Web service composition: a survey of techniques and tools
Web services are a consolidated reality of the modern Web with tremendous, increasing
impact on everyday computing tasks. They turned the Web into the largest, most accepted …
impact on everyday computing tasks. They turned the Web into the largest, most accepted …
A survey on web services composition
S Dustdar, W Schreiner - … journal of web and grid services, 2005 - inderscienceonline.com
Due to the web services' heterogeneous nature, which stems from the definition of several
XML-based standards to overcome platform and language dependence, web services have …
XML-based standards to overcome platform and language dependence, web services have …
Business rules integration in BPEL-a service-oriented approach
F Rosenberg, S Dustdar - … on E-Commerce Technology (CEC'05 …, 2005 - ieeexplore.ieee.org
Business rules change quite often. These changes cannot be handled efficiently by
representing business rules embedded in the source code of the business logic. Efficient …
representing business rules embedded in the source code of the business logic. Efficient …
Scene: A service composition execution environment supporting dynamic changes disciplined through rules
M Colombo, E Di Nitto, M Mauri - … , Chicago, IL, USA, December 4-7, 2006 …, 2006 - Springer
Abstract Service compositions are created by exploiting existing component services that
are, in general, out of the control of the composition developer. The challenge nowadays is …
are, in general, out of the control of the composition developer. The challenge nowadays is …
Normative requirements for regulatory compliance: An abstract formal framework
By definition, regulatory rules (in legal context called norms) intend to achieve specific
behaviour from business processes, and might be relevant to the whole or part of a business …
behaviour from business processes, and might be relevant to the whole or part of a business …
Statistical traffic modeling for network intrusion detection
JBD Caberera, B Ravichandran… - … Symposium on Modeling …, 2000 - ieeexplore.ieee.org
Examines the application of statistical traffic modeling for detecting novel attacks against
computer networks. We discuss the application of network activity models and application …
computer networks. We discuss the application of network activity models and application …
Achieving business process flexibility with business rules
T Van Eijndhoven, ME Iacob… - 2008 12th International …, 2008 - ieeexplore.ieee.org
Business processes used in networked business are often large and complex, which makes
them difficult to manage and change. In this paper we address this lack of flexibility by …
them difficult to manage and change. In this paper we address this lack of flexibility by …
A review of dynamic web service composition techniques
The requester's service request sometimes includes multiple related functionalities to be
satisfied by the Web service. In many cases the Web service has a limited functionality which …
satisfied by the Web service. In many cases the Web service has a limited functionality which …
Matrix pencil method and its performance
Y Hua, TK Sarkar - … Conference on Acoustics, Speech, and Signal …, 1988 - computer.org
In recent years, service-oriented computing has been successfully adopted by the industry
and used in numerous projects. This raises however new challenges, especially with …
and used in numerous projects. This raises however new challenges, especially with …
Methodological support for service-oriented design with ISDL
D Quartel, R Dijkman, M van Sinderen - Proceedings of the 2nd …, 2004 - dl.acm.org
Currently, service-oriented computing is mainly technology-driven. Most developments focus
on the technology that enables enterprises to describe, publish and compose application …
on the technology that enables enterprises to describe, publish and compose application …