eric Yu
Organization

General Chairs
Camille Salinesi Université Paris 1 Panthéon-Sorbonne, France
Dominique Rieu Université Grenoble Alpes, France

Program Chairs
Eric Yu University of Toronto, Canada
Schahram Dustdar TU Wien, Austria

Workshop Chairs
Sophie Dupuy-Chessa Université Grenoble Alpes, France
Erik Proper Institute of Science and Technology, Luxembourg

Forum Chairs
Nicolas Herbaut Université Paris 1 Panthéon-Sorbonne, France
Marcello La Rosa The University of Melbourne, Australia

Tutorial/Panel Chairs
Xavier Franch Universitat Politècnica de Catalunya, Spain
Samira Si Saïd Conservatoire National des Arts et Métiers Paris,
France

Doctoral Consortium Chairs


Oscar Pastor Universidad Politécnica de Valencia, Spain
Mario Cortes-Cornax Université Grenoble Alpes, France

Industry Chairs (Innovation in and for Information Systems)


Fabrice Forest Université Grenoble Alpes, France
Jean-Pierre Verjus French Tech in the Alps – Grenoble, France
Adrian Mos Naver Labs Europe

Publicity Chairs
Sergio Espana Utrecht University, The Netherlands
Naoufel Kraiem University of Manouba, Tunisia
viii Organization

Lin Liu Tsinghua University, China


Gloria Lucia Giraldo Gómez Universidad Nacional de Colombia, Colombia
Birgit Penzenstadler California State University, Long Beach, USA
Claudia Roncancio Université Grenoble Alpes, France
(Publicity Coordinator)
Motoshi Saeki Tokyo Institute of Technology School of Computing,
Japan

Web and Social Media Chairs


Akram Idani Université Grenoble Alpes, France
Sylvain Bouveret Université Grenoble Alpes, France

Proceedings Chair
Vik Pant University of Toronto, Canada

Organization Chair
Agnes Front Université Grenoble Alpes, France

Conference Steering Committee Chairs


Johann Eder Alpen Adria Universität Klagenfurt, Austria
John Krogstie Norwegian University of Science and Technology,
Norway
Eric Dubois LIST, Luxembourg

Conference Advisory Board


Janis Bubenko KTH Stockholm, Sweden
Oscar Pastorv Universidad Politécnica de Valencia, Spain
Barbara Pernici Politecnico di Milano, Italy
Colette Rolland Université Paris 1 Panthéon-Sorbonne, France
Arne Solvberg Norwegian University of Science and Technology,
Norway

Program Board Members


Ernesto Damiani University of Milan, Italy
Eric Dubois Luxembourg Institute of Science and Technology,
Luxembourg
Johann Eder Alpen Adria Universität Klagenfurt, Austria
Xavier Franch Universitat Politècnica de Catalunya, Spain
Matthias Jarke RWTH Aachen University, Germany
Organization ix

John Krogstie Norwegian University of Science and Technology,


Norway
Heinrich C. Mayr Alpen-Adria-Universität Klagenfurt, Austria
Selmin Nurcan Université Paris 1 Panthéon-Sorbonne, France
Oscar Pastor Lopez Universitat Politècnica de València, Spain
Barbara Pernici Politecnico di Milano, Italy
Henderik Proper Luxembourg Institute of Science and Technology,
Luxembourg
Jolita Ralyté University of Geneva, Switzerland
Manfred Reichert Ulm University, Germany
Hajo A. Reijers Utrecht University, The Netherlands
Stefanie Rinderle-Ma University of Vienna, Austria
Antonio Ruiz-Cortés University of Seville, Spain
Shazia Sadiq The University of Queensland, Australia
Camille Salinesi CRI, Université Paris 1 Panthéon-Sorbonne, France
Pnina Soffer University of Haifa, Israel
Janis Stirna Stockholm University, Sweden
Ernest Teniente Universitat Politècnica de Catalunya, Spain
Yannis Vassiliou National Technical University of Athens, Greece
Barbara Weber University of St. Gallen, Switzerland

Program Committee Members


Schahram Dustdar Vienna University of Technology, Austria
(Program Chair)
Eric Yu (Program Chair) University of Toronto, Canada
Raian Ali Hamad Bin Khalifa University, Qatar
Daniel Amyot University of Ottawa, Canada
Joao Araujo Universidade NOVA de Lisboa, Portugal
Marko Bajec University of Ljubljana, Slovenia
Boualem Benatallah The University of New South Wales, Australia
Alex Borgida Rutgers University, USA
Sjaak Brinkkemper Utrecht University, The Netherlands
Andrea Burattin Technical University of Denmark, Denmark
Cristina Cabanillas Vienna University of Economics and Business, Austria
Albertas Caplinskas Vilnius University, Lithuania
Cinzia Cappiello Politecnico di Milano, Italy
Carlo Combi Università degli Studi di Verona, Italy
Fabiano Dalpiaz Utrecht University, The Netherlands
Maya Daneva University of Twente, The Netherlands
Valeria De Antonellis University of Brescia, Italy
Adela Del Río Ortega University of Seville, Spain
Claudio Di Ciccio Vienna University of Economics and Business, Austria
Oscar Diaz University of the Basque Country, Spain
João Falcão E. Cunha University of Porto, Portugal
Pablo Fernandez University of Seville, Spain
Ulrich Frank Universität of Duisburg-Essen, Germany
x Organization

Jānis Grabis Riga Technical University, Latvia


Giancarlo Guizzardi Federal University of Espirito Santo, Brazil
Jun Han Swinburne University of Technology, Australia
Sumi Helal Lancaster University, UK
Jennifer Horkoff Chalmers and the University of Gothenburg, Sweden
Paul Johannesson Royal Institute of Technology, Sweden
Jan Jürjens Fraunhofer Institute, University of Koblenz-Landau,
Germany
Marite Kirikova Riga Technical University, Latvia
Agnes Koschmider Karlsruhe Institute of Technology, Germany
Julio Cesar Leite Pontifícia Universidade Católica do Rio de Janeiro,
Brazil
Henrik Leopold Kühne Logistics University, Germany
Lin Liu Tsinghua University, China
Fabrizio Maria Maggi University of Tartu, Estonia
Andrea Marrella Sapienza University of Rome, Italy
Florian Matthes Technical University of Munich, Germany
Raimundas Matulevicius University of Tartu, Estonia
Haralambos Mouratidis University of Brighton, UK
John Mylopoulos University of Toronto, Canada
Andreas L. Opdahl University of Bergen, Norway
Jeffrey Parsons Memorial University of Newfoundland, Canada
Birgit Penzenstadler Chalmers University of Technology, Sweden
Anna Perini Fondazione Bruno Kessler Trento, Italy
Günther Pernul Universität Regensburg, Germany
Pierluigi Plebani Politecnico di Milano, Italy
Geert Poels Ghent University, Belgium
Artem Polyvyanyy The University of Melbourne, Australia
Naveen Prakash The NorthCap University, India
Gil Regev École Polytechnique Fédérale de Lausanne,
Switzerland
Manuel Resinas University of Seville, Spain
Colette Rolland Université de Paris 1 Panthéon-Sorbonne, France
Wenjie Ruan Lancaster University, UK
Marcela Ruiz Zurich University of Applied Sciences, Switzerland
Flavia Santoro Universidade do Estado do Rio de Janeiro, Brazil
Michael Sheng Macquarie University, Australia
Peretz Shoval Ben-Gurion University, Israel
Samira Si-Said Cherfi Conservatoire National des Arts et Métiers, France
Guttorm Sindre Norwegian University of Science and Technology,
Norway
Kari Smolander Lappeenranta University of Technology, Finland
Monique Snoeck Katholieke Universiteit Leuven, Belgium
Markus Strohmaier RWTH Aachen University, GESIS, Germany
Arnon Sturm Ben-Gurion University, Israel
Boudewijn Van Dongen Eindhoven University of Technology, The Netherlands
Organization xi

Panos Vassiliadis University of Ioannina, Greece


Matthias Weidlich Humboldt-Universität zu Berlin, Germany
Hans Weigand Tilburg University, The Netherlands
Mathias Weske HPI, University of Potsdam, Germany
Jian Yang Macquarie University, Australia
Yijun Yu The Open University, UK
Jelena Zdravkovic Stockholm University, Sweden

Additional Reviewers

Agostinelli, Simone Kraft, Robin


Andrews, Kevin Kumara, Indika
Azanza, Maider Köpke, Julius
Bagozi, Ada Lee, Jaejoon
Bondel, Gloria Leno, Volodymyr
Braun, Daniel Lopez, Lidia
Böhm, Fabian Marquez Chamorro, Alfonso
Chowdhury, Mohammad Jabed Morshed Molenaar, Sabine
de Kinderen, Sybren Nalchigar, Soroosh
El-Khawaga, Ghada Nelissen, Klaas
Englbrecht, Ludwig Nikaj, Adriatik
Estrada Torres, Irene Bedilia Oliboni, Barbara
Fernandez, Pablo Palomares, Cristina
Gall, Manuel Parejo Maestre, José Antonio
Gallersdörfer, Ulrich Pereira, Juanan
García, José María Puchta, Alexander
Garda, Massimiliano Quintarelli, Elisa
Groefsema, Heerko Ramautar, Vijanti
Guizzardi, Renata Ras, Eric
Haarmann, Stephan Remy, Simon
Holl, Patrick Schlette, Daniel
Hoppenstedt, Burkhard Sottet, Jean-Sébastien
Hyrynsalmi, Sonja Spijkman, Tjerk
Ihde, Sven Stertz, Florian
Iqbal, Mubashar Tantar, Alexandru
Jansen, Slinger van der Werf, Jan Martijn
Jovanovic, Petar Velegrakis, Yannis
Kaczmarek-Heß, Monika Verdecchia, Roberto
Kalenkova, Anna Wen, Lijie
Kern, Sascha Winter, Karolin
Kostova, Blagovesta Zhao, Weiliang
Extended Abstracts of Invited
Keynote Talks
The Coevolution of Humans and Machines
(Extended Abstract)

Edward A. Lee

UC Berkeley, Berkeley, CS, USA


eal@berkeley.edu
https://ptolemy.berkeley.edu/ eal/

Abstract. We humans are less in control of the trajectory of technology than we


think. Technology shapes us as much as we shape it, and it may be more
defensible to think of technology as the result of a Darwinian coevolution than
the result of top-down intelligent design. To understand this question requires a
deep dive into how evolution works, how humans are different from computers,
and how technology development today resembles the emergence of a new life
form on our planet.

Keywords: Technology and society • Evolutionary theory • Philosophy


of technology

1 Coevolution

Richard Dawkins famously said that a chicken is an egg’s way of making another egg.
Is a human a computer’s way of making another computer? We tend to think of
technology as being created by humans in a top-down, intelligent-design manner, but
we may actually have less control than we realize. The trajectory that technology takes
is driven by many complex forces, including accidental mutations and feedback loops,
where technology shapes the thinking of the engineers developing the technology.
In my new book, The Coevolution [1], I coin the term “digital creationism” for the
idea that technology is the result of top-down intelligent design. This principle assumes
that every technology is the outcome of a deliberate process, where every aspect of a
design is the result of an intentional, human decision. I now know, after 40 years of
experience, that this is not how it happens. Software engineers are more the agents of
mutation in Darwinian evolutionary process. The outcome of their efforts is shaped
more by the computers, networks, software tools, libraries, and programming
languages than by their deliberate decisions. And the success and further development
of their product is determined as much or more by the cultural milieu into which they
launch their “creation” than their design decisions.
The French philosopher known as Alain (whose real name was Émile-Auguste
Chartier), wrote about fishing boats in Brittany:
Every boat is copied from another boat. ... Let’s reason as follows in the manner of Darwin. It is
clear that a very badly made boat will end up at the bottom after one or two voyages and thus
xvi E. A. Lee

never be copied. ... One could then say, with complete rigor, that it is the sea herself who
fashions the boats, choosing those which function and destroying the others [2].

Boat designers are agents of mutation, and sometimes their mutations result in a “badly
made boat.” From this perspective, perhaps Facebook has been fashioned more by
teenagers than software engineers.
More deeply, digital technology coevolves with humans. Facebook changes its
users, who then change Facebook. For software engineers, the tools we use, themselves
earlier outcomes of software engineering, shape our thinking. Think about how inte-
grated development environments (IDEs such as Eclipse), message boards (such as
Stack Overflow), libraries (such the Standard Template Library), programming lan-
guages (Scala, Xtend, and JavaScript, for example), and Internet search (such as
Google) affect the outcome of our software. These tools have more effect on the
outcome than all of our deliberate decisions.

2 Public Policy

Today, the fear and hype around AI taking over the world and social media taking
down democracy has fueled a clamor for more regulation. But if I am right about
coevolution, we may be going about the project of regulating technology all wrong.
Why have privacy laws, with all their good intentions, done little to protect our privacy
and only overwhelmed us with small-print legalese?
Under the principle of digital creationism, bad outcomes are the result of unethical
actions by individuals, for example by blindly following the profit motive with no
concern for societal effects. Under the principle of coevolution, bad outcomes are the
result of the procreative prowess of the technology itself. Technologies that succeed are
those that more effectively propagate. The individuals we credit with (or blame for)
creating those technologies certainly play a role, but so do the users of the technologies
and their whole cultural context. Under this perspective, Facebook users bear some
of the blame, along with Mark Zuckerberg, for distorted elections. They even bear
some of the blame for the design of Facebook software that enables distorted elections.
If they were willing to pay for social networking, for example, an entirely different
software design would have emerged.
Under digital creationism, the purpose of regulation is to constrain the individuals
who develop and market technology. In contrast, under coevolution, constraints can be
about the use of technology, not just its design. The purpose of regulation becomes to
nudge the process of both technology and cultural evolution through incentives and
penalties. Nudging is probably the best we can hope for. Evolutionary processes do not
yield easily to control.
The Coevolution of Humans and Machines (Extended Abstract) xvii

3 Living Digital Beings

If we wish to nudge the process through regulation, we have to better understand the
process. It may be more productive to think of the process as a coevolution, where
software systems coevolve with our culture as if they were living symbiotic beings. To
frame this line of thinking, I call these hypothetical beings “eldebees,” short for LDBs,
or living digital beings. They are creatures defined by bits, not DNA, and made of
silicon and metal, not organic molecules. They are born and they die. Some are simple,
with a genetic code of a few thousand bits, and some are extremely complex. Most live
short lives, sometimes less than a second, while others live for months or years. Some
even have prospects for immortality, prospects better than any organic being.
In this process, software engineers are doing more husbandry than design, com-
bining bits of code from here with bits of code from there to create a new “codome,” a
mutation that, with high probability, will prove unfit and will either die out or further
mutate. Users are midwives, bringing the eldebees to life, and culture is the ecosystem,
itself evolving along with the technology.
Viewed this way, technology becomes analogous to an emerging new life form on
our planet. This point of view sheds new light on many pressing questions, like
whether artificial intelligences will annihilate us, turn us into cyborgs, or even become
sentient. Technology already extends our minds and shapes our culture. Are we
designing it, or are it designing us?
Understanding this perspective requires a deep dive into how evolution works, how
humans are different from computers, and how the way technology develops resembles
and does not resemble the emergence of a new life form on our planet. That is the
subject of my book [1].

References
1. Lee, E.A.: The Coevolution: The Entwined Futures of Humans and Machines. MIT Press,
Cambridge (2020)
2. Rogers, D.S., Ehrlich, P.R.: Natural selection and cultural rates of change. Proc. Natl. Acad.
Sci. USA 105(9), 3416–3420 (2008)
Data Sovereignty and the Internet
of Production

Matthias Jarke

Informatik 5, RWTH Aachen & Fraunhofer FIT, Ahornstr. 55, 52074 Aachen,
Germany
jarke@dbis.rwth-aachen.de

Abstract. While the privacy of personal data has captured great attention in the
public debate, resulting, e.g., in the European GDPR guideline, the sovereignty
of knowledge-intensive small and medium enterprises concerning the usage
of their own data in the presence of dominant data-hungry players in the Internet
needs more investigation. In Europe, even the legal concept of data ownership is
unclear. We reflect on requirements analyses, reference architectures and solu-
tion concepts pursued by the International Data Spaces Initiative to address
these issues. In this setting, massive amounts of heterogeneous data must be
exchanged and analyzed across organizational and disciplinary boundaries,
throughout the lifecycle from (re-)engineering, to production, usage and recy-
cling, under hard resource and time constraints. A shared metaphor, borrowed
from Plato’s famous Cave Allegory, serves as the core modeling and data
management approach from conceptual, logical, physical, and business
perspectives.

Keywords: Data sovereignty • Data spaces • Digital shadows • Internet


of production

Introduction

The term “data sovereignty” is hotly debated in political, industrial, and privacy
communities. Politicians understand sovereignty as national sovereignty over data in
their territory, when it comes to the jurisdiction over the use of big data by the big
international players.
One might think that data industries dislike the idea because – in whatever defi-
nition – it limits their opportunities to exploit “data as the new oil”. However, some
of them employ the vision of data sovereignty of citizens as a weapon to abolish
mandatory data privacy rules as limiting customer sovereignty by viewing them as
people in need of protection in an uneven struggle for data ownership. For exactly this
reason, privacy proponents criticize data sovereignty as a tricky buzzword by the data
industry, aiming to undermine the principles of real self-determination and data
thriftiness (capturing only the minimal data necessary for a specified need) found in
many privacy laws. The European GDPR regulation follows this argumentation to
Data Sovereignty and the Internet of Production xix

some degree by clearly specifying that you are the owner of all personal data about
yourself.
Surprising to most participants, the well-known Göttingen-based law professor
Gerald Spindler, one of the GDPR authors, pointed out at a recent Dagstuhl Seminar on
Data Sovereignty (Cappiello et al. 2019) that this personal data ownership is the only
formal concept of data ownership that legally exists in Europe. In particular, the huge
group of knowledge-intensive small and medium enterprises (SMEs) or even larger
user industries in Europe are lacking coherent legal, technical, and organizational
concepts how to protect their data- and model-based knowledge in the globalized
industrial ecosystems.
In late 2014, we introduced the idea to extend the concept of personal data spaces
(Halevy et al. 2006) to the inter-organizational setting by introducing the idea of
Industrial Data Spaces as the kernel of platforms in which specific industrial ecosys-
tems could organize their cooperation in a data-sovereign manner (Jarke 2017, Jarke
and Quix 2017). The idea was quickly taken up by European industry and political
leaders. Since 2015, a number of large-scale German and EU projects have defined
requirements (Otto and Jarke 2019). Via numerous use case experiments, the Inter-
national Data Space (IDS) Association with currently roughly 100 corporate members
worldwide has evolved, and agreed on a reference architecture now already in version 3
(Otto et al. 2019).
As recently pointed out by Loucopoulos et al. (2019), the production sector offers
particularly complex challenges to such a setting due to the heterogeneity of its data
and mathematical models, the structural and material complexity of many products, the
globalized supply chains, and the international competition. Funded by the German
“Excellence Competition 2019”, an interdisciplinary group of researchers at RWTH
Aachen University therefore started a 7-year Excellence Cluster “Internet of Produc-
tion” aiming to address these challenges in a coherent manner.

References
Cappiello, C., Gal, A., Jarke, M., Rehof, J.: Data ecosystems – sovereign data
exchange among organizations. Dagstuhl Rep. 9(9), 66–134 (2019)
Halevy, A., Franklin, M., Maier, D.: Principles of data space systems. In: Proceedings
25th ACM SIGMOD-PODS, pp. 1–9 (2006)
Jarke, M.: Data spaces – combining goal-driven and data-driven approaches in com-
munity decision and negotiation support. In: Schoop, M., Kilgour, D. (eds.) GDN
2017. LNBIP, vol. 293, pp. 3–14. Springer, Cham (2017). https://doi.org/10.1007/
978-3-319-63546-0_1
Jarke, M., Quix, C.: On Warehouses, lakes, and spaces: the changing role of conceptual
modeling for data integration. In: Cabot, J., Gómez, C., Pastor, O., Sancho, M.,
Teniente, E. (eds.) Conceptual Modeling Perspectives, pp. 231–245. Springer,
Cham (2017). https://doi.org/10.1007/978-3-319-67271-7_16
xx M. Jarke

Loucopoulos, P., Kavakli, E., Chechina, N.: Requirements engineering for cyber
physical production systems. In: Giorgini, P., Weber, B. (eds.) CAiSE 2019.
LNCS, vol. 11483, pp. 276–291. Springer, Cham (2019). https://doi.org/10.1007/
978-3-030-21290-2_18
Otto, B., Jarke, M.: Designing a multi-sided data platform: findings from the inter-
national data spaces case. Electr. Markets 29(4), 561–580 (2019). https://doi.org/10.
1007/s12525-019-00362-x
Otto, B., Steinbuß, S., Teuscher, A., Lohmann, S. et al.: Reference Architecture Model
Version 3.0. Dortmund: International Data Spaces Association (2019)
Contents

Distributed Applications

Remodularization Analysis for Microservice Discovery Using Syntactic


and Semantic Clustering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Adambarage Anuruddha Chathuranga De Alwis, Alistair Barros,
Colin Fidge, and Artem Polyvyanyy

Decentralized Cross-organizational Application Deployment Automation:


An Approach for Generating Deployment Choreographies Based
on Declarative Deployment Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Karoline Wild, Uwe Breitenbücher, Kálmán Képes, Frank Leymann,
and Benjamin Weder

Modeling and Analyzing Architectural Diversity of Open Platforms . . . . . . . 36


Bahar Jazayeri, Simon Schwichtenberg, Jochen Küster,
Olaf Zimmermann, and Gregor Engels

Co-destruction Patterns in Crowdsourcing: Formal/Technical Paper . . . . . . . . 54


Reihaneh Bidar, Arthur H. M. ter Hofstede, and Renuka Sindhgatta

Information Systems Engineering with Digital Shadows: Concept


and Case Studies: An Exploratory Paper . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Martin Liebenberg and Matthias Jarke

Model-Driven Development of a Digital Twin for Injection Molding . . . . . . . 85


Pascal Bibow, Manuela Dalibor, Christian Hopmann, Ben Mainz,
Bernhard Rumpe, David Schmalzing, Mauritius Schmitz,
and Andreas Wortmann

SIoTPredict: A Framework for Predicting Relationships in the Social


Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Abdulwahab Aljubairy, Wei Emma Zhang, Quan Z. Sheng,
and Ahoud Alhazmi

B-MERODE: A Model-Driven Engineering and Artifact-Centric Approach


to Generate Blockchain-Based Information Systems. . . . . . . . . . . . . . . . . . . 117
Victor Amaral de Sousa, Corentin Burnay, and Monique Snoeck

Smart Contract Invocation Protocol (SCIP): A Protocol for the Uniform


Integration of Heterogeneous Blockchain Smart Contracts . . . . . . . . . . . . . . 134
Ghareeb Falazi, Uwe Breitenbücher, Florian Daniel,
Andrea Lamparelli, Frank Leymann, and Vladimir Yussupov
xxii Contents

AI and Big Data in IS

A System Framework for Personalized and Transparent


Data-Driven Decisions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Sarah Oppold and Melanie Herschel

Online Reinforcement Learning for Self-adaptive Information Systems . . . . . 169


Alexander Palm, Andreas Metzger, and Klaus Pohl

Aspect Term Extraction Using Deep Learning Model with Minimal


Feature Engineering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Felipe Zschornack Rodrigues Saraiva,
Ticiana Linhares Coelho da Silva,
and José Antônio Fernandes de Macêdo

State Machine Based Human-Bot Conversation Model and Services . . . . . . . 199


Shayan Zamanirad, Boualem Benatallah, Carlos Rodriguez,
Mohammadali Yaghoubzadehfard, Sara Bouguelia, and Hayet Brabra

Process Mining and Analysis

Stochastic-Aware Conformance Checking: An Entropy-Based Approach . . . . 217


Sander J. J. Leemans and Artem Polyvyanyy

Conformance Checking Approximation Using Subset Selection


and Edit Distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Mohammadreza Fani Sani, Sebastiaan J. van Zelst,
and Wil M. P. van der Aalst

Quantifying the Re-identification Risk of Event Logs for Process Mining:


Empiricial Evaluation Paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Saskia Nuñez von Voigt, Stephan A. Fahrenkrog-Petersen,
Dominik Janssen, Agnes Koschmider, Florian Tschorsch,
Felix Mannhardt, Olaf Landsiedel, and Matthias Weidlich

An Approach for Process Model Extraction by Multi-grained


Text Classification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Chen Qian, Lijie Wen, Akhil Kumar, Leilei Lin, Li Lin, Zan Zong,
Shu’ang Li, and Jianmin Wang

LoGo: Combining Local and Global Techniques for Predictive Business


Process Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Kristof Böhmer and Stefanie Rinderle-Ma

Business Process Variant Analysis Based on Mutual Fingerprints


of Event Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Farbod Taymouri, Marcello La Rosa, and Josep Carmona
Contents xxiii

DeepAlign: Alignment-Based Process Anomaly Correction Using


Recurrent Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Timo Nolle, Alexander Seeliger, Nils Thoma, and Max Mühlhäuser

Workforce Upskilling: A History-Based Approach for Recommending


Unfamiliar Process Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Anastasiia Pika and Moe T. Wynn

Requirements and Modeling

Evaluating the Benefits of Model-Driven Development: Empirical


Evaluation Paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
África Domingo, Jorge Echeverría, Óscar Pastor, and Carlos Cetina

Workarounds in Business Processes: A Goal-Based Analysis . . . . . . . . . . . . 368


Nesi Outmazgin, Pnina Soffer, and Irit Hadar

Digging into Business Process Meta-models: A First Ontological Analysis . . . 384


Greta Adamo, Chiara Di Francescomarino, and Chiara Ghidini

Mining User Opinions to Support Requirement Engineering:


An Empirical Study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Jacek Dąbrowski, Emmanuel Letier, Anna Perini, and Angelo Susi

Patterns for Certification Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417


Kevin Delmas, Claire Pagetti, and Thomas Polacsek

Information Extraction and Graph Representation for the Design


of Formulated Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Sagar Sunkle, Krati Saxena, Ashwini Patil, Vinay Kulkarni,
Deepak Jain, Rinu Chacko, and Beena Rai

Information Systems Engineering

Resource-Based Adaptive Robotic Process Automation:


Formal/Technical Paper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Renuka Sindhgatta, Arthur H. M. ter Hofstede, and Aditya Ghose

A Variability-Driven Analysis Method for Automatic Extraction


of Domain Behaviors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Iris Reinhartz-Berger and Sameh Abbas

Mutation Operators for Large Scale Data Processing Programs


in Spark. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
João Batista de Souza Neto, Anamaria Martins Moreira,
Genoveva Vargas-Solar, and Martin Alejandro Musicante
xxiv Contents

Recommendations for Evolving Relational Databases . . . . . . . . . . . . . . . . . 498


Julien Delplanque, Anne Etien, Nicolas Anquetil, and Stéphane Ducasse

A Combined Method for Usage of NLP Libraries Towards Analyzing


Software Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515
Xinyun Cheng, Xianglong Kong, Li Liao, and Bixin Li

Query-Based Metrics for Evaluating and Comparing Document Schemas . . . . 530


Evandro Miguel Kuszera, Letícia M. Peres,
and Marcos Didonet Del Fabro

Invited Keynote Talk

Data Sovereignty and the Internet of Production . . . . . . . . . . . . . . . . . . . . . 549


Matthias Jarke

Tutorials

Volunteer Design of Data Warehouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561


Sandro Bimonte

Design of Service-Dominant Business Models for a Digital World . . . . . . . . 563


Paul Grefen and Oktay Turetken

Using the Four-Component Instructional Design Model (4C/ID)


for Teaching Complex Learning Subjects in IS . . . . . . . . . . . . . . . . . . . . . . 566
Monique Snoeck and Daria Bogdanova

Open Source Software and Modern Information Systems: A Tutorial. . . . . . . 569


Anthony I. Wasserman

Tutorial on Process Performance Management . . . . . . . . . . . . . . . . . . . . . . 571


Adela del-Río-Ortega and Manuel Resinas

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573


Distributed Applications
Remodularization Analysis for
Microservice Discovery Using Syntactic
and Semantic Clustering

Adambarage Anuruddha Chathuranga De Alwis1(B) , Alistair Barros1 ,


Colin Fidge1 , and Artem Polyvyanyy2
1
Queensland University of Technology, Brisbane, Australia
{adambarage.dealwis,alistair.barros,c.fidge}@qut.edu.au
2
The University of Melbourne, Parkville, VIC 3010, Australia
artem.polyvyanyy@unimelb.edu.au

Abstract. This paper addresses the challenge of automated remodu-


larization of large systems as microservices. It focuses on the analysis
of enterprise systems, which are widely used in corporate sectors and
are notoriously large, monolithic and challenging to manually decou-
ple because they manage asynchronous, user-driven business processes
and business objects (BOs) having complex structural relationships. The
technique presented leverages semantic knowledge of enterprise systems,
i.e., BO structure, together with syntactic knowledge of the code, i.e.,
classes and interactions as part of static profiling and clustering. On a
semantic level, BOs derived from databases form the basis for prospec-
tive clustering of classes as modules, while on a syntactic level, struc-
tural and interaction details of classes provide further insights for mod-
ule dependencies and clustering, based on K-Means clustering and opti-
mization. Our integrated techniques are validated using two open source
enterprise customer relationship management systems, SugarCRM and
ChurchCRM. The results demonstrate improved feasibility of remod-
ularizing enterprise systems (inclusive of coded BOs and classes) as
microservices. Furthermore, the recommended microservices, integrated
with ‘backend’ enterprise systems, demonstrate improvements in key
non-functional characteristics, namely high execution efficiency, scala-
bility and availability.

Keywords: Microservice discovery · System remodularization · Cloud


migration

1 Introduction

Microservice architecture (MSA) has emerged as an evolution of service-oriented


architecture (SOA) to enable effective execution of software applications in
Cloud, Internet-of-Things and other distributed platforms [1]. Microservices
(MSs) are fine-grained, in comparison to classical SOA components. They
c Springer Nature Switzerland AG 2020
S. Dustdar et al. (Eds.): CAiSE 2020, LNCS 12127, pp. 3–19, 2020.
https://doi.org/10.1007/978-3-030-49435-3_1
4 A. A. C. De Alwis et al.

entail low coupling (inter-module dependency) and highly cohesive (intra-module


dependency) functionality, down to individualised operations, e.g., single oper-
ation video-download as a MS component, versus a multi-operation video man-
agement SOA component [2]. This promotes systems performance properties,
such as high processing efficiency, scalability and availability.
Reported experiences on MS development concern “greenfield” develop-
ments [1], where MSs are developed from “scratch”. However, major uncertainty
exists as to how MSs can be created by decoupling and reusing parts of a larger
system, through refactoring. This is of critical importance for the corporate sec-
tors which rely on large-scale enterprise systems (ESs), (e.g., Enterprise Resource
Planning (ERP) and Customer-Relationship Management (CRM)), to manage
their operations. Analysing ESs and identifying suitable parts for decoupling is
technically cumbersome, given the millions of lines of code, thousands of database
tables and extensive functional dependencies of their implementations. In partic-
ular, ESs manage business objects (BOs) [3], which have complex relationships
and support highly asynchronous and typically user-driven processes [4–6]. For
example, an order-to-cash process in SAP ERP has multiple sales orders, having
deliveries shared across different customers, with shared containers in trans-
portation carriers, and with multiple invoices and payments, which could be
processed before or after delivery [7]. This poses challenges to identify suitable
and efficient MSs from ES codes using classical software refactoring and optimal
splitting/merging of code across software modules.
Software remodularization techniques [8–10] have been proposed based on
static analysis, to identify key characteristics and dependencies of modules, and
abstract these using graph formalisms. New modules are recommended using
clustering algorithms and coupling and cohesion metrics. The focus of static
analysis techniques includes inter-module structure (class inheritance hierar-
chies), i.e., structural inheritance relationships, and inter-module interactions
(class object references), i.e., structural interaction relationships. Given that a
degradation of logical design reflected in software implementations can result
in classes with low cohesion, other techniques have been proposed to compare
structural properties of classes using information retrieval techniques [10], i.e.,
structural class similarity. Despite these proposals, studies show that the success
rate of software remodularisation remains low [11].
This paper presents a novel development of software remodularization applied
to the contemporary challenge of discovering fine-grained MSs from an ES’s code.
It extends the syntactic focus of software remodularization, by exploiting the
semantic structure of ESs, i.e., BOs and their relationships, which are, in prin-
ciple, influential in class cohesion and coupling. Specifically, the paper presents
the following:

– A novel MS discovery method for ESs combining syntactic properties, derived


from extracted structural inheritance relationships, structural interaction rela-
tionships, structural class similarity, and semantic properties, derived in turn
from databases and the relationships of BOs managed by classes.
Remodularization Analysis for Microservice Discovery 5

– An evaluation of the MS discovery methods that addresses three research


questions (refer Sect. 4.1) by implementing a prototype and experimenting
on two open-source CRMs: SugarCRMonote1 and ChurchCRM2 . The results
show that there is a 26.46% and 2.29% improvement in cohesion and a
18.75% and 16.74% reduction in coupling between modules of SugarCRM
and ChurchCRM, respectively. Furthermore, SugarCRM and ChurchCRM
manage to achieve 3.7% and 31.6% improved system execution efficiency and
36.2% and 47.8% scalability improvement, respectively, when MSs are intro-
duced to the system as suggested by our approach while preserving overall
system availability (refer to Tables 1, 2, 3, 4, 5 and 6).
The remainder of the paper is structured as follows. Section 2 describes the
related works and background on system remodularization techniques. Section 3
provides a detailed description of our MS discovery approach while Sect. 4
describes the implementation and evaluation. The paper concludes with Sect. 5.

2 Background and Motivation


This section first provides an overview of existing software remodularization and
MS discovery techniques with their relative strengths and weaknesses. It then
provides an overview of the architectural context of ESs and their alignments
with MSs. This context is assumed in the presentation of our software remodu-
larization techniques (Sect. 3).

2.1 Related Work and Techniques Used for Software


Remodularization
Software remodularization techniques involve automated analysis of different
facets of systems, including software structure, behaviour, functional require-
ments, and non-functional requirements. Techniques have focussed on static
analysis to analyse code structure and database schemas of the software systems
while dynamic analysis studies interactions of systems. Both approaches provide
complementary information for assessing properties of system modules based
on high cohesion and low coupling, and make recommendations for improved
modularity. However, static analysis is preferable for broader units of analysis
(i.e., systems or subsystems level) as all cases of systems’ execution are covered
compared to dynamic analysis [9].
Traditionally, research into software remodularization based on static analy-
sis has focused on a system’s implementation through two areas of coupling and
cohesion evaluation. The first is structural coupling and cohesion, which focuses
on structural relationships between classes in the same module or in different
modules. These include structural inheritance relationships between classes and
structural interaction relationships resulting when one class creates another class
1
https://www.sugarcrm.com/.
2
http://churchcrm.io/.
6 A. A. C. De Alwis et al.

and uses an object reference to invoke its methods [8]. Structural relationships
such as these are automatically profiled through Module Dependency Graphs
(MDG), capturing classes as nodes and structural relationships as edges [8,9],
and are used to cluster classes using K-means, Hill-climbing, NSGA II and other
clustering algorithms. The second is structural class similarity (otherwise known
as conceptual similarity of the classes) [10]. This draws from information retrieval
(IR) techniques, for source code comparison of classes, under the assumption that
similarly named variables, methods, object references, tables and attributes in
database query statements, etc., infer conceptual similarity of classes. Relevant
terms are extracted from the classes and used for latent semantic indexing and
cosine comparison to calculate the similarity value between them. Class sim-
ilarity, thus, provides intra-module measurements for evaluating coupling and
cohesion, in contrast to the inter-module measurements applied through struc-
tural coupling and cohesion described above.
Despite many proposals for automated analysis of systems, studies show that
the success rate of software remodularization remains low [11]. A prevailing prob-
lem is the limited insights available from purely syntactic structures of soft-
ware code to derive structural and interactional relationships of modules. More
recently, semantic insights available through BO relationships were exploited
to improve the feasibility of architectural analysis of applications. ESs manage
domain-specific information using BOs, through their databases and business
processes [5]. Evaluating the BO relationships and deriving valuable insights
from them to remodularize software systems falls under the category of seman-
tic structural relationships analysis. Such semantic relationships are highlighted
by the experiments conducted by Pẽrez-Castillo et al. [12], in which the tran-
sitive closure of strong BO dependencies derived from databases was used to
recommend software function hierarchies, and by the experiments conducted by
Lu et al. [13], in which SAP ERP logs were used to demonstrate process dis-
covery based on BOs. Research conducted by De Alwis et al. [14,15] on MS
discovery based on BO relationship evaluation shows the impact of considering
semantic structural relationships in software remodularization. However, to date,
techniques related to semantic structural relationships have not been integrated
with syntactic structural relationships and structural class similarity techniques.
As a result, currently proposed design recommendation tools provide insufficient
insights for software remodularization.

2.2 Architecture for Enterprise System to Microservice


Remodularization
As detailed in Sect. 2.1, there are multiple factors which should be considered in
the MS derivation process. In this section, we define the importance of consid-
ering such factors with respect to the architectural configuration of the ES and
MSs.
As depicted in Fig. 1, an ES consists of a set of self-contained modules
drawn from different subsystems and is deployed on a “backend” platform.
Modules consist of a set of software classes which contain internal system
Remodularization Analysis for Microservice Discovery 7

Fig. 1. Overview of an enterprise system extended with extracted microservices.

operations and operations which manage one or more BOs through create,
read, update, and delete (CRUD) operations. For example ‘Order Manage-
ment Module’ consists of several classes such as ‘Class Order’, ‘Class OrderCal’
and ‘Class OrderMan’, which contain operations manipulating data related
to ‘Order’ BO and ‘Class ProductVal’, which contain operations manipulat-
ing data related to ‘Product’ BO. Furthermore, the modules are interrelated
through method calls between classes in different modules (see the relationship of
‘Class ProductVal’ and ‘Class ProductMan’ in Fig. 1). In addition, classes inside
each individual module can have generalization/specialization relationships (i.e.,
subtype-supertype relationships) between different classes as depicted by the
relationships between ‘Class Order’ and ‘Class OrderMan’, and ‘Class Product’
and ‘Class ProductMan’ in Fig. 1.
The MSs, on the other hand, support a subset of operations through classes
which are related to individual BOs. Such implementations lead to high cohesion
within MSs and low coupling between the MSs (see the ‘Order Management
Microservice’ and ‘Product Microservice’ in Fig. 1). The MSs communicate with
each other through API calls in case they require information related to different
BOs which reside in other MSs. For example, ‘Order Management Microservice’
can acquire Product values through an API call to ‘Product Microservice’ (refer
arrow between the MSs in Fig. 1). The execution of operations across the ES
and MS system is coordinated through business processes, which means that
invocations of BO operations on the MSs will trigger operations on ES functions
involving the same BOs. As required for consistency in an MS system, BO data
will be synchronised across databases managed by ES and MSs periodically.
Based on this understanding of the structure of the ES and MSs, it is clear
why we should consider semantic and syntactic information for the MS discovery
process. In order to capture the subtype relationships and object reference rela-
tionships that exist in the ES system, we need structural inheritance relationship
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of El terror de 1824
This ebook is for the use of anyone anywhere in the United States and
most other parts of the world at no cost and with almost no restrictions
whatsoever. You may copy it, give it away or re-use it under the terms
of the Project Gutenberg License included with this ebook or online at
www.gutenberg.org. If you are not located in the United States, you will
have to check the laws of the country where you are located before
using this eBook.

Title: El terror de 1824

Author: Benito Pérez Galdós

Release date: October 12, 2023 [eBook #71861]

Language: Spanish

Original publication: Madrid: Obras de Pérez Galdós, 1904

Credits: Ramón Pajares Box. (This file was produced from images
generously made available by The Internet Archive/Canadian
Libraries.)

*** START OF THE PROJECT GUTENBERG EBOOK EL TERROR DE


1824 ***
Índice: I, II, III, IV, V, VI, VII, VIII, IX, X, XI, XII, XIII, XIV, XV, XVI, XVII,
XVIII, XIX, XX, XXI, XXII, XXIII, XXIV, XXV, XXVI, XXVII, XXVIII, XXIX.

Nota de transcripción

Los errores de imprenta han sido corregidos.


La ortografía del texto original ha sido modernizada de acuerdo con las normas
publicadas en 2010 por la Real Academia Española.
Las rayas intrapárrafos han sido espaciadas según los modernos usos
ortotipográficos.
Las notas a pie de página han sido renumeradas y colocadas al final del párrafo en
que se las llama.
EPISODIOS NACIONALES

EL TERROR DE 1824
Es propiedad. Queda hecho el depósito
que marca la ley. Serán furtivos los
ejemplares que no lleven el sello del autor
B. PÉREZ GALDÓS
EPISODIOS NACIONALES
SEGUNDA SERIE

EL TERROR DE 1824

32.000

MA DRID
O B RAS DE P É RE Z G AL DÓ S
132, Hortaleza
1904
EST. TIP. DE LA VIUDA E HIJOS DE TELLO
IMPRESOR DE CÁMARA DE S. M.
C. de San Francisco, 4.
EL TERROR DE 1824

En la tarde del 2 de octubre de 1823 un anciano bajaba con paso


tan precipitado como inseguro por las afueras de la Puerta de Toledo
en dirección al puente del mismo nombre. Llovía menudamente, sin
cesar, según la usanza del hermoso cielo cuando se enturbia, y la
ronda podía competir en lodos con su vecino Manzanares, el cual
hinchándose como la madera cuando se moja, extendía su saliva
fangosa por gran parte del cauce que le permiten los inviernos. E
anciano transeúnte marchaba con pie resuelto, sin que le causara
estorbo la lluvia, con el pantalón recogido hasta la pantorrilla
chapoteando sin embarazo en el lodo con las destrozadas botas. Iba
estrechamente forrado, como tizona en vaina, en añoso gabán oscuro
cuyo borde y solapa se sujetaba con alfileres allí donde no había
botones, y con los agarrotados dedos en la parte del pecho, como la
más necesitada de defensa contra la humedad y el frío. Hundía la
barba y media cara en el alzacuello, tieso como una pared
cubriéndose con él las orejas y el ala posterior del sombrero, que
destilaba agua como cabeza de tritón en fuente de Reales Sitios. No
llevaba paraguas ni bastón. Mirando sin cesar al suelo, daba unos
suspiros que competían con las ráfagas de aire. ¡Infelicísimo varón
¡Cuán claramente pregonaban su desdichada suerte el roto vestido
las horadadas botas, el casquete húmedo, la aterida cabeza, y aque
continuo suspirar casi al compás de los pasos! Parecía un
desesperado que iba derecho a descargar sobre el río el fardo de una
vida harto enojosa para llevarla más tiempo. No obstante, pasó por e
puente sin mirar al agua, y no se detuvo hasta el parador situado en la
divisoria de los caminos de Toledo y Andalucía.
Bajo el cobertizo destinado a los alcabaleros y gente del fisco
había hasta dos docenas de hombres de tropa, entre ellos algunos
oficiales de línea y voluntarios realistas de nuevo cuño en tales días
Los paradores cercanos albergaban una fuerza considerable, cuya
misión era guardar aquella principalísima entrada de la corte, ignorante
aún de los sucesos que en el último confín de la Península habían
cambiado el gobierno de constitucional dudoso en absoluto verídico y
puro, poniendo fin entre bombas certeras y falaces manifiestos a los
tres llamados años. En aquel cuerpo de guardia eran examinados los
pasaportes, vigilando con exquisito esmero las entradas y las salidas
mayormente estas últimas, a fin de que no escurriesen el bulto los
sospechosos ni se pusieran en cobro los revolucionarios, cuya última
cuenta se ajustaría pronto en el tremendo Josafat del despotismo.
Acercose el vejete al grupo de oficiales, y reconociendo
prontamente al que sin duda buscaba, que era joven, adusto y
morenote, bastante adelantado en su marcial carrera como
proclamaban las insignias, díjole con mucho respeto:
—Aquí estoy otra vez, señor coronel Garrote. ¿Tiene vuecencia
alguna buena noticia para mí?
—Ni buena ni mala, señor... ¿cómo se llama usted? —repuso e
militar.
—Patricio Sarmiento, para servir a vuecencia y la compañía
Patricio Sarmiento, el mismo que viste y calza, si esto se puede deci
de mi traje y de mis botas. Patricio Sarmiento, el...
—Pase usted adentro —díjole bruscamente el militar, tomándole po
un brazo y llevándole bajo el cobertizo—. Está usted como una sopa.
Un rumor, del cual podía dudarse si era de burla o de lástima, y
quizás provenía de las dos cosas juntamente, acogió la entrada de
infeliz preceptor en la compañía de los militares.
—Sí, señor Garrote —añadió Sarmiento—; soy, como decía, e
hombre más desgraciado de todo el globo terráqueo. Ese cielo que
nos moja no llora más que lloro en estos días, desde que me han
anunciado como probable, como casi cierta, la muerte de mi querido
hijo Lucas, de mi niño adorado, de aquel que era manso cordero en e
hogar paterno y león indómito en los combates... ¡Ah, señores
¡Ustedes no saben lo que es tener un hijo único, y perderlo en una
escaramuza de Andalucía, por descuidos de un general, o po
intrepidez imprudente de un oficialete!... ¿Pero hay esperanzas
todavía de que tan horrible noticia resulte incierta? ¿Se ha sabido
algo? Por Dios, señor Garrote, ¿ha sabido vuecencia si mi idolatrado
unigénito vive aún, o si feneció en esas tremendas batallas?... ¿Hay
algún parte que lo mencione?..., porque Lucas no podía morir como
cualquiera, no: había de morir ruidosa y gloriosísimamente, de una
manera tal, que dé gusto y juego a los historiadores... ¿Ha sabido algo
vuecencia de ayer acá?
—Nada —repuso Garrote fríamente.
—Ha seis días que vengo todas las tardes, y siempre me dice
vuecencia lo mismo —murmuró Sarmiento con angustia—. ¡Nada!
—Desde el primer día manifesté a usted qué nada podía saber.
—Pero a todas horas entran heridos, soldados dispersos, paisanos
correos que vienen de las Andalucías. ¿Se ha olvidado usted de
preguntar?
—No me he olvidado —indicó el coronel con semblante y tono más
compasivos—; pero nadie, absolutamente nadie, tiene noticia de
miliciano Lucas Sarmiento.
—¡Todo sea por Dios! —exclamó el preceptor mirando al cielo—
¡Qué agonía! Unos me dicen que sucumbió, otros que está herido
gravemente... ¿Han entrado hoy muchos milicianos prisioneros?
—Algunos.
—¿No venía Pujitos?
—¿Y quién es Pujitos?
—¡Oh! Vuecencia no conoce a nuestra gente.
—Soy forastero en Madrid.
—¡Oh! Pasaron aquellos tiempos de gloria —exclamó don Patricio
con lágrimas en los ojos, y declamando con cierto énfasis que no
cuadraba mal a su hueca voz y alta figura—. ¡Todo ha caído, todo es
desolación, muerte y ruinas! Aquellos adalides de la libertad, que
arrancaron a la madre España de las garras del despotismo; aquellos
fieros leones matritenses, que con solo un resoplido de su augusta
cólera desbarataron a la Guardia real, ¿qué se hicieron? ¿Qué se hizo
de la elocuencia que relampagueaba tronando en los cafés, con luz y
estruendo sorprendentes? ¿Qué se hizo de aquellas ideas de
emancipación que inundaban de gozo nuestras corazones? Todo cayó
todo se desvaneció en tinieblas, como lumbre extinguida por la
corriente de las aguas. La oleada de fango frailesco ha venido
arrasándolo todo. ¿Quién la detendrá volviéndola a su inmundo
cauce? ¡Estamos perdidos! La patria muere ahogada en lodaza
repugnante y fétido. Los que vimos sus días gloriosos, cuando al son
de patrióticos himnos eran consagradas públicamente las ideas de
libertad y nos hacíamos todos libres, todos igualmente soberanos, los
recordamos como un sueño placentero que no volverá. Despertamos
en la abyección, y el peso y el rechinar de nuestras cadenas nos
indican que vivimos aún. Las iracundas patas del déspota nos
pisotean, y los frailes nos...
—Basta —gritó una formidable voz interrumpiendo bruscamente a
infeliz dómine—. Para sainete basta ya, señor Sarmiento. Si abusa
usted de la benignidad con que se le toleran sus peroratas en atención
al estado de su cabeza, nos veremos obligados a retirarle las licencias
Esto no se puede resistir. Si los desocupados de Madrid le consienten
a usted que vaya de esquina en esquina y de grupo en grupo
divirtiéndoles con sus necedades y reuniendo tras de sí a los chicos
yo no permito que con pretexto de locura o idiotismo se insulte a
orden político que felizmente nos rige...
—¡Ah, señor Garrote, señor Garrote! —dijo Sarmiento moviendo
tristemente la cabeza y sacudiendo menudas gotas de agua sobre los
circunstantes—. Vuecencia me tapa la boca, que es el único desahogo
de mi alma abrasada... Callaré; pero deme vuecencia nuevas de m
hijo, aunque sean nuevas de su muerte.
Garrote encogió los hombros y ofreció una silla al pobre hombre
que, despreciando el asiento, juzgó más eficaz contra la humedad y e
fresco pasearse de un rincón a otro del cobertizo, dando fuertes
patadas y girando rápidamente, como veleta, al dar las vueltas. Los
demás militares y paisanos armados no ocultaban su regocijo ante la
grotesca figura y ditirámbico estilo del anciano, y cada cual imaginaba
un tema de burla con que zaherirle, mortificándole también en su
persona. Este le decía que Su Majestad pensaba nombrarle ministro
de Estado y llavero del reino; aquel que un ejército de carbonarios
venía por la frontera derecho a restablecer la Constitución; uno le
ponía una banqueta delante para que al pasar tropezase y cayese
otro le disparaba con cerbatana un garbanzo haciendo blanco en e
cogote o la nariz. Pero Sarmiento, atento a cosas más graves que
aquel juego importuno, hijo de un sentimiento grosero y vil, no hacía
caso de nada, y solo contestaba con monosílabos, o llevándose la
mano a la parte dolorida.
Había pasado más de un cuarto de hora en este indigno ejercicio
cuando de la venta salió un hombre pequeño, doblado, de mezquina
arquitectura, semejante a la de esos edificios bajos y sólidos que no
tienen por objeto la gallarda expresión de un ideal, sino simplemente
servir para cualquier objeto terrestre y positivo. Siendo posible la
comparación de las personas con las obras de arquitectura, y
habiendo quien se asemeja a una torre gótica, a un palacio señorial, a
un minarete árabe, puede decirse de aquel hombre que parecía una
cárcel. Con su musculatura de cal y canto se avenía maravillosamente
una como falta de luces, rasgo misterioso o inexplicable de su
semblante, que a pesar de tener cuanto corresponde al humano
frontispicio, parecía una fachada sin ventanas. Y no eran pequeños
sus ojos ciertamente, ni dejaban de ver con claridad cuanto enfrente
tenían; pero ello es que mirándole no se podía menos de decir: «¡Qué
cara tan oscura!».
Su fisonomía no expresaba cosa alguna, como no fuera una calma
torva, una especie de acecho pacienzudo. Y a pesar de esto no era
feo, ni sus correctas facciones habrían formado mal conjunto s
estuvieran de otra manera combinadas. Tales o cuales cejas, boca o
narices más o menos distantes de la perfección, pueden ser de
agradable visualidad o de horrible aspecto, según cual sea la
misteriosa conexión que forma con ellas una cara. La de aquel hombre
que allí se apareció era ferozmente antipática. Siempre que vemos po
primera vez a una persona, tratamos, sin darnos cuenta de nuestra
investigación, de escudriñar su espíritu y conocer por el mirar, por la
actitud, por la palabra, lo que piensa y desea. Rara vez dejamos de
enriquecer nuestro archivo psicológico con una averiguación preciosa
Pero enfrente de aquel sótano humano el observador se aturdía
diciendo: «Está tan lóbrego que no veo nada».
Vestía de paisano con cierto esmero, y todas cuantas armas
portátiles se conocen llevábalas él sobre sí, lo cual indicaba que era
voluntario realista. Fusil sostenido a la espalda con tirante, sable
machete, bayoneta, pistolas en el cinto, hacían de él una armería en
toda regla. Calzaba botas marciales con espuelas, a pesar de no se
de a caballo; mas este accesorio solían adoptarlo cariñosamente todos
los militares improvisados de uno y otro bando. Chupaba un cigarrillo
y a ratos se pasaba la mano por la cara, afeitada como la de un fraile
pero su habitual resabio nervioso (estos resabios son muy comunes en
el organismo humano) consistía en estar casi siempre moviendo las
mandíbulas como si rumiara o mascullase alguna cosa. Su nombre de
pila era Francisco Romo.
Don Patricio, luego que le vio, llegose a él y le dijo:
—¡Ah, señor Romo! ¡Cuánto me alegro de verlo! Aquí estoy po
sexta vez buscando noticias de mi hijo.
—¿Qué sabemos nosotros de tu hijo ni del hijo del Zancarrón?
Papá Sarmiento, tú estás en Babia... No tardarás mucho en ir a
Nuncio de Toledo... Ven acá, estafermo —al decir esto le tomaba po
un brazo y le llevaba al interior de la venta que servía de cuerpo de
guardia—, ven acá y sirve de algo.
—¿En qué puedo servir al señor Romo? Diga lo que quiera con ta
que no me pida nada de que resulte un bien al absolutismo.
—Es cosa mía —dijo Romo hablando en voz baja y retirándose con
Sarmiento a un rincón donde no pudieran ser oídos—. Tú, aunque
loco, eres hombre capaz de llevar un recado y ser discreto.
—Un recado... ¿a quién?
—A Elenita, la hija de don Benigno Cordero, que vive en tu misma
casa, ¿eh? Me parece que no te vendrán mal tres o cuatro reales..
Este saco de huesos está pidiendo carne. ¿Cuántas horas hace que
no has comido?
—Ya he perdido la cuenta —repuso el preceptor con afligidísimo
semblante, mientras un lagrimón como garbanzo corría por su mejilla.
—Pues bien, carcamal: aquí tienes una peseta. Es para ti si llevas a
la señorita doña Elena...
—¿Qué?
—Esta carta —dijo Romo mostrando una esquela doblada en pico.
—¡Una carta amorosa! —exclamó Sarmiento ruborizándose—
Señor Romo de mis pecados, ¿por quién me toma usted?
El tono de dignidad ofendida con que hablara Sarmiento, irritó de ta
modo al voluntario realista que, empujando brutalmente al anciano, le
vituperó de este modo:
—¡Dromedario! ¿Qué tienes que decir?... Sí, una carta amorosa. ¿Y
qué?
—Que usted es un simple si me toma por alcahuete —dijo don
Patricio con severo acento—. Guarde usted su peseta, y yo me
guardaré mi gana de comer. ¡Por vida de la chilindraina! No faltan
almas caritativas que hagan limosnas sin humillarnos...
Inflamado en vivísima cólera el voluntario, y sin hallar otras razones
para expresarla que un furibundo terno, descargó sobre el pobre
maestro aburrido uno de esos pescozones de catapulta que abaten de
un golpe las más poderosas naturalezas, y dejándole tendido en tierra
magullados y acardenalados el hocico y la frente, salió del cuerpo de
guardia.
A don Patricio le levantaron casi exánime, y su destartalado cuerpo
se fue estirando poco a poco en la postura vertical, restallándole las
coyunturas como clavijas mohosas. Se pasó la mano por la cara, y
dando un gran suspiro y elevando al cielo los ojos llorosos, exclamó
así con dolorido acento:
—¡Indigno abuso de la fuerza bruta, y de la impunidad que protege
a estos capigorrones!... Si otros fueran los tiempos, otras serían las
nueces... Pero los yunques se han vuelto martillos, y los martillos de
ayer son yunques ahora. ¡Rechilindrona! ¡Malditos sean los instantes
que he vivido después que murió aquella preciosa libertad!...
Y sucediendo la rabia al dolor, se aporreó la cabeza y se mordió los
puños. Habíanle abandonado los que antes le prestaran socorro
porque fuera se sentía gran ruido y salieron todos corriendo al camino
Don Patricio, coronándose dignamente con su sombrero, al cual se
empeñó en devolver su primitiva forma, salió también arrastrado por la
curiosidad.
II

Era que venían por el camino de Andalucía varias carretas


precedidas y seguidas de gente de armas a pie y a caballo, y aunque
no se veían sino confusos bultos a lo lejos, oíase un son a manera de
quejido, el cual, si al principió pareció lamentaciones de seres
humanos, luego se comprendió provenía del eje de un carro que
chillaba por falta de unto. Aquel áspero lamento, unido a la algazara
que hizo de súbito la mucha gente salida de los paradores y ventas
formaba lúgubre concierto, más lúgubre aún a causa de la tristeza de
la noche. Cuando los carros estuvieron cerca, una voz acatarrada y
becerril gritó: «¡Vivan las caenas! ¡Viva el rey absoluto y muera la
nación!». Respondiole un bramido infernal, como si a una rompieran a
gritar todas las cóleras del averno, y al mismo tiempo la luz de las
hachas, prontamente encendidas, permitió ver las terribles figuras que
formaban procesión tan espantosa. Don Patricio, quizás el único
espectador enemigo de semejante espectáculo, sintió los escalofríos
del terror y una angustia mortal que le retuvo inmóvil y casi sin
respiración por algún tiempo.
Los que custodiaban el convoy y los paisanos que le seguían po
entusiasmo absolutista, estaban manchados de fango hasta los ojos
Algunos traían pañizuelo en la cabeza, otros sombrero ancho; muchos
con el desgreñado cabello al aire, roncos, mojados de pies a cabeza
frenéticos, tocados de una borrachera singular que no se sabe si era
de vino o de venganza, brincaban sobre los baches, agitando un girón
con letras, una bota escuálida o un guitarrillo sin cuerdas. Era una
horrenda mezcla de bacanal, entierro y marcha de triunfo. Oíanse
bandurrias desacordes, carcajadas, panderetazos, votos, ternos
kirieleisones, vivas y mueras, todo mezclado con el lenguaje carreteril
con patadas de animales (no todos cuadrúpedos) y con el cascabeleo
de las colleras. Cuando la caravana se detuvo ante el cuerpo de
guardia, aumentó el ruido. La tropa formó al punto, y una nueva
aclamación al rey neto alborotó los caseríos. Salieron mujeres a las
ventanas, candil en mano, y la multitud se precipitó sobre los carros.
Eran estos galeras comunes con cobertizo de cañas y cama hecha
de pellejos y sacos vacíos. En el delantero venían tres hombres, dos
de ellos armados, sanos y alegres, el tercero enfermo y herido
reclinado doloridamente sobre el camastrón, con grillos en los pies y
una larga cadena que, prendida en la cintura y en una de las muñecas
se enroscaba junto al cuerpo como una culebra. Tenía vendada la
cabeza con un lienzo teñido de sangre, y era su rostro amarillo como
vela de entierro. Le temblaban las carnes, a pesar de disfrutar de
abrigo de una manta, y sus ojos extraviados, así como su anhelante
respiración, anunciaban un estado febril y congojoso. Cuando e
coronel Garrote se acercó al carro, y alzando la linterna que en la
mano traía, miró con vivísima curiosidad al preso, este dijo a media
voz:
—¿Estamos ya en Madrid?
Sin hacer caso de la pregunta, Garrote, cuyo semblante expresaba
el goce de una gran curiosidad satisfecha, dijo:
—¿Conque es usted...?
Uno de los hombres armados que custodiaban al preso en el carro
añadió:
—El héroe de las Cabezas.
Y junto al carro sonó este grito de horrible mofa:
—¡Viva Riego!
Garrote se empeñó en apartar a la gente que rodeaba el carro
apiñándose para ver mejor al preso e insultarle más de cerca.
Un hombre alargó el brazo negro, y tocando con su puño cerrado e
cuello del enfermo, gritó:
—¡Ladrón, ahora las pagarás!
El desgraciado general se recostó en su lecho de sacos, y callaba
aunque harto claramente imploraban compasión sus ojos.
—Fuera de aquí. Señores, a un lado —dijo Garrote, aclarando con
suavidad el grupo de curiosos—. Ya tendrán tiempo de verle a sus
anchas...
—Dicen que la horca será la más alta que se ha visto en Madrid —
indicó uno.
—Y que se venderán los asientos en la plaza, como en la de toros.
—Pero déjennoslo ver..., por amor de Dios. Si no nos lo comemos
señor coronel —gruñó una dama del parador cercano.
—¡Si no puede con su alma...! ¿Y ese hombre ha revuelto medio
mundo? Que me lo vengan a decir...
—¡Qué facha! ¿Y dicen que este es Riego?... ¡Qué bobería!... S
parece un sacristán que se ha caído de la torre cuando estaba tocando
a muerto...
—Este es tan Riego como yo.
—Os digo que es el mismo. Le vi yo en el teatro cantando el himno.
—El mismo es. Tiene el mismo parecido del retrato que paseaban
por Platerías.
Hasta aquí las mortificaciones fueron de palabra. Pero un grupo de
hombres que habían salido al encuentro de los carros, una gavilla
mitad armada, mitad desnuda, desarrapada, borracha, tan llena de
rabia y cieno que parecía creación espantosa del lodo de los caminos
de la hez de las tinajas y de la nauseabunda atmósfera de los
presidios, un pedazo de populacho, de esos que desgarrándose se
separan del cuerpo de la nación soberana para correr solo
manchando y envileciendo cuanto toca, empezó a gritar con el gruñido
de la cobardía que se finge valiente fiando en la impunidad:
—¡Que nos lo den; que nos entreguen a ese pillo, y nosotros le
ajustaremos la cuenta!
—Señores —dijo Garrote con energía—, atrás; atrás todo el mundo
El preso va a entrar en Madrid.
—Nosotros le llevaremos.
—Atrás todo el mundo.
Y los pocos soldados que allí había, auxiliados con tibieza por los
voluntarios realistas, apartaban a la gente.
Unos corrieron a curiosear en los carros que venían detrás, y otros
se metieron en la venta, donde sonaban seguidillas, castañuelas
desaforados gritos y chillidos. Un cuero de vino, roto por los golpes y
patadas que recibiera, dejaba salir el rojo líquido, y el suelo de la venta
parecía inundado de sangre. Algunos carreteros sedientos se habían
arrojado al suelo y bebían en el arroyo tinto; los que llegaron más tarde
apuraban lo que había en los huecos del empedrado, y los chicos
lamían las piedras fuera de la venta, a riesgo de ser atropellados po
las mulas desenganchadas que iban de la calle a la cuadra, o del tiro
al abrevadero. Poco después veíanse hombres que parecían
degollados con vida, carniceros o verdugos que se hubieran bañado
en la sangre de sus víctimas. El vino, mezclado al barro y tiñendo las
ropas que ya no tenían color, acababa de dar al cuadro en cada una
de sus figuras un tono crudo de matadero, horriblemente repulsivo a la
vista.
Y a la luz de las hachas de viento y de las linternas, las caras
aumentaban en ferocidad, dibujándose más claramente en ellas la risa
entre carnavalesca y fúnebre que formaba el sentido, digámoslo así
de tan extraño cuadro. Como no había cesado de llover, el piso
inundado era como un turbio espejo de lodo y basura, en cuyo crista
se reflejaban los hombres rojos, las rojas teas, las bayonetas bruñidas
las ruedas cubiertas de tierra, los carros, las flacas mulas, las
haraposas mujeres, el ir y venir, la oscilación de las linternas y hasta e
barullo, los relinchos de brutos y hombres, la embriaguez inmunda, y
por último, aquella atmósfera encendida, espesa, suciamente
brumosa, formada por los alientos de la venganza, de la rusticidad y
de la miseria.
En el segundo carro estaban presos también y heridos los
compañeros de Riego, a saber: el capitán don Mariano Bayo, e
teniente coronel piamontés Virginio Vicenti y el inglés Jorge Matías
Don Patricio Sarmiento, que no se atrevió a acercarse al primer carro
se detuvo breve rato junto al segundo, pasó indiferente por el tercero
donde solo venían sacos y un guerrillero con su mujer, y se dirigió a
cuarto, llamado por una voz débil que claramente dijo:
—Señor don Patricio de mi alma... ¡Bendito sea Dios que me
permite verle!
—¡Pujitos!... ¡Pujitos mío!... —exclamó Sarmiento extendiendo sus
brazos dentro del carro—. ¿Eres tú?... Sí, tú mismo... Dime, ¿estás
herido? Por lo visto, también vienes preso.
—Sí señor —repuso el maestro de obra prima—; herido y preso
estoy... Diga usted, ¿nos ahorcarán?
—¿Pues eso quién lo duda?
—¡Infeliz de mí!... Vea usted los lodos en que han venido a para
aquellos polvos. Bien me lo decía mi mujer... Señor don Patricio, al que
está como yo medio muerto de un bayonetazo en la barriga, deberían
dejarle en manos de Dios para que se lo llevase cuando a su Divina
Majestad le diese la gana, ¿no es verdad?

You might also like