Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2014 IEEE 18th International Enterprise Distributed Object Computing Conference

1-5 Sept. 2014

Filter Results

Displaying Results 1 - 25 of 42
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1125 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2014, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (137 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the EDOC Program Co-Chairs

    Publication Year: 2014, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (166 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2014, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2014, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2014, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2014, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Process Mining as the Superglue Between Data Science and Enterprise Computing

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB) | HTML iconHTML

    Summary form only given. Process mining provides new ways to utilize the abundance of data in enterprises. Suddenly many organizations realize thatsurvival is not possible without exploiting available data intelligently. A new profession is emerging: the data scientist. Justlike computer science emerged as a new discipline from mathematics when computers became abundantly available, we nowsee the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Formalization of Complex Event Stream Processing

    Publication Year: 2014, Page(s):2 - 11
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    Information systems in general, and business processes in particular, generate a wealth of information in the form of event traces or logs. The analysis of these logs, either offline or in real-time, can be put to numerous uses: computation of various statistics, detection of anomalous patterns or compliance violations of some form of contract. However, current solutions for Complex Event Processi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Exception Flows in Integration Systems

    Publication Year: 2014, Page(s):12 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    Enterprise Integration Patterns (EIP) are a collection of widely used patterns for integrating enterprise applications and business processes. These patterns represent a "de-facto" standard for design decisions when integrating enterprise applications. In previous work, the EIP control and data flow syntax and semantics have been expressed in the Business Process Model and Notation (BPMN) as a sem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise Architecture Intelligence: Combining Enterprise Architecture and Operational Data

    Publication Year: 2014, Page(s):22 - 31
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    Combining enterprise architecture and operational data is complex (especially when considering the actual 'matching' of data with enterprise architecture objects), and little has been written on how to do this. Therefore, in this paper we aim to fill this gap and propose a method to combine operational data with enterprise architecture to better support decision-making. Using such a method may res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis

    Publication Year: 2014, Page(s):32 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1077 KB) | HTML iconHTML

    A critical activity in Enterprise Architecture (EA) projects is building models for communicating a consolidated enterprise structure. This is achieved by modeling elements belonging in a plurality of domains (e.g., business, processes, technology, information) and making explicit the relationships existing between them. After models are completed, they are used to support the analysis of the ente... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overview of Enterprise Information Needs in Information Security Risk Assessment

    Publication Year: 2014, Page(s):42 - 51
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    Methods for risk assessment in information security suggest users to collect and consider sets of input information, often notably different, both in type and size. To explore these differences, this study compares twelve established methods on how their input suggestions map to the concepts of ArchiMate, a widely used modeling language for enterprise architecture. Hereby, the study also tests the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise Architecture Analysis with Production Functions

    Publication Year: 2014, Page(s):52 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (581 KB) | HTML iconHTML

    Enterprise Architecture (EA) is a discipline designed to cope with the complexity of modern enterprises at the intersection of information technology and business operations. This article demonstrates how EA models can be enriched with the production function concept from microeconomics, enabling new and business relevant kinds of analysis. The approach is demonstrated through examples regarding g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customization of Domain-Specific Reference Models for Data Warehouses

    Publication Year: 2014, Page(s):61 - 70
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    The availability of reference models for data warehouses lowers the obstacles that inhibit small and medium-sized enterprises (SMEs) from using business intelligence technology. Service providers may offer to companies a set of pre-configured reference models for various industries. Modelers may then customize the chosen reference model, tailoring the model to the specific needs of the individual ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy-Set Based Sentiment Analysis of Big Social Data

    Publication Year: 2014, Page(s):71 - 80
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (493 KB) | HTML iconHTML

    Computational approaches to social media analytics are largely limited to graph theoretical approaches such as social network analysis (SNA) informed by the social philosophical approach of relational sociology. There are no other unified modelling approaches to social data that integrate the conceptual, formal, software, analytical and empirical realms. In this paper, we first present and discuss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting iPhone Sales from iPhone Tweets

    Publication Year: 2014, Page(s):81 - 90
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    Recent research in the field of computational social science have shown how data resulting from the widespread adoption and use of social media channels such as twitter can be used to predict outcomes such as movie revenues, election winners, localized moods, and epidemic outbreaks. Underlying assumptions for this research stream on predictive analytics are that social media actions such as tweeti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Big Data Effectively - A Cloud Provider and a Cloud Consumer Perspective

    Publication Year: 2014, Page(s): 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    Summary form only given. Instrumentation of processes and an organization's environment provides vast amounts of data that can be used to drivedecisions. Next to setting up data collection, supervising data quality, and applying proper methods of analysis, organizationsface the challenge to set up an infrastructure and architecture to do so efficiently and cost-effectively. Virtualized platformssu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Ontological Analysis of Service Modeling at ArchiMate's Business Layer

    Publication Year: 2014, Page(s):92 - 100
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    ArchiMate is a widely-adopted enterprise architecture language based on the "service orientation" paradigm. Although its support for service orientation has had great impact in the representation of (service-oriented) enterprise architectures in the last 10 years, the representation of services in ArchiMate is not without problems. In particular, the predominance of the perspective of service as "... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WPress: An Application-Driven Performance Benchmark for Cloud-Based Virtual Machines

    Publication Year: 2014, Page(s):101 - 109
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    Approaching a comprehensive performance benchmark for on-line transaction processing (OLTP) applications in a cloud environment is a challenging task. Fundamental features of clouds, such as the pay-as-you-go pricing model and unknown underlying configuration of the system, are contrary to the basic assumptions of available benchmarks such as TPC-W or RUBiS. In this paper, we introduce a systemati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Composition for REST

    Publication Year: 2014, Page(s):110 - 119
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    One of the key strengths of service oriented architectures, the concept of service composition to reuse and combine existing services in order to achieve new and superior functionality, promises similar advantages when applied to resources oriented architectures. The challenge in this context is how to realize service composition in compliance with the constraints defined by the REST architectural... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.