By Topic

Ninth IEEE International EDOC Enterprise Computing Conference (EDOC'05)

Date 19-23 Sept. 2005

Filter Results

Displaying Results 1 - 25 of 32
  • Ninth IEEE International EDOC Enterprise Computing Conference

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Ninth IEEE International EDOC Enterprise Computing Conference - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Ninth IEEE International EDOC Enterprise Computing Conference - Copyright

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Ninth IEEE International EDOC Enterprise Computing Conference - Table of contents

    Publication Year: 2005, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2005, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (25 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee Members and Reviewers

    Publication Year: 2005, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Bridging the gap between data warehouses and business processes: a business intelligence perspective for event-driven process chains

    Publication Year: 2005, Page(s):3 - 14
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Data warehouse (DWH) information is accessed by business processes, and sometimes may also initiate changes of the control flow of business process instances. Today, there are no conceptual models available that make the relationship between the DWH and the business processes transparent. In this paper, we extend the event-driven process chain, a business process modeling language, with an additio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending BPEL for run time adaptability

    Publication Year: 2005, Page(s):15 - 26
    Cited by:  Papers (43)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    The existing Web service flow (WS-flow) technologies enable both static and dynamic binding of participating Web services (WSs) on the process model level. Adaptability on per-instance basis is not sufficiently supported and therefore must be addressed to improve process flexibility upon changes in the environment. Ad-hoc process instance changes can be enabled by swapping participating WS instanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent aggregation of purchase orders in e-procurement

    Publication Year: 2005, Page(s):27 - 36
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    A large enterprise generates millions of purchase orders (PO) each year buying various types of goods and services. Each PO has a cost associated with it. This cost comprises multiple elements including the price of the good or service, the shipping and handling of the purchase, and the overhead in initiating, generating, tracking, and managing the PO. To reduce the cost of doing business, it is i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning, planning, and the life cycle of workflow management

    Publication Year: 2005, Page(s):39 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    This paper describes an approach towards workflow management based on the combination of learning and planning. Assuming that processes cannot be fully described at build-time, the approach makes use of learning techniques, namely inductive logic programming (ILP), in order to discover workflow activities as planning operators. These operators are subsequently fed to a partial-order planner in ord... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealing with contract violations: formalism and domain specific language

    Publication Year: 2005, Page(s):46 - 57
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    This paper presents a formal system for reasoning about violations of obligations in contracts. The system is based on the formalism for the representation of contrary-to-duty obligations. These are the obligations that take place when other obligations are violated as typically applied to penalties in contracts. The paper shows how this formalism can be mapped onto the key policy concepts of a co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling mobile health systems: an application of augmented MDA for the extended healthcare enterprise

    Publication Year: 2005, Page(s):58 - 69
    Cited by:  Papers (4)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    Mobile health systems can extend the enterprise computing system of the healthcare provider by bringing services to the patient any time and anywhere. We propose a model-driven design and development methodology for the development of the m-health components in such extended enterprise computing systems. The methodology applies a model-driven design and development approach augmented with formal v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture for flexible Web service QoS negotiation

    Publication Year: 2005, Page(s):70 - 79
    Cited by:  Papers (21)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    The Web service selection phase is usually driven only by functional requirements. Non functional requirements, such as quality of service, should be negotiated by the service consumer and the service provider during service invocation in order to produce a contract to manage service provisioning and to monitor the actual fulfilment of negotiated SLAs. In this paper, an automated approach to Web s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ontology urbanization for semantic integration: dealing with semantics within large and dynamic enterprises

    Publication Year: 2005, Page(s):83 - 94
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    Nowadays, enterprise application integration (EAI) constitutes a real and growing need for most of enterprises, especially for large and dynamic enterprises of heterogeneous, autonomous and distributed information systems. Actually, the major problem of EAI is the heterogeneity problem, especially the semantic integration one. This latter is not correctly addressed by today's solutions, which focu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FTWeb: a fault tolerant infrastructure for Web services

    Publication Year: 2005, Page(s):95 - 105
    Cited by:  Papers (29)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    The Web services architecture came as answers to the search for interoperability among applications. There has been a growing interest in deploying on the Internet applications with high availability and reliability requirements. However, the technologies associated with this architecture still do not deliver adequate support to this requirement. The model proposed in this article is located in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for specifying contract mediated interactions

    Publication Year: 2005, Page(s):106 - 115
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    To form and automatically manage partnerships within a virtual organisation, it is necessary to have an electronic representation of the contract governing business relationships that can be used to mediate the rights and obligations that each interacting entity promises to honour. The paper describes a general method of representing business interactions using a widely used modelling language Pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An aspect oriented model driven framework

    Publication Year: 2005, Page(s):119 - 130
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    In model driven development (MDD), specifying transformations between models at various levels of abstraction can be a complex task. Specifying transformations for pervasive system features that are tangled with other system features is particularly difficult because the elements to be transformed are distributed across a model. This paper presents an aspect oriented model driven framework (AOMDF)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transaction support using unit of work modeling in the context of MDA

    Publication Year: 2005, Page(s):131 - 141
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Transactions are an important part of most enterprise computing systems. Sometimes they are supported by DBMS and sometimes by transaction monitors. In either case, they are part of the platform used by application developers. A platform independent model of enterprise computing must abstract away transactions and provide platform independent ways of describing them. This paper shows how "unit of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An MBA-oriented .Net metamodel

    Publication Year: 2005, Page(s):142 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    As an intermediate step within a larger endeavor aiming at the definition of automatic transformations between two widespread technologies, namely EJB and .Net components, we propose and discuss a metamodel for the .Net platform that captures the appropriate modeling concepts required for the definition and automatic generation of .Net PSMs from (legacy) J2EE PSMs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to relate business and application services using ISDL

    Publication Year: 2005, Page(s):157 - 168
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB) | HTML iconHTML

    This paper presents a service-oriented design approach that allows one to relate services modelled at different levels of granularity during a design process, such as business and application services. To relate these service models we claim that a 'concept gap' and an 'abstraction gap' need to be bridged. The concept gap represents the difference between the conceptual models used to construct se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling the ODP computational viewpoint with UML 2.0

    Publication Year: 2005, Page(s):169 - 180
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB) | HTML iconHTML

    The ODP computational viewpoint describes the functionality of a system and its environment in terms of a configuration of objects interacting at interfaces, independently of their distribution. Up until UML version 2.0, both the lack of precision in the UML definition and the semantic gap between the ODP concepts and the UML constructs hindered its application for ODP computational viewpoint mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantics of UML 2.0 activity diagram for business modeling by means of virtual machine

    Publication Year: 2005, Page(s):181 - 192
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    The paper proposes a more formalized definition of UML 2.0 activity diagram semantics. A subset of activity diagram constructs relevant for business process modeling is considered. The semantics definition is based on the original token flow methodology, but a more constructive approach is used. The activity diagram virtual machine is defined by means of a metamodel, with operations defined by a m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing fair non-repudiable interactions with Web services

    Publication Year: 2005, Page(s):195 - 206
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    The use of open, Internet-based communications for business-to-business (B2B) interactions requires accountability for and acknowledgment of the actions of participants. Accountability and acknowledgment can be achieved by the systematic maintenance of an irrefutable audit trail to render the interaction non-repudiable. To safeguard the interests of each party, the mechanisms used to meet this req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of enterprise information security - the importance of prioritization $

    Publication Year: 2005, Page(s):207 - 218
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (735 KB) | HTML iconHTML

    Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise information security. The paper thus considers how we may know what parts of information security are important for a company to address and what parts are not. Two methods for prioritization are used. The results demonstrate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving IT management at the BMW Group by integrating existing IT management processes

    Publication Year: 2005, Page(s):219 - 225
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    The management of IT landscapes consisting of thousands of business applications, different middleware systems, and supporting various business processes is a challenge for modern IT management. The BMW Group has addressed this challenge by establishing an integrated IT management process which covers strategy, architecture, planning and controlling. The BMW Group integrates the following preexist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.