You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Constraints allow developers to specify desired properties of systems in a number of domains, and have those properties be maintained automatically. This results in compact, declarative code, avoiding scattered code to check and imperatively re-satisfy invariants. Despite these advantages, constraint programming is not yet widespread, with standard imperative programming still the norm. There is a long history of research on integrating constraint programming with the imperative paradigm. However, this integration typically does not unify the constructs for encapsulation and abstraction from both paradigms. This impedes re-use of modules, as client code written in one paradigm can only use m...
Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud infrastructures. This report provides introductions to a selection of security mechanisms that were part of the "Cloud Security Mechanisms" seminar in summer term 2013 at HPI.
This book constitutes the thoroughly refereed proceedings of eight international workshops held in Valencia, Spain, in conjunction with the 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, in June 2013. The 36 full and 12 short papers have undertaken a high-quality and selective acceptance policy, resulting in acceptance rates of up to 50% for full research papers. The eight workshops were Approaches for Enterprise Engineering Research (AppEER), International Workshop on BUSiness/IT ALignment and Interoperability (BUSITAL), International Workshop on Cognitive Aspects of Information Systems Engineering (COGNISE), Workshop on Human-Centric Information Systems (HC-IS), Next Generation Enterprise and Business Innovation Systems (NGEBIS), International Workshop on Ontologies and Conceptual Modeling (OntoCom), International Workshop on Variability Support in Information Systems (VarIS), International Workshop on Information Systems Security Engineering (WISSE).
This book constitutes the refereed proceedings of the 11th International Conference on Service-Oriented Computing, ICSOC 2012, held in Berlin, Germany, in December 2013. The 29 full papers and 27 short papers presented were carefully reviewed and selected from 205 submissions. The papers are organized in topical sections on service engineering, service operations and management; services in the cloud; and service applications and implementations.
This book constitutes the proceedings of the 4th workshop on Business Process Model and Notation, BPMN 2012, held in Vienna, Austria, in September 2012. The BPMN workshop series provides a forum for academics and practitioners who share an interest in business process modeling using the Business Process Modeling Notation, which is seen by many as the de facto standard for business process modeling. This year, the workshop lasted two days and consisted of both a scientific and a practitioner event. The six full and three short papers presented were carefully reviewed and selected from 22 submissions. The workshop applied a thorough reviewing process, during which each paper was reviewed by three Program Committee members. In addition, an extended abstract of the workshop keynote is also included.
LNBIP 99 and LNBIP 100 together constitute the thoroughly refereed proceedings of 12 international workshops held in Clermont-Ferrand, France, in conjunction with the 9th International Conference on Business Process Management, BPM 2011, in August 2011. The 12 workshops focused on Business Process Design (BPD 2011), Business Process Intelligence (BPI 2011), Business Process Management and Social Software (BPMS2 2011), Cross-Enterprise Collaboration (CEC 2011), Empirical Research in Business Process Management (ER-BPM 2011), Event-Driven Business Process Management (edBPM 2011), Process Model Collections (PMC 2011), Process-Aware Logistics Systems (PALS 2011), Process-Oriented Systems in Heal...
This book constitutes the refereed proceedings of the 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, held in Valencia, Spain, in June 2013. The 44 revised full papers were carefully reviewed and selected from 162 submissions. The contributions have been grouped into the following topical sections: services; awareness; business process execution; products; business process modelling; modelling languages and meta models; requirements engineering 1; enterprise architecture; information systems evolution; mining and predicting; data warehouses and business intelligence; requirements engineering 2; knowledge and know-how; information systems quality; and human factors.
This book constitutes the proceedings of the 10th International Conference on Business Process Management, BPM 2012, held in Tallinn, Estonia, in September 2012. The 17 regular papers and 7 short papers included in this volume were carefully reviewed and selected from 126 submissions. The book also features two keynote lectures which were given at the conference. The papers are organized in topical sections named: process quality; conformance and compliance; BPM applications; process model analysis; BPM and the cloud; requirements and performance; process mining; and refactoring and optimization.
This book constitutes the proceedings of the 11th International Conference on Business Process Management, BPM 2013, held in Beijing, China, in August 2013. The 17 regular papers and 8 short papers included in this volume were carefully reviewed and selected from 118 submissions. The papers are organized in 7 topical sections named: process mining; conformance checking; process data; process model matching; process architectures and collaboration; as well as alternative perspectives, and industry paper.