Process Model Translation

[1]
A. Polyvyanyy, J. Vanhatalo, and H. Völzer, “Simplified computation and generalization of the refined process structure tree,” Web Services and Formal Methods, pp. 25–41, 2011, Accessed: Feb. 17, 2013. [Online]. Available: http://www.springerlink.com/index/Q36777U6446L384L.pdf.
[2]
“Snapshot.” Accessed: Feb. 17, 2013. [Online]. Available: http://link.springer.com/chapter/10.1007%2F978-3-540-88871-0_19?LI=true.
[3]
M. Weidlich, G. Decker, A. Großkopf, and M. Weske, “BPEL to BPMN: The myth of a straight-forward mapping,” On the Move to Meaningful Internet Systems: OTM 2008, pp. 265–282, 2008, Accessed: Feb. 17, 2013. [Online]. Available: http://www.springerlink.com/index/n185p62phr8g74x5.pdf.
[4]
“Snapshot.” Accessed: Feb. 17, 2013. [Online]. Available: http://eprints.qut.edu.au/4637/.
[5]
J. C. Recker and J. Mendling, “On the translation between BPMN and BPEL: Conceptual mismatch between process modeling languages,” in The 18th International Conference on Advanced Information Systems Engineering. Proceedings of Workshops and Doctoral Consortium, 2006, pp. 521–532, Accessed: Feb. 17, 2013. [Online]. Available: http://eprints.qut.edu.au/4637/.
[6]
“Snapshot.” Accessed: Feb. 17, 2013. [Online]. Available: http://link.springer.com/chapter/10.1007%2F978-3-642-19589-1_2?LI=true.
[7]
“Snapshot.” Accessed: Feb. 17, 2013. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0169023X09000330.
[8]
J. Vanhatalo, H. Völzer, and J. Koehler, “The refined process structure tree,” Data & Knowledge Engineering, vol. 68, no. 9, pp. 793–818, 2009, Accessed: Feb. 17, 2013. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0169023X09000330.

Forecasting & Simulation

[1]
T. M. McCarthy and S. L. Golicic, “Implementing collaborative forecasting to improve supply chain performance,” International Journal of Physical Distribution & Logistics Management, vol. 32, no. 6, pp. 431–454, Aug. 2002, doi: 10.1108/09600030210437960.
[2]
F. J. Damerau, “A technique for computer detection and correction of spelling errors,” Communications of the ACM, vol. 7, no. 3, pp. 171–176, 1964, Accessed: Feb. 24, 2013. [Online]. Available: http://dl.acm.org/citation.cfm?id=363994.
[3]
M. M. Helms, L. P. Ettkin, and S. Chapman, “Supply chain forecasting – Collaborative forecasting supports supply chain management,” Business Process Management Journal, vol. 6, no. 5, pp. 392–407, Dec. 2000, doi: 10.1108/14637150010352408.
[4]
“Calculate Differences between traces, (also between traces of adapted processes.” .
[5]
“Snapshot.” Accessed: Feb. 24, 2013. [Online]. Available: http://dl.acm.org/citation.cfm?id=363994.
[6]
“Snapshot.” Accessed: Jan. 28, 2013. [Online]. Available: http://link.springer.com/chapter/10.1007%2F978-3-642-15723-3_1.
[7]
W. M. P. van der Aalst, “Business Process Simulation Revisited,” in Enterprise and Organizational Modeling and Simulation, J. Barjis, Ed. Springer Berlin Heidelberg, 2010, pp. 1–14.
[8]
“ScienceDirect Snapshot.” Accessed: Jan. 28, 2013. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0169023X09000354.
[9]
“ScienceDirect Full Text PDF.” Accessed: Jan. 28, 2013. [Online]. Available: http://pdn.sciencedirect.com/science?_ob=MiamiImageURL&_cid=271546&_user=464575&_pii=S0169023X09000354&_check=y&_origin=article&_zone=toolbar&_coverDate=2009--30&view=c&originContentFamily=serial&wchp=dGLzVlV-zSkWz&md5=662e337323976f9fc3dcadc77a0a45ca&pid=1-s2.0-S0169023X09000354-main.pdf.
[10]
A. Rozinat, M. T. Wynn, W. M. P. van der Aalst, A. H. M. ter Hofstede, and C. J. Fidge, “Workflow simulation for operational decision support,” Data & Knowledge Engineering, vol. 68, no. 9, pp. 834–850, Sep. 2009, doi: 10.1016/j.datak.2009.02.014.

Communication Technology

[1]
R. Hans, S. Zöller, S. Abels, A. Miede, and R. Steinmetz, “Enabling Collaboration in Virtual Manufacturing Enterprises with Cloud Computing,” in Proceedings of the 19th Americas Conference on Information Systems (AMCIS 2013), Chicago, Aug. 2013, pp. 1–10.
[2]
A. Barros, G. Decker, M. Dumas, and F. Weber, “Correlation Patterns in Service-Oriented Architectures,” in Fundamental Approaches to Software Engineering, vol. 4422, M. Dwyer and A. Lopes, Eds. Springer Berlin / Heidelberg, 2007, pp. 245–259.
[3]
J. Wagener, O. Spjuth, E. L. Willighagen, and J. E. Wikberg, “XMPP for cloud computing in bioinformatics supporting discovery and invocation of asynchronous web services,” BMC Bioinformatics, vol. 10, no. 1, p. 279, doi: 10.1186/1471-2105-10-279.
[4]
R. Hans, D. Dahlen, S. Zöller, D. Schuller, and U. Lampe, “Enabling Virtual Manufacturing Enterprises with Cloud Computing – An Analysis of Criteria for the Selection of Database as a Service Offers,” in Advances in Sustainable and Competitive Manufacturing Systems, Porto, Jun. 2013, pp. 427–438.
[5]
[6]
Shamsuzzoha, A. and Helo, P., “Virtual enterprise architectural framework: collaboration for small and medium enterprises,” in Proceedings of the ASME 2013 International Manufacturing Science and Engineering Conference (MSEC2013), Madison, Wisconsin, USA, Jun. 2013, pp. 1–8.
[7]
Hao, Y., Shamsuzzoha, A. and Helo, P., “Designing of cloud-based virtual factory information system,” in Proceedings of the 23rd International Conference on Flexible Automation & Intelligent Manufacturing (FAIM2013), Porto, Portugal, Jun. 2013, pp. 415–426, [Online]. Available: http://link.springer.com/chapter/10.1007%2F978-3-319-00557-7_34#page-1.
[8]
Shamsuzzoha, A., Abels, S. and Helo, P. , “Adaptive virtual enterprise process management: perspective of cloud-based data storage,” in Proceedings of the 15th International Conference on Enterprise Information Systems (ICEIS 2013), Angers Loire Valley, France, Jul. 2013, pp. 88–94.
[9]
“SpringerLink Snapshot.” Accessed: May 14, 2012. [Online]. Available: http://www.springerlink.com/content/g737435n566r6115/abstract/.
[10]
“SpringerLink Full Text PDF.” Accessed: May 14, 2012. [Online]. Available: http://www.springerlink.com/content/g737435n566r6115/fulltext.pdf.
[11]
“JClouds is an open source Java library. The API allows to create  portable clou.” .
[12]
JCloud Community, “JClouds.” [Online]. Available: http://www.jclouds.org/.

Processes and Compliance

[1]
W. M. P. V. der Aalst, “Modeling and Analyzing Interorganizational Workflows,” Application of Concurrency to System Design, International Conference on, p. 262, 1998, doi: http://doi.ieeecomputersociety.org/10.1109/CSD.1998.657557.
[2]
M. Montali, M. Pesic, W. M. P. van der Aalst, F. Chesani, P. Mello, and S. Storari, “Declarative specification and verification of service choreographiess,” ACM Trans. Web, vol. 4, no. 1, pp. 1–62, 2010, doi: 10.1145/1658373.1658376.
[3]
W. van der Aalst, A. Mooij, C. Stahl, and K. Wolf, “Service Interaction: Patterns, Formalization, and Analysis,” in Formal Methods for Web Services, 2009, pp. 42–88.
[4]
S. Goedertier and J. Vanthienen, “Designing Compliant Business Processes with Obligations and Permissions,” in Business Process Management 2006 Workshops, 2006, pp. 5–14.
[5]
S. Rinderle, A. Wombacher, and M. Reichert, “Evolution of Process Choreographies in DYCHOR,” in Int’l Conf. on Cooperative Information Systems, Springer, 2006, pp. 273–290.
[6]
J. Küster, K. Ryndina, and H. Gall, “Generation of Business Process Models for Object Life Cycle Compliance,” in Int’l Conference Business Process Management, 2007, pp. 165–181.
[7]
S. Rinderle, A. Wombacher, and M. Reichert, “On the Controlled Evolution of Process Choreographies.,” in Int’l Conf. on Data Engineering, 2006, p. 124.
[8]
L. T. Ly, S. Rinderle-Ma, D. Knuplesch, and P. Dadam, “Monitoring Business Process Compliance Using Compliance Rule Graphs,” in On the Move to Meaningful Internet Systems: OTM 2011, R. Meersman, T. Dillon, P. Herrero, A. Kumar, M. Reichert, L. Qing, B.-C. Ooi, E. Damiani, D. C. Schmidt, J. White, M. Hauswirth, P. Hitzler, and M. Mohania, Eds. Springer Berlin Heidelberg, 2011, pp. 82–99.
[9]
R. A. Botha and J. H. P. Eloff, “Separation of duties for access control enforcement in workflow environments,” IBM Systems Journal, vol. 40, no. 3, pp. 666–682, 2001, Accessed: Apr. 30, 2010. [Online]. Available: http://portal.acm.org/citation.cfm?id=1017212.
[10]
P. Grefen, N. Mehandjiev, G. Kouvas, G. Weichhart, and R. Eshuis, “Dynamic business network process management in instant virtual enterprises,” Comput. Ind., vol. 60, no. 2, pp. 86–103, Feb. 2009, doi: 10.1016/j.compind.2008.06.006.
[11]
Z. Milosevic, A. Josang, T. Dimitrakos, and M. A. Patton, “Discretionary Enforcement of Electronic Contracts,” 2002.
[12]
H. Foster, S. Uchitel, J. Magee, and J. Kramer, “Model-Based Analysis of Obligations in Web Service Choreography,” in Advanced Int’l Conference on Telecommunications and Int’l Conference on Internet and Web Applications and Services, 2006, p. 149, doi: http://dx.doi.org/233CE24A-5FFE-42EB-B2F3-E0E6645458FE.
[13]
D. Grigori, F. Casati, M. Castellanos, U. Dayal, M. Sayal, and M.-C. Shan, “Business Process Intelligence,” Computers in Industry, vol. 53, no. 3, pp. 321–343, Apr. 2004, doi: 10.1016/j.compind.2003.10.007.
[14]
S. Rinderle, M. Reichert, and P. Dadam, “Flexible Support of Team Processes by Adaptive Workflow Systems,” Distributed and Parallel Databases, Jul. 2004. http://www.springerlink.com/content/k54776285582p21g/ (accessed Feb. 01, 2013).
[15]
S. Rinderle, A. Wombacher, and M. Reichert, “Evolution of Process Choreographies in DYCHOR,” in Proc. CoopIS’06, 2006, pp. 273–290.
[16]
B. Weber, M. Reichert, W. Wild, and S. Rinderle-Ma, “Providing Integrated Life Cycle Support in Process-Aware Information Systems,” Int’l Journal of Cooperative Information Systems (IJCIS), Mar. 2009. http://dbis.eprints.uni-ulm.de/269/ (accessed Feb. 01, 2013).
[17]
C. Heinlein, “Workflow and Process Synchronization with Interaction Expressions and Graphs,” in Proceedings of the 17th International Conference on Data Engineering, Washington, DC, USA, 2001, pp. 243–252.
[18]
C. Giblin, S. Müller, and B. Pfitzmann, “From Regulatory Policies to Event Monitoring Rules: Towards Model-Driven Compliance Automation,” IBM Research GmbH, Research Report RZ-3662, 2006.
[19]
D. Fötsch, E. Pulvermüller, and W. Rossak, “Modeling and Verifying Workflow-based Regulations,” 2006.
[20]
K. Namiri and N. Stojanovic, “Pattern-Based Design and Validation of Business Process Compliance,” in Int’ OTM Conferences 2007, Part I, 2007, vol. 4803, pp. 59–76.
[21]
H. Davulcu, M. Kifer, C. R. Ramakrishnan, and I. V. Ramakrishnan, “Logic Based Modeling and Analysis of Workflows,” in Int’l Conference Principles of Database Systems, 1998, pp. 25–33.
[22]
B. Weber, M. Reichert, and S. Rinderle-Ma, “Change Patterns and Change Support Features - Enhancing Flexibility in Process-Aware Information Systems.,” Data and Knowledge Engineering, vol. 66, no. 3, pp. 438–466, 2008.
[23]
A. K. Ghose and G. Koliadis, “Auditing Business Process Compliance,” Faculty of Informatics, University of Wollongong, 2007.
[24]
L. Ly, S. Rinderle, and P. Dadam, “Semantic Correctness in Adaptive Process Management Systems,” in Business Process Management, 2006, vol. 02, pp. 193–208.
[25]
WenAn Tan, Weiming Shen, Lida Xu, Bosheng Zhou, and Ling Li, “A Business Process Intelligence System for Enterprise Process Performance Management,” IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 38, no. 6, pp. 745–756, Nov. 2008, doi: 10.1109/TSMCC.2008.2001571.
[26]
M. Weidlich, H. Ziekow, J. Mendling, O. Günther, M. Weske, and N. Desai, “Event-based monitoring of process execution violations,” in Business Process Management, Springer, 2011, pp. 182–198.
[27]
W. W. Eckerson, Performance Dashboards: Measuring, Monitoring, and Managing Your Business. John Wiley & Sons, 2010.
[28]
L. T. Ly, F. M. Maggi, M. Montali, S. Rinderle-Ma, and W. M. P. van der Aalst, “A Framework for the Systematic Comparison and Evaluation of Compliance Monitoring Approaches,” in Enterprise Distributed Object Computing Conference (EDOC), 2013 17th IEEE International, 2013, pp. 7–16, doi: 10.1109/EDOC.2013.11.
[29]
“Google Books Link.” Accessed: Jan. 25, 2013. [Online]. Available: http://books.google.at/books?id=daiXfV1jcakC.
[30]
“Snapshot.” Accessed: Aug. 06, 2013. [Online]. Available: http://link.springer.com/chapter/10.1007/978-3-642-25109-2_7.
[31]
“Full Text PDF.” Accessed: Aug. 06, 2013. [Online]. Available: http://link.springer.com/content/pdf/10.1007%2F978-3-642-25109-2_7.pdf.
[32]
“IEEE Xplore Abstract Record.” Accessed: Mar. 16, 2014. [Online]. Available: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6658259&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F6657190%2F6658245%2F06658259.pdf%3Farnumber%3D6658259.
[33]
“ScienceDirect Snapshot.” Accessed: Feb. 14, 2012. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0166361503001994.
[34]
“ScienceDirect Full Text PDF.” Accessed: Feb. 14, 2012. [Online]. Available: http://www.sciencedirect.com/science?_ob=MiamiImageURL&_cid=271439&_user=464575&_pii=S0166361503001994&_check=y&_origin=article&_zone=toolbar&_coverDate=30-Apr-2004&view=c&originContentFamily=serial&wchp=dGLzVlV-zSkzV&md5=71e0eca272aa0d0d066d852de9ed1a66/1-s2.0-S0166361503001994-main.pdf.
[35]
“IEEE Xplore Full Text PDF.” Accessed: Feb. 14, 2012. [Online]. Available: http://ieeexplore.ieee.org/ielx5/5326/4663233/04633624.pdf?tp=&arnumber=4633624&isnumber=4663233.
[36]
S. Kabicher-Fuchs, J. Mangler, and S. Rinderle-Ma, “Experience Breeding in Process-Aware Information Systems,” in Advanced Information Systems Engineering, C. Salinesi, M. C. Norrie, and Ó. Pastor, Eds. Springer Berlin Heidelberg, 2013, pp. 594–609.
[37]
“Full Text PDF.” Accessed: Jan. 14, 2014. [Online]. Available: http://link.springer.com/content/pdf/10.1007%2F978-3-642-38709-8_38.pdf.
[38]
“Snapshot.” Accessed: Jan. 14, 2014. [Online]. Available: http://link.springer.com/chapter/10.1007%2F978-3-642-38709-8_38.
[39]
K. Wolf, “Does My Service Have Partners?,” in Transactions on Petri Nets and Other Models of Concurrency II, 2009, pp. 152–171.
[40]
J. Mangler and S. Rinderle-Ma, “Rule-Based Synchronization of Process Activities,” in 2011 IEEE 13th Conference on Commerce and Enterprise Computing (CEC), Sep. 2011, pp. 121–128, doi: 10.1109/CEC.2011.23.
[41]
W. van der Aalst, H. de Beer, and B. van Dongen, “Process Mining and Verification of Properties: An Approach based on Temporal Logic,” in Int’l OnTheMove Conferences, 2005, vol. 3761, pp. 130–147.
[42]
R. A. Frosch and N. E. Gallopoulos, “Strategies for manufacturing,” Scientific American, vol. 261, no. 3, pp. 144–152, 1989.
[43]
A. Marchetti, Sarbanes-Oxley Ongoing Compliance Guide. Parson Consulting, 2007.
[44]
S. Rinderle-Ma and M. Leitner, “On Evolving Organizational Models without Loosing Control on Authorization Constraints in Web Service Orchestrations,” presented at the IEEE Conference on Electronic Commerce, 2010.
[45]
B. Weber, M. Reichert, W. Wild, and S. Rinderle, “Balancing Flexibility and Security in Adaptive Process Management Systems,” Nov. 2005. http://www.springerlink.com/content/d94fx02fwpjxpama/ (accessed Feb. 01, 2013).
[46]
M. Alberti et al., “Expressing and Verifying Business Contracts with Abductive,” in Int’l Conference Normative Multi-agent Systems, 2007.
[47]
ILOG, “ILOG JRules and IBM MQWF – White Paper.”
[48]
J. Mangler, G. Stuermer, and E. Schikuta, “Cloud Process Execution Engine-Evaluation of the Core Concepts,” Arxiv preprint arXiv:1003.3330, 2010.
[49]
J. van den Heuvel and H. Weigand, “Cross-Organizational Workflow Integration using Contracts,” 2000.
[50]
J. Pflug and S. Rinderle-Ma, “Dynamic Instance Queuing in Process-Aware Information Systems,” USA, 2013, [Online]. Available: http://eprints.cs.univie.ac.at/3558/.
[51]
G. Stuermer, J. Mangler, and E. Schikuta, “Building a modular service oriented workflow engine,” in Service-Oriented Computing and Applications (SOCA), 2009 IEEE International Conference on, 2010, pp. 1–4.
[52]
J. Eder and A. Tahamtan, “Temporal Conformance of Federated Choreographies,” in Database and Expert Systems Applications, 2008, pp. 668–675.
[53]
A. Förster, G. Engels, T. Schattkowsky, and R. V. der Straeten, “Verification of Business Process Quality Constraints Based on Visual Process Patterns,” 2007.
[54]
ProSTEP iViP, “Collaborative Project Management  RECOMMENDATION Collaborative Project Management (CPM) Reference Model;,” PSI 1-1 Version 3.0.
[55]
M. Leitner, J. Mangler, and S. Rinderle-Ma, “SPRINT- Responsibilities: Design and Development of Security Policies in Process-aware Information Systems,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 2, no. 4, pp. 1–24, Dec. 2011.
[56]
W. M. P. van der Aalst, “Interorganizational Workflows: An Approach based on Message Sequence Charts and Petri Nets,” Systems Analysis - Modeling - Simulation, vol. 34, no. 3, pp. 335–367, 1999.
[57]
IDS Scheer, “Governance, Risk and Compliance Management with ARIS,” 2007.
[58]
T. Hildebrandt, “Towards Enhancing Business Process Monitoring with Sonification,” Berlin, Germany, Aug. 2013, [Online]. Available: http://eprints.cs.univie.ac.at/3756/.
[59]
Emprise, “BONAPART Sarbanes-Oxley Analyser,” 2008.
[60]
M. Peleg, P. Soffer, and J. Ghattas, “Mining Process Execution and Outcomes – Position Paper,” 2007.
[61]
Shamsuzzoha, A., Ferreira, F., Azevedo, A. and Helo, P., “Business Process Monitoring and Management in Virtual Enterprise through Interactive User Interface Layer,” in Proceedings of the 23rd International Conference on Flexible Automation & Intelligent Manufacturing (FAIM2013), Porto, Portugal, Jun. 2013, pp. 451–464.
[62]
T. Hildebrandt and S. Rinderle-Ma, “Toward a Sonification Concept for Business Process Monitoring,” in 19th International Conference on Auditory Display (ICAD 2013), Lodz, Poland, Jul. 2013, pp. 323–330, [Online]. Available: http://eprints.cs.univie.ac.at/3729/.
[63]
M. P. Papazoglou, “The Challenges of Service Evolution,” in Proceedings of the 20th international conference on Advanced Information Systems Engineering, Berlin, Heidelberg, 2008, pp. 1–15, doi: 10.1007/978-3-540-69534-9_1.
[64]
“Supporting Ad-hoc Changes in Distributed Workflow Management Systems. - UTpublications.” Accessed: Feb. 01, 2013. [Online]. Available: http://doc.utwente.nl/61967/.
[65]
M. Reichert and T. Bauer, “Supporting Ad-Hoc Changes in Distributed Workflow Management Systems,” in On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, vol. 4803, R. Meersman and Z. Tari, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 150–168.
[66]
“Full Text PDF.” Accessed: Feb. 01, 2013. [Online]. Available: http://dbis.eprints.uni-ulm.de/165/1/RRD04.pdf.
[67]
“Snapshot.” Accessed: Feb. 01, 2013. [Online]. Available: http://dbis.eprints.uni-ulm.de/165/.
[68]
“Full Text PDF.” Accessed: Feb. 01, 2013. [Online]. Available: http://dbis.eprints.uni-ulm.de/143/1/WRWR05a.pdf.
[69]
“Snapshot.” Accessed: Feb. 01, 2013. [Online]. Available: http://dbis.eprints.uni-ulm.de/143/.
[70]
“Full Text PDF.” Accessed: Feb. 01, 2013. [Online]. Available: http://dbis.eprints.uni-ulm.de/269/1/IJCIS_Web.pdf.
[71]
“Snapshot.” Accessed: Feb. 01, 2013. [Online]. Available: http://dbis.eprints.uni-ulm.de/269/.
[72]
M. Weske, “Workflow Management Systems: Formal Foundation, Conceptual Design, Implementation Aspects,” 2000, Accessed: Feb. 01, 2013. [Online]. Available: http://bpt.hpi.uni-potsdam.de/lib/papers/habil.pdf.
[73]
M. Reichert, S. Rinderle, U. Kreher, and P. Dadam, “Adaptive Process Management with ADEPT2,” in Proceedings of the 21st International Conference on Data Engineering, Washington, DC, USA, 2005, pp. 1113–1114, doi: 10.1109/ICDE.2005.17.
[74]
“Full Text PDF.” Accessed: Feb. 01, 2013. [Online]. Available: http://dbis.eprints.uni-ulm.de/163/1/RDB04.pdf.
[75]
M. Reichert, P. Dadam, and T. Bauer, “Dealing with Forward and Backward Jumps in Workflow Management Systems,” Informatik - Forschung und Entwicklung, Apr. 2004. http://www.springerlink.com/content/qg2pxeyb7kqgy2bp/ (accessed Feb. 01, 2013).
[76]
“Snapshot.” Accessed: Feb. 01, 2013. [Online]. Available: http://dbis.eprints.uni-ulm.de/163/.
[77]
M. Leitner, J. Mangler, and S. Rinderle-Ma, “Definition and Enactment of Instance-spanning Process Constraints,” presented at the WISE, Nov. 2012.
[78]
“IEEE Xplore Abstract Record.” Accessed: Mar. 21, 2012. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6046963.
[79]
W. M. P. van der Aalst, N. Lohmann, P. Massuthe, C. Stahl, and K. Wolf, “Multiparty Contracts: Agreeing and Implementing Interorganizational Processes,” The Computer Journal, vol. 53, no. 1, pp. 90–106, Jan. 2010, doi: 10.1093/comjnl/bxn064.
[80]
“process type level / inter-process coordination formal description on how inter.” .
[81]
M. Jensen and N. Gruschka, “Privacy Against the Business Partner: Issues for Realizing End-to-End Confidentiality in Web Service Compositions,” in Database and Expert Systems Application, 2009. DEXA’09. 20th International Workshop on, 2009, pp. 117–121.
[82]
“Anwendung von Model Checking für Prozess-Verifikation, Constraints werden als .” .
[83]
Chris McClean, “The Forrester WaveTM: Enterprise Governance, Risk, And Compliance Platforms, Q3 2009,” 2009.
[84]
F. Caldwell, C. Casper, and T. Eid, “Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms,” Gartner Group, 2009.
[85]
W. van der Aalst, N. Lohmann, P. Massuthe, C. Stahl, and K. Wolf, “From Public Views to Private Views – Correctness-by-Design for Services,” in Web Services and Formal Methods, 2008, pp. 139–153.
[86]
W. Reisig, “Towards a Theory of Services,” in Information Systems and e-Business Technologies, 2008, pp. 271–281.
[87]
M. Pesic, H. Schonenberg, and W. M. P. van der Aalst, “DECLARE: Full Support for Loosely-Structured Processes.,” in Int’l Enterprise Computing Conference (EDOC’07), 2007, pp. 287–300.
[88]
J. Yu, T. P. Manh, J. Hand, and Y. Jin, “Pattern-based Property Specification and Verification for Service Composition,” Swinburne University of Technology, CeCSES Report SUT.CeCSES-TR010, 2006.
[89]
G. Goldszmidt, J. Joseph, and N. Sachdeva, “On demand business process life cycle, Part 6: Apply customization policies and rules,” IBM, 2005. [Online]. Available: http://www.ibm.com/developerworks/webservices/library/ws-odbp6/.
[90]
S. Rinderle, M. Reichert, and P. Dadam, “Correctness Criteria for Dynamic Changes in Workflow Systems – A Survey.,” Data and Knowledge Engineering, vol. 50, no. 1, pp. 9–34, 2004.
[91]
W. M. P. van der Aalst, “Inheritance of Interorganizational Workflows to Enable Business-to-Business E-Commerce,” Electronic Commerce Research, vol. 2, no. 3, pp. 195–231, Jul. 2002, doi: 10.1023/A:1016031730365.
[92]
W. V. D. Aalst, “Loosely coupled interorganizational workflows: Modeling and analyzing workflows crossing organizational boundaries,” Information and Management, vol. 37, pp. 67–75, 2000, [Online]. Available: http://is.tm.tue.nl/staff/wvdaalst/publications/p99.pdf.
[93]
E. Bertino, E. Ferrari, and V. Alturi, “The Specification and Enforcement of Authorization Constraints in WFMS.,” ACM Transactions on Information and System Security, vol. 2, no. 1, pp. 65–104, 1999.
[94]
“Zusammenfassung liegt vor. Recht untechnisch und allgemein, aber interessant in.” .
[95]
“process level inter-process dependencies / different activities inter-workflow .” .
[96]
“inter-process task coordination (between organisations) on process type level.” .
[97]
H. Schonenberg, R. Mans, N. Russell, N. Mulyar, and W. Aalst, “Process Flexibility: A Survey of Contemporary Approaches,” in Advances in Enterprise Engineering I, 2008, pp. 16–30.
[98]
E. M. Kharbili, S. Stein, I. Markovic, and E. Pulvermüller, “Towards a Framework for Semantic Business Process Compliance Management,” 2008.
[99]
D. Karagiannis, “A Business Process-Based Modelling Extension for Regulatory Compliance.,” presented at the Multikonferenz Wirtschaftsinformatik, 2008.
[100]
Y. Liu, S. Müller, and K. Xu, “A static compliance-checking framework for business process models,” IBM Systems Journal, vol. 46, no. 2, pp. 335–261, 2007.
[101]
R. Agrawal, C. Johnson, J. Kiernan, and F. Leymann, “Taming Compliance with Sarbanes-Oxley Internal Controls Using Database Technology,” in Int’l Conference on Data Engineering, Washington, DC, USA, 2006, p. 92, doi: http://dx.doi.org/10.1109/ICDE.2006.155.
[102]
W. M. P. van der Aalst and M. Weske, “The P2P Approach to Interorganizational Workflows.,” in Int’l Conference on Advanced Information Systems Engineering, 2001, pp. 140–156.
[103]
F. Casati, S. Ceri, B. Pernici, and G. Pozzi, “Workflow Evolution,” Data and Knowledge Engineering, vol. 24, no. 3, pp. 211–238, 1998.

SME and Business Aspects

[1]
Kartha, C.P., “A comparison of ISO 9000:2000 quality system standards, QS9000, ISO/TS 16949 and Baldrige criteria,” The TQM Magazine (Emerald Group Publishing Limited), vol. 16, no. Number 5: 336, 2004, [Online]. Available: http://www.emeraldinsight.com/journals.htm?articleid=842121.
[2]
Rojas, Evelyn, Barros, Ana, Azevedo, Américo, and Batocchio, Antonio, “Business Model Development for Virtual Enterprises,” Bournemouth, UK, Oct. 2012, pp. 624–634.
[3]
S. K. Fixson, “Product architecture assessment: a tool to link product, process, and supply chain design decisions,” Journal of Operations Management, vol. 23, no. 3–4, pp. 345–369, 2005.
[4]
L. C. Thisse, “Advanced quality planning: a guide for any organization,” Quality progress, vol. 31, no. 2, pp. 73–77, 1998, Accessed: Jul. 04, 2013. [Online]. Available: http://alexandrow.pdforms.texas-quality.org/SiteImages/125/Reference%20Library/Quality%20Planning.pdf.
[5]
T. U. Mark Gershon, “Choosing Which Process Improvement Methodology to Implement.” 2010, [Online]. Available: http://na-businesspress.homestead.com/JABE/Jabe105/GershonWeb.pdf.
[6]
A. Chandrashekar and P. B. Schary, “Toward the virtual supply chain: the convergence of IT and organization,” International Journal of Logistics Management, The, vol. 10, no. 2, pp. 27–40, 1999.
[7]
R. A. Frosch and N. E. Gallopoulos, “Strategies for manufacturing,” Scientific American, vol. 261, no. 3, pp. 144–152, 1989.
[8]
D. C. G. David P. Fowler, “PPAP 4th Edition,” Jun. 2006.
[9]
Shamsuzzoha, A. and Helo, P., “Virtual Enterprise Management to Enhance the Manufacturing Process Collaboration,” presented at the 22nd international conference on Flexible Automation and Intelligent Manufacturing  (FAIM 2012), Helsinki, Finland, Jun. 2012.
[10]
“2006PPAPManual4thEditionManual.pdf.” .
[11]
“[PDF] von texas-quality.org.” Accessed: Jul. 04, 2013. [Online]. Available: http://alexandrow.pdforms.texas-quality.org/SiteImages/125/Reference%20Library/Quality%20Planning.pdf.
[12]
“This work aims at identifying the key business model elements necessary to buil.” .
[13]
S. Schulte, D. Schuller, R. Steinmetz, and S. Abels, “Plug-and-Play Virtual Factories,” IEEE Internet Computing, vol. 16, no. 5, pp. 78–82, 2012.
[14]
Georgi Pavlov, Atanas Manafov, Irena Pavlova, and Velimir Manafov, “An ‘Adventurous’ Approach towards Virtual Entrepreneurship,” presented at the International Conference for Entrepreneurship, Innovation and Regional Development ICEIRD 2012, Sofia, Bulgaria, Jun. 2012.
[15]
M. Taylor and A. Murphy, “SMEs and e-business,” Journal of Small Business and Enterprise Development, vol. 11, no. 3, pp. 280–289, 2004.
[16]
V. Corvello and P. Migliarese, “Virtual forms for the organization of production: A comparative analysis,” International Journal of Production Economics, vol. 110, no. 1–2, pp. 5–15, 2007.
[17]
D. Chen and N. Daclin, “Barriers driven methodology for enterprise interoperability,” Establishing The Foundation Of Collaborative Networks, pp. 453–460, 2007.
[18]
V. Barba-Sánchez, M. P. Martínez-Ruiz, and A. I. Jimenez-Zarco, “Drivers, benefits and challenges of ICT adoption by small and medium sized enterprises (SMEs): A literature review,” Problems and Perspectives in Management, vol. 5, no. 1, pp. 104–115, 2007.
[19]
R. van Hoek, “Clockspeed: Winning Industry Control in the Age of Temporary Advantage,” Supply Chain Management: An International Journal, vol. 5, no. 3, p. 162, 2000.

Sensors

[1]
S. Zöller, A. Reinhardt, M. Wachtel, and R. Steinmetz, “Integrating Wireless Sensor Nodes and Smartphones for Energy-Efficient Data Exchange in Smart Environments,” in Proceedings of the 5th IEEE PerCom International Workshop on Smart Environments and Ambient Intelligence (SENAmI), San Diego, CA, USA, Mar. 2013, pp. 652–657.
[2]
P. Kinney, “Zigbee technology: Wireless control that simply works,” in Communications design conference, 2003, vol. 2, Accessed: Jul. 04, 2013. [Online]. Available: http://www.ceid.upatras.gr/faculty/alexiou/ahts/projects/project04/ylikoAskisewn/Evdomada1/B1/Tutorials/802.15.4-Tutorials/ZigBee_Technology_Sept2003.pdf.
[3]
D. Culler, D. Estrin, and M. Srivastava, “Guest editors’ introduction: overview of sensor networks,” Computer, vol. 37, no. 8, pp. 41–49, 2004.
[4]
R. Conforti, M. La Rosa, G. Fortino, A. H. M. ter Hofstede, J. Recker, and M. Adams, “Real-time risk monitoring in business processes: A sensor-based approach,” Journal of Systems and Software, vol. 86, no. 11, pp. 2939–2965, Nov. 2013, doi: 10.1016/j.jss.2013.07.024.
[5]
“ScienceDirect Snapshot.” Accessed: Mar. 20, 2014. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S016412121300174X.
[6]
S. Zöller, C. Vollmer, M. Wachtel, R. Steinmetz, and A. Reinhardt, “Data Filtering for Wireless Sensor Networks Using Forecasting and Value of Information (accepted for publication),” presented at the The 38th IEEE Conference on Local Computer Networks (LCN), Oct. 2013.
[7]
M. Tubaishat and S. Madria, “Sensor networks: an overview,” IEEE potentials, vol. 22, no. 2, pp. 20–23, 2003.
[8]
H. Edgar, J. Callawy, and E. H. Callaway, “Wireless sensor networks: Architectures and Protocols,” Boca Raton, Florida: CRC Press, vol. 200, pp. 1–40, 2004.
[9]
L. Ruiz-Garcia, P. Barreiro, J. Rodriguez-Bermejo, and J. I. Robla, “Review. Monitoring the intermodal, refrigerated transport of fruit using sensor networks,” Spanish Journal of Agricultural Research, vol. 5, no. 2, pp. 142–156, 2007.
[10]
R. Jedermann, R. Schouten, A. Sklorz, W. Lang, and O. van Kooten, “Linking keeping quality models and sensor systems to an autonomous transport supervision system,” in Cold Chain Management–2nd international Workshop, Bonn, 2006, vol. 8.
[11]
R. Jedermann and W. Lang, “Mobile java code for embedded transport monitoring systems,” in Proceedings of the Embedded World Conference, Poing, 2006, pp. 771–777.
[12]
R. Hans, M. Zahn, U. Lampe, and A. Papageorgiou, “Energy-efficient Web Service Invocation on Mobile Devices: The Influence of Compression and Parsing,” in Proceedings of the 2nd International Conference on Mobile Services (MS 2013), Stanta Clara, Jun. 2013, pp. 1–6.
[13]
S. Zöller, M. Wachtel, F. Knapp, and R. Steinmetz, “Going All the Way -- Detecting and Transmitting Events with Wireless Sensor Networks in Logistics (accepted for publication).,” presented at the The 38th IEEE Conference on Local Computer Networks (LCN), Oct. 2013.
[14]
“[PDF] from upatras.gr.” Accessed: Jul. 04, 2013. [Online]. Available: http://www.ceid.upatras.gr/faculty/alexiou/ahts/projects/project04/ylikoAskisewn/Evdomada1/B1/Tutorials/802.15.4-Tutorials/ZigBee_Technology_Sept2003.pdf.
[15]
S. Zöller, A. Reinhardt, and R. Steinmetz, “Distributed Data Filtering in Logistics Wireless Sensor Networks Based on Transmission Relevance,” presented at the The 37th IEEE Conference on Local Computer Networks (LCN 2012).
[16]
A. Reinhardt, D. Christin, M. Hollick, J. Schmitt, P. Mogre, and R. Steinmetz, “Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks,” in 7th European Conference on Wireless Sensor Networks (EWSN 2010), 2010, pp. 33–48.
[17]
R. Jedermann and W. Lang, “The Minimum Number of Sensors–Interpolation of Spatial Temperature Profiles in Chilled Transports,” in 6th European Conference on Wireless Sensor Networks (EWSN), 2009, pp. 232–246.
[18]
C. Hua and T. S. P. Yum, “Optimal routing and data aggregation for maximizing lifetime of wireless sensor networks,” Networking, IEEE/ACM Transactions on, vol. 16, no. 4, pp. 892–903, 2008.
[19]
K. Sohraby, D. Minoli, and T. F. Znati, Wireless sensor networks: technology, protocols, and applications. Wiley-Blackwell, 2007.
[20]
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” Communications Magazine, IEEE, vol. 40, no. 8, pp. 102–114, 2002.
[21]
R. Jedermann et al., “Transport scenario for the intelligent container,” Understanding Autonomous Cooperation and Control in Logistics, pp. 393–404.
[22]
R. Verdone, D. Dardari, G. Mazzini, and A. Conti, Wireless sensor and actuator networks: technologies, analysis and design. Academic Press, 2008.
[23]
A. Dada and F. Thiesse, “Sensor applications in the supply chain: the example of quality-based issuing of perishables,” in Proceedings of the 1st international conference on The internet of things, 2008, pp. 140–154.
[24]
C. Mascolo and M. Musolesi, “SCAR: context-aware adaptive routing in delay tolerant mobile sensor networks,” in Proceedings of the 2006 international conference on Wireless communications and mobile computing, 2006, pp. 533–538.

Semantic

[1]
S. Schulte, U. Lampe, J. Eckert, and R. Steinmetz, “LOG4SWS. KOM: Self-Adapting Semantic Web Service Discovery for SAWSDL,” in 2010 6th World Congress on Services, 2010, pp. 511–518.
[2]
S. Schulte, J. Eckert, N. Repp, and R. Steinmetz, “An approach to evaluate and enhance the retrieval of Semantic Web services,” in Service Systems and Service Management, 2008 International Conference on, 2008, pp. 1–7, doi: 10.1109/ICSSSM.2008.4598550.
[3]
D. Martin et al., “Bringing semantics to web services with owl-s,” World Wide Web, vol. 10, no. 3, pp. 243–277, 2007.
[4]
M. Klusch, P. Kapahnke, and I. Zinnikus, “Sawsdl-mx2: A machine-learning approach for integrating semantic web service matchmaking variants,” in Web Services, 2009. ICWS 2009. IEEE International Conference on, 2009, pp. 335–342.
[5]
D. Fensel, Enabling Semantic Web Services: The Web Service Modeling Ontology. Springer-Verlag New York Inc, 2007.
[6]
S. Schulte, N. Repp, D. Schuller, and R. Steinmetz, “From Web Service Policies to Automatic Deviation Handling: Supporting Semantic Description of Reactions to Policy Violations,” in Semantic Computing, 2009. ICSC’09. IEEE International Conference on, 2009, pp. 312–317.
[7]
D. Schuller, A. Papageorgiou, S. Schulte, J. Eckert, N. Repp, and R. Steinmetz, “Process reliability in service oriented architectures,” in Digital Ecosystems and Technologies, 2009. DEST ’09. 3rd IEEE International Conference on, 2009, pp. 606–611, doi: 10.1109/DEST.2009.5276712.
[8]
D. Kourtesis and I. Paraskakis, “Web service discovery in the FUSION semantic registry,” in Business Information Systems, 2008, pp. 285–296.
[9]
E. Cimpian et al., “Ontologies and Matchmaking,” Semantic Service Provisioning, pp. 19–54, 2008.
[10]
R. Akkiraju, “Semantic Web Services,” Semantic Web Services: Theory, Tools, and Applications, pp. 191–216, Chapter IX, 2007.
[11]
K. Sivashanmugam, J. A. Miller, A. P. Sheth, and K. Verma, “Framework for semantic web process composition,” International Journal of Electronic Commerce, vol. 9, no. 2, pp. 71–106, 2005.
[12]
P. Plebani and B. Pernici, “Urbe: Web service retrieval based on similarity evaluation,” Knowledge and Data Engineering, IEEE Transactions on, vol. 21, no. 11, pp. 1629–1642, 2009.
[13]
M. Klusch, P. Kapahnke, and I. Zinnikus, “Hybrid adaptive web service selection with sawsdl-mx and wsdl-analyzer,” The Semantic Web: Research and Applications, pp. 550–564, 2009.
[14]
K. Verma and A. Sheth, “Semantically annotating a web service,” Internet Computing, IEEE, vol. 11, no. 2, pp. 83–85, 2007.
[15]
J. Farrell, I. B. M. H. Lausen, and D. Innsbruck, “Semantic annotations for wsdl and xml schema,” 2007. http://www.w3.org/TR/2007/REC-sawsdl-20070828/.
[16]
L. Clement, A. Hately, C. von Riegen, T. Rogers, and others, “UDDI Version 3.0. 2,” 2004. http://www.uddi.org/pubs/uddi_v3.htm.

Negotiation

[1]
G. Dudek and H. Stadtler, “Negotiation-based collaborative planning between supply chains partners,” European Journal of Operational Research, vol. 163, no. 3, pp. 668–687, 2005.
[2]
J. (Roger) Jiao, X. You, and A. Kumar, “An agent-based framework for collaborative negotiation in the global manufacturing supply chain network,” Robotics and Computer-Integrated Manufacturing, vol. 22, no. 3, pp. 239–255, Jul. 2006, doi: 10.1016/j.rcim.2005.04.003.
[3]
Ralph Vigne, Juergen Mangler, Erich Schikuta, and Stefanie Rinderle-Ma, “WS-Agreement based Service Negotiation in a Heterogeneous Service Environment,” presented at the IEEE International Conference on Service Oriented Computing & Applications (SOCA 2012), Taipei, Taiwan, Dec. 2012.
[4]
W. M. P. van der Aalst, N. Lohmann, P. Massuthe, C. Stahl, and K. Wolf, “Multiparty Contracts: Agreeing and Implementing Interorganizational Processes,” The Computer Journal, vol. 53, no. 1, pp. 90–106, Jan. 2010, doi: 10.1093/comjnl/bxn064.
[5]
J. M. Zaha, A. Barros, M. Dumas, and A. Hofstede, “Let’s Dance: A Language for Service Behavior Modeling,” in On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE, vol. 4275, R. Meersman and Z. Tari, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 145–162.

Process Design and Optimization

[1]
A. Hallerbach, T. Bauer, and M. Reichert, “Capturing variability in business process models: the Provop approach,” Journal of Software Maintenance and Evolution: Research and Practice, vol. 22, no. 6–7, pp. 519–546, 2010.
[2]
D. Schuller, Ulrich Lampe, J. Eckert, R. Steinmetz, and S. Schulte, “Cost-driven Optimization of Complex Service-based Workflows for Stochastic QoS Parameters,” in 2012 IEEE 19th International Conference on Web Services, Waikiki, Hawaii, Jun. 2012, pp. 66–74.
[3]
S. L. Mansar and H. A. Reijers, “Best practices in business process redesign: validation of a redesign framework,” Computers in Industry, vol. 56, no. 5, pp. 457–471, 2005.
[4]
“Addresses QoS aware Service Composition considering stochastic QoS attributes.” .
[5]
W. M. P. Van Der Aalst, M. Dumas, F. Gottschalk, A. H. M. Ter Hofstede, M. La Rosa, and J. Mendling, “Correctness-preserving configuration of business process models,” in Proceedings of the Theory and practice of software, 11th international conference on Fundamental approaches to software engineering, 2008, pp. 46–61.
[6]
W. M. P. Van Der Aalst et al., “Business process mining: An industrial application,” Information Systems, vol. 32, no. 5, pp. 713–732, 2007.