By Topic

4-9 July 2011

Filter Results

Displaying Results 1 - 25 of 112
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (986 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (205 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2011, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (196 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2011, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (114 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Workshop Chairs

    Publication Year: 2011, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (216 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (231 KB)
    Freely Available from IEEE
  • Technical Steering and Program Committees

    Publication Year: 2011, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • IEEE Computer Society Technical Committee on Services Computing

    Publication Year: 2011, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (247 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2011, Page(s):xxii - xxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB)

    These plenary keynote speeches discuss the following: cloud first in e-government; cloud computing challenges and solutions; and Web services in the scientific wilds. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel sessions

    Publication Year: 2011, Page(s):xxvi - xxxii
    Request permission for commercial reuse | PDF file iconPDF (782 KB)
    Freely Available from IEEE
  • Tutorials

    Publication Year: 2011, Page(s):xxxiii - xxxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB)

    Provides an abstract for each of the tutorial presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Negotiation towards Service Level Agreements: A Life Cycle Based Approach

    Publication Year: 2011, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (713 KB) | HTML iconHTML

    Service Based Systems (SBSs) are composed of loosely coupled services. Different stakeholders in these systems, e.g. service providers, service consumers, and business decision makers, have different types of concerns which may be dissimilar or inconsistent. Service Level Agreements (SLAs) play a major role in ensuring the quality of SBSs. They stipulate the availability, reliability, and quality ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Web Mashups Full Completion via Frequent Sequence Mining

    Publication Year: 2011, Page(s):9 - 16
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (802 KB) | HTML iconHTML

    In this paper we address the problem of Web Mashups full completion which consists of predicting the most suitable set of (combined) services that successfully meet the goals of an end-user Mashup, given the current service (or composition of services) initially supplied. We model full completion as a frequent sequence mining problem and we show how existing algorithms can be applied in this conte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Practical Architecture of Cloudification of Legacy Applications

    Publication Year: 2011, Page(s):17 - 24
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    Cloud computing has been attracting much attention since its birth. How to cloudify software systems especially legacy applications in the cloud era is becoming increasingly important. Based on RGPS meta-model framework and International standards-ISO/IEC 19763, an architecture for cloudification of legacy applications is proposed, which consists of three parts: a Web portal, a SaaS service superm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management Model Proposal for Portuguese Public Administration Shared Services

    Publication Year: 2011, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (955 KB) | HTML iconHTML

    Portugal was considered in recent surveys as a leading nation in eGovernment implementation at European context. Like the great majority of governments around the world, in the earlier stages, the emphasis was mostly on development e-services at the front-end. However, drawing on OECD's observations, continued expansion in e-services is not possible without integration in government back-end proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radar Management Model and Its Application in Enterprise Transformation and Upgrading

    Publication Year: 2011, Page(s):33 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (854 KB) | HTML iconHTML

    Enterprise management is improving its capacities, with its practice being advanced. However, it is facing greater challenge of transformation and upgrading, as the result of fiercer competition and accelerated globalization driven by global economic changes and IT revolution. Based on three years of studies of thousands of enterprises in 12 industries, jointly conducted by the experts and scholar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human Task Support in Service Composition

    Publication Year: 2011, Page(s):41 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    This paper presents a composite service execution engine, which can support human tasks and improve their execution by an approach of human task scheduling. In the approach, the performance evaluation model is proposed, which can reflect the performance of the human service resources objectively and comprehensively. Based on this model, the initial scheduling as well as re-scheduling methods for s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Organizational Password Policy Compliance via Open Source Tools

    Publication Year: 2011, Page(s):43 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    This study demonstrated two open source applications that can readily be customized and used by organizations to improve compliance with password policies and to ensure the quality of passwords within organizations. The tools address both ends of the password spectrum, in that one tool consists of CGI server code used to generate secure random passwords, while the other tool exemplifies techniques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CEclipse: An Online IDE for Programing in the Cloud

    Publication Year: 2011, Page(s):45 - 52
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB) | HTML iconHTML

    Due to the benefits of cloud computing, many desktop applications have been migrated into the cloud. In order to program in the cloud, lots of IDEs are also moved into the cloud at recent years. Although online IDE can bring developers a lot of convenience for their developing process, some tough problems are still less touched. This paper summarized three main kinds of actual problems from three ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SSC4Cloud Tooling: An Integrated Environment for the Development of Business Processes with Security Requirements in the Cloud

    Publication Year: 2011, Page(s):53 - 60
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1506 KB) | HTML iconHTML

    Cloud Computing, Business Process Modeling (BPM) and Service-oriented architectures (SOA) are playing a relevant role in the evolution of Information Technology (IT). A considerable number of system developers are using Cloud technologies to deploy and make available systems over the Internet. Business Process Management standards are being widely used to model business requirements. In addition, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model-Driven Approach for Monitoring ebBP BusinessTransactions

    Publication Year: 2011, Page(s):61 - 68
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB) | HTML iconHTML

    ebXML BPSS (ebBP) is well-suited to specify Business-to-Business (B2B) interactions as choreographies of so-called Business Transactions. Web Services and WS-BPEL as dedicated interface technologies then can be used to provide the implementation of such choreographies. Tracking and ensuring the progress of choreographies calls for monitoring facilities that require gathering information from log d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing the Distribution of Software Services in Infrastructure Clouds

    Publication Year: 2011, Page(s):69 - 72
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (853 KB) | HTML iconHTML

    In the public perception, cloud computing is frequently associated with almost unlimited elasticity and scalability of computing capacity. However, Infrastructure as a Service in the form of virtual machines provides limited supplies of virtual resources, due to restrictions of the underlying physical hardware. At the same time, the execution of Software as a Service instances leads to a specific ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.