11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007)

15-19 Oct. 2007

Filter Results

Displaying Results 1 - 25 of 59
  • 11th IEEE International Enterprise Distributed Object Computing Conference - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • 11th IEEE International Enterprise Distributed Object Computing Conference - Title page

    Publication Year: 2007, Page(s):i - iii
    Request permission for reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • 11th IEEE International Enterprise Distributed Object Computing Conference - Copyright notice

    Publication Year: 2007, Page(s): iv
    Request permission for reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • 11th IEEE International Enterprise Distributed Object Computing Conference - Table of contents

    Publication Year: 2007, Page(s):v - x
    Request permission for reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2007, Page(s): ix
    Request permission for reuse | PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2007, Page(s): x
    Request permission for reuse | PDF file iconPDF (138 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): xi
    Request permission for reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2007, Page(s): xi
    Request permission for reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s): xii
    Request permission for reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2007, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Keynote [Bill Neugent biography]

    Publication Year: 2007, Page(s): xv
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (271 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of Bill Neugent, the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mircea Mihaescu Director, Technology and Innovation, CIO Office IBM

    Publication Year: 2007, Page(s): xvi
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Mr. Mihaescu, Director, WebAhead Development and Security Innovations, has 25 years of experience in information technology systems. Mircea is responsible for the development and adoption of social networking technologies used by the IBM community. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Getting Rid of the OR-Join in Business Process Models

    Publication Year: 2007, Page(s): 3
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (490 KB) | HTML iconHTML

    In practice, the development of process-aware information systems suffers from a gap between conceptual business process models and executable workflow specifications. Because of this gap, conceptual models are hardly reused as execution templates. In this paper, we address the notorious "OR-join problem" that is partly responsible for this gap. At the conceptual level people frequently use OR-joi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Quality of Service Aspects in Top-Down Business Process Development Using WS-CDL and WS-BPEL

    Publication Year: 2007, Page(s): 15
    Cited by:  Papers (11)  |  Patents (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2557 KB) | HTML iconHTML

    Developing cross-organizational business processes is a tedious task. The partners have to agree on a common data format and meaning as well as on the Quality of Service (QoS) requirements each partner has to fulfill. The QoS requirements are typically described using Service Level Agreements (SLAs) among the partners. In this paper, we propose a top-down modeling approach for Web service based bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Graphical Notation for Modeling Complex Events in Business Processes

    Publication Year: 2007, Page(s): 27
    Cited by:  Papers (16)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Using complex event rules for capturing dependencies between business processes is an emerging trend in enterprise information systems. In previous work we have identified a set of requirements for event extensions for business process modeling languages. This paper introduces a graphical language for modeling composite events in business processes, namely BEMN, that fulfills all these requirement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Classification of Differences between Similar BusinessProcesses

    Publication Year: 2007, Page(s): 37
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    To unify similar business processes, such as processes of similar business units or similar organizations, the similarities and differences between these business processes must be detected and the differences must be resolved. This paper presents a classification that describes frequently occurring differences between business processes. This classification is helpful in the difference detection ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing Business Conversations with Consistency Guarantees Using Message-Oriented Middleware

    Publication Year: 2007, Page(s): 51
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    The paper considers distributed applications where interactions between constituent services take place via messages in an asynchronous environment with unpredictable communication and processing delays; further, interacting parties are not required to be online at the same time. Message-oriented middleware (MoM) is commonly used for connecting such loosely coupled distributed applications. Despit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Web Services Message Exchange by SOAP Bundling Framework

    Publication Year: 2007, Page(s): 63
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    Web services use an interoperable and loosely coupled data exchange architecture. Web services processing can cause significant runtime overhead, especially when the number of fine-grained transactions becomes large. Although some best-practice guidelines recommend coarse-grained messages to improve the performance of web services, coarse-grained services may interfere with the componentization of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model-Driven Framework for Trusted Computing Based Systems

    Publication Year: 2007, Page(s): 75
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1346 KB) | HTML iconHTML

    Existing approaches for Trust Management through software alone - by their very principle - are uncompromising and have inherent weaknesses. Once the information leaves the service provider platform, there is no way to guarantee the integrity of the information on the client (or service requestor) platform. The Trusted Computing Group proposed a quantum leap in security, a hardware based "root of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a Privacy-Preserving Benchmarking Enterprise System

    Publication Year: 2007, Page(s): 87
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Benchmarking is the process of comparing one's own performance to the statistics of a group of competitors, named peer group. It is a common and important process in the business world for many important business metrics, called key performance indicators (KPI). Privacy is of the utmost importance, since these KPIs allow the inference of sensitive information. Therefore several secure multiparty c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Configuration of Network Security

    Publication Year: 2007, Page(s): 97
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    The proliferation of networked systems and services along with their exponential growth in complexity and size has increased the control and management complexity of such systems and services by several orders of magnitude. As a result, management tools have failed to cope with and handle the complexity, dynamism, and coordination among network attacks. In this paper, we present a self-configurati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business and IT Alignment with SEAM for Enterprise Architecture

    Publication Year: 2007, Page(s): 111
    Cited by:  Papers (26)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (753 KB) | HTML iconHTML

    To align an IT system with an organization's needs, it is necessary to understand the organization 's position within its environment as well as its internal configuration. In SEAM for enterprise architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process addresses the complete hierarchy. We illustrate the use of SEAM for enterpri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structuring Software Cities A Multidimensional Approach

    Publication Year: 2007, Page(s): 122
    Cited by:  Papers (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    Software cities alias application landscapes of large enterprises comprise tens or even hundreds of IT applications. Structuring software cities into domains is an important task of enterprise architects. The quality of the resulting domain model is crucial for the success of enterprise architecture management and an important tool for the governance of the development of an enterprise's applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise Architecture: A Framework Supporting System Quality Analysis

    Publication Year: 2007, Page(s): 130
    Cited by:  Papers (18)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2779 KB) | HTML iconHTML

    Enterprise Architecture is a model-based approach to business-oriented IT management. To promote good IT decision making, an enterprise architecture framework needs to explicate what kind of analyses it supports. Since creating enterprise architecture models is expensive and without intrinsic value, it is desirable to only create enterprise architecture models based on metamodels that support well... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Tool for Enterprise Architecture Analysis

    Publication Year: 2007, Page(s): 142
    Cited by:  Papers (37)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1045 KB) | HTML iconHTML

    The discipline of enterprise architecture advocates the use of models to support decision-making on enterprise-wide information system issues. In order to provide such support, enterprise architecture models should be amenable to analyses of various properties, as e.g. the availability, performance, interoperability, modifiability, and information security of the modeled enterprise information sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.