By Topic

2010 14th IEEE International Enterprise Distributed Object Computing Conference

25-29 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 38
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (616 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2010, Page(s):viii - ix
    Request permission for commercial reuse | PDF file iconPDF (103 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Co-chairs

    Publication Year: 2010, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (103 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (83 KB) | HTML iconHTML
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2010, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s):xiv - xvi
    Request permission for commercial reuse | PDF file iconPDF (114 KB) | HTML iconHTML
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2010, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Keynote abstracts

    Publication Year: 2010, Page(s):xix - xxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB)

    The talk starts from a dream/vision paper I published in 2008, whose title is a play on that of John Backus' famous Turing Award Lecture (and paper). I will propose that - or rather ask whether - programming can be made to be a lot closer to the way humans think about dynamics, and the way they manage to get others (e.g., their children, their employees, etc.) to do what they have in mind. Technic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Portfolio Valuation - Using Enterprise Architecture and Business Requirements Modeling

    Publication Year: 2010, Page(s):3 - 13
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (807 KB) | HTML iconHTML

    This paper describes our architecture-based approach to IT valuation. It sketches how different valuation methods can be combined and linked to models of business requirements and enterprise architecture, and how a first part of this approach is realized using Archi Mate and BiZZ design Architect. In this manner, the value and cost of different elements in the architecture can be computed and attr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise Architecture Meta Models for IT/Business Alignment Situations

    Publication Year: 2010, Page(s):14 - 23
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    Enterprise Architecture models can be used to support IT/business alignment. However, existing approaches do not distinguish between different IT/business alignment situations. Since companies face diverse challenges in achieving a high degree of IT/business alignment, a universal `one size fits all' approach does not seem appropriate. This paper proposes to decompose the IT/business alignment pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting Change Propagation in the Evolution of Enterprise Architectures

    Publication Year: 2010, Page(s):24 - 33
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    Enterprise Architecture (EA) models the whole vision of an organisation in various aspects regarding both business processes and information technology resources. As the organisation grows, the architecture governing its systems and processes must also evolve to meet with the demands of the business environment. In this context, a critical issue is change propagation: given a set of primary change... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An EA-approach to Develop SOA Viewpoints

    Publication Year: 2010, Page(s):37 - 46
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1177 KB) | HTML iconHTML

    The paradigm of service orientation is heavily used to design complex IT systems able to satisfy the need for an agile business support. Many enterprises have established service-oriented architectures (SOAs) of different size and complexity. However, such SOAs need efficient management and the discipline of enterprise architecture management has only just begun to reflect the shift from applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What is Different in Quality Management for SOA?

    Publication Year: 2010, Page(s):47 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    With the service-oriented paradigm, some established ways of thinking about software quality and its assurance seem to change. But things do not necessarily become more difficult. Some considerable advancements to traditional ways of quality management can be introduced through the use of service-based systems, leading to largely reduced efforts and increased quality. In this article we identify t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Probabilistic Relational Models for System Quality Analysis

    Publication Year: 2010, Page(s):57 - 66
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1413 KB) | HTML iconHTML

    The formalism Probabilistic Relational Models (PRM) couples discrete Bayesian Networks with a modeling formalism similar to UML class diagrams and has been used for architecture analysis. PRMs are well-suited to perform architecture analysis with respect to system qualities since they support both modeling and analysis within the same formalism. A particular strength of PRMs is the ability to perf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Typed Business Process Specification

    Publication Year: 2010, Page(s):69 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    In this paper we propose a typed approach to business process specification based on typed workflow charts. These can be exploited as a domain-specific programming language and facilitate tight integration between workflow definition and system dialogue programming. The approach also supports the integration of business process modeling and business process automation. We discuss two ways of explo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Incremental Process Mining Approach to Extract Knowledge from Legacy Systems

    Publication Year: 2010, Page(s):79 - 88
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    Several approaches have already been proposed to extract both business processes and business rules from a legacy source code. These approaches consider static source code analysis for the extraction procedure. However, business processes have components that can not be directly extracted by static analysis (i.e., participants, responsibilities, and concurrent activities). Moreover, well-known sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process Viewing Patterns

    Publication Year: 2010, Page(s):89 - 98
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    Business processes represent a fundamental asset of a company as they describe the core knowledge underlying its competitive advantage. Tools for modeling and analysis of business processes have to cope with the increasing complexity of these processes. A view on a process intends to abstract from details and make complex processes easier to understand. A process view results from specific transfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Service Outsourcing Using Process Views

    Publication Year: 2010, Page(s):99 - 108
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (761 KB) | HTML iconHTML

    Service outsourcing is a business paradigm in which an organization has a part of its business process performed by a service provider. Process views are pivotal to support this way of working. A process view shields secret or irrelevant details from a private business process, thus allowing an organization to reveal only public, relevant parts of its private business process to partner organizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Ontology-Based Approach for Semantic Integration

    Publication Year: 2010, Page(s):111 - 120
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (550 KB) | HTML iconHTML

    One of the main challenges for enterprise application integration is the semantically correct integration of systems. There are many approaches that aim to address this problem, but most of them focus mainly on technical and syntactical aspects. This paper presents an Ontology-Based Approach for Semantic Integration (OBA-SI), which uses ontologies as conceptual models for defining mappings between... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model-Driven Approach for Designing E-Services Using Business Ontological Frameworks

    Publication Year: 2010, Page(s):121 - 130
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (645 KB) | HTML iconHTML

    A constant goal of enterprises of all sizes is to align their business with IT. The major concern is to design the technology to support the desired performance goals and business values. In e-business collaborations, services are becoming the cornerstones for modeling the offerings of the involved parties. However, business concepts, like value offerings, typically cannot be linked to technology ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise Application-Specific Data Management

    Publication Year: 2010, Page(s):131 - 140
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (10506 KB) | HTML iconHTML

    Enterprise applications are presently built on a 20-year old data management infrastructure that was designed to meet a specific set of requirements for OLTP systems. In the meantime, enterprise applications have become more sophisticated, data set sizes have increased, requirements on the freshness of input data have been strengthened, and the time allotted for completing business processes has b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.