ACM

Displaying 1-20 of 20 results

  • White Papers // Jan 2013

    Connecting Mobile Things to Global Sensor Network Middleware using System-generated Wrappers

    Internet of Things (IoT) will create a cyber-physical world where all the things around us are connected to the Internet, sense and produce "Big data" that has to be stored, processed and communicated with minimum human intervention. With the ever increasing emergence of new sensors, interfaces and mobile devices, the...

    Provided By ACM

  • White Papers // Dec 2012

    Dynamic Resource Provisioning for Cloud-Based Gaming Infrastructures

    Modern Massively Multiplayer Online Games (MMOGs) allow hundreds of thousands of players to interact with a large, dynamic virtual world. Implementing a scalable MMOG service is challenging because the system is subject to high workload variability, and nevertheless must always operate under very strict Quality of Service (QoS) requirements. Traditionally,...

    Provided By ACM

  • White Papers // Oct 2012

    What We Talk About When We Talk About Cloud Network Performance

    Infrastructure-as-a-Service ("Cloud") data-centers intrinsically depend on high-performance networks to connect servers within the data-center and to the rest of the world. Cloud providers typically offer different service levels, and associated prices, for different sizes of virtual machine, memory, and disk storage. However, while all cloud providers provide network connectivity to...

    Provided By ACM

  • White Papers // Sep 2012

    Securing Your Transactions: Detecting Anomalous Patterns in XML Documents

    XML transactions are used in many information systems to store data and interact with other systems. Abnormal transactions, the result of either an on-going cyber attack or the actions of a benign user, can potentially harm the interacting systems and therefore they are regarded as a threat. In this paper...

    Provided By ACM

  • White Papers // Aug 2012

    Epistemic Temporal Logic for Information Flow Security

    Temporal epistemic logic is a well-established framework for expressing agent's knowledge and how it evolves over time. Within language-based security these are central issues, for instance in the context of declassification. The authors propose to bring these two areas together. The paper presents a computational model and an epistemic temporal...

    Provided By ACM

  • White Papers // Aug 2012

    SecureBPMN: Modeling and Enforcing Access Control Requirements in Business Processes

    Modern enterprise systems have to comply to regulations such as Basel III resulting in complex security requirements. These requirements need to be modeled at design-time and enforced at runtime. Moreover, modern enterprise systems are often business-process driven, i. e., the system behavior is described as high-level business processes that are...

    Provided By ACM

  • White Papers // Jul 2012

    BPMN Analysis of Public Procurement

    This paper formulates a realistic case study of a public procurement process, where the national legal system is taken in consideration. Business Process Modeling Notation (BPMN) is used for encoding processes related to the analysis of public procurement tasks. Critical elements in the public procurement process that affect time, quality...

    Provided By ACM

  • White Papers // Apr 2012

    Combining Social Web and BPM for Improving Enterprise Performances: The BPM4People Approach to Social BPM

    Social BPM fuses business process management practices with social networking applications, with the aim of enhancing the enterprise performance by means of a controlled participation of external stakeholders to process design and enactment. This project centered demonstration paper proposes a model-driven approach to participatory and social enactment of business processes....

    Provided By ACM

  • White Papers // Dec 2011

    Experimental Evaluation of Distributed Middleware with a Virtualized Java Environment

    The correctness and performance of large scale service oriented systems depend on distributed middleware components performing various communication and coordination functions. It is, however, very difficult to experimentally assess such middleware components, as interesting behavior often arises exclusively in large scale settings, but such deployments are costly and time consuming....

    Provided By ACM

  • White Papers // Nov 2011

    Security and Safety of Assets in Business Processes

    Business processes and service compositions are defined independent of the realizing systems. The visualization of security and safety constraints on the business process model level appears to be a promising approach to system independent specification of the security and safety requirements. Such requirements can be realized through business process annotation...

    Provided By ACM

  • White Papers // Sep 2010

    Identification of Low-Level Point Radioactive Sources Using a Sensor Network

    Identification of a low-level point radioactive source amidst background radiation is achieved by a network of radiation sensors using a two-step approach. Based on measurements from three or more sensors, a geometric difference triangulation method or an N-sensor localization method is used to estimate the location and strength of the...

    Provided By ACM

  • White Papers // Jun 2010

    A Virtual Cloud Computing Provider for Mobile Devices

    A mobile device like a smart phone is becoming one of main information processing devices for users these days. Using it, a user not only receives and makes calls, but also performs information tasks. However, a mobile device is still resource constrained, and some applications, especially work related ones, usually...

    Provided By ACM

  • White Papers // May 2010

    Quality Management On Amazon Mechanical Turk

    Crowd sourcing services, such as Amazon Mechanical Turk, allow for easy distribution of small tasks to a large number of workers. Unfortunately, since manually verifying the quality of the submitted results is hard, malicious workers often take advantage of the verification difficulty and submit answers of low quality. Currently, most...

    Provided By ACM

  • White Papers // Nov 2009

    Model Checking of Security-Sensitive Business Processes

    Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In this paper, it has been shown that model checking can be profitably used for the automatic analysis of security-sensitive business processes. But building a formal model that simultaneously accounts for both the work flow...

    Provided By ACM

  • White Papers // Jun 2009

    Smart Metering the Clouds

    As cloud computing becomes increasingly pervasive, the data center energy consumption attributable to cloud computing is climbing, despite the clarion call of action to reduce consumption and reverse environmental effects. At the same time, the rising cost of energy - due to regulatory measures enforcing a "True cost" of energy...

    Provided By ACM

  • White Papers // Mar 2009

    Modeling and Monitoring Performance Metrics of WSBPEL Processes

    In this paper, the authors present a model-driven approach to the development of monitoring solutions for WS-BPEL processes. The approach allows modeling of process performance metrics based on a domain-specific language in a platform-independent way, i.e. independent of a proprietary event model of a BPEL engine implementation. They have created...

    Provided By ACM

  • White Papers // Jul 2008

    Controlling Business Process Instance Flexibility Via Rules of Planning

    When an organization decides on the level of flexibility in handling business process instances, it needs to impose this level in operational practice. The way of imposing a given level of flexibility depends on the means employed for controlling business processes. When a Business Process Support (BPS) system is used,...

    Provided By ACM

  • White Papers // May 2008

    Exploring Semantic Interference in Heterogeneous Sensor Networks

    As the use of wireless sensor networks expands, there will be multiple, independent networks operating in the same physical space. These networks will run heterogeneous applications and be managed by different entities. At the same time, the development of commercially available, general purpose sensor platforms makes it likely that co-located...

    Provided By ACM

  • White Papers // Mar 2008

    A Novel Modeling Language for Tool-Based Business Process Engineering

    The increasing complexity of economic interaction of enterprises in inter-organizational value networks presupposes a flexible arrangement of the corresponding business processes. A structured, methodically founded modeling, analysis and controlling of the relevant business processes and performance indicators is essential for the adequate management of the individual enterprise activities in such...

    Provided By ACM

  • White Papers // Feb 2008

    Transformation of SBVR Business Design to UML Models

    This paper presents a methodology for transforming business designs written in OMG's standard Semantics of Business Vocabulary and Rules (SBVR) framework, into a set of UML models. It involves the transformation of business vocabulary and rules written in SBVR's \"Structured English\" into a set of UML diagrams, which includes Activity...

    Provided By ACM

  • White Papers // Jan 2013

    Connecting Mobile Things to Global Sensor Network Middleware using System-generated Wrappers

    Internet of Things (IoT) will create a cyber-physical world where all the things around us are connected to the Internet, sense and produce "Big data" that has to be stored, processed and communicated with minimum human intervention. With the ever increasing emergence of new sensors, interfaces and mobile devices, the...

    Provided By ACM

  • White Papers // Jun 2010

    A Virtual Cloud Computing Provider for Mobile Devices

    A mobile device like a smart phone is becoming one of main information processing devices for users these days. Using it, a user not only receives and makes calls, but also performs information tasks. However, a mobile device is still resource constrained, and some applications, especially work related ones, usually...

    Provided By ACM

  • White Papers // Oct 2012

    What We Talk About When We Talk About Cloud Network Performance

    Infrastructure-as-a-Service ("Cloud") data-centers intrinsically depend on high-performance networks to connect servers within the data-center and to the rest of the world. Cloud providers typically offer different service levels, and associated prices, for different sizes of virtual machine, memory, and disk storage. However, while all cloud providers provide network connectivity to...

    Provided By ACM

  • White Papers // Dec 2012

    Dynamic Resource Provisioning for Cloud-Based Gaming Infrastructures

    Modern Massively Multiplayer Online Games (MMOGs) allow hundreds of thousands of players to interact with a large, dynamic virtual world. Implementing a scalable MMOG service is challenging because the system is subject to high workload variability, and nevertheless must always operate under very strict Quality of Service (QoS) requirements. Traditionally,...

    Provided By ACM

  • White Papers // Dec 2011

    Experimental Evaluation of Distributed Middleware with a Virtualized Java Environment

    The correctness and performance of large scale service oriented systems depend on distributed middleware components performing various communication and coordination functions. It is, however, very difficult to experimentally assess such middleware components, as interesting behavior often arises exclusively in large scale settings, but such deployments are costly and time consuming....

    Provided By ACM

  • White Papers // Mar 2008

    A Novel Modeling Language for Tool-Based Business Process Engineering

    The increasing complexity of economic interaction of enterprises in inter-organizational value networks presupposes a flexible arrangement of the corresponding business processes. A structured, methodically founded modeling, analysis and controlling of the relevant business processes and performance indicators is essential for the adequate management of the individual enterprise activities in such...

    Provided By ACM

  • White Papers // May 2008

    Exploring Semantic Interference in Heterogeneous Sensor Networks

    As the use of wireless sensor networks expands, there will be multiple, independent networks operating in the same physical space. These networks will run heterogeneous applications and be managed by different entities. At the same time, the development of commercially available, general purpose sensor platforms makes it likely that co-located...

    Provided By ACM

  • White Papers // Sep 2010

    Identification of Low-Level Point Radioactive Sources Using a Sensor Network

    Identification of a low-level point radioactive source amidst background radiation is achieved by a network of radiation sensors using a two-step approach. Based on measurements from three or more sensors, a geometric difference triangulation method or an N-sensor localization method is used to estimate the location and strength of the...

    Provided By ACM

  • White Papers // Sep 2012

    Securing Your Transactions: Detecting Anomalous Patterns in XML Documents

    XML transactions are used in many information systems to store data and interact with other systems. Abnormal transactions, the result of either an on-going cyber attack or the actions of a benign user, can potentially harm the interacting systems and therefore they are regarded as a threat. In this paper...

    Provided By ACM

  • White Papers // Aug 2012

    Epistemic Temporal Logic for Information Flow Security

    Temporal epistemic logic is a well-established framework for expressing agent's knowledge and how it evolves over time. Within language-based security these are central issues, for instance in the context of declassification. The authors propose to bring these two areas together. The paper presents a computational model and an epistemic temporal...

    Provided By ACM

  • White Papers // Nov 2011

    Security and Safety of Assets in Business Processes

    Business processes and service compositions are defined independent of the realizing systems. The visualization of security and safety constraints on the business process model level appears to be a promising approach to system independent specification of the security and safety requirements. Such requirements can be realized through business process annotation...

    Provided By ACM

  • White Papers // Nov 2009

    Model Checking of Security-Sensitive Business Processes

    Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In this paper, it has been shown that model checking can be profitably used for the automatic analysis of security-sensitive business processes. But building a formal model that simultaneously accounts for both the work flow...

    Provided By ACM

  • White Papers // Apr 2012

    Combining Social Web and BPM for Improving Enterprise Performances: The BPM4People Approach to Social BPM

    Social BPM fuses business process management practices with social networking applications, with the aim of enhancing the enterprise performance by means of a controlled participation of external stakeholders to process design and enactment. This project centered demonstration paper proposes a model-driven approach to participatory and social enactment of business processes....

    Provided By ACM

  • White Papers // Jul 2008

    Controlling Business Process Instance Flexibility Via Rules of Planning

    When an organization decides on the level of flexibility in handling business process instances, it needs to impose this level in operational practice. The way of imposing a given level of flexibility depends on the means employed for controlling business processes. When a Business Process Support (BPS) system is used,...

    Provided By ACM

  • White Papers // Mar 2009

    Modeling and Monitoring Performance Metrics of WSBPEL Processes

    In this paper, the authors present a model-driven approach to the development of monitoring solutions for WS-BPEL processes. The approach allows modeling of process performance metrics based on a domain-specific language in a platform-independent way, i.e. independent of a proprietary event model of a BPEL engine implementation. They have created...

    Provided By ACM

  • White Papers // Feb 2008

    Transformation of SBVR Business Design to UML Models

    This paper presents a methodology for transforming business designs written in OMG's standard Semantics of Business Vocabulary and Rules (SBVR) framework, into a set of UML models. It involves the transformation of business vocabulary and rules written in SBVR's \"Structured English\" into a set of UML diagrams, which includes Activity...

    Provided By ACM

  • White Papers // Aug 2012

    SecureBPMN: Modeling and Enforcing Access Control Requirements in Business Processes

    Modern enterprise systems have to comply to regulations such as Basel III resulting in complex security requirements. These requirements need to be modeled at design-time and enforced at runtime. Moreover, modern enterprise systems are often business-process driven, i. e., the system behavior is described as high-level business processes that are...

    Provided By ACM

  • White Papers // Jul 2012

    BPMN Analysis of Public Procurement

    This paper formulates a realistic case study of a public procurement process, where the national legal system is taken in consideration. Business Process Modeling Notation (BPMN) is used for encoding processes related to the analysis of public procurement tasks. Critical elements in the public procurement process that affect time, quality...

    Provided By ACM

  • White Papers // Jun 2009

    Smart Metering the Clouds

    As cloud computing becomes increasingly pervasive, the data center energy consumption attributable to cloud computing is climbing, despite the clarion call of action to reduce consumption and reverse environmental effects. At the same time, the rising cost of energy - due to regulatory measures enforcing a "True cost" of energy...

    Provided By ACM

  • White Papers // May 2010

    Quality Management On Amazon Mechanical Turk

    Crowd sourcing services, such as Amazon Mechanical Turk, allow for easy distribution of small tasks to a large number of workers. Unfortunately, since manually verifying the quality of the submitted results is hard, malicious workers often take advantage of the verification difficulty and submit answers of low quality. Currently, most...

    Provided By ACM