Given the importance of clients in service-oriented computing, and the ongoing evolution of distributed system and application realization technologies from client/service architectures, through distributed-object and...
详细信息
ISBN:
(纸本)9780769544267
Given the importance of clients in service-oriented computing, and the ongoing evolution of distributed system and application realization technologies from client/service architectures, through distributed-object and service-oriented to cloud computing, there is a growing need to lower the complexities and barriers involved in the development of client applications. these range from large scale business applications and business processes to laptop programs and small "apps" on mobile devices. In this paper we present a unified conceptual framework in which the basic concerns and viewpoints relevant for building clients of service-oriented, distributed systems can be expressed and related to one another in a platform-independent, non-proprietary way. the basic concerns used to structure the framework are the level of abstraction at which a system is represented and the roles from which the software entities of a distributed system are viewed. Using the various models supported in the framework it is possible to customize each client developer's view and simplify the way in which service providers develop and maintain their services. this paper provides an overview of our framework and show how it could be applied using a small example.
enterprise architecture (EA) management aims at analyzing and improving the enterprise as a whole. A correct and consistent analysis is based on reliable EA data. However, current industrial practice shows that many p...
详细信息
ISBN:
(纸本)9780769544250
enterprise architecture (EA) management aims at analyzing and improving the enterprise as a whole. A correct and consistent analysis is based on reliable EA data. However, current industrial practice shows that many persons need to collect, prepare, and disseminate EA relevant data while only a small group of persons actually benefits from this information. this state of affairs has a negative impact on the motivation of those who are in charge of gathering EA information. Additionally, the monetary value of this information is often implicit. To overcome this situation, this paper presents an approach to model the supply and demand situation for EA information. the resulting model helps to understand, explain, and ease EA-related information gathering. the applicability of the resulting model is demonstrated withthe help of a real world case study from the German federal government.
A business web is a collection of enterprises designed to jointly satisfy a consumer need. A model that shows the creation, distribution, and consumption of goods or services of economic value in a business web is cal...
详细信息
ISBN:
(纸本)9780769544250
A business web is a collection of enterprises designed to jointly satisfy a consumer need. A model that shows the creation, distribution, and consumption of goods or services of economic value in a business web is called value model. the goal of a value model is to help the stakeholders build a shared understanding of the business case and assess the potential profitability of collaboration in the business web. the participating stakeholders in a business web are assumed to act trustfully in the collaboration and therefore trust is left entirely outside the picture. However the assumption that stakeholders act trustfully is often not useful in practice (since there are malicious actors). In this paper we consider business webs from a trust perspective and introduce an approach for measuring the trustworthiness of the stakeholders participating in a business web.
In parallel to the effort of creating Open Linked Data for the World Wide Web there is a number of projects aimed for developing the same technologies but in the context of their usage in closed environments such as p...
详细信息
ISBN:
(纸本)9780769544267
In parallel to the effort of creating Open Linked Data for the World Wide Web there is a number of projects aimed for developing the same technologies but in the context of their usage in closed environments such as private enterprises. In the paper, we present results of research on interlinking structured data for use in Idea Management Systems - a still rare breed of knowledge management systems dedicated to innovation management. In our study, we show the process of extending an ontology that initially covers only the Idea Management System structure towards the concept of linking withdistributedenterprise data and public data using Semantic Web technologies. Furthermore we point out how the established links can help to solve the key problems of contemporary Idea Management Systems.
Most agree that enterprise architecture (EA) artifacts include not only representation models, but also design principles [35]. While EA modeling and EA models are covered broadly in the EA state-of-the-art, design ac...
详细信息
ISBN:
(纸本)9780769544267
Most agree that enterprise architecture (EA) artifacts include not only representation models, but also design principles [35]. While EA modeling and EA models are covered broadly in the EA state-of-the-art, design activity issues and design principles in particular are still neglected. While there has been some work on EA principles recently, their use has not been systematically surveyed so far. this is surprising because EA principles play an important role in practice. Based on a review of the state-of-the-art of EA principle understanding, we summarize findings from a survey among 70 participants from Swiss and German companies. While EA principles are widely defined, well documented, based on IT strategy and generally perceived as useful, deficiencies are apparent regarding stakeholder involvement, business architecture principles (definition as well as usage), regular principle reviews, and business alignment.
this work investigates the use of knowledge about organizational roles captured in enterprise models for service configuration. Based on an industrial case, it presents a way to extract a role's information demand...
详细信息
ISBN:
(纸本)9780769544267
this work investigates the use of knowledge about organizational roles captured in enterprise models for service configuration. Based on an industrial case, it presents a way to extract a role's information demand and to use this as initial configuration for agent-based services. In addition to the meta-model included in the enterprise modeling language, the use of a common ontology is proposed which captures both, the perspective of information demand and services. the architecture of the agent-based services is following the idea to characterize all enterprise members and components by their functions and to represent them by sets of services provided by them. the main contributions of the paper are (1) to show that a role's information demand is relevant for service configuration, (2) to present a way of extracting information demand from enterprise models, and (3) to extend an approach for SOA-based enterprise representation with information demand.
System execution traces are useful artifacts for validating enterprisedistributed software system quality-of-service (QoS) properties, such as end-to-end response time, service time, and throughput. With proper plann...
详细信息
ISBN:
(纸本)9780769544267
System execution traces are useful artifacts for validating enterprisedistributed software system quality-of-service (QoS) properties, such as end-to-end response time, service time, and throughput. With proper planning during development phase of the software lifecycle, it is possible to ensure such traces contain required properties to facilitate analysis for QoS validation. In some case, however, it is not possible to ensure system execution traces contain the necessary properties for QoS analysis. Consequently, this makes it hard to analyze such system execution traces for validation of QoS properties. this paper therefore presents preliminary work on the System Execution Trace Adaptation Framework (SETAF) for adapting system execution traces to support analysis of It also presents preliminary results from applying SETAF to externally developed applications. the initial results show that it is possible to validate QoS properties by adapting system execution traces at analysis time instead of modifying the application's existing source code.
In recent years, enterprise architecture (EA) management has become an intensively discussed approach in both industry and academia for managing the complexity of an enterprise from a holistic perspective. While there...
详细信息
ISBN:
(纸本)9780769544267
In recent years, enterprise architecture (EA) management has become an intensively discussed approach in both industry and academia for managing the complexity of an enterprise from a holistic perspective. While there is a strong academic and practical interest in EA frameworks and EA modeling, there is a notable insecurity about the cost benefit ratio of EA. In this paper, we address this research problem with a qualitative research design. We conduct a series of semi-structured interviews with industry experts on enterprise architecture in order to identify classes of EA goals, corresponding EA frameworks adoption to achieve these goals and employed EA benefit assessment approaches. the findings point to, among others, a fairly stable set of EA goals that shift over time and EA frameworks that lack modularity and adjustment capabilities to easily customize towards these goals. this paper is part of an ongoing exploratory research that aims at researching which benefits emanate from EA.
Interface contracts are sets of constraints specifying valid exchanges of messages between two or more peers. A contract violation occurs when one of the peers fails to fulfil one of these constraints and emits a mess...
详细信息
ISBN:
(纸本)9780769544250
Interface contracts are sets of constraints specifying valid exchanges of messages between two or more peers. A contract violation occurs when one of the peers fails to fulfil one of these constraints and emits a message that is not a valid continuation of a message "trace". In some cases, the message that directly exposes the violation turns out to be the last of a succession of forced moves, while the "root cause" of the violation resides earlier in the trace and may emanate from a different peer. We formally define the notion of causality for interface contracts expressed in a first-order extension of Linear Temporal Logic. In particular, we show how the detection of root causes reduces to satisfiability solving of a precise set of formulae. An experimental setup shows how causality can be analyzed automatically on a pre-recorded message trace.
enterprise architecture (EA) management provides an engineering approach for the continuous advancement of the enterprise as a whole. the high number of involved components and their dense web of interdependencies nev...
详细信息
ISBN:
(纸本)9780769544267
enterprise architecture (EA) management provides an engineering approach for the continuous advancement of the enterprise as a whole. the high number of involved components and their dense web of interdependencies nevertheless form a major challenge for such approach and demand high initial investment into documentations, communications, and analysis. Aforementioned fact has in the past been an impediment for successful EA management in practice. In the field of software engineering recently lightweight and agile methods have become more and more important. these methods aim at quickly creating results, while staying flexible in respect to the design goals to attain. In this article we explore to which extent the de-facto standard for agile methods, namely Scrum, can be applied to EA management. thereby, we derive challenges for an agile EA management approach and revisit current approaches regarding their agility. Finally, we outline how agile EA management can be implemented based on the method of Scrum.
暂无评论