Vienna University of Economics and Business

Displaying 1-40 of 139 results

  • White Papers // Sep 2013

    A Framework and Middleware for Application-Level Cloud Bursting on Top of Infrastructure-as-a-Service Clouds

    A core idea of cloud computing is elasticity, i.e., enabling applications to adapt to varying load by dynamically acquiring and releasing cloud resources. One concrete realization is cloud bursting, which is the migration of applications or parts of applications running in a private cloud to a public cloud to cover...

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2013

    Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations

    Dowser is a 'Guided' fuzzer that combines taint tracking, program analysis and symbolic execution to find buffer overflow and underflow vulnerabilities buried deep in a program's logic. The key idea is that analysis of a program lets the users pinpoint the right areas in the program code to probe and...

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2013

    Interactive Visual Transformation for Symbolic Representation of Time-oriented Data

    Data mining on time-oriented data has many real-world applications, like optimizing shift plans for shops or hospitals, or analyzing traffic or climate. As those data are often very large and multi-variate, several methods for symbolic representation of time-series have been proposed. Some of them are statistically robust, have a lower-bound...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2013

    Evolving Graph Databases Under Description Logic Constraints

    In the setting of graph-structured data, description logics are well suited to impose constraints that capture the semantics of the do-main of interest. When the data evolves as a result of operations carried out by users or applications, it is important to ensure that the satisfaction of the constraints is...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2013

    RESTful Business Process Management in the Cloud

    As more and more business processes are migrated into cloud-based runtimes, there is a need to manage their state to provide support for quality attributes such as elasticity, scalability and dependability. In this paper, the authors discuss how the REST architectural style provides a sensible choice to manage and publish...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2013

    SOA Model for High Availability of Services

    Service-Oriented Architecture (SOA) provides reusability and enables easy functionality integration. Service availability in SOA is important as it is used by safety critical systems, telecommunication systems and business systems. Service unavailability can result in reduced profits, reputation damage and reduced safety. Machine virtualization, clusters and group communication systems are used...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2013

    Minimum Variance Estimation of a Sparse Vector Within the Linear Gaussian Model: An RKHS Approach

    The authors consider minimum variance estimation within the Sparse Linear Gaussian Model (SLGM). A sparse vector is to be estimated from a linearly transformed version embedded in Gaussian noise. Their analysis is based on the theory of Reproducing Kernel Hilbert Spaces (RKHS). After a characterization of the RKHS associated with...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2013

    Efficient Updates of Uncertain Databases

    Uncertain databases have evolved as an active area of database research, surveyed, for example, in. The possible world's semantics is commonly used to deal with uncertain data. Several representation systems for uncertain data-bases have been proposed to provide efficient storage and query facilities for a potentially big number of possible...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2013

    Toward a Cloud-Based Integration of IR Tools

    In this paper, the authors present the case for creating a cloud-based infrastructure for IR. The infrastructure should provide access to multiple components of IR systems and a method to easily integrate them in various configurations, as well as data and parameters used in IR experiments. Workflow tools are promising...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2013

    Securing a Space-Based Service Architecture With Coordination-Driven Access Control

    In distributed applications, multiple autonomous processes need to collaborate in an efficient way. Space-based middleware enables data-driven coordination for these processes via shared tuple spaces that allow a decoupled form of communication. Complex coordination logic may be provided to clients via reusable service components that access such tuple spaces to...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2013

    dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection

    In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operating system kernel provides an extremely powerful tool. Kernel-level code can introduce hard to detect backdoors, provide stealth by hiding les, processes or other...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2013

    M2M Platform-as-a-Service for Sustainability Governance

    Recently, cloud computing technologies have been employed for large-scale Machine-To-Machine (M2M) systems, as they could potentially offer better solutions for managing monitoring data and analytics applications to support the needs of different consumers. However, there exist complex relationships between monitored objects, monitoring data, analysis features, and stakeholders in M2M that...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2013

    Application-Level Performance Monitoring of Cloud Services Based on the Complex Event Processing Paradigm

    Monitoring of applications deployed to Infrastructure-as-a-Service clouds is still an open problem. In this paper, the authors discuss an approach based on the complex event processing paradigm, which allows application developers to specify and monitor high-level application performance metrics. They use the case of a Web 2.0 sentiment analysis application...

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2013

    Lines of Malicious Code: Insights Into the Malicious Software Industry

    Malicious software installed on infected computers is a fundamental component of online crime. Malware development thus plays an essential role in the underground economy of cyber-crime. Malware authors regularly update their software to defeat defenses or to support new or improved criminal business models. A large body of research has...

    Provided By Vienna University of Economics and Business

  • White Papers // Nov 2012

    Vanity, Cracks and Malware

    Today, a large amount of software products include mechanisms to counter software piracy. However, most protection mechanisms can be easily circumvented by applying soft-ware patches (cracks) or license key generators (keygens) with seemingly no financial incentives. The authors' research shows that the distribution of cracks and keygens not only al-lows...

    Provided By Vienna University of Economics and Business

  • White Papers // Oct 2012

    Automatic SLA Matching and Provider Selection in Grid and Cloud Computing Markets

    Cloud computing is a novel computing paradigm that offers data, software, and hardware services in a manner similar to traditional utilities such as water, electricity, and telephony. Usually, in Cloud and Grid computing, contracts between traders are established using Service Level Agreements (SLAs), which include objectives of service usage. However,...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2012

    Conflict Visualization for Evolving UML Models

    The urgent demand for supporting teamwork and continuous evolution of software models triggered intensive research on optimistic version control systems for models. State-of-the-art model versioning approaches primarily focus on detecting changes and conflicts between concurrently evolved versions of a model. However, techniques for conflict visualization have been hardly investigated yet....

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2012

    Optimized Execution of Business Processes on Crowdsourcing Platforms

    Crowdsourcing in enterprises is a promising approach for organizing a flexible workforce. Recent developments show that the idea gains additional momentum. However, an obstacle for widespread adoption is the lack of an integrated way to execute business processes based on a crowdsourcing platform. The main difference compared to traditional approaches...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2012

    Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation

    The essential characteristics of cloud computing such as elasticity or broad network access provide many economic benefits for their users, but with these benefits also many security and privacy risks come along. These risks can be generally classified into legal and technical risks. The upcoming general data protection regulation by...

    Provided By Vienna University of Economics and Business

  • White Papers // Aug 2012

    Virtualizing Software and Humans for Elastic Processes in Multiple Clouds - A Service Management Perspective

    There is a growing trend of combining human-based computation with machine-based computation to solve complex problems which cannot be answered with machine-based computation alone. From the computing perspective, integrating machine-based computing elements with human-based computing elements and provisioning them under the same model will facilitate the resource elasticity required by...

    Provided By Vienna University of Economics and Business

  • White Papers // Aug 2012

    Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures

    Cloud providers aim at guaranteeing Service Level Agreements (SLAs) in a resource-efficient way. This, amongst others, means that resources of Virtual (VMs) and Physical Machines (PMs) have to be autonomically allocated responding to external influences as workload or environmental changes. Thereby, Workload Volatility (WV) is one of the crucial factors...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2012

    Identifying Incompatible Implementations of Industry Standard Service Interfaces for Dependable Service-Based Applications

    In this paper, the authors study fault localization techniques for identification of incompatible configurations and implementations in Service-Based Applications (SBAs). They consider SBAs with abstract service interfaces that integrate multiple concrete service implementations from various providers. Practice has shown that standardized interfaces alone do not guarantee compatibility of services originating...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2012

    Enhanced Sharing and Privacy in Collaborative Virtual Teams

    Privacy concerns keep users from sharing required information in a collaborative environment. There is a need of privacy preserving methods that can enhance flow of information among collaborating users in dynamic teams without compromising their privacy. The authors describe a user-defined role-based sharing control model and architecture that uses hybrid...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Ethics in Security Research Which Lines Should Not Be Crossed?

    Recently, several research papers in the area of information security were published that may or may not be considered unethical. Looking at these borderline cases is relevant as today's research papers will influence how young researchers conduct their research. In this paper, the authors discuss fundamental ethical principles and their...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Automation Possibilities in Information Security Management

    Information security management, as defined in ISO 27001, deals with establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an information security management system. This paper provides an analysis about the automation possibilities in information security management. The analysis takes into account the potential of using security ontologies in risk management,...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Tor HTTP Usage and Information Leakage

    This paper analyzes the web browsing behavior of Tor users. By collecting HTTP requests the authors show which websites are of interest to Tor users and they determined an upper bound on how vulnerable Tor users are to sophisticated de-anonymization attacks: up to 78 % of the Tor users do...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Accurate SINR Estimation Model for System Level Simulation of LTE Networks

    This paper presents an SINR prediction model for LTE systems with the aim of improving the accuracy of physical layer models used for higher-than-physical-level simulations. This physical layer SINR abstraction for zero-forcing receivers takes channel estimation errors into account. It allows for the calculation of the post-equalization receive SINR of...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Joint Network-Channel Coding for the Asymmetric Multiple-Access Relay Channel

    In this paper, the authors consider the time-division Multiple Access Relay Channel (MARC). They propose a low-complexity compress-and-forward-based transmission scheme that consists of a scalar quantization of Log-Likelihood Ratios (LLRs), followed by a suitably defined network code. This scheme is well suited also for asymmetric source-relay channel conditions. They use...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Adaptive Channel Direction Quantization Based on Spherical Prediction

    In this paper, the authors present algorithms for the quantization of a correlated unit norm random vector process. Such algorithms are important, e.g., for channel vector quantization in wireless communication systems. Starting from a quantization codebook that uniformly quantizes the unit sphere, they propose to iteratively adapt the codebook to...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Workflow-Based Composition and Testing of Combined e-services and components

    Information systems are increasingly built using component models such as Enterprise Java Beans, COM+, or CORBA objects. Dynamically aggregated and composed Web services can be seen as a newly emerging research area for Service Oriented Architectures, which are combined with components. The authors' paper presents three main arguments: that composition...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Semantic Inter-Organizational Performance Analysis Using the Balanced Scorecard Methodology

    Evaluating Inter-Organizational Relationships (IORs) is important in today's businesses for increasing competitiveness and business potential. Typically, IORs are measured by high-level Key Performance Indicators (KPIs) such as trust, knowledge sharing, and others. However, these high-level KPIs are difficult to be measured quantitatively. It is therefore difficult to determine IORs and...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2012

    Energy Efficient Service Delivery in Clouds in Compliance with the Kyoto Protocol

    Cloud computing is revolutionizing the ICT landscape by providing scalable and efficient computing resources on demand. The ICT industry - especially data centers, are responsible for considerable amounts of CO2 emissions and will very soon be faced with legislative restrictions, such as the Kyoto protocol, defining caps at different organizational...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2012

    Quality-Aware Service-Oriented Data Integration: Requirements, State of the Art and Open Challenges

    With a multitude of data sources available online, data consumers might find it hard to select the best combination of sources for their needs. Aspects such as price, licensing, service and data quality play a major role in selecting data sources. The authors therefore advocate quality-aware data services as a...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2012

    An Interoperable and Self-adaptive Approach for SLA-based Service Virtualization in Heterogeneous Cloud Environments

    Cloud computing is a newly emerged computing infrastructure that builds on the latest achievements of diverse research areas, such as Grid computing, Service-oriented computing, business process management and virtualization. An important characteristic of Cloud-based services is the provision of non-functional guarantees in the form of Service Level Agreements (SLAs), such...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2012

    Cloud Computing for Education and Research in Developing Countries

    Recently cloud computing has offered attractive solutions for academic and research institutions due to several reasons. In this chapter, the authors present a study of how cloud computing can be used for research and teaching activities in higher educational and research institutions in developing countries. Instead of focusing on cloud...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2012

    Users in Cells: a Data Traffic Analysis

    The authors present a large-scale cell based measurement analysis of the user behavior in a live operational HSDPA network. The motivations are: first, to understand the statistical properties of users in cells for refining network planning procedures; and second, to provide realistic traffic models for simulations of cellular packet-oriented networks....

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2012

    Data Concern Aware Querying for the Integration of Data Services

    There is an increasing trend for organizations to publish data over the web using data services. The published data is often associated with data concerns like privacy, licensing, pricing, quality of data, etc. This raises several new challenges. For instance, it must be ensured that data consumers utilize the data...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2012

    Trusted Information Sharing Using SOA-Based Social Overlay Networks

    Cross-enterprise collaboration has emerged as a key survival factor in today's global markets. Semantic Web technologies are the basis to establish enterprise interoperability including data mediation support and automatic composition of services. Capabilities of services are semantically described and reasoning techniques support the discovery and selection of services at run-time....

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2012

    Sum-Rate Optimization for the MIMO IC Under Imperfect CSI: A Deterministic Equivalent Approach

    A new method is proposed to determine pre-coding matrices that achieve local maxima of the expected sum rate in a Multiple Input Multiple Output Interference Channel (MIMO IC), in the realistic scenario where only partial Channel State Information (CSI) is available at the transmitters. Relying on a random matrix analysis...

    Provided By Vienna University of Economics and Business

  • White Papers // Dec 2011

    Business-Model-Driven Data Engineering Using the REA-DSL

    The most prominent business ontology for accounting information systems is the Resource-Event-Agent (REA) ontology developed by McCarthy, Geerts and others. REA is a widely accepted framework for the design of a conceptual model of the accountability infrastructure of enterprise information systems. Originally, REA targeted the resource flows within and between...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2010

    Carrier Frequency Synchronization in the Downlink of 3GPP LTE

    In this paper, the authors investigate carrier frequency synchronization in the downlink of 3GPP Long Term Evolution (LTE). A complete carrier frequency offset estimation and compensation scheme based on standardized synchronization signals and reference symbols is presented. The estimation performance in terms of mean square error is derived analytically and...

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2009

    Validation of Minimum-Energy Band-Limited Prediction Using Vehicular Channel Measurements

    The authors demonstrate that Minimum-Energy (ME) band-limited prediction shows the same robust performance for vehicular channel measurements as well as for the numeric Clarke channel model. By contrast, channel prediction based on sinusoidal modelling presented by Chen et al., 2007, shows poor performance for a small percentage of measured channel...

    Provided By Vienna University of Economics and Business

  • White Papers // Nov 2011

    Optimal Pilot Symbol Power Allocation in Multi-Cell Scenarios of LTE

    Current systems for cellular wireless communication are designed for coherent detection. Therefore, the channel estimator is a crucial part of a receiver. UMTS Long Term Evolution (LTE) provides a possibility to change the power radiated at the pilot subcarriers relative to those that of the data subcarriers. Clearly, this additional...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2009

    End-User Development in a Graphical User Interface Setting

    In many areas, software applications must be highly configurable - using a pre-defined set of options or preferences is not flexible enough. One way to improve an application's flexibility is to allow users to change parts of the source code - and thus the application's behavior - on-the-fly; modern languages...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2010

    Boosting Sphere Decoding Speed Through Graphic Processing Units

    Graphic Processing Units (GPUs) have evolved to provide a massive computational power. In contrast to Central Processing Units, GPUs are so-called many-core processors with hundreds of cores capable of running thousands of threads in parallel. This parallel processing power can accelerate the simulation of communication systems. In this paper, the...

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2009

    Vector Perturbation Precoding for Receivers With Limited Dynamic Range

    In this paper, the authors consider the Vector Perturbation (VP) pre-coding scheme for the multiuser MISO broadcast channel proposed by Hochwald et al. under the practical assumption that the receivers have limited dynamic range. In this case, VP pre-coding is shown to suffer from an error floor at high Signal-to-Noise...

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2013

    Lines of Malicious Code: Insights Into the Malicious Software Industry

    Malicious software installed on infected computers is a fundamental component of online crime. Malware development thus plays an essential role in the underground economy of cyber-crime. Malware authors regularly update their software to defeat defenses or to support new or improved criminal business models. A large body of research has...

    Provided By Vienna University of Economics and Business

  • White Papers // Nov 2012

    Vanity, Cracks and Malware

    Today, a large amount of software products include mechanisms to counter software piracy. However, most protection mechanisms can be easily circumvented by applying soft-ware patches (cracks) or license key generators (keygens) with seemingly no financial incentives. The authors' research shows that the distribution of cracks and keygens not only al-lows...

    Provided By Vienna University of Economics and Business

  • White Papers // Mar 2013

    Securing a Space-Based Service Architecture With Coordination-Driven Access Control

    In distributed applications, multiple autonomous processes need to collaborate in an efficient way. Space-based middleware enables data-driven coordination for these processes via shared tuple spaces that allow a decoupled form of communication. Complex coordination logic may be provided to clients via reusable service components that access such tuple spaces to...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2013

    Minimum Variance Estimation of a Sparse Vector Within the Linear Gaussian Model: An RKHS Approach

    The authors consider minimum variance estimation within the Sparse Linear Gaussian Model (SLGM). A sparse vector is to be estimated from a linearly transformed version embedded in Gaussian noise. Their analysis is based on the theory of Reproducing Kernel Hilbert Spaces (RKHS). After a characterization of the RKHS associated with...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2012

    An Interoperable and Self-adaptive Approach for SLA-based Service Virtualization in Heterogeneous Cloud Environments

    Cloud computing is a newly emerged computing infrastructure that builds on the latest achievements of diverse research areas, such as Grid computing, Service-oriented computing, business process management and virtualization. An important characteristic of Cloud-based services is the provision of non-functional guarantees in the form of Service Level Agreements (SLAs), such...

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2010

    Cycle Analysis of Time-variant LDPC Convolutional Codes

    Time-variant Low-Density Parity-Check convolutional codes (LDPCccs) can be derived from unwrapping Quasi-Cyclic (QC) LDPC block codes. Rather than analyzing cycles in a large-scale time-domain parity check matrix, the authors propose a new way to describe cycle properties in compact form by a "Polynomial syndrome former", i.e., a syndrome former in...

    Provided By Vienna University of Economics and Business

  • White Papers // Aug 2012

    Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures

    Cloud providers aim at guaranteeing Service Level Agreements (SLAs) in a resource-efficient way. This, amongst others, means that resources of Virtual (VMs) and Physical Machines (PMs) have to be autonomically allocated responding to external influences as workload or environmental changes. Thereby, Workload Volatility (WV) is one of the crucial factors...

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2012

    Sum-Rate Optimization for the MIMO IC Under Imperfect CSI: A Deterministic Equivalent Approach

    A new method is proposed to determine pre-coding matrices that achieve local maxima of the expected sum rate in a Multiple Input Multiple Output Interference Channel (MIMO IC), in the realistic scenario where only partial Channel State Information (CSI) is available at the transmitters. Relying on a random matrix analysis...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2012

    Cloud Computing for Education and Research in Developing Countries

    Recently cloud computing has offered attractive solutions for academic and research institutions due to several reasons. In this chapter, the authors present a study of how cloud computing can be used for research and teaching activities in higher educational and research institutions in developing countries. Instead of focusing on cloud...

    Provided By Vienna University of Economics and Business

  • White Papers // Dec 2011

    Introducing the Virtual Network Mapping Problem With Delay, Routing and Location Constraints

    Network virtualization is a main paradigm of Future Internet research. It allows for automatic creation of virtual networks with application specific resource management, routing, topology and naming. Since those virtual networks need to be implemented by means of the underlying physical network, the Virtual Network Mapping Problem (VNMP) arises. In...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2010

    Managing Variability and Evolution of Business Document Models

    The United Nations Centre for Trade Facilitation and e-Business (UN/CEFACT) standardizes business documents for electronic data interchange. Their approaches towards UN/EDIFACT and XML have later been followed by a conceptual modeling approach called Core Components (CC). Having used this approach for four years in practice, it became evident that the...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2010

    Managing Variability and Evolution of Business Document Models

    The United Nations Centre for Trade Facilitation and e-Business (UN/CEFACT) standardizes business documents for electronic data interchange. Their approaches towards UN/EDIFACT and XML have later been followed by a conceptual modeling approach called Core Components (CC). Having used this approach for four years in practice, it became evident that the...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2010

    Managing Variability and Evolution of Business Document Models

    The United Nations Centre for Trade Facilitation and e-Business (UN/CEFACT) standardizes business documents for electronic data interchange. Their approaches towards UN/EDIFACT and XML have later been followed by a conceptual modeling approach called Core Components (CC). Having used this approach for four years in practice, it became evident that the...

    Provided By Vienna University of Economics and Business

  • White Papers // Oct 2008

    On Reconciliation of Contractual Concerns of Web Services

    Contracts are a way of collaborating and binding parties involved describing exchanges of promises or agreement between parties. In the world of Web services, the approaches, languages, and tools that support, specify, and establish contractual concerns are vast. Existing works often mention similar concepts but provide different languages and terminologies....

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2008

    inContext: On Coupling and Sharing Context for Collaborative Teams

    Present team members have difficulties in keeping the relations between their various, concurrent activities due to the lack of suitable tools supporting context coupling and sharing. Furthermore, collaboration services are hardly aware of related context of team members and their activities. Such awareness is required to adapt to the dynamics...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2012

    Identifying Incompatible Implementations of Industry Standard Service Interfaces for Dependable Service-Based Applications

    In this paper, the authors study fault localization techniques for identification of incompatible configurations and implementations in Service-Based Applications (SBAs). They consider SBAs with abstract service interfaces that integrate multiple concrete service implementations from various providers. Practice has shown that standardized interfaces alone do not guarantee compatibility of services originating...

    Provided By Vienna University of Economics and Business

  • White Papers // Jun 2011

    Distributed Continuous Data Aggregation Over Web Service Event Streams

    The authors present a distributed platform for continuous event-based aggregation of Web services and data. The platform both actively monitors Web services and receives XML events using WS-Eventing. An aggregation is composed of multiple inputs such as Web service invocations and event subscriptions, which are formulated and processed in a...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Workflow-Based Composition and Testing of Combined e-services and components

    Information systems are increasingly built using component models such as Enterprise Java Beans, COM+, or CORBA objects. Dynamically aggregated and composed Web services can be seen as a newly emerging research area for Service Oriented Architectures, which are combined with components. The authors' paper presents three main arguments: that composition...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2012

    Semantic Inter-Organizational Performance Analysis Using the Balanced Scorecard Methodology

    Evaluating Inter-Organizational Relationships (IORs) is important in today's businesses for increasing competitiveness and business potential. Typically, IORs are measured by high-level Key Performance Indicators (KPIs) such as trust, knowledge sharing, and others. However, these high-level KPIs are difficult to be measured quantitatively. It is therefore difficult to determine IORs and...

    Provided By Vienna University of Economics and Business

  • White Papers // May 2013

    RESTful Business Process Management in the Cloud

    As more and more business processes are migrated into cloud-based runtimes, there is a need to manage their state to provide support for quality attributes such as elasticity, scalability and dependability. In this paper, the authors discuss how the REST architectural style provides a sensible choice to manage and publish...

    Provided By Vienna University of Economics and Business

  • White Papers // Jan 2007

    Web-enabled Smart Service Business Infrastructures

    Smart service businesses denote a specific type of economic coordination amongst independently operating component service producers coupled through an electronic network to jointly generate complex compound services, making use of emerging web service technologies. The paper gives an overview of the inner structure of smart service businesses and their fundamental...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2008

    Modeling Human Aspects of Business Processes - A View-Based, Model-Driven Approach

    Human participation in business processes needs to be addressed in process modeling. BPEL4People with WS-HumanTask covers this concern in the context of BPEL. Bound to specific workflow technology this leads to a number of problems. Firstly, maintaining and migrating processes to new or similar technologies is expensive. Secondly, the low-level,...

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2007

    Applying Model Transformation By-Example on Business Process Modeling Languages

    Model transformations are playing a vital role in the field of model engineering. However, for non-trivial transformation issues most approaches require imperative definitions, which are cumbersome and error-prone to create. Therefore, Model Transformation By Example (MTBE) approaches has been proposed as user-friendly alternative that simplifies the definition of model transformations....

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2008

    A 3-level e-Business Registry Meta Model

    Business partners willing to does business electronically with each other must reach an agreement; on the economic level, on the inter-organizational process choreography, and on the services implementing the choreography. In order to search for a potential business partner, one will first look for a partner who offers a required...

    Provided By Vienna University of Economics and Business

  • White Papers // Jul 2009

    The Business Choreography Language (BCL) - A Domain-Specific Language for Global Choreographies

    UN/CEFACT's Modeling Methodology (UMM) is a modeling approach for describing the choreography of B2B processes. UMM is developed by the United Nations Center for Trade Facilitation and Electronic Business (UN/CEFACT) and currently defined as a UML profile. Thereby, it constrains the UML for the specific needs of B2B. As the...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2010

    Reference Modeling for Inter-Organizational Systems

    Inter-organizational business process models are created and used by different partner networks. Often, those models are similar but differ in certain business needs. Due to the lack of methods and tools, companies are required to start from scratch to create their specific models instead of taking advantage of and reusing...

    Provided By Vienna University of Economics and Business

  • White Papers // Aug 2008

    An Add-In for UN/CEFACT's Modeling Methodology 2.0

    UN/CEFACT's Modeling Methodology (UMM) is a UML based modeling language and has become the method of choice for the modeling of inter-organizational business processes. The complexity of UMM, however, makes it difficult to use for novice modelers. In order to overcome this limitation and to allow for a seamless integration...

    Provided By Vienna University of Economics and Business

  • White Papers // Oct 2007

    A UML Profile for Core Components and Their Transformation to XSD

    In business-to-business e-commerce, traditional Electronic Data Interchange (EDI) approaches such as UN/EDIFACT have been superseded by approaches like web services and ebXML. Nevertheless, a precise and common semantic definition of business documents exchanged is needed. In order to become independent from transfer syntax, the authors prefer defining the documents as...

    Provided By Vienna University of Economics and Business

  • White Papers // Sep 2008

    Deriving Business Service Interfaces in Windows Workflow from UMM Transactions

    Modeling inter-organizational business processes identifies the services each business partner has to provide and to consume as well as the flow of interactions between them. A model-driven approach to inter-organizational business processes allows abstracting from the underlying IT platform and, thereby, guarantees to survive changes in technology. UN/CEFACT's Modeling Methodology...

    Provided By Vienna University of Economics and Business

  • White Papers // Dec 2006

    A State Machine Executing UMM Business Transactions

    UN/CEFACT's Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The current UMM version comprises three main views for describing a computation independent model from a neutral perspective. Currently, the UMM version is missing a platform independent model showing how each partner has to realize the message...

    Provided By Vienna University of Economics and Business

  • White Papers // Oct 2012

    Automatic SLA Matching and Provider Selection in Grid and Cloud Computing Markets

    Cloud computing is a novel computing paradigm that offers data, software, and hardware services in a manner similar to traditional utilities such as water, electricity, and telephony. Usually, in Cloud and Grid computing, contracts between traders are established using Service Level Agreements (SLAs), which include objectives of service usage. However,...

    Provided By Vienna University of Economics and Business

  • White Papers // Aug 2012

    Virtualizing Software and Humans for Elastic Processes in Multiple Clouds - A Service Management Perspective

    There is a growing trend of combining human-based computation with machine-based computation to solve complex problems which cannot be answered with machine-based computation alone. From the computing perspective, integrating machine-based computing elements with human-based computing elements and provisioning them under the same model will facilitate the resource elasticity required by...

    Provided By Vienna University of Economics and Business

  • White Papers // Apr 2012

    Quality-Aware Service-Oriented Data Integration: Requirements, State of the Art and Open Challenges

    With a multitude of data sources available online, data consumers might find it hard to select the best combination of sources for their needs. Aspects such as price, licensing, service and data quality play a major role in selecting data sources. The authors therefore advocate quality-aware data services as a...

    Provided By Vienna University of Economics and Business

  • White Papers // Feb 2012

    Trusted Information Sharing Using SOA-Based Social Overlay Networks

    Cross-enterprise collaboration has emerged as a key survival factor in today's global markets. Semantic Web technologies are the basis to establish enterprise interoperability including data mediation support and automatic composition of services. Capabilities of services are semantically described and reasoning techniques support the discovery and selection of services at run-time....

    Provided By Vienna University of Economics and Business