Encoding Web Service Constraints at your Service Coreographies as Constraints
|
|
- August O’Brien’
- 5 years ago
- Views:
Transcription
1 Encoding Web Service Constraints at your Service Coreographies as Constraints Marco Aiello DIT, University of Trento & DSG, TUWien Joint work with: Mike Papazoglou, Alexander Lazovik, and Rosella Gennari Implementation: Alexander Lazovik, Igor Cappello SRI, June 23 rd, 2006
2 Summary Service Choreography Definition of Choreography framework The XSRL request language The XSAL assertion language An example of a choreography Implementation overiview
3 Problem context and description Given a set of services populating an electronic marketplace that follow standardized business process, equip the requester and service providers with instruments to operate, abstracting from marketplace s s details and avoiding reimplementation as much as possible Choreography: (dynamic) selection and invocation of services in order to achieve requester and providers goals
4 A delicate balance Composition by design vs. Automatic composition design time execution time
5 The orchestration framework
6 Can constraints be of service? Dealing with numeric values Feasibility Notions of optimal solutions Soft constraints to express preferences Dynamic addition and removal of assertions Previous approach using MBP: Advantages: sound and complete algorithms, handling of non-determinism, state together with path properties Disadvantages: state explosion problem, handlling h of numeric values, non-optimality n of the solution
7 Business process for Travelling
8 XSRL: Sample request - 1 Given a business process for a traveling domain, user requests: reserving one night trip to Paris with hotel avoiding to travel by train, if possible spending overall amount less than 300 euros spending less than 100 euros per hotel, if possible, and 200 at most receiving, finally, a confirmation of payment
9 XSRL: language constructs Xml Service Request Language, based on an extension of temporal logic (EaGLe and CTL): achive-all, vital, atomic reachability before then sequencing prefer to, optional preference vital-maint, optional-maint maintainability goals =,<,> linear constraints
10
11 XSRL: Sample request - 2 achieve-all before achieve-all prefer vital-maint hotelprice < 100 to vital-maint hotelprice < 200 optional-maint trainbooked vital confirmed ^ location = Paris ^ hotelreserved then atomic final vital-maint price < 300
12 XSAL: Assertion examples - 1 Provider level: Use VISA card for payment, if possible Preserve a positive balance on a bank account Role level: All flights to a health risk countries must have a special medical insurance purchased Travel package entity evolution is checked Process level: Special offer for people with fidelity card (OneWorld( OneWorld) Process must be atomic: always reaching a final state
13 XSAL: Assertions classification Operational assertions Simple Preservation Business Entity VISA card Positive account balance Flight medical insurance Travel package Atomicity Fidelity card Provider Role Business Process Actor assertions (based on ownership)
14 Two Phase Construction Given a BP a request and a set of assertions: PHASE I: encode the BP as a set of constraint expressions PHASE 2: encode the request and assertions based on phase I execute and gather information from service invocations (including varaible values and new assertions)
15 Two Phase Construction Given a BP a request and a set of assertions: PHASE I: encode the BP as a set of constraint expressions PHASE 2: encode the request and assertions based on phase I execute and gather information from service invocations (including varaible values and new assertions)
16
17 Phase II
18 Encoding: Completeness Theorem 1. If the service problem P is modeled into the constraint problem E(P), then a solution to the constraint problem corresponds to a solution plan for P.
19
20 Encoding the BP
21 A sample request achieve-all vital-maint (price < 155) Vital (Asel = true) Vital (TrConcluded = true) whole encoding and run
22 Implementation and initial evaluation JUnit Eclipse plug-in Implemented using Choco java library with explanation based functionalities GNU-Linux Centrino CPU 2 GHz, RAM 1 GB
23 Preliminary considerations 1. simple reachability requests, domains 2000 states with low branching and non-determisim on an average of 0,947 seconds 2. including cycles the average execution time grows up to 1,737 seconds 3. vital requests, domains 1000 the average execution time increases to 4,29 seconds 4. reachability and maintainability operators the average execution time 10,97 seconds
24 Planning perspective Business process is defined by a state-transition system Problem: find and execute a plan,, such that its execution satisfies the XSRL goal and XSAL assertions From the planning perspective: XSRL & XSAL Service operations Our Framework Business processes Service implementations and registry goal language actions planning domain environment Planning Actions: two types of uncertainty: nondeterministic failures and unknown outcome from the invocations Solution: : interleaved planning and execution
25 Conclusions: summary A language to express user requests XSRL and business rules (assertions) XSAL The Choreography framework: interleaving of planning and execution The realization of the framework using Constraint Programming Advantage of using constraints for Web Services: values, updates, optimality, preferences (soft), explanations An interesting application for contraint programming, beyond traditional scheduling? An implementation of the Choreography framework
26 Conclusions: future directions Properties of the encoding algorithms, e.g., complexity Generalization of the planning in non- determistic domains under uncertainty Implementation of «smart» service selection Use of XSRL and XSAL for expressing QoS properties of requests and assertions Experimental evaluation of the implementation
27 References A. Lazovik, M. Aiello, and R. Gennari, Encoding Requests to Web Service Compositions as Constraints. (2005) LNCS 3709: Constraint Programming (CP 05). A. Lazovik, M. Aiello, and M. Papazoglou, Planning and monitoring the execution of web service requests. (2006) Journal on Digital Libraries,, to appear. M. Aiello, and A. Lazovik, Monitoring assertion-based business processes. (2006) International Journal of Cooperative Information Systems,, to appear.
Service Request Languages based on AI Planning - II
Service Request Languages based on AI Planning - II Alexander Lazovik CWI a.lazovik@cwi.nl IPA Lentedagen on Service-oriented Computing Conference center Kapellerput, Heeze, April 3-5, 2007 Summary Constraint
More informationUniversity of Groningen. Choreographies Lazovik, Aliaksandr; Aiello, Marco; Gennari, Rosella
University of Groningen Choreographies Lazovik, Aliaksandr; Aiello, Marco; Gennari, Rosella Published in: International Conference on Internet and Web Applications and Services (AICT/ICIW 2006) IMPORTANT
More informationAssociating Assertions with Business Processes and Monitoring their Execution
Associating Assertions with Business Processes and Monitoring their Execution Alexander Lazovik ITC-IRST and DIT, University of Trento 38050 Trento, Italy lazovik@dit.unitn.it Marco Aiello DIT University
More informationAssociating Assertions with Business Processes and Monitoring their Execution
Associating Assertions with Business Processes and Monitoring their Execution Alexander Lazovik ITC-IRST and DIT, University of Trento 38050 Trento, Italy lazovik@dit.unitn.it Marco Aiello DIT University
More information38050 Povo Trento (Italy), Via Sommarive 14 PLANNING AND MONITORING THE EXECUTION OF WEB SERVICE REQUESTS
UNIVERSITY OF TRENTO DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY 38050 Povo Trento (Italy), Via Sommarive 14 http://www.dit.unitn.it PLANNING AND MONITORING THE EXECUTION OF WEB SERVICE REQUESTS
More informationDIT - University of Trento INTERACTING WITH SERVICE COMPOSITIONS
PhD Dissertation International Doctorate School in Information and Communication Technologies DIT - University of Trento INTERACTING WITH SERVICE COMPOSITIONS Alexander Lazovik Advisor: Prof. Marco Aiello
More informationWeb Service Orchestration as Constraints Programming
Web Service Orchestration as Constraints Programming Alexander Lazovik 1, Marco Aiello 2,1, and Rosella Gennari 3 1 DIT University of Trento Via Sommarive, 14 38050 Trento Italy lazovik@dit.unitn.it 2
More informationImplicit vs. Explicit Data-Flow Requirements in Web Service Composition Goals
Implicit vs. Explicit Data-Flow Requirements in Web Service Composition Goals Annapaola Marconi, Marco Pistore, and Paolo Traverso ITC-irst Via Sommarive 18, Trento, Italy {marconi, pistore, traverso}@itc.it
More informationEncoding Web Services Requests As Constraints: An Implementation. Codifica Di Richieste A Web Services Come Vincoli: Un Implementazione
UNIVERSITÁ DEGLI STUDI DI TRENTO Facoltá di Scienze Matematiche, Fisiche e Naturali Corso di Laurea in Informatica Anno Accademico 2004-2005 Encoding Web Services Requests As Constraints: An Implementation
More informationA CSP Search Algorithm with Reduced Branching Factor
A CSP Search Algorithm with Reduced Branching Factor Igor Razgon and Amnon Meisels Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, 84-105, Israel {irazgon,am}@cs.bgu.ac.il
More informationWeb Services and Planning or How to Render an Ontology of Random Buzzwords Useful? Presented by Zvi Topol. May 12 th, 2004
Web Services and Planning or How to Render an Ontology of Random Buzzwords Useful? Presented by Zvi Topol May 12 th, 2004 Agenda Web Services Semantic Web OWL-S Composition of Web Services using HTN Planning
More informationSoftware Engineering I (02161)
Software Engineering I (02161) Week 2 Assoc. Prof. Hubert Baumeister DTU Compute Technical University of Denmark Spring 2017 Contents What are software requirements? Requirements Engineering Process Domain
More informationA Framework For Business Rule Driven Web Service Composition
A Framework For Business Rule Driven Web Service Composition Bart Orriëns, Jian Yang, Mike P. Papazoglou Tilburg University, Infolab PO Box 90153 5000 LE, Tilburg Netherlands {b.orriens,jian,mikep}@uvt.nl
More informationPaolo Bellavista Veronica Conti Carlo Giannelli Jukka Honkola
The Smart-M3 Semantic Information Broker (SIB) Plug-in Extension: Implementation and Evaluation Experiences Paolo Bellavista Veronica Conti Carlo Giannelli Jukka Honkola 20.11.2012 - SN4MS'12 DISI, Università
More informationA Capacity Planning Methodology for Distributed E-Commerce Applications
A Capacity Planning Methodology for Distributed E-Commerce Applications I. Introduction Most of today s e-commerce environments are based on distributed, multi-tiered, component-based architectures. The
More informationBPEL Research. Tuomas Piispanen Comarch
BPEL Research Tuomas Piispanen 8.8.2006 Comarch Presentation Outline SOA and Web Services Web Services Composition BPEL as WS Composition Language Best BPEL products and demo What is a service? A unit
More informationModular Verification of Web Services Using Efficient Symbolic Encoding and Summarization
Modular Verification of Web Services Using Efficient Symbolic Encoding and Summarization Fang Yu joint work with: Chao Wang, Aarti Gupta and Tevfik Bultan University of California, Santa Barbara and NEC
More informationUniversity of Groningen. Towards Variable Service Compositions Using VxBPEL Sun, Chang-ai; Aiello, Marco
University of Groningen Towards Variable Service Compositions Using VxBPEL Sun, Chang-ai; Aiello, Marco Published in: International Conference on Software Reuse IMPORTANT NOTE: You are advised to consult
More informationJazz: A Tool for Demand-Driven Structural Testing
Jazz: A Tool for Demand-Driven Structural Testing J. Misurda, J. A. Clause, J. L. Reed, P. Gandra, B. R. Childers, and M. L. Soffa Department of Computer Science University of Pittsburgh Pittsburgh, Pennsylvania
More informationTeaching Principles of Dependable Distributed Software
Teaching Principles of Dependable Distributed Software Zoltán Horváth hz@inf.elte.hu Faculty of Informatics, Eötvös Loránd University, Budapest 14th Workshop on Software Engineering Education and Reverse
More informationOrchestration vs Choreography
Orchestration vs Choreography u In many cases, there is no unique point of invocation for the services n In these cases, we say that the system is a choreography n Let starts with an example: w Consider
More informationINTRODUCTION Background of the Problem Statement of the Problem Objectives of the Study Significance of the Study...
vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION... ii DEDICATION... iii ACKNOWLEDGEMENTS... iv ABSTRACT... v ABSTRAK... vi TABLE OF CONTENTS... vii LIST OF TABLES... xii LIST OF FIGURES... xiii LIST
More informationFAQ RHB TravelFX App and Multi-Currency Card
FAQ RHB TravelFX App and Multi-Currency Card 1 About RHB TravelFX 1.1 What is the RHB TravelFX? RHB TravelFX is a mobile application that is to be used for your RHB TravelFX Multi-Currency Card that allows
More informationPlatform Architecture Overview
Platform Architecture Overview Platform overview How-to example Platform components detailed Mediation infrastructure VAS USER container Architecture: overall Backend platform Container Persistence External
More informationWeb Services. Lecture I. Valdas Rapševičius. Vilnius University Faculty of Mathematics and Informatics
Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2014.02.28 2014.02.28 Valdas Rapševičius. Java Technologies 1 Outline Introduction to SOA SOA Concepts:
More informationPlanning and Monitoring Web Service Composition
Planning and Monitoring Web Service Composition M. Pistore, F. Barbon, P. Bertoli, D. Shaparau, and P. Traverso University of Trento - ITALY pistore@dit.unitn.it ITC-irst - Trento - ITALY [barbon,bertoli,traverso,shaparau]@irst.itc.it
More informationAn extensible monitoring framework for measuring and evaluating tool performance in a service-oriented architecture
An extensible monitoring framework for measuring and evaluating tool performance in a service-oriented architecture Christoph Becker, Hannes Kulovits, Michael Kraxner, Riccardo Gottardi, Andreas Rauber
More informationBRING YOUR OWN DEVICE POLICY
BRING YOUR OWN DEVICE POLICY Updated Term 2 Review 2019 17 Quorn Area School BYOD POLICY [Review of policy in 2019] Quorn Area School is committed to aiding students and staff in creating a 21st Century
More informationSmart Solutions for a smarter planet. IBM System z... myths vs truth
Systems Technology Group System z Smart Solutions for a smarter planet IBM System z... myths vs truth Edith Velázquez Gómez (evelaz@mx1.ibm.com) Alejandro Saucedo de Alba (asaucedo@mx1.ibm.com) IBM System
More informationHealth wearables: Early days
Health wearables: Early days What is wearable technology? Wearable technology includes items, such as jewelry, glasses and clothing worn on, in and around the body incorporating sensors and other electronic
More informationApplication for e-tourism: Intelligent Mobile Tourist Guide
4th International Congress on Advanced Applied Informatics July 14, 2015, Okayama Convention Center, Okayama, Japan Application for e-tourism: Intelligent Mobile Tourist Guide Alexander Smirnov, Alexey
More informationCYBER THREAT IN AVIATION ARE YOU READY TO ADDRESS IT YET?
CYBER THREAT IN AVIATION ARE YOU READY TO ADDRESS IT YET? Peter Armstrong, Hong Kong March 2015 GROWING FROM STRENGTH TO STRENGTH... WHY IT MATTERS IT IS A REAL PROBLEM AND IT IS PERVASIVE GOVERNMENTS
More informationConsumption and Composition of Web Services and non web services
Consumption and Composition of Web Services and non web services Rohit Kishor Kapadne Computer Engineering Department, RMD Sinhgad School of Engineering, Warje Pune, Maharashtra, India Abstract Nowadays
More informationResults and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets
Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets Sheetal K. Labade Computer Engineering Dept., JSCOE, Hadapsar Pune, India Srinivasa Narasimha
More informationCounterexample Guided Synthesis of Monitors for Realizability Enforcement. Matthias Güdemann Gwen Salaün Meriem Ouederni
Counterexample Guided Synthesis of Monitors for Realizability Enforcement Matthias Güdemann Gwen Salaün Meriem Ouederni Choreographies Global contract specifications Participants, communication, message
More informationUniversity of Groningen. Services and Objects Andrea, Vincenzo D ; Aiello, Marco
University of Groningen Services and Objects Andrea, Vincenzo D ; Aiello, Marco IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please
More informationChecking the Realizability of BPMN 2.0 Choreographies
Checking the Realizability of PMN 2.0 Choreographies Gwen Salaün Grenoble INP, INRI, France joint work with Pascal Poizat LRI, University of Evry, France 1 Realizability of Choreographies Interactions
More informationVulnerability Management
Vulnerability Management Service Definition Table of Contents 1 INTRODUCTION... 2 2 SERVICE OFFERINGS VULNERABILITY MANAGEMENT... 2 3 SOLUTION PURPOSE... 3 4 HOW IT WORKS... 3 5 WHAT S INCLUDED... 4 6
More informationSemantic Web. Semantic Web Services. Morteza Amini. Sharif University of Technology Fall 94-95
ه عا ی Semantic Web Semantic Web Services Morteza Amini Sharif University of Technology Fall 94-95 Outline Semantic Web Services Basics Challenges in Web Services Semantics in Web Services Web Service
More informationSEMANTIC WEBSERVICE DISCOVERY FOR WEBSERVICE COMPOSITION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationBusiness Process Modelling & Semantic Web Services
Business Process Modelling & Semantic Web Services Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web services SOA Problems? CSA 3210 Last Lecture 2 Lecture Outline
More informationA Self Analysing and Reliable SOA Model
A Self Analysing and Reliable SOA Model Prachet Bhuyan #, Asima Das #, Durga Prasad Mohapatra * # School of Computer Engineering, KIIT University, Bhubaneswar, Odisha, India * Department of Computer Science
More informationHow to submit and sign electronically your Online Travel Reimbursement Request (OTRR) User guide
How to submit and sign electronically your Online Travel Reimbursement Request (OTRR) User guide Version 4 2018-07-02 1 Content Introduction... 3 Rules for submitting travel reimbursement requests and
More informationArchitectural design: the coordination perspective
Architectural design: the coordination perspective José Proença HASLab - INESC TEC & UM Arquitectura e Cálculo 2015-16 :FO Outline 1.Visual semantics for Reo Connector colouring (CC)1 2.Locality (concurrency)
More informationIntel Solid State Drive Data Center Family for PCIe* in Baidu s Data Center Environment
Intel Solid State Drive Data Center Family for PCIe* in Baidu s Data Center Environment Case Study Order Number: 334534-002US Ordering Information Contact your local Intel sales representative for ordering
More informationPrepaid Access MIDWEST ANTI-MONEY LAUNDERING CONFERENCE Federal Reserve Bank of Kansas City March 5, 2014
Prepaid Access 2014 MIDWEST ANTI-MONEY LAUNDERING CONFERENCE Federal Reserve Bank of Kansas City March 5, 2014 Discussion Points Emerging Technology Prepaid Access What is it and how does it work? Open
More informationMobile Travel Trends in China. Nov 2013
Mobile Travel Trends in China Nov 2013 Qunar is the world s largest Chinese travel platform Background Monthly Unique Visitors (in mm) Founded: 2005 Headquarters: Beijing, China Employees: 1699 Listed:
More informationQ&A Genuine-ID. Answers. Questions
Q&A Genuine-ID Questions Answers 1. What is Genuine-ID? Genuine-ID is a software package for the automated authentication of ID documents (IDs). It automatically extracts any kind of relevant data from
More informationThe Collaboration Cornerstone
E-Mail: The Collaboration Cornerstone On Demand Insurance Business Problems 1. We lose customers because we process new policy applications too slowly. 2. Our claims processing is time-consuming and inefficient.
More informationSoftware Engineering I (02161)
Software Engineering I (02161) Week 3 Assoc. Prof. Hubert Baumeister DTU Compute Technical University of Denmark Spring 2017 Contents Programming Tips and Tricks Booleans Constants Delegation Requirements
More informationMOBILE POSITIONING DATA: A NEW DATA SOURCE FOR MEASURING Population Mobility
MOBILE POSITIONING DATA: A NEW DATA SOURCE FOR MEASURING Population Mobility Edi Setiawan Population and Labor Mobility Statistics Division BPS-Statististics Indonesia BIG DATA Feasibility on using For
More informationIncremental Evaluation of OCL invariants in the Essential MOF object model
Incremental Evaluation of OCL invariants in the Essential MOF object model Miguel Garcia, Ralf Möller http://www.sts.tu-harburg.de/~mi.garcia 2008-03-12 Agenda Problem Statement The tools at our disposal:
More informationConcur Expense QuickStart Guide for CRC. Concur Technologies Version 1.2
Concur Expense QuickStart Guide for CRC Concur Technologies Version 1.2 June 29 th, 2015 2004 2015 Concur. All rights reserved. 1 Document Revision History Date Description Version Author(s) 06/29/2015
More informationADARA IMPACT. What a difference data can make
ADARA IMPACT What a difference data can make A NEW WAY OF MEASUREMENT OLD WAY Impressions Clicks CTR NEW WAY 11,700 confirmed hotel bookings ADR increase of $20 LOS increase of.3 days Avg. occupancy increase
More informationDAML Ontologies for Agent-Enabled Web Services
DAML Ontologies for Agent-Enabled Web Services Sheila A. McIlraith Knowledge Systems Laboratory (KSL) Department of Computer Science Stanford University (withtran Cao Son and Honglei Zeng) Background The
More informationA transfer pricing case study 25, 26 & 27 July 2018 based on an example by BDO
A transfer pricing case study 25, 26 & 27 July 2018 based on an example by BDO presented by Prof. Dr. Daniel N. Erasmus Solomon Choge Renier van Rensburg lecturers Advanced Diploma in TP GETTING TO KNOW
More informationThanks for your cooperation! The Questionnaire of the Developers' Experiment 1
The Questionnaire of the Developers' Experiment 1 This experiment deals with comparative analysis of two variability representation notations: Application-based DOmain Modeling (ADOM), which is a UML-based
More informationWeighing in on the Benefits of a SAS 70 Audit for Third Party Administrators
Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener
More informationWell, you need to capture the notions of atomicity, non-determinism, fairness etc. These concepts are not built into languages like JAVA, C++ etc!
Hwajung Lee Why do we need these? Don t we already know a lot about programming? Well, you need to capture the notions of atomicity, non-determinism, fairness etc. These concepts are not built into languages
More informationNetServ: Dynamically Deploying In-network Services
NetServ: Dynamically Deploying In-network Services Suman Srinivasan, Jae Woo Lee, Eric Liu, Mike Kester, Henning Schulzrinne, Volker Hilt, Srini Seetharaman, Ashiq Khan Columbia University, Bell Labs,
More informationMobile World Congress Claudine Mangano Director, Global Communications Intel Corporation
Mobile World Congress 2015 Claudine Mangano Director, Global Communications Intel Corporation Mobile World Congress 2015 Brian Krzanich Chief Executive Officer Intel Corporation 4.9B 2X CONNECTED CONNECTED
More information38050 Povo (Trento), Italy Tel.: Fax: e mail: url:
CENTRO PER LA RICERCA SCIENTIFICA E TECNOLOGICA 38050 Povo (Trento), Italy Tel.: +39 0461 314312 Fax: +39 0461 302040 e mail: prdoc@itc.it url: http://www.itc.it Automated Composition of Semantic Web Services
More informationA proposal for Standards Adoption: An architecture for distributed systems of medical devices in high acuity environments
Interoperabilität von patientennahen Medizingeräten A proposal for Standards Adoption: An architecture for distributed systems of medical devices in high acuity environments Joint meeting of IEEE EMBS
More informationEvaluation of Real-time operating systems for FGC controls
Evaluation of Real-time operating systems for FGC controls Konstantinos Chalas, CERN, Geneva, Switzerland September 2015 Abstract Power Converter Control for various experiments at CERN, is conducted using
More informationIntroduction to CICS. Course introduction
Introduction to CICS Course introduction Course introduction What is CICS? What is an application server? Why use an application server? Course introduction Services provided by CICS How CICS applications
More informationModeling, Testing and Executing Reo Connectors with the. Reo, Eclipse Coordination Tools
Replace this file with prentcsmacro.sty for your meeting, or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Modeling, Testing and Executing Reo Connectors with the
More informationPart VIII Transactions, Integrity and Triggers
Part VIII Transactions, Integrity and Triggers Transactions, Integrity and Triggers 1 Basic Terms 2 Term Transaction 3 Transactions in SQL 4 Integrity Constraints in SQL 5 Trigger Saake Database Concepts
More informationVISA PAYMENT CONTROLS GETTING STARTED GUIDE. Provide ongoing payment control to support your business card program
VISA PAYMENT CONTROLS GETTING STARTED GUIDE Provide ongoing payment control to support your business card program TABLE OF CONTENTS Visa Payment Controls... 1 Convenient Online Portal... 1 Comprehensive
More informationOBJECT-ORIENTED MODELING AND DESIGN. Process Overview
OBJECT-ORIENTED MODELING AND DESIGN Process Overview CONTENTS: 1. Development Stages. 2. Development Life Cycle. 3. Summary. A software Development process provides a basis for the organized production
More informationModel Driven Development of Component Centric Applications
Model Driven Development of Component Centric Applications Andreas Heberle (entory AG), Rainer Neumann (PTV AG) Abstract. The development of applications has to be as efficient as possible. The Model Driven
More informationOffline Location Based Services Using Android OS Implemented In Smartphone and Beagleboard Xm
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationIT6801-SERVICE ORIENTED ARCHITECTURE
ST.JOSEPH COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING IT 6801-SERVICE ORIENTED ARCHITECTURE UNIT I 2 MARKS 1. Define XML. Extensible Markup Language(XML) is a markup language
More informationIntroduction to Web Services & SOA
References: Web Services, A Technical Introduction, Deitel & Deitel Building Scalable and High Performance Java Web Applications, Barish Web Service Definition The term "Web Services" can be confusing.
More informationBPMN Extensions for Decentralized Execution and Monitoring of Business Processes
BPMN Extensions for Decentralized Execution and Monitoring of Business Processes Jonas Anseeuw, Gregory Van Seghbroeck, Bruno Volckaert, Filip De Turck Department of Information Technology, Ghent University,
More informationSEPA goes Mobile Dr. Marijke De Soete ETSI Security Workshop January 2011 Sophia Antipolis, France
www.europeanpaymentscouncil.eu SEPA goes Mobile Dr. Marijke De Soete ETSI Security Workshop 2011 19-20 January 2011 Sophia Antipolis, France Global mobile subscribers (millions) Mobile phone: some statistics
More informationDistributed Systems. Web Services (WS) and Service Oriented Architectures (SOA) László Böszörményi Distributed Systems Web Services - 1
Distributed Systems Web Services (WS) and Service Oriented Architectures (SOA) László Böszörményi Distributed Systems Web Services - 1 Service Oriented Architectures (SOA) A SOA defines, how services are
More informationModel Checking with Abstract State Matching
Model Checking with Abstract State Matching Corina Păsăreanu QSS, NASA Ames Research Center Joint work with Saswat Anand (Georgia Institute of Technology) Radek Pelánek (Masaryk University) Willem Visser
More informationBest of TRAVEL APPS. Now go around the world hassle-free
Best of TRAVEL APPS Now go around the world hassle-free DID YOU KNOW? Travel & Tourism s total contribution in 9% of global GDP (US $6.6 trillion) source : http://www.wttc.org 2.4 billion Internet users
More informationRequest for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995
Network Working Group Y. Rekhter Request for Comments: 1787 T.J. Watson Research Center, IBM Corp. Category: Informational April 1995 Status of this Memo Routing in a Multi-provider Internet This memo
More informationConcur Travel QuickStart Guide
Concur Travel QuickStart Guide Concur Technologies Version 1.3 As of: June 2016 Contact Us Procurement Card and Travel Services Office pcardandtravelsvcs@southalabama.edu http://www.southalabama.edu/departments/financialaffairs/travelandprocurement/
More informationDEVOPS COURSE CONTENT
LINUX Basics: Unix and linux difference Linux File system structure Basic linux/unix commands Changing file permissions and ownership Types of links soft and hard link Filter commands Simple filter and
More informationSecurity for Multithreaded Programs under Cooperative Scheduling
Security for Multithreaded Programs under Cooperative Scheduling Alejandro Russo and Andrei Sabelfeld Dept. of Computer Science and Engineering, Chalmers University of Technology 412 96 Göteborg, Sweden,
More informationSoftware Service Engineering
Software Service Engineering Lecture 4: Service Modeling Doctor Guangyu Gao Some contents and notes selected from Service Oriented Architecture by Michael McCarthy 1. Place in Service Lifecycle 2 Content
More informationChapter 4 Objectives
Chapter 4 Objectives Eliciting requirements from the customers Modeling requirements Reviewing requirements to ensure their quality Documenting requirements for use by the design and test teams 4.1 The
More informationDigital Marketing in an Ageing World. by Francesco Berrettini. European Tourism For All Forum, October 2015, Albufeira, Portugal
Digital Marketing in an Ageing World by Francesco Berrettini European Tourism For All Forum, October 2015, Albufeira, Portugal THE WORLD IS AGEING Source: United Nations, 2012 THE WORLD IS AGEING Source:
More informationInfor Lawson on IBM i 7.1 and IBM POWER7+
Infor Lawson on IBM i 7.1 and IBM POWER7+ IBM Systems & Technology Group Mike Breitbach mbreit@us.ibm.com This document can be found on the web, Version Date: March, 2014 Table of Contents 1. Introduction...
More informationWeb Services. Lecture I. Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics
Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2015.02.19 Outline Introduction to SOA SOA Concepts: Services Loose Coupling Infrastructure SOA Layers
More informationLesson 19 Software engineering aspects
Lesson 19 Software engineering aspects Service Oriented Architectures Security Module 4 - Architectures Unit 1 Architectural features Ernesto Damiani Università di Milano SOA is HAD HAD is an old concept
More informationSoftware Verification of Safety-Critical Aerospace Systems1
Software Verification of Safety-Critical Aerospace Systems1 Ce sar A. Mun oz Alwyn Goodloe {cesar.a.munoz,a.goodloe}@nasa.gov Frama-C Day 2016 June 20th, 2016 1 This presentation reports joint work with
More informationECE 462 Object-Oriented Programming using C++ and Java. Flickering and Double Buffering
ECE 462 Object-Oriented Programming g using C++ and Java Flickering and Double Buffering Yung-Hsiang Lu yunglu@purdue.edu d YHL Double Buffering 1 Flickering YHL Double Buffering 2 No Flickering YHL Double
More informationAutomated Compliance Verification of Business Processes in Apromore
Automated Compliance Verification of Business Processes in Apromore Heerko Groefsema 1, Nick R.T.P. van Beest 2, and Abel Armas-Cervantes 3 1 University of Groningen, The Netherlands h.groefsema@rug.nl
More informationFault Detection of Reachability Testing with Game Theoretic Approach
Fault Detection of Reachability Testing with Game Theoretic Approach S. Preetha Dr.M. Punithavalli Research Scholar, Karpagam University, Coimbatore. Director, Sri Ramakrishna Engineering College, Coimbatore.
More informationA Reference Architecture for Payload Reusable Software (RAPRS)
SAND2011-7588 C A Reference Architecture for Payload Reusable Software (RAPRS) 2011 Workshop on Spacecraft Flight Software Richard D. Hunt Sandia National Laboratories P.O. Box 5800 M/S 0513 Albuquerque,
More informationAlignment of Business and IT - ArchiMate. Dr. Barbara Re
Alignment of Business and IT - ArchiMate Dr. Barbara Re What is ArchiMate? ArchiMate is a modelling technique ("language") for describing enterprise architectures. It presents a clear set of concepts within
More informationElectronic ID at work: issues and perspective
Electronic ID at work: issues and perspective Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Why should I have/use an (e-) ID? to prove my identity to an "authority":
More informationOverview of SRI s. Lee Pike. June 3, 2005 Overview of SRI s. Symbolic Analysis Laboratory (SAL) Lee Pike
June 3, 2005 lee.s.pike@nasa.gov Model-Checking 101 Model-checking is a way automatically to verify hardware or software. For a property P, A Model-checking program checks to ensure that every state on
More informationA Mission Critical Protection Investment That Pays You Back
A Mission Critical Protection Investment That Pays You Back By Wade Ettleman and Earl Philmon June 2012 Page 1 of 8 www.cellwatch.com A Mission Critical Protection Investment That Pays You Back Reliable
More informationParallelization of Spider Planner
Parallelization of Spider Planner Morten Smedsrud, SINTEF 1 SPIDER - A Generic VRP Solver Designed to be widely applicable Based on generic, rich model Predictive route planning Plan repair, reactive planning
More informationQoS-aware model-driven SOA using SoaML
QoS-aware model-driven SOA using SoaML Niels Schot A thesis submitted for the degree of MSc Computer Science University of Twente EEMCS - TRESE: Software Engineering Group Examination committee: Luís Ferreira
More informationConcur Expense QuickStart Guide. Concur Technologies Version 1.6
Concur Expense QuickStart Guide Concur Technologies Version 1.6 November 30, 2016 2004 2016 Concur. All rights reserved. 1 Document Revision History Date Description Version Author 08/22/2014 Concur Expense
More information