The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SaaS provides multi-tenant technology allowing database to share storage but coming with irregular load, untraceable transaction characteristics and so on. Lock technology is important to ensure transaction concurrency control, but if multi-tenant database uses traditional granularity database locks, it will cause numerous problems because of the untraceable transaction characteristics and other reasons...
Enterprise Engineering is a means of applying engineering method to Enterprise Architecture, developing and evolving the mapping enterprise strategy to its resources. The potential benefits of service orientation have long been considered a driver for Enterprise Engineering. However, the service development discipline as a whole is still in it early stages. Do-main-specific frameworks and methodologies...
Much research work has been discussing the transformation between different process modeling languages. The focus was often put on model syntax rather than on the integrity of process content. Here an established approach for evaluating information content is used to assess the information content change that results due to process model transformation from EPC to BPMN business process representation...
Nowadays, process-centric Web Applications (WAs) are extensively used in contexts where multi-user, coordinated work is required. Recently, Model Driven Engineering (MDE) techniques have been investigated for the development of this kind of applications. However, there are still some open issues. First, a complete roundtrip engineering support is still missing. Second, the lack of a proper integration...
Considering the status reporting activity on a Software Configuration Managment (SCM) process, this paper presents a new version of an ontology that aims to represent the knowledge domain related to the essential phases of: issue identification, issue evaluation, and change execution. Concepts, relations, properties, and axioms are presented for this ontology so competence questions can be answered...
Research in enterprise system security has largely focused on the development of theoretical models capable of demonstrating mathematically that they possess desired security properties. However, recent results confirm that many of these models cannot be applied in practice because of the unpredictability of human participants' behavior in business processes. Moreover, while malicious attacks remain...
Systems of systems (SoS) are composed of subsystems such as Distributed, Information Technology, Real-Time and Embedded systems. Among distributed systems, Message-Oriented Middleware (MOM) is used by SoS in order to share status information from system elements (component, service, etc.). Often several different MOM technologies are used in one SoS, then interoperability between these MOM is a requirement...
Data processing in Cloud or IoT (Internet of Things) sometimes implies continuous real-time queries as data streams. In order to acquire extreme value of data stream over time-based sliding window, traditional approaches computed the exact solution through vast space especially under worse circumstances. In this paper, we design space-bounded synopsis data structure and random algorithm for extreme...
The passage from monolithic, product driven business models to networked and service-based business has given raise to the emergence of service ecosystems. A service ecosystem is a socio-technical complex system that enables service-based collaboration between entities such as enterprises, institutions or individuals. Contemporary service ecosystems are established and managed typically in an ad~hoc...
Curators in specialized fields such as biotechnology, often have to either rely on in-house tools or do tedious tasks manually. To address these issues, we have implemented Open Reconcile, an open-source and general reconciliation tool that ensures the compliance of a dataset to a specific controlled vocabulary. Open Reconcile is compatible with the Google Refine Reconciliation API, where Google Refine...
The ODP Enterprise Language is used to describe the organizational objectives and policies that apply to the system to be specified. It also captures constraints associated with the environment in which the system is to be used. Because the enterprise specification is concerned more with organizational issues than technical details of the system, there is considerable emphasis in the language design...
Software solutions for certain complex problem areas such as claims adjudication and fraud detection are hard to build using imperative programming languages and even harder to maintain and change. In light of this, enterprises are turning to Rule-Based Expert Systems to provide a solution. However, to realize the full potential of this, the technology for mining and articulating the knowledge need...
Audit is an independent activity that employs standardized methods to evaluate and improve the effect in the process of compliance and control in order to help the organization achieve its goals. Nowadays, the current audit management process is costly and requires a high effort since there is a high amount of resources and used assets needed. This happens due to the large number of regulations with...
During a stateful interaction, a partner service may become unavailable because of a server crash or a temporary network failure. Once the failed service becomes available again, the interaction partners do not have any knowledge about each other's state, possibly resulting in errors or deadlocks. This paper proposes an approach to the recovery of stateful interactions based on service interaction...
Memory-based methods for recommending data services predict the ratings of active users based on the information of other similar users or items, where the similarity algorithm always plays a key role. In many scenarios, we find that the similarity of two users always show different effectiveness when predicting different ratings. Normal similarity algorithms usually do not count the difference, since...
Nowadays, many organizations use BPM for capturing and monitoring their business processes. The introduction of BPM in an organization may become expensive, because of the upfront investments on software and hardware. Therefore, organizations can choose for a cloud-based BPM system, in which a BPM system can be used in a pay-per-use manner. Opting for cloud-based solutions may normally raise concerns...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.