Vienna University of Technology

Displaying 1-40 of 109 results

  • White Papers // Apr 2012

    CASViD: Application Level Monitoring for SLA Violation Detection in Clouds

    Cloud resources and services are offered based on Service Level Agreements (SLAs) that state usage terms and penalties in case of violations. Although, there is a large body of work in the area of SLA provisioning and monitoring at infrastructure and platform layers, SLAs are usually assumed to be guaranteed...

    Provided By Vienna University of Technology

  • White Papers // Oct 2011

    Towards Self-Awareness in Cloud Markets: A Monitoring Methodology

    Currently, the Cloud landscape is a fragmented, static and shapeless market that hinders the paradigm's ability to fulfill its promise of ubiquitous computing on tap and as a commodity. In this paper, the authors present their vision of an autonomic self-aware Cloud market platform, and argue that autonomic market platforms...

    Provided By Vienna University of Technology

  • White Papers // Sep 2011

    Cost-Efficient Utilization of Public SLA Templates in Autonomic Cloud Markets

    Dynamic and self-adaptable markets are fundamental for the successful implementation of the Cloud computing paradigm where computing resources are provided on demand and dynamically to the heterogeneous user base. Usually, in Cloud markets, contracts between traders are established using Service Level Agreements (SLAs), which include objectives of service usage. However,...

    Provided By Vienna University of Technology

  • White Papers // Sep 2011

    Towards Autonomic Market Management in Cloud Computing Infrastructures

    Cloud computing markets face challenges, such as a large variety of different resource types in the market. A large variety of resource types results in a low number of matches of ask and bids. Consequently, the market has a low liquidity, which is economically inefficient and can lead to market...

    Provided By Vienna University of Technology

  • White Papers // Aug 2011

    Domain-Specific Languages in a Finite Domain Constraint Programming System

    In this paper, the authors present Domain-Specific Languages (DSLs) that they devised for their use in the implementation of a finite domain constraint programming system, available as library (clpfd) in SWI-Prolog and YAP-Prolog. These DSLs are used in propagator selection and constraint reification. In these areas, they lead to concise...

    Provided By Vienna University of Technology

  • White Papers // Aug 2011

    Information Security Automation: How Far Can We Go?

    Information security management is a very complex task which involves the implementation and monitoring of more than 130 security controls. To achieve greater efficiency in this process it is necessary to automate as many controls as possible. This paper provides an analysis of how many controls can be automated, based...

    Provided By Vienna University of Technology

  • White Papers // Aug 2011

    Using Explicit and Machine-Understandable Engineering Knowledge for Defect Detection in Automation Systems Engineering

    Today the costs of a failure in operation of huge industrial complexes are very high. Traditional approaches for defect detection in automation systems engineering in principle work, but generally don't take into account the semantic heterogeneity of tools and data models which are used within the engineering of industrial automation...

    Provided By Vienna University of Technology

  • White Papers // Jul 2011

    The Vienna LTE Simulators - Enabling Reproducibility in Wireless Communications Research

    In this paper, the authors introduce MATLAB-based link and system level simulation environments for UMTS Long-Term Evolution (LTE). The source codes of both simulators are available under an academic non-commercial use license, allowing researchers full access to standard-compliant simulation environments. Owing to the open source availability, the simulators enable reproducible...

    Provided By Vienna University of Technology

  • White Papers // Jul 2011

    Towards a Security Management Reference Model for Vertical and Horizontal Collaborative Clouds

    The re-perimeterization and the erosion of trust boundaries already happening in organizations is amplified and accelerated by Cloud Computing. Security controls in Cloud Computing are, for the most part, no different from security controls in any IT environment from a functional perspective. However, because of the Cloud service models employed,...

    Provided By Vienna University of Technology

  • White Papers // Jul 2011

    SemTrace: Semantic Requirements Tracing Using Explicit Requirement Knowledge

    In the Software Engineering (SE) domain the EU challenge on semantic systems and services motivates better support of knowledge creation as well as better access of SE stakeholders to the knowledge they need to perform their activities. Application Lifecycle Management (ALM) is the coordination of development lifecycle activities by process...

    Provided By Vienna University of Technology

  • White Papers // Jun 2011

    Code Obfuscation Against Static and Dynamic Reverse Engineering

    The process of reverse engineering allows attackers to understand the behavior of software and extract proprietary algorithms and data structures (e.g. cryptographic keys) from it. Code obfuscation is frequently employed to mitigate this risk. However, while most of today's obfuscation methods are targeted against static reverse engineering, where the attacker...

    Provided By Vienna University of Technology

  • White Papers // Jun 2011

    Cloud-Based Sustainability Governance - State of the Art and Open Issues

    Sustainability governance for resource consumption by humans, such as carbon footprint and electricity consumption in facilities, is a complex issue that requires extensible platforms to manage and analyze multiple types of data over the time. In this paper, the authors discuss current state of the art and open issues of...

    Provided By Vienna University of Technology

  • White Papers // Jun 2011

    Detecting Environment-Sensitive Malware

    The execution of malware in an instrumented sandbox is a widespread approach for the analysis of malicious code, largely because it sidesteps the difficulties involved in the static analysis of obfuscated code. As malware analysis sandboxes increase in popularity, they are faced with the problem of malicious code detecting the...

    Provided By Vienna University of Technology

  • White Papers // Jun 2011

    Position Paper: m2n-A Tool for Translating Models to Natural Language Descriptions

    To describe the structure of a system, the UML Class Diagram yields the means-of-choice. Therefore, the Class Diagram provides concepts like class, attribute, operation, association, generalization, aggregation, enumeration, etc. When students are introduced to this diagram, they often have to solve exercises where texts in natural language are given and...

    Provided By Vienna University of Technology

  • White Papers // May 2011

    Engineering Project Management Using the Engineering Cockpit

    Automation Systems Engineering projects typically depend on contributions from several engineering disciplines. While available software tools are strong in supporting each individual engineering discipline, there is very little work on engineering process management and monitoring across multi-discipline engineering projects. In this paper, the authors present the Engineering Cockpit, a social-network-style...

    Provided By Vienna University of Technology

  • White Papers // May 2011

    Flexible Support for Adaptable Software and Systems Engineering Processes

    Typical complex software and systems engineering projects involve a set of different engineering disciplines and therefore heavily rely on systems integration approaches. Service-oriented architecture and Enterprise Service Bus provide a valuable basis for systems integration; however often depend on tedious manual work or invasive and therefore inflexible adaptations in case...

    Provided By Vienna University of Technology

  • White Papers // May 2011

    Automating the Detection of Complex Semantic Conflicts Between Software Requirements

    Keeping requirements consistent already at early project stages is a main success factor for software development projects. However, manual requirements conflict analysis takes significant effort and is error-prone. Requirement engineers and other project participants such as technical architects use different terminologies (due to different domain backgrounds) which makes automation of...

    Provided By Vienna University of Technology

  • White Papers // Apr 2011

    Interaction Mining and Skill-Dependent Recommendations for Multi-Objective Team Composition

    Web-based collaboration and virtual environments supported by various Web 2.0 concepts enable the application of numerous monitoring, mining and analysis tools to study human interactions and team formation processes. The composition of an effective team requires a balance between adequate skill fulfillment and sufficient team connectivity. The underlying interaction structure...

    Provided By Vienna University of Technology

  • White Papers // Apr 2011

    WSN Implementation of the Average Consensus Algorithm

    This paper is motivated by the lack of distributed algorithm implementations on Wireless Sensor Networks (WSN) in hardware. The authors deal exemplary with the implementation of the well-known average consensus algorithm. By formulating the algorithm into nesC, a C derivative, it is possible to enrich the knowledge of the algorithm...

    Provided By Vienna University of Technology

  • White Papers // Apr 2011

    Object Stereo- Joint Stereo Matching and Object Segmentation

    This paper presents a method for joint stereo matching and object segmentation. In the authors' approach a 3D scene is represented as a collection of visually distinct and spatially coherent objects. Each object is characterized by three different aspects: a color model, a 3D plane that approximates the object's disparity...

    Provided By Vienna University of Technology

  • White Papers // Mar 2011

    Crowdsourcing Mobile Workflows With Tweetflows

    The use of mobile devices and Applications (Apps) offer users ubiquitous access to arbitrary Services. In this paper, the authors study the applicability of established SOA concepts in mobile computing scenarios. In particular, they investigate the application of existing SOA infrastructure principles like Service registries on App stores and investigate...

    Provided By Vienna University of Technology

  • White Papers // Mar 2011

    Supporting Dynamic, People-Driven Processes Through Self-Learning of Message Flows

    Flexibility and automatic learning are key aspects to support users in dynamic business environments such as value chains across SMEs or when organizing a large event. Process centric information systems need to adapt to changing environmental constraints as reflected in the user's behavior in order to provide suitable activity recommendations....

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    Pushing Efficient Evaluation of HEX Programs by Modular Decomposition

    The evaluation of logic programs with access to external knowledge sources requires to interleave external computation and model building. Deciding where and how to stop with one task and proceed with the next is a difficult problem, and existing approaches have severe scalability limitations in many real-world application scenarios. The...

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    Cost-Based Optimization of Service Compositions

    For providers of composite services preventing cases of SLA violations is crucial. Previous work has established runtime adaptation of compositions as a promising tool to achieve SLA conformance. However, in order to get a realistic and complete view of the decision process of service providers, the costs of adaptation need...

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    A Comparison of Rule Inheritance in Model-to-Model Transformation Languages

    Although model transformations presumably play a major role in Model-Driven Engineering, reuse mechanisms such as inheritance have received little attention so far. In this paper, the authors propose a comparison framework for rule inheritance in declarative model-to-model transformation languages, and provide an in-depth evaluation of three prominent representatives thereof, namely...

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    Designing Flexible GUI to Increase the Acceptance Rate of Product Data Management Systems in Industry

    Product Data Management (PDM) desktop and web based systems maintain the organizational technical and managerial data to increase the quality of products by improving the processes of development, business process flows, change management, product structure management, project tracking and resource planning. Though PDM is heavily benefiting industry but PDM community...

    Provided By Vienna University of Technology

  • White Papers // Jan 2011

    Supporting the Evolution of Model-Driven Service-Oriented Systems: A Case Study on QoS-Aware Process-Driven SOAs

    Process-driven Service-Oriented Architectures (SOA) need to cope with constant changing requirements of various compliance requirements, such as Quality of Service (QoS) constraints within Service Level Agreements (SLA). To the best of the knowledge, only little evidence is available if and in how far process-driven SOAs deal with the evolution of...

    Provided By Vienna University of Technology

  • White Papers // Jan 2011

    Computational Social Network Management in Crowd-sourcing Environments

    Flexible interactions in complex social and service-oriented collaboration systems increasingly demand for automated adaptation techniques to optimize partner discovery and selection. Today, applications of complex service-oriented systems can be found in crowdsourcing environments. In such environments, collaborations are typically short-lived and strongly influenced by incentives and actor behavior. As actors...

    Provided By Vienna University of Technology

  • White Papers // Dec 2010

    An End-to-End Framework for Business Compliance in Process-Driven SOAs

    It is significant for companies to ensure their businesses conforming to relevant policies, laws, and regulations as the consequences of infringement can be serious. Unfortunately, the divergence and frequent changes of different compliance sources make it hard to systematically and quickly accommodate new compliance requirements due to the lack of...

    Provided By Vienna University of Technology

  • White Papers // Dec 2010

    PiOS: Detecting Privacy Leaks in IOS Applications

    With the introduction of Apple's iOS and Google's Android operating systems, the sales of smartphones have exploded. These smartphones have become powerful devices that are basically miniature versions of personal computers. However, the growing popularity and sophistication of smartphones have also increased concerns about the privacy of users who operate...

    Provided By Vienna University of Technology

  • White Papers // Nov 2010

    Semantic Tool Interoperability for Engineering Manufacturing Systems

    Manufacturing systems engineering projects depend on contributions from several engineering disciplines. These contributions consist of complex artifacts like mechanical, electrical, and software components and plans. While the software tools are strong in supporting each individual engineering discipline, there is very little work on engineering processes automation across semantically heterogeneous engineering...

    Provided By Vienna University of Technology

  • White Papers // Nov 2010

    Extending Mondrian Memory Protection

    Most modern operating systems implement some sort of memory protection scheme for user processes. These schemes make it is possible to set access permissions that determine whether a region of memory allocated for a process can be read, written, or executed by this process. Mondrian memory protection is a technique...

    Provided By Vienna University of Technology

  • White Papers // Nov 2010

    Automated Derivation of Configurations for the Integration of Software(+) Engineering Environments

    Today's systems integration technologies enable the integration of (software+) engineering environments to support engineering processes across domain and tool boundaries. These engineering processes heavily rely on manual configuration of integration frameworks, resulting in costly, time-consuming, and error-prone human work. In this paper, the authors introduce an extended model-driven approach for...

    Provided By Vienna University of Technology

  • White Papers // Nov 2010

    Declarative Belief Set Merging Using Merging Plans

    The authors present a declarative framework for belief set merging tasks over (possibly heterogeneous) knowledge bases, where belief sets are sets of literals. The framework is designed generically for flexible deployment to a range of applications, and allows to specify complex merging tasks in tree-structured merging plans, whose leaves are...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Autonomic SLA-Aware Service Virtualization for Distributed Systems

    Cloud Computing builds on the latest achievements of diverse research areas, such as grid computing, service-oriented computing, business processes and virtualization. Managing such heterogeneous environments requires sophisticated interoperation of adaptive coordinating components. In this paper, the authors introduce an SLA-aware service virtualization architecture that provides non-functional guarantees in the form...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Service-Centric Inference and Utilization of Confidence on Context

    The inadequate quality of context forces the context consumers in pervasive environments to reason about the quality and relevance of context to be confident of its worth to perform their functionality. The additional task of analyzing large volumes of context drastically affects the performance of the context consumers to adjust...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    A Flexible Approach Towards Self-Adapting Process Recommendations

    A companys ability to flexibly adapt to changing business requirements is one key factor to remain competitive. The required flexibility in people driven processes is usually achieved through ad-hoc workflows which are naturally highly unstructured. Effective guidance in ad-hoc workflows therefore requires a simultaneous consideration of multiple goals: Support of...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Weighted Fuzzy Clustering for Capability-Driven Service Aggregation

    Workflow design, mashup configuration, and composite service formation are examples where the capabilities of multiple simple services combined achieve a complex functionality. In this paper the authors address the problem of limiting the number of required services that fulfill the required capabilities while exploiting the functional specialization of individual services....

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Runtime Behavior Monitoring and Self-Adaptation in Service-Oriented Systems

    Mixed service-oriented systems composed of human actors and software services build up complex interaction networks. Without any coordination, such systems may exhibit undesirable properties due to unexpected behavior. Also, communications and interactions in such networks are not preplanned by top-down composition models. Consequently, the management of service-oriented applications is difficult...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Model-Aware Monitoring of SOAs for Compliance

    Business processes today are supported by process-driven service oriented architectures. Due to the increasing importance of compliance of an organization with regulatory requirements and internal policies, there is a need for appropriate techniques to monitor organizational information systems as they execute business processes. Event-based monitoring of processes is one of...

    Provided By Vienna University of Technology

  • White Papers // Jul 2011

    The Vienna LTE Simulators - Enabling Reproducibility in Wireless Communications Research

    In this paper, the authors introduce MATLAB-based link and system level simulation environments for UMTS Long-Term Evolution (LTE). The source codes of both simulators are available under an academic non-commercial use license, allowing researchers full access to standard-compliant simulation environments. Owing to the open source availability, the simulators enable reproducible...

    Provided By Vienna University of Technology

  • White Papers // Jun 2001

    Software Engineering in Games

    The goal of this paper work is to compare general software projects to game projects using these four phases, including one another phase, present only in game development. Starting with the definition of every development phase, it uses case studies and statistics to further stress the difference between a 'general'...

    Provided By Vienna University of Technology

  • White Papers // Jun 2009

    Data Recovery From Distributed Personal Repositories

    This paper presents an approach to personal disaster recovery, e.g. after a hard-disk crash, based not on an explicitly ex-ante defined recovery plan with a rigid backup regime, but rather on naturally accumulated and distributed sources of personal data, such as e-mails and their attachments. The paper aims to restore...

    Provided By Vienna University of Technology

  • White Papers // Jun 2009

    Automatically Generating Models for Botnet Detection

    A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. This paper presents a system that aims to detect bots, independent of any prior information about the command and control channels or propagation vectors, and without requiring multiple...

    Provided By Vienna University of Technology

  • White Papers // Nov 2008

    Towards a Meta-Negotiation Architecture for SLA-Aware Grid Services

    In novel market-oriented resource sharing models resource consumers pay for the resource usage and expect that non-functional requirements for the application execution, termed as Quality of Service (QoS), are satisfied. QoS is negotiated between two parties following the specific negotiation protocols and is recorded using Service Level Agreements (SLAs) standard....

    Provided By Vienna University of Technology

  • White Papers // Nov 2008

    Advanced QoS Methods for Grid Workflows Based on Meta-Negotiations and SLA-Mappings

    In novel market-oriented resource sharing models, resource consumers pay for the resource usage and expect that non-functional requirements for the application execution, termed as Quality of Service (QoS), are satisfied. QoS is negotiated between two parties following the specific negotiation protocols and is recorded using Service Level Agreements (SLAs). However,...

    Provided By Vienna University of Technology

  • White Papers // Sep 2009

    Measurement Based Throughput Evaluation of Residual Frequency Offset Compensation in WiMAX

    WiMAX utilizes a physical-layer based on OFDM that is very sensitive to carrier frequency offset. Even though most of this offset can be compensated using the initial training sequence, there still remains a residual frequency offset due to estimation errors. The methods proposed to correct for this remaining offset are...

    Provided By Vienna University of Technology

  • White Papers // Nov 2009

    Throughput and Capacity of MIMO WiMAX

    The work in this paper presents physical layer throughput measurement results of a WiMAX link implemented according to IEEE 802.16-2004. The measurements were carried out in an alpine and an urban scenario using the Vienna MIMO Testbed. The paper compares the measured throughput to three different theoretical bounds: the channel...

    Provided By Vienna University of Technology

  • White Papers // Dec 2009

    Efficient Detection of Split Personalities in Malware

    Malware is the root cause of many security threats on the Internet. To cope with the thousands of new malware samples that are discovered every day, security companies and analysts rely on automated tools to extract the runtime behavior of malicious pro-grams. Of course, malware authors are aware of these...

    Provided By Vienna University of Technology

  • White Papers // Dec 2008

    Scalable, Behavior-Based Malware Clustering

    Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a malicious program in a controlled environment and produce reports that summarize the program's actions. Of course, the problem of analyzing the reports still remains....

    Provided By Vienna University of Technology

  • White Papers // Mar 2010

    Catching the Ouroboros: On Debugging Non-Ground Answer-Set Programs

    An important issue towards a broader acceptance of Answer-Set Programming (ASP) is the deployment of tools which support the programmer during the coding phase. In particular, methods for debugging an answer-set program are recognised as a crucial step in this regard. Initial work on debugging in ASP mainly focused on...

    Provided By Vienna University of Technology

  • White Papers // Jul 2010

    Abstract and Concrete Syntax Migration of Instance Models

    This paper presents a solution for the TTC 2010 model migration case study. Firstly, the paper presents a modular approach to migrate the instance models' abstract syntax. Secondly, the problem of co-evolution of diagrammatical information such as icon positions and bend points of edges is identified and a solution specific...

    Provided By Vienna University of Technology

  • White Papers // Dec 2008

    An Integrated View on Monitoring and Compensation for Dynamic Optical Networks: From Management to Physical Layer

    A vertical perspective, ranging from management and routing to physical layer options, concerning dynamic network Monitoring and Compensation of impairments (M&C), is given. Feasibility, reliability, and performance improvements on reconfigurable transparent networks are expected to arise from the consolidated assessment of network management and control specifications, as a more accurate...

    Provided By Vienna University of Technology

  • White Papers // Jan 2010

    Applied Information Security for M-Commerce and Digital Television Environments

    With the emergence of convergent information devices capable of delivering multimedia content and providing a network communication independent of location, new challenges regarding the creation of secure environments for conducting business electronically have arisen. Digital television (d-TV) uses high-bandwidth connections to provide on-demand pay-per-view multimedia content and value-added services, such...

    Provided By Vienna University of Technology

  • White Papers // May 2010

    Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds

    Cloud computing represents a promising computing paradigm, where computational power is provided similar to utilities like water, electricity or gas. While most of the Cloud providers can guarantee some measurable non-functional performance metrics e.g., service availability or throughput, there is lack of adequate mechanisms for guaranteeing certifiable and auditable security,...

    Provided By Vienna University of Technology

  • White Papers // Sep 2009

    Service-Oriented Architecture Design Aspects of OPC UA for Industrial Applications

    OPC Unified Architecture is the most recent OPC specification from the OPC Foundation and differs significantly from its predecessors. The OPC Foundation's main goals with this development was to provide a path forward from the original OPC COmmunications Model (COM/DCOM) to a current infrastructure model (SOA) and introduce a cross-platform...

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    Designing Flexible GUI to Increase the Acceptance Rate of Product Data Management Systems in Industry

    Product Data Management (PDM) desktop and web based systems maintain the organizational technical and managerial data to increase the quality of products by improving the processes of development, business process flows, change management, product structure management, project tracking and resource planning. Though PDM is heavily benefiting industry but PDM community...

    Provided By Vienna University of Technology

  • White Papers // Sep 2010

    Integration of Flexible Web Based GUI in I-SOAS

    It is necessary to improve the concepts of the present web based graphical user interface for the development of more flexible and intelligent interface to provide ease and increase the level of comfort at user end like most of the desktop based applications. This research is conducted targeting the goal...

    Provided By Vienna University of Technology

  • White Papers // Oct 2009

    Trusted Interaction Patterns in Large-scale Enterprise Service Networks

    The evolution towards cross-organizational collaboration and interaction patterns has led to the emergence of scalable, Web services-based composition infrastructures. The success of Service-Oriented Architecture (SOA) was mainly influenced by the standardization of composition languages such as BPEL. However, compositions require humans to be in the loop and ways to interface...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Service-Centric Inference and Utilization of Confidence on Context

    The inadequate quality of context forces the context consumers in pervasive environments to reason about the quality and relevance of context to be confident of its worth to perform their functionality. The additional task of analyzing large volumes of context drastically affects the performance of the context consumers to adjust...

    Provided By Vienna University of Technology

  • White Papers // Sep 2010

    On Evaluating and Publishing Data Concerns for Data as a Service

    The proliferation of Data as a Service (DaaS) available on the Internet and offered by cloud service providers indicates an increasing trend in providing data under Web services in e-science and business domains. While data usage and selection are dependent on different constraints established on the basis of several data...

    Provided By Vienna University of Technology

  • White Papers // May 2009

    End-To-End Support for QoS-Aware Service Selection, Invocation and Mediation in VRESCo

    Service-oriented Computing has recently received a lot of attention from both academia and industry. However, current service oriented solutions are often not as dynamic and adaptable as intended because the publish-find-bind-execute cycle of the SOA triangle is not entirely realized. In this paper, the authors highlight some issues of current...

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    Cost-Based Optimization of Service Compositions

    For providers of composite services preventing cases of SLA violations is crucial. Previous work has established runtime adaptation of compositions as a promising tool to achieve SLA conformance. However, in order to get a realistic and complete view of the decision process of service providers, the costs of adaptation need...

    Provided By Vienna University of Technology

  • White Papers // Nov 2009

    Context Coupling Techniques for Context-Aware Web Service Systems - An Overview

    Distributed services in a context-aware Web service system or in a service composition need to couple context information from different sources in order to be able to interpret context information. Such interpretation is a prerequisite before services can adapt themselves to be context-aware. However, context coupling in context-aware Web service...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Model-Aware Monitoring of SOAs for Compliance

    Business processes today are supported by process-driven service oriented architectures. Due to the increasing importance of compliance of an organization with regulatory requirements and internal policies, there is a need for appropriate techniques to monitor organizational information systems as they execute business processes. Event-based monitoring of processes is one of...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    VRESCo - Vienna Runtime Environment for Service-Oriented Computing

    Throughout the last years, the Service-Oriented Architecture (SOA) paradigm has been promoted as a means to create loosely coupled distributed applications. In theory, SOAs make use of a service registry, which can be used by providers to publish their services and by clients to discover these services in order to...

    Provided By Vienna University of Technology

  • White Papers // Feb 2010

    Interaction-Driven Self-Adaptation of Service Ensembles

    The emergence of large-scale online collaboration requires current information systems to be apprehended as service ensembles comprising human and software service entities. The software services in such systems cannot adapt to user needs based on autonomous principles alone. Instead system requirements need to reflect global interaction characteristics that arise from...

    Provided By Vienna University of Technology

  • White Papers // Apr 2010

    Monitoring and Analyzing Service-Based Internet Systems Through a Model-Aware Service Environment

    As service-based Internet systems get increasingly complex they become harder to manage at design time as well as at runtime. Nowadays, many systems are described in terms of precisely specified models, e.g., in the context of model-driven development. By making the information in these models accessible at runtime, the authors...

    Provided By Vienna University of Technology

  • White Papers // Sep 2009

    Context-Aware Adaptive Service Mashups

    Mashup tools are becoming increasingly important enabling users to compose services and processes on the Web. Most existing tools focus on Web-based interfaces, usability, and visual languages for creating mashups. A major challenge that has received limited attention is context-awareness and adaptivity of service mashups. In this paper the authors...

    Provided By Vienna University of Technology

  • White Papers // Feb 2009

    DeXIN- An Extensible Framework for Distributed XQuery Over Heterogeneous Data Sources

    In the Web environment, rich, diverse sources of heterogeneous and distributed data are ubiquitous. In fact, even the information characterizing a single entity - like, for example, the information related to a Web service - is normally scattered over various data sources using various languages such as XML, RDF, and...

    Provided By Vienna University of Technology

  • White Papers // Sep 2010

    Social Formation and Interactions in Evolving Service-Oriented Communities

    The global scale and distribution of companies have changed the economy and dynamics of businesses. Web-based collaborations and cross-organizational processes typically require dynamic and context-based interactions between people and services. However, finding the right partner to work on joint tasks or to solve emerging problems in such scenarios is challenging...

    Provided By Vienna University of Technology

  • White Papers // Jul 2009

    A Model and Algorithm for Self-Adaptation in Service-Oriented Systems

    In this paper, the authors address the problem of self-adaptation in internet-scale service-oriented systems. Services need to adapt by selecting the best neighboring services solely based on local, limited information. In such complex systems, the global significance of the various selection parameters dynamically changes. They introduce a novel metric measuring...

    Provided By Vienna University of Technology

  • White Papers // May 2010

    Low Level Metrics to High Level SLAs - LoM2HiS Framework: Bridging the Gap Between Monitored Metrics and SLA Parameters in Cloud Environments

    Cloud computing represents a novel on-demand computing approach where resources are provided in compliance to a set of predefined non-functional properties specified and negotiated by means of Service Level Agreements (SLAs). In order to avoid costly SLA violations and to timely react to failures and environmental changes, advanced SLA enactment...

    Provided By Vienna University of Technology

  • White Papers // Jan 2011

    Computational Social Network Management in Crowd-sourcing Environments

    Flexible interactions in complex social and service-oriented collaboration systems increasingly demand for automated adaptation techniques to optimize partner discovery and selection. Today, applications of complex service-oriented systems can be found in crowdsourcing environments. In such environments, collaborations are typically short-lived and strongly influenced by incentives and actor behavior. As actors...

    Provided By Vienna University of Technology

  • White Papers // Mar 2010

    Composable Cost Estimation and Monitoring for Computational Applications in Cloud Computing Environments

    With the offer from cloud computing providers, scientists have the opportunity to utilize pay-as-you-go resources together with their own and shared resources. However, scientists need to decide which parts of their applications should be executed in cloud computing systems in order to balance the trade-off between cost, time and resource...

    Provided By Vienna University of Technology

  • White Papers // Oct 2009

    On Analyzing and Specifying Concerns for Data as a Service

    Providing data as a service has not only fostered the access to data from anywhere at anytime but also reduced the cost of investment. However, data is often associated with various concerns that must be explicitly described and modeled in order to ensure that the data consumer can find and...

    Provided By Vienna University of Technology

  • White Papers // Aug 2009

    A Survey on Context-Aware Web Service Systems

    Being context-aware will improve how software adapts to dynamic changes influenced by various factors during the operation of the software. Context-aware techniques have been widely applied in different types of applications, but still are limited to small scale or single-organizational environments due to the lack of well-agreed interfaces, protocols, and...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Weighted Fuzzy Clustering for Capability-Driven Service Aggregation

    Workflow design, mashup configuration, and composite service formation are examples where the capabilities of multiple simple services combined achieve a complex functionality. In this paper the authors address the problem of limiting the number of required services that fulfill the required capabilities while exploiting the functional specialization of individual services....

    Provided By Vienna University of Technology

  • White Papers // Mar 2009

    Correlation of Context Information for Mobile Services

    Location Based Services are a key driver in today's telecom market, even if the power of Location Based Services is not nearly exhausted in nowadays telecom systems. To build intuitive Location Based Services for mobile handsets one success factor is to cover a broad range of mobile handsets available on...

    Provided By Vienna University of Technology

  • White Papers // Mar 2011

    Supporting Dynamic, People-Driven Processes Through Self-Learning of Message Flows

    Flexibility and automatic learning are key aspects to support users in dynamic business environments such as value chains across SMEs or when organizing a large event. Process centric information systems need to adapt to changing environmental constraints as reflected in the user's behavior in order to provide suitable activity recommendations....

    Provided By Vienna University of Technology