Vienna University of Technology

Displaying 1-40 of 125 results

  • White Papers // Apr 2012

    CASViD: Application Level Monitoring for SLA Violation Detection in Clouds

    Cloud resources and services are offered based on Service Level Agreements (SLAs) that state usage terms and penalties in case of violations. Although, there is a large body of work in the area of SLA provisioning and monitoring at infrastructure and platform layers, SLAs are usually assumed to be guaranteed...

    Provided By Vienna University of Technology

  • White Papers // Oct 2011

    Towards Self-Awareness in Cloud Markets: A Monitoring Methodology

    Currently, the Cloud landscape is a fragmented, static and shapeless market that hinders the paradigm's ability to fulfill its promise of ubiquitous computing on tap and as a commodity. In this paper, the authors present their vision of an autonomic self-aware Cloud market platform, and argue that autonomic market platforms...

    Provided By Vienna University of Technology

  • White Papers // Sep 2011

    Cost-Efficient Utilization of Public SLA Templates in Autonomic Cloud Markets

    Dynamic and self-adaptable markets are fundamental for the successful implementation of the Cloud computing paradigm where computing resources are provided on demand and dynamically to the heterogeneous user base. Usually, in Cloud markets, contracts between traders are established using Service Level Agreements (SLAs), which include objectives of service usage. However,...

    Provided By Vienna University of Technology

  • White Papers // Sep 2011

    Towards Autonomic Market Management in Cloud Computing Infrastructures

    Cloud computing markets face challenges, such as a large variety of different resource types in the market. A large variety of resource types results in a low number of matches of ask and bids. Consequently, the market has a low liquidity, which is economically inefficient and can lead to market...

    Provided By Vienna University of Technology

  • White Papers // Aug 2011

    Domain-Specific Languages in a Finite Domain Constraint Programming System

    In this paper, the authors present Domain-Specific Languages (DSLs) that they devised for their use in the implementation of a finite domain constraint programming system, available as library (clpfd) in SWI-Prolog and YAP-Prolog. These DSLs are used in propagator selection and constraint reification. In these areas, they lead to concise...

    Provided By Vienna University of Technology

  • White Papers // Aug 2011

    Information Security Automation: How Far Can We Go?

    Information security management is a very complex task which involves the implementation and monitoring of more than 130 security controls. To achieve greater efficiency in this process it is necessary to automate as many controls as possible. This paper provides an analysis of how many controls can be automated, based...

    Provided By Vienna University of Technology

  • White Papers // Aug 2011

    Using Explicit and Machine-Understandable Engineering Knowledge for Defect Detection in Automation Systems Engineering

    Today the costs of a failure in operation of huge industrial complexes are very high. Traditional approaches for defect detection in automation systems engineering in principle work, but generally don't take into account the semantic heterogeneity of tools and data models which are used within the engineering of industrial automation...

    Provided By Vienna University of Technology

  • White Papers // Jul 2011

    The Vienna LTE Simulators - Enabling Reproducibility in Wireless Communications Research

    In this paper, the authors introduce MATLAB-based link and system level simulation environments for UMTS Long-Term Evolution (LTE). The source codes of both simulators are available under an academic non-commercial use license, allowing researchers full access to standard-compliant simulation environments. Owing to the open source availability, the simulators enable reproducible...

    Provided By Vienna University of Technology

  • White Papers // Jul 2011

    Towards a Security Management Reference Model for Vertical and Horizontal Collaborative Clouds

    The re-perimeterization and the erosion of trust boundaries already happening in organizations is amplified and accelerated by Cloud Computing. Security controls in Cloud Computing are, for the most part, no different from security controls in any IT environment from a functional perspective. However, because of the Cloud service models employed,...

    Provided By Vienna University of Technology

  • White Papers // Jul 2011

    SemTrace: Semantic Requirements Tracing Using Explicit Requirement Knowledge

    In the Software Engineering (SE) domain the EU challenge on semantic systems and services motivates better support of knowledge creation as well as better access of SE stakeholders to the knowledge they need to perform their activities. Application Lifecycle Management (ALM) is the coordination of development lifecycle activities by process...

    Provided By Vienna University of Technology

  • White Papers // Jun 2011

    Code Obfuscation Against Static and Dynamic Reverse Engineering

    The process of reverse engineering allows attackers to understand the behavior of software and extract proprietary algorithms and data structures (e.g. cryptographic keys) from it. Code obfuscation is frequently employed to mitigate this risk. However, while most of today's obfuscation methods are targeted against static reverse engineering, where the attacker...

    Provided By Vienna University of Technology

  • White Papers // Jun 2011

    Cloud-Based Sustainability Governance - State of the Art and Open Issues

    Sustainability governance for resource consumption by humans, such as carbon footprint and electricity consumption in facilities, is a complex issue that requires extensible platforms to manage and analyze multiple types of data over the time. In this paper, the authors discuss current state of the art and open issues of...

    Provided By Vienna University of Technology

  • White Papers // Jun 2011

    Detecting Environment-Sensitive Malware

    The execution of malware in an instrumented sandbox is a widespread approach for the analysis of malicious code, largely because it sidesteps the difficulties involved in the static analysis of obfuscated code. As malware analysis sandboxes increase in popularity, they are faced with the problem of malicious code detecting the...

    Provided By Vienna University of Technology

  • White Papers // Jun 2011

    Position Paper: m2n-A Tool for Translating Models to Natural Language Descriptions

    To describe the structure of a system, the UML Class Diagram yields the means-of-choice. Therefore, the Class Diagram provides concepts like class, attribute, operation, association, generalization, aggregation, enumeration, etc. When students are introduced to this diagram, they often have to solve exercises where texts in natural language are given and...

    Provided By Vienna University of Technology

  • White Papers // May 2011

    Engineering Project Management Using the Engineering Cockpit

    Automation Systems Engineering projects typically depend on contributions from several engineering disciplines. While available software tools are strong in supporting each individual engineering discipline, there is very little work on engineering process management and monitoring across multi-discipline engineering projects. In this paper, the authors present the Engineering Cockpit, a social-network-style...

    Provided By Vienna University of Technology

  • White Papers // May 2011

    Automating the Detection of Complex Semantic Conflicts Between Software Requirements

    Keeping requirements consistent already at early project stages is a main success factor for software development projects. However, manual requirements conflict analysis takes significant effort and is error-prone. Requirement engineers and other project participants such as technical architects use different terminologies (due to different domain backgrounds) which makes automation of...

    Provided By Vienna University of Technology

  • White Papers // May 2011

    Flexible Support for Adaptable Software and Systems Engineering Processes

    Typical complex software and systems engineering projects involve a set of different engineering disciplines and therefore heavily rely on systems integration approaches. Service-oriented architecture and Enterprise Service Bus provide a valuable basis for systems integration; however often depend on tedious manual work or invasive and therefore inflexible adaptations in case...

    Provided By Vienna University of Technology

  • White Papers // Apr 2011

    WSN Implementation of the Average Consensus Algorithm

    This paper is motivated by the lack of distributed algorithm implementations on Wireless Sensor Networks (WSN) in hardware. The authors deal exemplary with the implementation of the well-known average consensus algorithm. By formulating the algorithm into nesC, a C derivative, it is possible to enrich the knowledge of the algorithm...

    Provided By Vienna University of Technology

  • White Papers // Apr 2011

    Interaction Mining and Skill-Dependent Recommendations for Multi-Objective Team Composition

    Web-based collaboration and virtual environments supported by various Web 2.0 concepts enable the application of numerous monitoring, mining and analysis tools to study human interactions and team formation processes. The composition of an effective team requires a balance between adequate skill fulfillment and sufficient team connectivity. The underlying interaction structure...

    Provided By Vienna University of Technology

  • White Papers // Apr 2011

    Object Stereo- Joint Stereo Matching and Object Segmentation

    This paper presents a method for joint stereo matching and object segmentation. In the authors' approach a 3D scene is represented as a collection of visually distinct and spatially coherent objects. Each object is characterized by three different aspects: a color model, a 3D plane that approximates the object's disparity...

    Provided By Vienna University of Technology

  • White Papers // Mar 2011

    Crowdsourcing Mobile Workflows With Tweetflows

    The use of mobile devices and Applications (Apps) offer users ubiquitous access to arbitrary Services. In this paper, the authors study the applicability of established SOA concepts in mobile computing scenarios. In particular, they investigate the application of existing SOA infrastructure principles like Service registries on App stores and investigate...

    Provided By Vienna University of Technology

  • White Papers // Mar 2011

    Supporting Dynamic, People-Driven Processes Through Self-Learning of Message Flows

    Flexibility and automatic learning are key aspects to support users in dynamic business environments such as value chains across SMEs or when organizing a large event. Process centric information systems need to adapt to changing environmental constraints as reflected in the user's behavior in order to provide suitable activity recommendations....

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    Pushing Efficient Evaluation of HEX Programs by Modular Decomposition

    The evaluation of logic programs with access to external knowledge sources requires to interleave external computation and model building. Deciding where and how to stop with one task and proceed with the next is a difficult problem, and existing approaches have severe scalability limitations in many real-world application scenarios. The...

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    Cost-Based Optimization of Service Compositions

    For providers of composite services preventing cases of SLA violations is crucial. Previous work has established runtime adaptation of compositions as a promising tool to achieve SLA conformance. However, in order to get a realistic and complete view of the decision process of service providers, the costs of adaptation need...

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    A Comparison of Rule Inheritance in Model-to-Model Transformation Languages

    Although model transformations presumably play a major role in Model-Driven Engineering, reuse mechanisms such as inheritance have received little attention so far. In this paper, the authors propose a comparison framework for rule inheritance in declarative model-to-model transformation languages, and provide an in-depth evaluation of three prominent representatives thereof, namely...

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    Designing Flexible GUI to Increase the Acceptance Rate of Product Data Management Systems in Industry

    Product Data Management (PDM) desktop and web based systems maintain the organizational technical and managerial data to increase the quality of products by improving the processes of development, business process flows, change management, product structure management, project tracking and resource planning. Though PDM is heavily benefiting industry but PDM community...

    Provided By Vienna University of Technology

  • White Papers // Jan 2011

    Supporting the Evolution of Model-Driven Service-Oriented Systems: A Case Study on QoS-Aware Process-Driven SOAs

    Process-driven Service-Oriented Architectures (SOA) need to cope with constant changing requirements of various compliance requirements, such as Quality of Service (QoS) constraints within Service Level Agreements (SLA). To the best of the knowledge, only little evidence is available if and in how far process-driven SOAs deal with the evolution of...

    Provided By Vienna University of Technology

  • White Papers // Jan 2011

    Computational Social Network Management in Crowd-sourcing Environments

    Flexible interactions in complex social and service-oriented collaboration systems increasingly demand for automated adaptation techniques to optimize partner discovery and selection. Today, applications of complex service-oriented systems can be found in crowdsourcing environments. In such environments, collaborations are typically short-lived and strongly influenced by incentives and actor behavior. As actors...

    Provided By Vienna University of Technology

  • White Papers // Dec 2010

    An End-to-End Framework for Business Compliance in Process-Driven SOAs

    It is significant for companies to ensure their businesses conforming to relevant policies, laws, and regulations as the consequences of infringement can be serious. Unfortunately, the divergence and frequent changes of different compliance sources make it hard to systematically and quickly accommodate new compliance requirements due to the lack of...

    Provided By Vienna University of Technology

  • White Papers // Dec 2010

    PiOS: Detecting Privacy Leaks in IOS Applications

    With the introduction of Apple's iOS and Google's Android operating systems, the sales of smartphones have exploded. These smartphones have become powerful devices that are basically miniature versions of personal computers. However, the growing popularity and sophistication of smartphones have also increased concerns about the privacy of users who operate...

    Provided By Vienna University of Technology

  • White Papers // Nov 2010

    Semantic Tool Interoperability for Engineering Manufacturing Systems

    Manufacturing systems engineering projects depend on contributions from several engineering disciplines. These contributions consist of complex artifacts like mechanical, electrical, and software components and plans. While the software tools are strong in supporting each individual engineering discipline, there is very little work on engineering processes automation across semantically heterogeneous engineering...

    Provided By Vienna University of Technology

  • White Papers // Nov 2010

    Extending Mondrian Memory Protection

    Most modern operating systems implement some sort of memory protection scheme for user processes. These schemes make it is possible to set access permissions that determine whether a region of memory allocated for a process can be read, written, or executed by this process. Mondrian memory protection is a technique...

    Provided By Vienna University of Technology

  • White Papers // Nov 2010

    Automated Derivation of Configurations for the Integration of Software(+) Engineering Environments

    Today's systems integration technologies enable the integration of (software+) engineering environments to support engineering processes across domain and tool boundaries. These engineering processes heavily rely on manual configuration of integration frameworks, resulting in costly, time-consuming, and error-prone human work. In this paper, the authors introduce an extended model-driven approach for...

    Provided By Vienna University of Technology

  • White Papers // Nov 2010

    Declarative Belief Set Merging Using Merging Plans

    The authors present a declarative framework for belief set merging tasks over (possibly heterogeneous) knowledge bases, where belief sets are sets of literals. The framework is designed generically for flexible deployment to a range of applications, and allows to specify complex merging tasks in tree-structured merging plans, whose leaves are...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Autonomic SLA-Aware Service Virtualization for Distributed Systems

    Cloud Computing builds on the latest achievements of diverse research areas, such as grid computing, service-oriented computing, business processes and virtualization. Managing such heterogeneous environments requires sophisticated interoperation of adaptive coordinating components. In this paper, the authors introduce an SLA-aware service virtualization architecture that provides non-functional guarantees in the form...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Service-Centric Inference and Utilization of Confidence on Context

    The inadequate quality of context forces the context consumers in pervasive environments to reason about the quality and relevance of context to be confident of its worth to perform their functionality. The additional task of analyzing large volumes of context drastically affects the performance of the context consumers to adjust...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    A Flexible Approach Towards Self-Adapting Process Recommendations

    A companys ability to flexibly adapt to changing business requirements is one key factor to remain competitive. The required flexibility in people driven processes is usually achieved through ad-hoc workflows which are naturally highly unstructured. Effective guidance in ad-hoc workflows therefore requires a simultaneous consideration of multiple goals: Support of...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Weighted Fuzzy Clustering for Capability-Driven Service Aggregation

    Workflow design, mashup configuration, and composite service formation are examples where the capabilities of multiple simple services combined achieve a complex functionality. In this paper the authors address the problem of limiting the number of required services that fulfill the required capabilities while exploiting the functional specialization of individual services....

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Runtime Behavior Monitoring and Self-Adaptation in Service-Oriented Systems

    Mixed service-oriented systems composed of human actors and software services build up complex interaction networks. Without any coordination, such systems may exhibit undesirable properties due to unexpected behavior. Also, communications and interactions in such networks are not preplanned by top-down composition models. Consequently, the management of service-oriented applications is difficult...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Model-Aware Monitoring of SOAs for Compliance

    Business processes today are supported by process-driven service oriented architectures. Due to the increasing importance of compliance of an organization with regulatory requirements and internal policies, there is a need for appropriate techniques to monitor organizational information systems as they execute business processes. Event-based monitoring of processes is one of...

    Provided By Vienna University of Technology

  • White Papers // Feb 2010

    RTTM: Real-Time Transactional Memory

    Hardware transactional memory is a promising synchronization technology for chip-multiprocessors. It simplifies programming of concurrent applications and allows for higher concurrency than lock based synchronization. Standard transactional memory is optimized for average case throughput, but for real-time systems the authors are interested in worst-case execution times. They propose Real-Time Transactional...

    Provided By Vienna University of Technology

  • White Papers // Aug 2011

    Information Security Automation: How Far Can We Go?

    Information security management is a very complex task which involves the implementation and monitoring of more than 130 security controls. To achieve greater efficiency in this process it is necessary to automate as many controls as possible. This paper provides an analysis of how many controls can be automated, based...

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    A Comparison of Rule Inheritance in Model-to-Model Transformation Languages

    Although model transformations presumably play a major role in Model-Driven Engineering, reuse mechanisms such as inheritance have received little attention so far. In this paper, the authors propose a comparison framework for rule inheritance in declarative model-to-model transformation languages, and provide an in-depth evaluation of three prominent representatives thereof, namely...

    Provided By Vienna University of Technology

  • White Papers // Apr 2011

    WSN Implementation of the Average Consensus Algorithm

    This paper is motivated by the lack of distributed algorithm implementations on Wireless Sensor Networks (WSN) in hardware. The authors deal exemplary with the implementation of the well-known average consensus algorithm. By formulating the algorithm into nesC, a C derivative, it is possible to enrich the knowledge of the algorithm...

    Provided By Vienna University of Technology

  • White Papers // Nov 2010

    Extending Mondrian Memory Protection

    Most modern operating systems implement some sort of memory protection scheme for user processes. These schemes make it is possible to set access permissions that determine whether a region of memory allocated for a process can be read, written, or executed by this process. Mondrian memory protection is a technique...

    Provided By Vienna University of Technology

  • White Papers // May 2010

    A Practical Attack to De-Anonymize Social Network Users

    Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates and have millions of registered users. In this paper, the authors introduce a novel de-anonymization attack that exploits group membership information that is available on social networking sites. More precisely, they show that information about...

    Provided By Vienna University of Technology

  • White Papers // Aug 2011

    Domain-Specific Languages in a Finite Domain Constraint Programming System

    In this paper, the authors present Domain-Specific Languages (DSLs) that they devised for their use in the implementation of a finite domain constraint programming system, available as library (clpfd) in SWI-Prolog and YAP-Prolog. These DSLs are used in propagator selection and constraint reification. In these areas, they lead to concise...

    Provided By Vienna University of Technology

  • White Papers // Jun 2011

    Position Paper: m2n-A Tool for Translating Models to Natural Language Descriptions

    To describe the structure of a system, the UML Class Diagram yields the means-of-choice. Therefore, the Class Diagram provides concepts like class, attribute, operation, association, generalization, aggregation, enumeration, etc. When students are introduced to this diagram, they often have to solve exercises where texts in natural language are given and...

    Provided By Vienna University of Technology

  • White Papers // Apr 2012

    CASViD: Application Level Monitoring for SLA Violation Detection in Clouds

    Cloud resources and services are offered based on Service Level Agreements (SLAs) that state usage terms and penalties in case of violations. Although, there is a large body of work in the area of SLA provisioning and monitoring at infrastructure and platform layers, SLAs are usually assumed to be guaranteed...

    Provided By Vienna University of Technology

  • White Papers // May 2008

    Improving IT-Service Business Processes by Integrating Mobility: The Role of User Participation - Results From Five Case Studies

    In common IT-Service business, e.g., field technicians for maintenance and servicing of office machines, processes are usually paper-based. This causes error-prone and time-consuming activities. The integration of mobile tools might improve these business processes. Nevertheless, the implementation of mobile-integrated business processes within corporate IT-Systems is a major and still increasing...

    Provided By Vienna University of Technology

  • White Papers // Apr 2011

    Object Stereo- Joint Stereo Matching and Object Segmentation

    This paper presents a method for joint stereo matching and object segmentation. In the authors' approach a 3D scene is represented as a collection of visually distinct and spatially coherent objects. Each object is characterized by three different aspects: a color model, a 3D plane that approximates the object's disparity...

    Provided By Vienna University of Technology

  • White Papers // Sep 2009

    A Single-Path Chip-Multiprocessor System

    In this paper, the authors explore the combination of a time-predictable chip-multiprocessor system with the single-path programming paradigm. Time-sliced arbitration of the main memory access provides time-predictable memory load and store instructions. Single-path programming avoids control flow dependent timing variations. To keep the execution time of tasks constant, even in...

    Provided By Vienna University of Technology

  • White Papers // Sep 2009

    Towards Time-Predictable Data Caches for Chip-Multiprocessors

    Future embedded systems are expected to use chip-multiprocessors to provide the execution power for increasingly demanding applications. Multiprocessors increase the pressure on the memory bandwidth and processor local caching is mandatory. However, data caches are known to be very hard to integrate into the Worst-Case Execution Time (WCET) analysis. The...

    Provided By Vienna University of Technology

  • White Papers // Jan 2009

    Cooperative Space-Time Codes With Opportunistic Network Coding

    Cooperative communications has emerged as one of the most efficient way of exploiting spatial diversity in wireless communications. Cooperative communications is a strategy where users, besides transmitting their own information, also relay re-encoded version of other users' information to a common destination. In this paper, the authors investigate a scheme...

    Provided By Vienna University of Technology

  • White Papers // Aug 2010

    DeSVi: An Architecture for Detecting SLA Violations in Cloud Computing Infrastructures

    Cloud computing is a promising paradigm for the implementation of scalable on-demand computing infrastructures. Self-manageable Cloud infrastructures are required in order to comply with users' requirements specified by Service Level Agreements (SLAs) on one hand and to minimize user interactions with the system on the other hand. Adequate SLA monitoring...

    Provided By Vienna University of Technology

  • White Papers // Dec 2009

    Money, Credit, Capital And The State On The Evolution Of Money And Institutions

    All human societies with a developed political economy are monetary economies. The very existence of interplay of production and consumption activities of a society's members implies that periodically reappearing habits, of relations between activities become visible and are memorized. At a certain point of development the repetitions - using days...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Editorial Message: Middleware for Service Oriented Computing Workshop 2010

    The initial visionary promise of Service Oriented Computing (SOC) was a world of cooperating services, loosely coupled to flexibly create dynamic business processes and agile applications that may span organisations and heterogeneous computing platforms but can nevertheless adapt quickly and autonomously to changes of requirements or context. Today, the influence...

    Provided By Vienna University of Technology

  • White Papers // Sep 2010

    Simulating Autonomic SLA Enactment in Clouds Using Case Based Reasoning

    With the emergence of Cloud Computing resources of physical machines have to be allocated to Virtual Machines (VMs) in an on-demand way. However, the efficient allocation of resources like memory, storage or bandwidth to a VM is not a trivial task. On the one hand, the Service Level Agreement (SLA)...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    Autonomic SLA-Aware Service Virtualization for Distributed Systems

    Cloud Computing builds on the latest achievements of diverse research areas, such as grid computing, service-oriented computing, business processes and virtualization. Managing such heterogeneous environments requires sophisticated interoperation of adaptive coordinating components. In this paper, the authors introduce an SLA-aware service virtualization architecture that provides non-functional guarantees in the form...

    Provided By Vienna University of Technology

  • White Papers // Jun 2011

    Detecting Environment-Sensitive Malware

    The execution of malware in an instrumented sandbox is a widespread approach for the analysis of malicious code, largely because it sidesteps the difficulties involved in the static analysis of obfuscated code. As malware analysis sandboxes increase in popularity, they are faced with the problem of malicious code detecting the...

    Provided By Vienna University of Technology

  • White Papers // Dec 2010

    PiOS: Detecting Privacy Leaks in IOS Applications

    With the introduction of Apple's iOS and Google's Android operating systems, the sales of smartphones have exploded. These smartphones have become powerful devices that are basically miniature versions of personal computers. However, the growing popularity and sophistication of smartphones have also increased concerns about the privacy of users who operate...

    Provided By Vienna University of Technology

  • White Papers // Feb 2011

    Pushing Efficient Evaluation of HEX Programs by Modular Decomposition

    The evaluation of logic programs with access to external knowledge sources requires to interleave external computation and model building. Deciding where and how to stop with one task and proceed with the next is a difficult problem, and existing approaches have severe scalability limitations in many real-world application scenarios. The...

    Provided By Vienna University of Technology

  • White Papers // Nov 2010

    Declarative Belief Set Merging Using Merging Plans

    The authors present a declarative framework for belief set merging tasks over (possibly heterogeneous) knowledge bases, where belief sets are sets of literals. The framework is designed generically for flexible deployment to a range of applications, and allows to specify complex merging tasks in tree-structured merging plans, whose leaves are...

    Provided By Vienna University of Technology

  • White Papers // Jun 2010

    Decomposition of Distributed Nonmonotonic Multi-Context Systems

    Multi-Context Systems (MCS) are formalisms that enable the inter-linkage of single knowledge bases, called contexts, via bridge rules. Recently, a fully distributed algorithm for evaluating heterogeneous, non-monotonic MCS was described. In this paper, the authors continue this line of work and present a decomposition technique for MCS which analyzes the...

    Provided By Vienna University of Technology

  • White Papers // Jul 2009

    Relevance-Driven Evaluation of Modular Nonmonotonic Logic Programs

    Modular non-Monotonic Logic Programs (MLPs) under the answer-set semantics have been recently introduced as an ASP formalism in which modules can receive context-dependent input from other modules, while allowing (mutually) recursive module calls. This can be used for more succinct and natural problem representation at the price of an exponential...

    Provided By Vienna University of Technology

  • White Papers // May 2009

    Modular Nonmonotonic Logic Programming Revisited

    Recently, enabling modularity aspects in Answer Set Programming (ASP) has gained increasing interest to ease the composition of program parts to an overall program. In this paper, the authors focus on modular non-Monotonic Logic Programs (MLP) under the answer set semantics, whose modules may have contextually dependent input provided by...

    Provided By Vienna University of Technology

  • White Papers // Jun 2009

    Decomposition of Declarative Knowledge Bases With External Functions

    The authors present a method to decompose a declarative knowledge base, given by a logic program under answer set semantics with access to external sources. It overcomes the ineffectiveness of current methods due to a lack of structural information about these sources, viewed as black boxes, by exploiting independency information...

    Provided By Vienna University of Technology

  • White Papers // Apr 2009

    Realizing Default Logic Over Description Logic Knowledge Bases

    The authors consider a realization of Reiter-style default logic on top of Description Logic Knowledge Bases (DL-KBs). To this end, they present elegant transformations from default theories to conjunctive query (cq-)programs that combine rules and ontologies, based on different methods to find extensions of default theories. The transformations, which are...

    Provided By Vienna University of Technology

  • White Papers // Sep 2008

    Domain-Specific Languages for Service-Oriented Architectures: An Explorative Study

    Domain-Specific Languages (DSLs) are an important software development approach for many Service-Oriented Architectures (SOAs). They promise to model the various SOA concerns in a suitable way for the various technical and non-technical stakeholders of a SOA. However, so far the research on SOA DSLs concentrates on novel technical contributions, and...

    Provided By Vienna University of Technology

  • White Papers // Mar 2009

    Correlation of Context Information for Mobile Services

    Location Based Services are a key driver in today's telecom market, even if the power of Location Based Services is not nearly exhausted in nowadays telecom systems. To build intuitive Location Based Services for mobile handsets one success factor is to cover a broad range of mobile handsets available on...

    Provided By Vienna University of Technology

  • White Papers // Mar 2011

    Supporting Dynamic, People-Driven Processes Through Self-Learning of Message Flows

    Flexibility and automatic learning are key aspects to support users in dynamic business environments such as value chains across SMEs or when organizing a large event. Process centric information systems need to adapt to changing environmental constraints as reflected in the user's behavior in order to provide suitable activity recommendations....

    Provided By Vienna University of Technology

  • White Papers // Sep 2009

    Selecting Web Services Based on Past User Experiences

    Since the Internet of Services (IoS) is becoming reality, there is an inherent need for novel service selection mechanisms, which work in spite of large numbers of alternative services and take the user-centric nature of services in the IoS into account. One way to do this is to incorporate feedback...

    Provided By Vienna University of Technology

  • White Papers // May 2010

    Selective Service Provenance in the VRESCo Runtime

    In general, provenance describes the origin and well-documented history of a given object. This notion has been applied in information systems, mainly to provide data provenance of scientific workflows. Similar to this, provenance in Service-oriented Computing has also focused on data provenance. However, the authors argue that in service-centric systems...

    Provided By Vienna University of Technology

  • White Papers // Oct 2010

    A Flexible Approach Towards Self-Adapting Process Recommendations

    A companys ability to flexibly adapt to changing business requirements is one key factor to remain competitive. The required flexibility in people driven processes is usually achieved through ad-hoc workflows which are naturally highly unstructured. Effective guidance in ad-hoc workflows therefore requires a simultaneous consideration of multiple goals: Support of...

    Provided By Vienna University of Technology

  • White Papers // Apr 2008

    What SOA Can Do for Software Dependability

    The prosperity and competitiveness of organizations and societies in general largely depend on the degree of their ability to react flexibly and pro-actively on a constantly changing environment. As many new products and services depend on information and communication software, the inertness of today's software systems turns them into an...

    Provided By Vienna University of Technology

  • White Papers // Apr 2011

    Interaction Mining and Skill-Dependent Recommendations for Multi-Objective Team Composition

    Web-based collaboration and virtual environments supported by various Web 2.0 concepts enable the application of numerous monitoring, mining and analysis tools to study human interactions and team formation processes. The composition of an effective team requires a balance between adequate skill fulfillment and sufficient team connectivity. The underlying interaction structure...

    Provided By Vienna University of Technology

  • White Papers // Mar 2011

    Crowdsourcing Mobile Workflows With Tweetflows

    The use of mobile devices and Applications (Apps) offer users ubiquitous access to arbitrary Services. In this paper, the authors study the applicability of established SOA concepts in mobile computing scenarios. In particular, they investigate the application of existing SOA infrastructure principles like Service registries on App stores and investigate...

    Provided By Vienna University of Technology

  • White Papers // Apr 2010

    Adaptive Information Disclosure in a Dynamic Web of Trust

    Dynamic interactions in complex service-oriented systems increasingly demand for automated adaptation techniques to optimize resource discovery and selection. The authors describe a science collaboration scenario that applies mechanisms for adaptive information sharing, and introduce an adaptation approach that accounts for emerging trust relations based on varying interaction behavior of collaboration...

    Provided By Vienna University of Technology

  • White Papers // Jun 2010

    Supporting Network Formation Through Mining Under Privacy Constraints

    Single professionals and small companies come together and form virtual communities to compete with global players. In these collaboration networks, the actual business partners are discovered and alliances formed on demand. However, it is impossible for single members to keep track of the dynamics in large-scale networks. With the wide...

    Provided By Vienna University of Technology

  • White Papers // Dec 2010

    An End-to-End Framework for Business Compliance in Process-Driven SOAs

    It is significant for companies to ensure their businesses conforming to relevant policies, laws, and regulations as the consequences of infringement can be serious. Unfortunately, the divergence and frequent changes of different compliance sources make it hard to systematically and quickly accommodate new compliance requirements due to the lack of...

    Provided By Vienna University of Technology