-------- Original-Nachricht --------
Betreff: [WI] CfP Informationssysteme mit Open Source (ISOS 2011) -
Verlängerung der Einreichungsfrist auf 01.05.
Datum: Thu, 21 Apr 2011 12:58:08 +0200
Von: Prof. Dr. Frank Rump <frank.rump(a)hs-emden-leer.de>
An: wi(a)aifb.uni-karlsruhe.de
****************************************************************************
CALL FOR PAPERS
8. GI-Workshop ISOS 2011
Informationssysteme mit Open Source
im Rahmen der GI-Jahrestagung "Informatik 2011" in Berlin
04.-07.10.2011
****************************************************************************
Informationssysteme mit Open Source
-----------------------------------
Die Entwicklung von Informationssystemen (IS) auf der Basis von Open
Source (OS) Produkten ist in der Industrie, bei Behörden und in
Wissenschaft und Forschung gängige Praxis. Viele
Forschungseinrichtungen stellen ihre Systeme als OS-Systeme zur
Verfügung und OS-Systeme beeinflussen Spezifikationen in den Bereichen
Java-EE, Web und andere. Viele größere Unternehmen haben mittlerweile
eine eigene Abteilung, die sich mit Fragestellungen zu OS-Software
beschäftigt.
Die Chancen des Einsatzes von OS-Produkten haben jedoch noch nicht
alle IT- Verantwortlichen erreicht. Das liegt u.a. an fehlenden
Informationen über bereits verfügbare Systeme und Produkte, einer
allgemeinen Unsicherheit beim Umgang mit OS-Lizenzen und
software-technischen Fragestellungen im Zusammenhang mit dem Einsatz
von OS-Produkten.
Auf dem Workshop ISOS 2011 sollen sämtliche Aspekte des Einsatzes von
OS-Produkten in der Entwicklung von Informationssystemen thematisiert
und insbesondere bestehende Problemfelder und Unsicherheiten
aufgezeigt und analysiert werden. Praktiker und Wissenschaftler mit
Erfahrungen im Bereich der Nutzung von OS-Produkten sind herzlich
eingeladen, Beiträge zu den folgenden und weiteren relevanten Themen
einzureichen:
Software-Engineering und OS
* Software-Architekturen unter Einsatz von OS-Produkten
* PM, QS und Wartung in OS-IS
Juristische Aspekte des Einsatzes von OS-Produkten
* Lizenzvereinbarungen
* Vertragsgestaltungen
* Haftungsfragen
OS für spezielle Anwendungsbereiche
* Öffentlicher Sektor
* Mobile Anwendungssysteme
* Betriebliche Anwendungssysteme
OS für formale Systeme
* Modellierung komplexer Systeme
* Verifikation von Eigenschafen
Einfluss von OS auf Spezifikationen
* OS und Java-EE
* OS und Web
Adressaten
----------
Praktiker und Wissenschaftler mit Erfahrungen im Bereich der Nutzung
von OS-Produkten in der professionellen Software-Entwicklung sind
herzlich eingeladen, Beiträge zu den genannten und weiteren relevanten
Themen einzureichen.
Termine
-------
* 01.05.2011: Einreichung von Beiträgen (über EasyChair)
* 23.05.2011: Benachrichtigung über Annahme oder Ablehnung
* 01.07.2011: Abgabe der fertigen Druckvorlagen
Beiträge
--------
Beiträge sollten ca. 6 Seiten umfassen und in deutscher oder
englischer Sprache verfasst sein. Die Beiträge sind als PDF-Datei über
EasyChair (https://www.easychair.org/conferences/?conf=informatik2011)
einzureichen. Eingereichte Beiträge werden geprüft und akzeptierte
Beiträge in der GI-Edition "Lecture Notes in Informatics"
veröffentlicht. Beachten Sie daher unbedingt auch die allgemeinen
Hinweise auf der Homepage der GI-Jahrestagung
(http://www.informatik2011.de/535.html). Von mindestens einem der
Autoren wird die Bereitschaft erwartet, sich zur Tagung anzumelden und
sich die gesamte Dauer des Workshops freizuhalten.
Workshop-Leitung (Ansprechpartner)
----------------------------------
* Prof. Dr. Frank Rump, Hochschule Emden/Leer
* Prof. Dr. Bernd Müller, Ostfalia Hochschule Braunschweig/Wolfenbüttel
Teilnahme
---------
Für die Teilnahme am Workshop ist eine Anmeldung zur INFORMATIK 2011
erforderlich. Weitere Informationen zur INFORMATIK 2011 erhalten Sie
auf der Homepage der Tagung (http://www.informatik2011.de/).
Programmkomitee
---------------
* Dr. D. Boles (Uni Oldenburg)
* Prof. Dr. R. Bruns (FH Hannover)
* Dr. P. Buhrmann (sd&m AG) (angefragt)
* Prof. Dr. H. Eirund (Hochschule Bremen)
* Prof. Dr. O. Herden (DHBW Stuttgart Campus Horb)
* Prof. Dr. H. Hinrichs (FH Lübeck)
* Prof. Dr. H. Jasper (TU Freiberg)
* Prof. Dr. B. Müller (FH Braunschweig/Wolfenbüttel)
* Prof. Dr. M. Nüttgens (Uni Hamburg)
* Prof. Dr. F. Rump (FH Emden/Leer)
* Dr. H. Smolinski (IBM Deutschland)
* Prof. Dr. J. Taeger (Uni Oldenburg)
* Prof. Dr. T. Teschke (Hochschule Bremen)
* Prof. Dr. O. Zukunft (HAW Hamburg)
Homepage
--------
* http://isos.et-inf.fho-emden.de/
--
Prof. Dr. Frank J. Rump - frank.rump(a)hs-emden-leer.de
Hochschule Emden/Leer - Fachbereich Technik
Constantiaplatz 4 - 26723 Emden - Tel. 05432/301337
--
Mailing-Liste: wi(a)aifb.uni-karlsruhe.de
Administrator: wi-admin(a)aifb.uni-karlsruhe.de
Konfiguration: https://www.lists.uni-karlsruhe.de/sympa/info/wi
-------- Original-Nachricht --------
Betreff: [computational.science] Call for Paper of Special Issue on
Multimedia Computing and Management in Cloud Environment
Datum: Thu, 21 Apr 2011 02:57:14 -0700 (PDT)
Von: Guangjie <guangj_liu(a)yahoo.com.cn>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
Concurrency and Computation: Practice and Experience
http://www3.interscience.wiley.com/journal/117946197/grouphome/home.html
Special Issue on Multimedia Computing and Management in Cloud Environment
Introduction
In cloud computing environment, various innovative multimedia (text, image,
audio, video, graph,
etc.) services appear. For example, users may work on one document or drawing
together over
Internet, users can push their complicated computing tasks to cloud servers, and
users can forward
their multimedia content (e.g., TV program) to cloud servers with the aim of
obtaining the
analyzed result (e.g., a short summarization). To support these services,
various computing or
management techniques are required, e.g., multimedia processing, coding,
communication, storage
and access. Additionally, in cloud computing, security and privacy become very
important issues,
e.g., user authentication and authorization, information exchange between
clients and cloud servers,
privacy protection of user-uploaded content, etc.
This special issue aims to collect the best papers contributed by leading
experts, and expose the
readership to the latest research results on multimedia computing and management
in cloud
computing environment. It will include a number of related topics, demonstrate
pioneer work,
investigate the novel solutions and discuss the future trends in this field.
Topics
Submitted papers may focus on theoretical model, architecture construction,
algorithm design or
hardware implementation. Both review papers and technical papers are expected.
The topics
include but are not limited to
Resource allocation in cloud computing
Task management in cloud computing
Cloud computing platform and system
Multimedia coding for cloud based applications
Multimedia processing in cloud environment
Multimedia communication in cloud environment
Multimedia content management in cloud environment
Multimedia storage and access in cloud platforms
Multimedia service and system in cloud environment
Multimedia security and protection in cloud computing
User authentication/authorization in cloud computing
Secure communication in cloud computing
Copyright protection and tracing in cloud computing
Privacy preservation in cloud computing
Submission
The submitted papers should describe original research which is not published
nor currently under
review by other journals or conferences. Author guidelines for preparation of
manuscript can be found at
http://www3.interscience.wiley.com/journal/117946197/grouphome/home.html. All
manuscripts
and any supplementary material should be submitted through the online submission
system:
http://www3.interscience.wiley.com/journal/117946197/grouphome/home.html, by
selecting the corresponding special issue. All papers will be
rigorously reviewed based on their originality, high scientific quality,
organization, clarity of
writing, and support provided for assertions and conclusion.
Important Dates
Submission deadline: May 1, 2011
Acceptance notification: June 1, 2011
Final manuscript due: June 30, 2011
Guest Editors
Dr. Shiguo Lian
Orange Labs Beijing, China
E-mail: shiguo.lian(a)ieee.org
Prof. Athanasios Vasilakos
University of Western Macedonia, Greece
E-mail: vasilako(a)ath.forthnet.gr
-------- Original-Nachricht --------
Betreff: [computational.science] Call for Paper of The Computer Journal
Special Issue on Security and Privacy in Innovative Communication and
Services
Datum: Thu, 21 Apr 2011 02:55:04 -0700 (PDT)
Von: Guangjie <guangj_liu(a)yahoo.com.cn>
Organisation: "ICCSA"
An: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
The Computer Journal
http://comjnl.oxfordjournals.org/
Special Issue on
Security and Privacy in Innovative Communication and Services
Introduction
Now, various multimedia services are enriching human's daily life, such as
multimedia message services, color rings, mobile TV, IPTV, User Generated
Content (UGC), p2p sharing, etc. With the rapid development of communication
technology, it becomes a reality to hear or watch anything, anywhere. For
example, the convergence between Internet, digital TV and telecommunication
(e.g., telephone, telegram, or mobile communication) pushes the development of
TV services, such as interactive TV, IPTV, mobile TV, etc. The cloud computing
techniques make it more and more attractive for remote users to work on one task
together, e.g., collaborative drawing or writing. The machine-to-machine
communication enriches users' experiences by fastening the wearable computing or
ambient intelligence. Social networks (for linking friends or sharing multimedia
contents) over Internet or mobile networks are attracting more and more users.
This special issue focuses on the security and privacy issues arising in
innovative communication or service systems, and aims to collect best papers
contributed by leading experts, expose the readership to the latest research
results on the countermeasures. It will include a number of related topics,
demonstrate pioneer work in this field, investigate the novel solutions and
discuss the future trends in this field.
Topics
Submitted papers may focus on theoretical model, architecture construction,
algorithm design or hardware implementation. Both review papers and technical
papers are expected. The topics include but are not limited to
Security and privacy in network convergence
Security and privacy in machine-to-machine communication
Security and privacy in collaborative computing
Security and privacy in cloud computing
Security and privacy in grid computing
Security and privacy in peer-to-peer computing
Security and privacy in wearable computing
Security and privacy in ambient intelligence
Security and privacy in ubiquitous communication
Security and privacy in mobile sensor networks
Security and privacy in mobile ad hoc networks
Security and privacy in information sharing social networks
Security and privacy in interactive multimedia services
Security and privacy in other innovative communication and services
Submission
The submitted papers must be written in English and describe original research
which is not published nor currently under review by other journals or
conferences. Author guidelines for preparation of manuscript can be found at
http://comjnl.oxfordjournals.org/. All manuscripts and any supplementary
material should be submitted through the online submission system:
http://mc.manuscriptcentral.com/compj, by mentioning the corresponding special
issue. All papers will be rigorously reviewed based on their originality, high
scientific quality, organization, clarity of writing, and support provided for
assertions and conclusion.
Important Dates
Submission deadline: June 5, 2011
First revision notification: July 15, 2011
Final acceptance notification: September 1, 2011
Final manuscript due: September 20, 2011
Guest Editors
Dr. Shiguo Lian
Orange Labs Beijing
E-mail: shiguo.lian(a)ieee.org
Prof. Gritzalis Stefanos
University of the Aegean
Email: sgritz(a)aegean.gr
-------- Original-Nachricht --------
Betreff: [WI] Zweiter Call for Papers & Einladung zum Workshop der GI
FG SIM an der Informatik 4.-7.10.2011 Berlin - STRATEGISCHES
INFORMATIONSMANAGEMENT
Datum: Wed, 20 Apr 2011 17:15:48 +0200
Von: Walser Konrad <konrad.walser(a)bfh.ch>
An: 'wi(a)aifb.uni-karlsruhe.de' <wi(a)aifb.uni-karlsruhe.de>
***********************************************************************************************************
Informatik 2011 -- 41. Jahrestagung der Gesellschaft für Informatik e.V.
(GI) -- 4. bis 7. Oktober 2011 -- Berlin
/*Zweiter Call for Papers und *//*Einladung zur Gründungsversammlung und
zum Workshop
"Strategisches Informationsmanagement" -- Fachgruppe SIM des GI
Fachbereichs 5 -- Wirtschaftsinformatik*/
*Halbtägiger Workshop mit zwei Sessions*
Detailprogramm folgt später.
***********************************************************************************************************
*VORLÄUFIGES PROGRAMM Workshop*
1. Session mit Keynote und Darstellung der Gründe für die
Wiederinitiierung der Fachgruppe sowie Formalia.
2. Session mit Diskussionsrunde zur Ausrichtung der Fachgruppe mit den
Fachgruppenmitgliedern und weiteren
Interessierten sowie Vorträgen aus Einreichungen.
**********************************************************************************************************
/*Der folgende Text ist als zu diskutierender programmatischer Vorschlag
für die Fachgruppe*//*SIM*//*(und den Workshop) zu verstehen.*/
*PROBLEMSTELLUNG FACHGRUPPE STRATEGISCHES INFORMATIONSMANAGEMENT**(FG SIM)*
Das strategische Informationsmanagement ist eine schillernde Disziplin,
der in Wissenschaft und Praxis gleichermaßen Bedeutung zugemessen wird.
Zwar hat sich "Informationsmanagement" eher als ein Begriff aus der
Informatik- und Wirtschaftsinformatikforschung etabliert, während in der
Praxis eher die Termini "IT-Management", "IT-Governance" und
"Informatik-Management" gebräuchlich sind. Gleichwohl scheint Konsens zu
bestehen, dass die Verarbeitung und Bereitstellung von Information
systematisch zu managen ist und dabei Informationssysteme und
-technologie mit in die Betrachtung einbezogen werden müssen.
In Anlehnung an etablierte Definitionen verstehen wir
Informationsmanagement als "auf Information und Kommunikation
gerichtetes Leitungshandeln in Organisationen, also alle
Führungsaufgaben, die sich mit Information und Kommunikation befassen"
(Heinrich, Stelzer 2009) bzw. "das Management der
Informationswirtschaft, der Informationssysteme, der Informations- und
Kommunikationstechnik sowie der übergreifenden Führungsaufgaben" (Krcmar
2009).
Damit verbundene Ziele sind bspw. die Unterstützung der Erreichung der
strategischen Unternehmensziele und die Steigerung des
Unternehmenswerts. Als hiermit verbundene Ziele und Aufgaben werden die
Entwicklung von aus Unternehmensstrategien abgeleiteten IT-Strategien,
Business/IT-Alignment sowie IT-Service-, IT-Risiko- und
Compliance-Management genannt. Informationsmanagement ist damit sowohl
Management- wie Technikdisziplin (Krcmar 2009).
Bis heute existiert kein etabliertes und strukturiertes
Methodenverständnis zur Erstellung und Durchsetzung einer IT-Strategie,
zum Aufbau angemessener Strukturen sowie zur Entwicklung von
korrespondierenden IT-Prozessen. Die Arbeit in der Fachgruppe, die mit
diesem Workshop wieder aufgenommen werden soll, widmet sich u.a. diesem
Sachverhalt.
Die Verfasser empfinden es als einen Mangel, dass sich seit einer Reihe
von Jahren keine Fachgruppe der Gesellschaft für Informatik bzw. des
Fachbereichs Wirtschaftsinformatik diesem bedeutenden Thema aktiv widmet.
Es ist nicht das Ziel, zu vorhandenen Fachgruppen in Konkurrenz zu
treten. Vielmehr bearbeitet die Fachgruppe SIM komplementär und gerne in
Kooperation mit anderen Fachgruppen entsprechende Themen aus
strategischer Sicht.
*VORGEHEN IN UND FÜR FACHGRUPPE STRATEGISCHES
INFORMATIONSMANAGEMENT****(FG SIM)*
Wir planen, zunächst eine Konferenz- oder Workshop-Reihe zu initiieren,
in der zunächst in der Breite und danach in immer stärker fokussierten
Veranstaltungen auf aktuelle und künftige Entwicklungen im Strategischen
Informationsmanagement eingegangen wird. Wichtig ist uns hierfür zum
einen die Kopplung von Theorie und Praxis, zum anderen die Definition
einer wissenschaftlichen Forschungsagenda.
*KONTAKTPERSONEN UND SPRECHER DER F**G**SIM*
Bei Fragen stehen Ihnen die beiden Sprecher der GI Fachgruppe SIM Prof.
Dr. Matthias Goeken (Frankfurt School of Finance & Management) und Dr.
rer. oec. Konrad Walser (Berner Fachhochschule) gerne zur Verfügung. Die
Emailadressen lauten wie folgt:
* _m.goeken(a)fs.de_ <mailto:m.goeken@fs.de>
* _konrad.walser(a)bfh.ch_ <mailto:konrad.walser@bfh.ch>
*WEBSEITEN*
*NEU:* Webseite zum Workshop der FG SIM an der Informatik 2011 in Berlin:
http://www.frankfurt-school.de/content/de/it_governance/workshop_SIM.htm
*BESTEHEND:* Webseite für den Workshop auf der Webseite der Informatik
2011:
http://www.informatik2011.de/fileadmin/informatik2011/WS-pdf/CfP_GI_FG_SIM_…
*EINREICHUNGEN UND TERMINE*
Wir werden, ausgehend von der Tatsache, dass wir die Fachgruppe neu
beleben und erst auszurichten haben, für diesen ersten Workshop nicht
mit einem Programmkomitee und doppelblind-begutachteten Beiträgen arbeiten.
Trotzdem werden wir je nach Einreichungslage eine mehr oder weniger
strukturierte Auswahl treffen. Das entsprechende Auswahlverfahren wird
für Sie transparent gemacht.
Bitte senden Sie daher Workshop-Einreichungen (Paper zur Informatik 2011
oder "Extended Abstracts") *bis spätestens zum 6.5.2011* zu den oben
angegebenen Themenbereichen im LNI-Format *per E-Mail* an die beiden
Sprecher der GI Fachgruppe SIM ein, von denen die E-Mail-Adressen oben
angegeben sind.
Wir freuen uns auf Ihre Einreichungen, Ihre Mitwirkung und Ihr Interesse
an der Wiederbelebung der Fachgruppe SIM sowie auf Ihre Anwesenheit an
unserem Workshop.
Ihre
Matthias Goeken -- Sprecher GI FG SIM
Konrad Walser -- Stv. Sprecher GI FG SIM
-------- Original-Nachricht --------
Betreff: [AISWorld] Contents of the Latest Issue of Journal of Database
Management (JDM) 22(2)
Datum: Wed, 20 Apr 2011 13:56:01 -0500
Von: Keng Siau <ksiau(a)unlnotes.unl.edu>
An: aisworld(a)lists.aisnet.org
The contents of the latest issue of:
Journal of Database Management (JDM)
Official Publication of the Information Resources Management Association
Volume 22, Issue 2, April-June 2011
Published: Quarterly in Print and Electronically
ISSN: 1063-8016 EISSN: 1533-8010
Published by IGI Publishing, Hershey-New York, USA
www.igi-global.com/jdm
Editor-in-Chief: Keng Siau, University of Nebraska - Lincoln, USA
Special Issue: Service-Oriented Architecture and Computing
GUEST EDITORIAL PREFACE
Sandeep Purao, Penn State University, USA
Vijay Khatri, Indiana University, USA
Brian Cameron, Penn State University, USA
To read the preface, click on the link below, and then click "Preface."
http://www.igi-global.com/bookstore/titledetails.aspx?titleid=47820
PAPER ONE
Multi-Level Modeling of Web Service Compositions with Transactional
Properties
K. Vidyasankar, Memorial University, Canada
Gottfried Vossen, University of Muenster, Germany
Web services have become popular as a vehicle for the design,
integration, composition, reuse, and deployment of distributed and
heterogeneous software. However, although industry standards for the
description, composition, and orchestration of Web services have been
under development, their conceptual underpinnings are not fully
understood. Conceptual models for service specification are rare, as are
investigations based on them. This paper presents and studies a
multi-level service composition model that perceives service
specification as going through several levels of abstraction. It starts
from transactional operations at the lowest level and abstracts into
activities at higher levels that are close to the service provider or
end user. The authors treat service composition from a specification and
execution point of view, where the former is about composition logic and
the latter about transactional guarantees. Consequently, the model
allows for the specification of a number of transactional properties,
such as atomicity and guaranteed termination, at all levels. Different
ways of achieving the composition properties and implications of the
model are presented. The authors also discuss how the model subsumes
practical proposals like the OASIS Business Transaction Protocol, Sun’s
WS-TXM, and execution aspects of the BPEL4WS standard.
To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/bookstore/article.aspx?titleid=52991
PAPER TWO
Service Composition and Interaction in a SOC Middleware Supporting
Separation of Concerns with Flows and Views
Dickson K. W. Chiu, Dickson Computer Systems, Hong Kong
Qing Li, City University of Hong Kong, Hong Kong
Patrick C. K. Hung, University of Ontario, Canada
Zhe Shan, City University of Hong Kong, Hong Kong
S. C. Cheung, Hong Kong University of Science and Technology, Hong Kong
Yu Yang, City University of Hong Kong, Hong Kong
Matthias Farwick, University of Innsbruck, Austria
Service-Oriented Computing (SOC) has recently gained attention both
within industry and academia; however, its characteristics cannot be
easily solved using existing distributed computing technologies.
Composition and interaction issues have been the central concerns,
because SOC applications are composed of heterogeneous and distributed
processes. To tackle the complexity of inter-organizational service
integration, the authors propose a methodology to decompose complex
process requirements into different types of flows, such as control,
data, exception, and security. The subset of each type of flow necessary
for the interactions with each partner can be determined in each
service. These subsets collectively constitute a process view, based on
which interactions can be systematically designed and managed for system
integration through service composition. The authors illustrate how the
proposed SOC middleware, named FlowEngine, implements and manages these
flows with contemporary Web services technologies. An experimental case
study in an e-governmental environment further demonstrates how the
methodology can facilitate the design of complex inter-organizational
processes.
To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/bookstore/article.aspx?titleid=52992
PAPER THREE
Ensuring Customised Transactional Reliability of Composite Services
Sami Bhiri, National University of Ireland, Galway, Ireland
Walid Gaaloul, Telecom & Management SudParis, France
Claude Godart, LORIA-INRIA, France
Olivier Perrin, LORIA-INRIA, France
Maciej Zaremba, National University of Ireland, Galway, Ireland
Wassim Derguech, National University of Ireland, Galway, Ireland
Web services are defined independently of any execution context. Due to
their inherent autonomy and heterogeneity, it is difficult to examine
the behaviour of composite services, especially in case of failures.
This paper is interested in ensuring composite services reliability.
Reliable composition is defined as a composition where all instance
executions are correct from a transactional and business point of view.
In this paper, the authors propose a transactional approach for ensuring
reliable Web service compositions. The approach integrates the
expressivity power of workflow models and the reliability of Advanced
Transactional Models (ATM). This method offers flexibility for designers
to specify their requirements in terms of control structure, using
workflow patterns, and execution correctness. Contrary to ATM, the
authors start from the designers’ specifications to define the
appropriate transactional mechanisms that ensure correct executions
according to their requirements.
To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/bookstore/article.aspx?titleid=52993
PAPER FOUR
Leveraging Early Aspects in End-to-End Model Driven Development for
Non-Functional Properties in Service Oriented Architecture
Hiroshi Wada, National ICT Australia, Australia
Junichi Suzuki, University of Massachusetts, Boston, USA
Katsuya Oba, OGIS International, Inc., USA
In Service Oriented Architecture (SOA), each application is designed
with a set of reusable services and a business process. To retain the
reusability of services, non-functional properties of applications must
be separated from their functional properties. This paper investigates a
model-driven development framework that separates non-functional
properties from functional properties and manages them. This framework
proposes two components: (1) a programming language, called BALLAD, for
a new per-process strategy to specify non-functional properties for
business processes, and (2) a graphical modeling method, called
FM-SNFPs, to define a series of constraints among non-functional
properties. BALLAD leverages aspects in aspect oriented
programming/modeling. Each aspect is used to specify a set of
non-functional properties that crosscut multiple services in a business
process. FM-SNFPs leverage the notion of feature modeling to define
constraints among non-functional properties like dependency and mutual
exclusion constraints. BALLAD and FM-SNFPs free application developers
from manually specifying, maintaining and validating non-functional
properties and constraints for services one by one, reducing the
burdens/costs in development and maintenance of service-oriented
applications. This paper describes the design details of BALLAD and
FM-SNFPs, and demonstrates how they are used in developing
service-oriented applications. BALLAD significantly reduces the costs to
implement and maintain non-functional properties in service-oriented
applications.
To obtain a copy of the entire article, click on the link below.
http://www.igi-global.com/bookstore/article.aspx?titleid=52994
*****************************************************
For full copies of the above articles, check for this issue of the
Journal of Database Management (JDM) in your institution's library. This
journal is also included in the IGI Global aggregated "InfoSci-Journals"
database: http://www.igi-global.com/EResources/InfoSciJournals.aspx.
*****************************************************
CALL FOR PAPERS
Mission of JDM:
The Journal of Database Management (JDM) publishes original research on
all aspects of database management, design science, systems analysis and
design, and software engineering. The primary mission of JDM is to be
instrumental in the improvement and development of theory and practice
related to information technology, information systems, and management
of knowledge resources. The journal is targeted at both academic
researchers and practicing IT professionals.
Coverage of JDM:
The Journal of Database Management (JDM) publishes three types of
rigorous and high quality articles: research articles, research notes,
and research reviews. Research articles are full innovative findings
that make substantial theoretical and empirical contributions to
knowledge in the field by using various theoretical and methodological
approaches. Research notes are novel and complete but not as
comprehensive as full research articles; they include exploratory
studies and methodological articles. Research reviews are insightful and
carefully crafted articles that conceptualize research areas, synthesize
previous innovative findings, advance the understanding of the field,
and identify and develop future research directions. Authors are welcome
to submit manuscripts that qualify for any of the three categories.
Topics of interest to the journal include, but are not limited to, the
following areas:
* Agile systems development
* Bio-informatics
* Cognitive modeling
* Component engineering
* Conceptual modeling
* Data quality
* Data warehousing and data mining
* Database for advanced applications
* Database management and administration
* Database models and query languages
* Database security and integrity
* Design science
* Domain-driven development
* E-business and m-commerce models and architectures
* Empirical software engineering
* Enterprise systems and supply chain integration
* Extreme modeling and extreme programming
* Geographical information systems
* Human-computer interaction
* Heterogeneous and distributed database
* Information and knowledge modeling
* Intelligent agents and agent-based applications
* Knowledge engineering and management
* Method engineering and metamodeling
* Object oriented methods and methodologies
* Requirements engineering
* Service-oriented architecture/service-oriented computing
* Semantic Web and ontology
* Software engineering
* System analysis and design
* Unified modeling language and unified process
* Virtual team and Web 2.0
* Web database and Web-based information systems
* Web design methods and methodologies
Interested authors should consult the journal's manuscript submission
guidelines www.igi-global.com/jdm
All inquiries and submissions should be sent to:
Editor-in-Chief: Keng Siau at jdm(a)unlnotes.unl.edu
-------- Original-Nachricht --------
Betreff: rBPM 2011 @ BPM 2011 - Second CFP
Datum: Thu, 21 Apr 2011 01:35:30 -0300
Von: m.fantinato(a)usp.br
An: m.fantinato(a)usp.br
[Apologies if you are not interested in this topic]
Dear researcher,
In 2010, we had the first edition of the rBPM workshop, focused on
REUSE in the BPM domain. After a successful event, we are going to
have the second edition of the workshop, also together with the BPM
conference.
Should you have interest in this theme, please visit the workshop web
site at: http://each.uspnet.usp.br/rbpm/2011/. You may consider submit
a paper.
==> Reminder: There is one month to the submission deadline.
Best regards,
Marcelo Fantinato
(on befalf of the Organizing Committee)
-------- Original Message --------
Subject: [AISWorld] Process Mining - Slides and Event Logs
supporting the new book "Process Mining: Discovery,
Conformance, and Enhancement of Business Processes"
Date: Wed, 20 Apr 2011 12:04:10 +0200
From: Aalst, W.M.P. van der <W.M.P.v.d.Aalst(a)tm.tue.nl>
To: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
Slides and Event Logs supporting the new book "Process
Mining: Discovery, Conformance, and Enhancement of Business
Processes"
http://www.processmining.org/book/
Process mining provides a new means to improve processes in
a variety of application domains. Driven by the omnipresence
of event data and the limitations of Business Process
Management (BPM) and Business Intelligence (BI) approaches,
a new discipline has emerged that builds on classical
process model-driven approaches and data mining. During the
last decade, breakthroughs have been realized that make it
possible the automatically discover business processes from
event data present in information systems ranging from ERP
systems (e.g. SAP and Oracle) and E-business applications to
hospital information systems and high-tech production
systems. Process mining can also be used for conformance
checking in the context of auditing, compliance, and
governance. Moreover, by projecting event data onto
discovered models, business processes can be improved in
terms of costs, time, and quality.
The book "Process Mining: Discovery, Conformance, and
Enhancement of Business Processes" (Springer,
http://springer.com/978-3-642-19344-6, ISBN
978-3-642-19344-6) by Wil van der Aalst is the first book on
Process Mining. It collects the state-of-the-art results
available in publications, software and best practices. To
support the book a website
http://www.processmining.org/book/ has been created
containing slides, event logs, and models. The slides can be
used for presentations, e.g., for university seminars to
discuss the emerging topic of process mining and for
training IT and business consultants to provide services
based on process mining. Many of the event logs mentioned
in the book are available via
http://www.processmining.org/book/. The open-source software
ProM (http://www.promtools.org/prom6/) and other tools
supporting the XES or MXML format can be used to discover
process models from these example logs. Also models have
been included to experiment with conformance checking
(pinpoint discrepancies between event log and model) and
other types of analysis.
For more information on process mining visit
www.processmining.org <http://www.processmining.org>. For
more information on the new process mining book see
http://springer.com/978-3-642-19344-6. People of
organizations that have the proper SpringerLink subscription
can download the book from
http://www.springerlink.com/content/978-3-642-19344-6.
-------- Original Message --------
Subject: [AISWorld] CFP - Service Science, Systems and
Cloud Computing Services Minitrack@HICSS 45 - Grand Wailea,
Maui Island
Date: Tue, 19 Apr 2011 20:32:20 -0700
From: Haluk Demirkan <Haluk.Demirkan(a)asu.edu>
To: aisworld(a)lists.aisnet.org <aisworld(a)lists.aisnet.org>
(Apologies for Cross-Posting)
Dear Colleagues,
Hello! I am serving as a co-chair of the "Service Science, Systems and Cloud Computing Services" Minitrack in the Decision Technology, Mobile Technologies and Service Science Track of the upcoming 45th Hawaii International Conference on System Sciences (HICSS) (http://www.hicss.hawaii.edu/hicss_45/45dt.htm#DT8). My co-chairs and I are writing to internationally renowned scholars such as you with expertise in various areas of IT services, service science, service oriented, on-demand, cloud, utility or proactive computing in hopes that you will consider submitting a paper to our minitrack. We have already received a great deal of interest, and your contributions would help us improve the quality of the sessions. The deadline for submitting papers to HICSS-45 is coming closer: June 15, 2011. The topic of this minitrack is in an emerging research need, and there are many areas of interest that are related to the general topic. Please consider submitting your work if it is rela!
ted to any of the specific topics listed and/or if you feel it addresses visions of the future of service oriented computing, science, systems and cloud computing. We encourage you to think "out of the box" for this track, and we expect a range of concepts, tools, methods, philosophies and theories to be discussed. We thank you, in advance, for your valuable contribution to HICSS-45. Please let me know if you have any questions or need additional information. I look forward to receiving your submission!
Best Regards,
Haluk Demirkan - haluk.demirkan(a)asu.edu
Service Science, Systems and Cloud Computing Services
Haluk Demirkan-ASU, Michael Goul-ASU, Susan Bouchard-Cisco Systems
CALL FOR PAPERS: HICSS-45 - January 4-7, 2012 - Grand Wailea, Maui Island
Additional detail may be found on HICSS primary web site: http://www.hicss.hawaii.edu/hicss_45/apahome45.htm
There is a need to apply robust research findings in the appropriate management and organizational contexts related to services innovation, quality, architecture, design and delivery, and the resulting customer satisfaction and business value (Ostrom et al. 2010). The goal of this track is to explore the challenges, issues and opportunities related to the innovation-services-based economy - from conceptualization to practical implementation. We are interested in novel approaches to "Service Systems", "Cloud Computing Services", "Technical and managerial approaches to service-oriented architecture, infrastructure, data, business processes, workflows and strategy". Possible topics of applied, field and empirical research include, but are not limited to:
* Service innovation and issues in service systems design
* Theories and approaches for integrating and/or sourcing services and cloud computing management and automated business process management
* Theories, challenges and impacts of service-orientation on enterprises, organizations and individuals
* Theories and approaches for services architecture, infrastructure, processes, workflows
* Planning, building and managing service infrastructure
* Co-production/creation/innovation as driving components of service orientation
* Decision models and decision support systems for service-related management and operations
* Data services and data management service level agreements
* Service discovery, design, modeling, delivery, deployment, measurement, maintenance, bundling and marketing
* Services implications to value chains, networks, constellations and shops
* Service-oriented enterprise industry standards and solution stacks
* Service-based grid/utility/autonomic computing infrastructure designs, approaches and implementations
* Service security, privacy and trust in distributed service networks
* Ontology, semantic web and business rules for services computing
* Service oriented solution patterns, choreographies, orchestrations and repositories
* Infrastructures, standards and inter-organizational practices for federations of service-oriented enterprises
* Managing service networks in the supply chain and procurement management context
* Case studies of service systems and cloud computing implementation and management
* Design of service blueprints for IT services
* Self-service and smart technologies and management
* Automated service-level agreement negotiation and orchestration
* Collaborative service management in B2B and B2C e-commerce
* B2B and B2C processes for service negotiation, operations, and management
* The commoditization of business processes (e.g. out-tasking, ITIL, SCORE)
* The commoditization of software (e.g. the software-as-service model - SaaS, software oriented architecture-SOA, application service providers-ASP)
* The commoditization of hardware (e.g., on-demand, utility computing, cloud computing, software oriented infrastructure with virtualized resources - SOI, infrastructure service providers-IaaS)
IMPORTANT DEADLINES
June 15 - Submit full manuscripts for review. The review is double-blind; therefore this submission must be without author names.
Receive acceptance notification by August 16.
Revise your manuscript to add author names. If required, make other changes.
Submit Final Paper for Publication by September 15.
_______________________________________________
AISWorld mailing list
AISWorld(a)lists.aisnet.org
-------- Original Message --------
Subject: [computational.science] CFP: 7th International
Conference on Information Systems Security (ICISS 2011)
Date: Tue, 19 Apr 2011 19:02:18 +0200
From: Claudio Agostino Ardagna (claudio.ardagna)
<claudio.ardagna(a)unimi.it>
Organization: "ICCSA"
To: Computational Science Mailing List
<computational.science(a)lists.iccsa.org>
[Apologies if you receive multiple copies of this message]
CALL FOR PAPERS
******************************************************************
7th International Conference on Information Systems Security
(ICISS 2011)
December 15-19, 2011, Jadavpur University, Kolkata, India
http://www.iciss.org.in
******************************************************************
The conference series ICISS (International Conference on
Information Systems Security), held annually, provides a forum for
disseminating latest research results in information and systems
security. ICISS 2011, the seventh conference in this series, will
be held under the aegis of the newly formed Society for Research
in Information Security and Privacy (SRISP). The acceptance ratio
of the first six conferences has averaged less than 30%, and the
proceedings have been published as part of the Springer Verlag
series of Lecture Notes in Computer Science. Submissions are
encouraged from academia, industry and government addressing
theoretical and practical problems in information and systems
security and related areas. Topics of interest include but are
not limited to:
* Application Security
* Authentication and Access Control
* Biometric Security
* Data Security
* Digital Forensics and Diagnostics
* Digital Rights Management
* Distributed System Security
* Formal Methods in Security
* Intrusion Detection, Prevention& Response
* Intrusion Tolerance and Recovery
* Key Management and Cryptographic Protocols
* Language-based Security
* Malware Analysis and Mitigation
* Network Security
* Operating System Security
* Privacy and Anonymity
* Security in P2P, Sensor and Ad Hoc Networks
* Software Security
* Vulnerability Detection and Mitigation
* Web Security
IMPORTANT DATES
Manuscript Submission: July 15, 2011
Tutorial Proposal Submission: July 22, 2011
Notification of Acceptance: September 09, 2011
Camera-Ready Manuscript: September 23, 2011
INSTRUCTIONS FOR PAPER SUBMISSION
Papers should be formatted as they would appear in the final LNCS
proceedings. Papers should be at most 15 pages in length, including
the bibliography. Detailed submission instructions can be found at
the conference web site. One of the authors of an accepted paper
must attend the conference to present the paper. ICISS accepts only
electronic submissions in PDF format. Camera-Ready manuscripts must
be submitted in LaTeX.
DUAL SUBMISSION POLICY
Submitted papers must not substantially overlap with papers
published or currently submitted to a journal or a conference
with proceedings.
TUTORIAL PROPOSALS
There will be tutorial program for two days (December 15-16, 2011).
At most four three-hour tutorials will be offered. Proposals are
invited for tutorials of duration three hours on relevant topics of
current interest. A tutorial proposal should include the extended
abstract of the tutorial and a brief biography of the speaker(s).
Please mail your proposal to the Tutorial Chair. The speaker(s) of
the accepted proposals need to submit their final presentation one
month before the conference.
PROCEEDINGS
Conference Proceedings will be published in the Springer LNCS series.
GENERAL CHAIRS
* Aditya Bagchi, ISI, Calcutta, India (aditya(a)isical.ac.in)
* A. K. Majumdar, IIT, Kharagpur, India (akmj(a)cse.iitkgp.ernet.in)
PROGRAM CHAIRS
* Sushil Jajodia, George Mason U., USA (jajodia(a)gmu.edu)
* Chandan Mazumdar, Jadavpur U., India (chandan.mazumdar(a)gmail.com)
ORGANIZING CHAIR
* Mridul S. Barik, Jadavpur Univ., India (mridulsankar(a)gmail.com)
TUTORIAL CHAIR
* Sarmistha Neogy, Jadavpur Univ., India (sarmisthaneogy(a)computer.org)
PUBLICITY CO-CHAIRS
* Claudio A. Ardagna, Universita' degli Studi di Milano, Italy
* TBC
FINANCE CHAIR
* Anirban Sengupta, Jadavpur Univ., India (anirban.sg(a)gmail.com)
INDUSTRY CHAIR
* Kushal Banerjee, TCS, Kolkata, India (kushalk.banerjee(a)tcs.com)
PROGRAM COMMITTEE MEMBERS
* Vijay Atluri, Rutgers University, USA
* Steve Barker, King’s College London, UK
* Frédéric Cuppens, ENST, France
* Sabrina De Capitani di Vimercati,
Universita' degli Studi di Milano, Italy
* Fabio Massacci, U.of Trento, Italy
* G. Karjoth, IBM Res. Lab, Switzerland
* Indrajit Ray, CSU, USA
* Indrakshi Ray, CSU, USA
* Javier Lopez, Univ. of Malaga, Spain
* Jonathan Giffin, Georgia Tech Univ, USA
* Michiharu Kudo, IBM TRL, Japan
* M. Christodorescu, IBM T.J.W.R.C., USA
* Nasir Memon, Polytechnic University, USA
* Patrick McDaniel, Penn State U. USA
* Atul Prakash, Univ. of Michigan, USA
* Shankardas Roy, Howard University, USA
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* R. Sekar, SUNY, Stony Brook, USA
* Sharad Mehrotra, UC Irvine, USA
* Shiuh-Pyng Shieh, NCTU, Taiwan
* Somesh Jha, Univ. of Wisconsin, USA
* V.N. Venkatakrishnan, Univ. of Illinois, USA
* Vijay Varadharajan, Macquarie U., Australia
* Yingjiu Li, SMU, Singapore
* Anish Mathuria, DA-IICT, Gandhinagar, India
* B. Bruhadeshwar, IIIT Hyderabad, India
* Indranil Sengupta, IIT, Kharagpur, India
* R. Ramanujam, IMS, Chennai, India
* S K Gupta, IIT, Delhi, India
* Shamik Sural, IIT, Kharagpur, India
* Shishir Nagaraja, IIIT Delhi, India
* Subrat Kumar Dash, LNMIIT, India
* Sukumar Nandi, IIT, Guwahati, India
* Samiran Chattopadhyay, Jadavpur University
* Goutam Kumar Paul, Jadavpur University
* Subhomoy Maitra, ISI Calcutta, India
For any questions, please contact iciss2011india(a)gmail.com
-------- Original-Nachricht --------
Betreff: [WI] CfP Workshop "Challenges in Mobile Service Computing"
(located at ECOWS 2011)
Datum: Tue, 19 Apr 2011 16:55:31 +0200
Von: Schulte, Stefan <schulte(a)kom.tu-darmstadt.de>
An: fg-sw-arch(a)ira.uka.de <fg-sw-arch(a)ira.uka.de>,
wi(a)lists.uni-karlsruhe.de <wi(a)lists.uni-karlsruhe.de>,
KUVS-L(a)LISTSERV.UNI-HEIDELBERG.DE <KUVS-L(a)LISTSERV.UNI-HEIDELBERG.DE>
CC: Freddy Lecue <Freddy.Lecue(a)manchester.ac.uk>
##############################Call for Papers###############################
European Conference on Web Services (ECOWS'11)
Workshop "Challenges in Mobile Service Computing"
14th September 2011, Lugano, Switzerland
http://www.kom.tu-darmstadt.de/CMSC-2011/
############################################################################
In order to meet the challenges arising from the usage of Web service technologies on mobile devices, it is necessary to develop new technical solutions. Within the workshop "Challenges in Mobile Service Computing (CMSC 2011)", researchers will be given the possibility to present their current work regarding all aspects of service computing on mobile devices. The topics of interests include both client-side and server-side aspects as well as business opportunities and their implementation using Web service technologies.
Topics of interest include, but are not limited to the following:
* Application as a Service (AaaS) in mobile computing
* Adaptation mechanisms for mobile service invocations
* Business scenarios based on the usage of services on mobile devices
* Caching for service invocation on mobile devices
* Context-based adaptation of services
* Data management on mobile devices
* Discovery for mobile service invocations
* Invocation of services from the cloud
* Integration of mobile devices in service compositions
* Mobile service computing security
* Multimedia services
* Quality of Experience
* Quality of Service
* Scalable computing on mobile devices
* Service-based applications in general
* Resource and mobility management
* Semantic descriptions of services for mobile devices
* Service adaptation, discovery, selection, composition, execution, and optimization on mobile devices
* Service middleware on mobile devices
* Service mashups for mobile devices
* Service personalization on mobile devices
* Tool support
Important Dates:
* Submission of papers: 15.06.2011
* Notification of acceptance: 15.07.2011
* Submission of camera-ready version: 31.08.2011
* Workshop: 14.09.2011
For further information, please consult the workshop website http://www.kom.tu-darmstadt.de/CMSC-2011/
--- Dr.-Ing. Stefan Schulte ---
Head of Service-oriented Computing
Multimedia Communications Lab (KOM)
http://www.kom.tu-darmstadt.de
Technische Universitaet Darmstadt
Dept. of Electrical Engineering& Information Technology
tel: +49 (0) 6151 16-6187 fax: +49 (0) 6151 16-6152
postal address: TU Darmstadt, FB 18, KOM, Rundeturmstr. 10, D-64283 Darmstadt, Germany
--
Mailing-Liste: wi(a)aifb.uni-karlsruhe.de
Administrator: wi-admin(a)aifb.uni-karlsruhe.de
Konfiguration: https://www.lists.uni-karlsruhe.de/sympa/info/wi