Service-Oriented Computing – ICSOC 2019 Workshops: WESOACS, ASOCA, ISYCC, TBCE, and STRAPS, Toulouse, France, October 28–31, 2019, Revised Selected Papers

[1]  C. Nicolle,et al.  Condensed Representations of Association Rules in n-Ary Relations , 2023, IEEE Transactions on Knowledge and Data Engineering.

[2]  Matthew Green,et al.  ZEXE: Enabling Decentralized Private Computation , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[3]  Michail Matthaiou,et al.  ENORM: A Framework For Edge NOde Resource Management , 2017, IEEE Transactions on Services Computing.

[4]  Richard Woodward,et al.  The organisation for economic cooperation and development , 2004, The SAGE Encyclopedia of Higher Education.

[5]  Manfred Reichert,et al.  Comprehension of business process models: Insight into cognitive strategies via eye tracking , 2019, Expert Syst. Appl..

[6]  Takoua Abdellatif,et al.  A Framework for GDPR Compliance in Big Data Systems , 2019, CRiSIS.

[7]  Maroun Koussaifi,et al.  User-Oriented Description of Emerging Services in Ambient Systems , 2019, ICSOC Workshops.

[8]  Genoveva Vargas-Solar,et al.  Trusted Data Integration in Service Environments: A Systematic Mapping , 2019, ICSOC.

[9]  Frank Leymann,et al.  Process-Based Composition of Permissioned and Permissionless Blockchain Smart Contracts , 2019, 2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC).

[10]  Giancarlo Fortino,et al.  A development approach for collective opportunistic Edge-of-Things services , 2019, Inf. Sci..

[11]  Nadia Kabachi,et al.  Knowledge Guided Integration of Structured and Unstructured Data in Health Decision Process , 2019, ISD.

[12]  Amira Mouakher,et al.  An Ontology-Based Monitoring System in Vineyards of the Burgundy Region , 2019, 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE).

[13]  Frank Leymann,et al.  Modeling and execution of blockchain-aware business processes , 2019, SICS Software-Intensive Cyber-Physical Systems.

[14]  Andrea Zisman,et al.  Won't Take No for an Answer: Resource-Driven Requirements Adaptation , 2019, 2019 IEEE/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[15]  F. Leymann,et al.  The essential deployment metamodel: a systematic review of deployment automation technologies , 2019, SICS Software-Intensive Cyber-Physical Systems.

[16]  Waheed Iqbal,et al.  Unsupervised learning approach for web application auto-decomposition into microservices , 2019, J. Syst. Softw..

[17]  Michael Gerndt,et al.  Performance Modeling for Cloud Microservice Applications , 2019, ICPE.

[18]  Florian Daniel,et al.  Supporting Reuse of Smart Contracts through Service Orientation and Assisted Development , 2019, 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON).

[19]  João Leitão,et al.  Data Replication on the Cloud/Edge , 2019, PaPoC@EuroSys.

[20]  Peter McCloskey,et al.  A Mobile-Based Deep Learning Model for Cassava Disease Diagnosis , 2019, Front. Plant Sci..

[21]  Craig E. Kuziemsky,et al.  An Agent Based Framework for Healthcare Teamwork , 2019, Proceedings of the 2019 2nd International Conference on Information Science and Systems.

[22]  Ingo Weber,et al.  Architecture for Blockchain Applications , 2019, Springer International Publishing.

[23]  Ivan Beschastnikh,et al.  Improving microservice-based applications with runtime placement adaptation , 2019, Journal of Internet Services and Applications.

[24]  Franco Zambonelli,et al.  Pervasive computing middleware: current trends and emerging challenges , 2019, CCF Trans. Pervasive Comput. Interact..

[25]  F. Richard Yu,et al.  Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.

[26]  Luca Guida,et al.  A Service-Oriented Perspective on Blockchain Smart Contracts , 2019, IEEE Internet Computing.

[27]  Mohamed Amine Ferrag,et al.  Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.

[28]  Ying Zhao,et al.  EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts , 2018, IEEE Internet of Things Journal.

[29]  Seong-je Cho,et al.  Representing Multicloud Security and Privacy Policies and Detecting Potential Problems , 2019, ICSOC Workshops.

[30]  Juan Camilo Vargas,et al.  Blockchain-based consent manager for GDPR compliance , 2019, Open Identity Summit.

[31]  Meriem Belguidoum,et al.  A DSL for elastic component-based cloud application , 2019, Int. J. High Perform. Comput. Netw..

[32]  Jaspreet Kaur,et al.  Develop Leave Application using Blockchain Smart Contract , 2019, 2019 11th International Conference on Communication Systems & Networks (COMSNETS).

[33]  Sylvie Trouilhet,et al.  Towards an Intelligent User-Oriented Middleware for Opportunistic Composition of Services in Ambient Spaces , 2018, M4IoT@Middleware.

[34]  Saeed Sharifian,et al.  PESS-MinA: A Proactive Stochastic Task Allocation Algorithm for FaaS Edge-Cloud environments , 2018, 2018 4th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS).

[35]  André Vasconcelos Carrusca Gestão de micro-serviços na Cloud e Edge , 2018 .

[36]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[37]  Serge Demeyer,et al.  Migrating towards microservices: migration and architecture smells , 2018, IWoR@ASE.

[38]  Max Chevalier,et al.  Querying Heterogeneous Data in Graph-Oriented NoSQL Systems , 2018, DaWaK.

[39]  Frederico Alvares,et al.  CoMe4ACloud: An end-to-end framework for autonomic Cloud systems , 2018, Future Gener. Comput. Syst..

[40]  Antonio Puliafito,et al.  Blockchain and IoT Integration: A Systematic Survey , 2018, Sensors.

[41]  Theo Lynn,et al.  Microservices migration patterns , 2018, Softw. Pract. Exp..

[42]  2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) , 2018 .

[43]  Gautam Srivastava,et al.  MQTT-G: A Publish/Subscribe Protocol with Geolocation , 2018, 2018 41st International Conference on Telecommunications and Signal Processing (TSP).

[44]  Archana B. Saxena,et al.  IAAS Trust in Public Domain: Evaluative Framework for Service Provider , 2018, 2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT).

[45]  Wenbin Yao,et al.  Data-Driven and Feedback-Enhanced Trust Computing Pattern for Large-Scale Multi-Cloud Collaborative Services , 2018, IEEE Transactions on Services Computing.

[46]  Xiaoyu Hong,et al.  Blockchain Based Credibility Verification Method for IoT Entities , 2018, Secur. Commun. Networks.

[47]  Jean-Michel Bruel,et al.  Ambient Intelligence Users in the Loop: Towards a Model-Driven Approach , 2018, STAF Workshops.

[48]  Anju Alex,et al.  Machine Learning Based System Health Check Analyzer For Energy Components , 2018 .

[49]  Qiong Chen,et al.  Data Driven Chiller Sequencing for Reducing HVAC Electricity Consumption in Commercial Buildings , 2018, e-Energy.

[50]  Juan Manuel Murillo,et al.  Towards Dynamically Programmable Devices Using Beacons , 2018, ICWE Workshops.

[51]  Jordi Cabot,et al.  OpenAPItoUML: A Tool to Generate UML Models from OpenAPI Definitions , 2018, ICWE.

[52]  Sandra Wachter,et al.  Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR , 2018, Comput. Law Secur. Rev..

[53]  Ingrid Nunes,et al.  Cleaning Up the Mess: A Formal Framework for Autonomously Reverting BDI Agent Actions , 2018, 2018 IEEE/ACM 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[54]  Michael R. Lyu,et al.  Online App Review Analysis for Identifying Emerging Issues , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).

[55]  João Leitão,et al.  Towards Enabling Novel Edge-Enabled Applications , 2018, ArXiv.

[56]  Antonio Bucchiarone,et al.  From Monolithic to Microservices: An Experience Report from the Banking Domain , 2018, IEEE Software.

[57]  Claude Castelluccia,et al.  Enhancing Transparency and Consent in the IoT , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[58]  Ralf Klamma,et al.  The Exploitation of OpenAPI Documentation for the Generation of Web Frontends , 2018, WWW.

[59]  Steffen Becker,et al.  CAUS: An Elasticity Controller for a Containerized Microservice , 2018, ICPE Companion.

[60]  Conal Elliott,et al.  The simple essence of automatic differentiation , 2018, Proc. ACM Program. Lang..

[61]  Stefan Wagner,et al.  From Monolith to Microservices: A Classification of Refactoring Approaches , 2018, DEVOPS.

[62]  Wenbin Yao,et al.  Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service , 2018, IEEE Transactions on Information Forensics and Security.

[63]  Sandra Wachter The GDPR and the Internet of Things: a three-step transparency model , 2018, Law, Innovation and Technology.

[64]  J. Christian Attiogbé,et al.  A Model-Driven Method for Fast Building Consistent Web Services from OpenAPI-Compatible Models , 2018, MODELSWARD.

[65]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[66]  Gerald Kotonya,et al.  Developing IoT applications: challenges and frameworks , 2017, IET Cyper-Phys. Syst.: Theory & Appl..

[67]  Kim-Kwang Raymond Choo,et al.  A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.

[68]  Rajkumar Buyya,et al.  Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.

[69]  Nick Szabo,et al.  Smart Contracts: Building Blocks for Digital Markets , 2018 .

[70]  Linus Johansson,et al.  Improving Intrusion Detection for IoT Networks - A Snort GPGPU Modification Using OpenCL , 2018 .

[71]  Mody,et al.  Bitcoin and Blockchain : A peer to peer electronic cash system , 2018 .

[72]  Kevin Andrews,et al.  A Smart Mobile Assessment Tool for Collecting Data in Large-Scale Educational Studies , 2018, FNC/MobiSPC.

[73]  Mahir Kaya,et al.  Complex Event Processing Using IOT Devices Based on Arduino , 2017 .

[74]  Dan Wang,et al.  sTube+: an IoT communication sharing architecture for smart after-sales maintenance in buildings , 2017, BuildSys@SenSys.

[75]  Kyungho Lee,et al.  An analysis of economic impact on IoT under GDPR , 2017, 2017 International Conference on Information and Communication Technology Convergence (ICTC).

[76]  Zhang Zhe,et al.  A review on consensus algorithm of blockchain , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[77]  Luciano Baresi,et al.  Microservices Identification Through Interface Analysis , 2017, ESOCC.

[78]  Bertil Chapuis,et al.  A Horizontally Scalable and Reliable Architecture for Location-Based Publish-Subscribe , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).

[79]  Jieping Ye,et al.  The Simpler The Better: A Unified Approach to Predicting Original Taxi Demands based on Large-Scale Online Platforms , 2017, KDD.

[80]  Schahram Dustdar,et al.  A Serverless Real-Time Data Analytics Platform for Edge Computing , 2017, IEEE Internet Computing.

[81]  Stéphanie Chollet,et al.  Self-Aware Context in Smart Home Pervasive Platforms , 2017, 2017 IEEE International Conference on Autonomic Computing (ICAC).

[82]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[83]  Daniel James,et al.  Wired LAN and Wireless LAN Attack Detection using Signature Based and Machine Learning Tools , 2017 .

[84]  Stefan Heindorf,et al.  Linking Services to Websites by Leveraging Semantic Data , 2017, 2017 IEEE International Conference on Web Services (ICWS).

[85]  Mohsen Guizani,et al.  Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.

[86]  Mario Kusek,et al.  Microservices as Agents in IoT Systems , 2017, KES-AMSTA.

[87]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[88]  Manfred Reichert,et al.  Cognitive Insights into Business Process Model Comprehension: Preliminary Results for Experienced and Inexperienced Individuals , 2017, BPMDS/EMMSAD@CAiSE.

[89]  Rubby Casallas,et al.  Cost comparison of running web applications in the cloud using monolithic, microservice, and AWS Lambda architectures , 2017, Service Oriented Computing and Applications.

[90]  Benoît Garbinato,et al.  Scaling and Load Testing Location-Based Publish and Subscribe , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[91]  Leïla Azouz Saïdane,et al.  Modeling Correlation between QoS Attributes for Trust Computation in Cloud Computing Environments , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[92]  Min Chen,et al.  Disease Prediction by Machine Learning Over Big Data From Healthcare Communities , 2017, IEEE Access.

[93]  Kathiravan Srinivasan,et al.  Managing Service-Heterogeneity using Osmotic Computing , 2017, ArXiv.

[94]  Nane Kratzke,et al.  Understanding cloud-native applications after 10 years of cloud computing - A systematic mapping study , 2017, J. Syst. Softw..

[95]  Ishwar Lal Sharma,et al.  Measurement of economic performance and social progress as well-being: A survey of Himachal Pradesh , 2017 .

[96]  Zhaohui Liu,et al.  Optimal chiller sequencing control in an office building considering the variation Of chiller maximum cooling capacity , 2017 .

[97]  Lihong Bao,et al.  QoS-based Trust Computing Scheme for SLA Guarantee in Cloud Computing System , 2017, 2017 International Conference on Computing Intelligence and Information System (CIIS).

[98]  D. Drescher,et al.  Blockchain Basics: A Non-Technical Introduction in 25 Steps , 2017 .

[99]  Long Sun,et al.  An open IoT framework based on microservices architecture , 2017, China Communications.

[100]  Ming-E Zhang,et al.  Adaptive system construction of medical knowledge agent learning technology , 2017, 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).

[101]  Tao Luo,et al.  Research on K anonymity algorithm based on association analysis of data utility , 2017, 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).

[102]  Shang-Pin Ma,et al.  An Overview and Classification of Service Description Approaches in Automated Service Composition Research , 2017, IEEE Transactions on Services Computing.

[103]  Avinash Keskar,et al.  A Reconfigurable IoT Architecture with Energy Efficient Event-Based Data Traffic Reduction Scheme , 2017, Int. J. Online Eng..

[104]  Nicolas Verstaevel,et al.  Lifelong Machine Learning with Adaptive Multi-Agent Systems , 2017, ICAART.

[105]  Thomas Vogel,et al.  Control Strategies for Self-Adaptive Software Systems , 2017, ACM Trans. Auton. Adapt. Syst..

[106]  Sarbjeet Singh,et al.  Compliance-based Multi-dimensional Trust Evaluation System for determining trustworthiness of Cloud Service Providers , 2017, Future Gener. Comput. Syst..

[107]  M. Carmen Ruiz,et al.  From Sensor Networks to Internet of Things. Bluetooth Low Energy, a Standard for This Evolution , 2017, Sensors.

[108]  K. Figl Comprehension of Procedural Visual Business Process Models , 2017, WI 2017.

[109]  Alberto Lluch-Lafuente,et al.  Microservices: Yesterday, Today, and Tomorrow , 2016, Present and Ulterior Software Engineering.

[110]  Frank Leymann,et al.  Service-Oriented Computing , 2008, Lecture Notes in Computer Science.

[111]  Mahadev Satyanarayanan,et al.  The Emergence of Edge Computing , 2017, Computer.

[112]  Ivana Olivková,et al.  Comparison and Evaluation of Fare Collection Technologies in the Public Transport , 2017 .

[113]  Oliver Kopp,et al.  Declarative vs . Imperative : Two Modeling Patterns for the Automated Deployment of Applications , 2017 .

[114]  Zahir Tari,et al.  Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust Factors , 2017, IEEE Cloud Computing.

[115]  Yanchun Zhang,et al.  Ensuring data integrity in electronic health records: A quality health care implication , 2016, 2016 International Conference on Orange Technologies (ICOT).

[116]  Ralph Deters,et al.  Blockchain as a Service for IoT , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[117]  Bing Liu,et al.  Lifelong machine learning: a paradigm for continuous learning , 2017, Frontiers of Computer Science.

[118]  Juan Carlos De Martin,et al.  Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[119]  Irene Luque Ruiz,et al.  State of the Art, Trends and Future of Bluetooth Low Energy, Near Field Communication and Visible Light Communication in the Development of Smart Cities , 2016, Sensors.

[120]  Harald C. Gall,et al.  What would users change in my app? summarizing app reviews for recommending software changes , 2016, SIGSOFT FSE.

[121]  Valérie Issarny,et al.  Revisiting Service-Oriented Architecture for the IoT: A Middleware Perspective , 2016, ICSOC.

[122]  Manfred Reichert,et al.  A Configurator Component for End-User Defined Mobile Data Collection Processes , 2016, ICSOC Workshops.

[123]  Alin Deutsch,et al.  Towards a Shared Ledger Business Collaboration Language Based on Data-Aware Processes , 2016, ICSOC.

[124]  Jan Mendling,et al.  Untrusted Business Process Monitoring and Execution Using Blockchain , 2016, BPM.

[125]  Peter Kilpatrick,et al.  Challenges and Opportunities in Edge Computing , 2016, 2016 IEEE International Conference on Smart Cloud (SmartCloud).

[126]  Olaf Zimmermann,et al.  Service Cutter: A Systematic Approach to Service Decomposition , 2016, ESOCC.

[127]  Genoveva Vargas-Solar,et al.  Rhone: A Quality-Based Query Rewriting Algorithm for Data Integration , 2016, ADBIS.

[128]  Rajkumar Buyya,et al.  Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.

[129]  Ralf Hinze,et al.  Equational reasoning with lollipops, forks, cups, caps, snakes, and speedometers , 2016, J. Log. Algebraic Methods Program..

[130]  Bixin Li,et al.  A Model to Evaluate the Credibility of Service in Cloud Computing Environment , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[131]  Jan Olaf Blech,et al.  Spatio-Temporal Models for Formal Analysis and Property-Based Testing , 2016, STAF Workshops.

[132]  Nima Jafari Navimipour,et al.  A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities , 2016, Comput. Hum. Behav..

[133]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[134]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[135]  Rami Bahsoon,et al.  Microservices and Their Design Trade-Offs: A Self-Adaptive Roadmap , 2016, 2016 IEEE International Conference on Services Computing (SCC).

[136]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[137]  Ricardo Terra,et al.  Towards a Technique for Extracting Microservices from Monolithic Enterprise Systems , 2016, ArXiv.

[138]  Pooyan Jamshidi,et al.  Microservices Architecture Enables DevOps: Migration to a Cloud-Native Architecture , 2016, IEEE Software.

[139]  Diomidis Spinellis,et al.  Being a DevOps Developer , 2016, IEEE Softw..

[140]  Igor Cavrak,et al.  Architecture of an interoperable IoT platform based on microservices , 2016, 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[141]  Nofirman Firdaus,et al.  Chiller: Performance Deterioration and Maintenance , 2016 .

[142]  Steffen Staab,et al.  Ontology enrichment by discovering multi-relational association rules from ontological knowledge bases , 2016, SAC.

[143]  Michele Risi,et al.  Visual Mobile Computing for Mobile End-Users , 2016, IEEE Transactions on Mobile Computing.

[144]  Kamel Hamrouni,et al.  Association rules-based Ontology Enrichment , 2016, Int. J. Web Appl..

[145]  Maria Rita Palattella,et al.  Internet of Things in the 5G Era: Enablers, Architecture, and Business Models , 2016, IEEE Journal on Selected Areas in Communications.

[146]  Jatinder Singh,et al.  TBSD: A Defend Against Sybil Attack in Wireless Sensor Networks , 2016 .

[147]  Dávid Bartók,et al.  A branch-and-bound approach to virtual machine placement , 2016 .

[148]  Immo Heino,et al.  Bluetooth Beacon Enabled Mobility Services and Opportunities in Public Transit , 2016 .

[149]  Wolfgang Narzt,et al.  Bluetooth Low Energy as enabling technology for Be-In/Be-Out systems , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[150]  Luis Miguel Sintra Salvo Paiva,et al.  Semantic relations extraction from unstructured information for domain ontologies enrichment , 2015 .

[151]  Albert Y. Zomaya,et al.  Computation Offloading for Service Workflow in Mobile Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.

[152]  Mitesh Soni,et al.  End to End Automation on Cloud with Build Pipeline: The Case for DevOps in Insurance Industry, Continuous Integration, Continuous Testing, and Continuous Delivery , 2015, 2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[153]  Sibel Adali,et al.  A Survey on Trust Modeling , 2015, ACM Comput. Surv..

[154]  Paul D. Manuel,et al.  A trust model of cloud computing based on Quality of Service , 2015, Ann. Oper. Res..

[155]  Wolfgang Narzt,et al.  Be-In/Be-Out with Bluetooth Low Energy: Implicit Ticketing for Public Transportation Systems , 2015, 2015 IEEE 18th International Conference on Intelligent Transportation Systems.

[156]  Genoveva Vargas-Solar,et al.  Can Data Integration Quality Be Enhanced on Multi-cloud Using SLA? , 2015, DEXA.

[157]  Ulrike Gretzel,et al.  Smart tourism: foundations and developments , 2015, Electronic Markets.

[158]  Philippe Lalanda,et al.  Rondo: A Tool Suite for Continuous Deployment in Dynamic Environments , 2015, 2015 IEEE International Conference on Services Computing.

[159]  Wei Wang,et al.  Recommender system application developments: A survey , 2015, Decis. Support Syst..

[160]  Yangyong Zhu,et al.  The Challenges of Data Quality and Data Quality Assessment in the Big Data Era , 2015, Data Sci. J..

[161]  Manish Virmani,et al.  Understanding DevOps & bridging the gap from continuous integration to continuous delivery , 2015, Fifth International Conference on the Innovative Computing Technology (INTECH 2015).

[162]  Thomas Vogel,et al.  Software Engineering Meets Control Theory , 2015, 2015 IEEE/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems.

[163]  Brendan Fong,et al.  A Compositional Framework for Passive Linear Networks , 2015, 1504.05625.

[164]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[165]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[166]  Frank Leymann,et al.  Automated Capturing and Systematic Usage of DevOps Knowledge for Cloud Applications , 2015, 2015 IEEE International Conference on Cloud Engineering.

[167]  Panayiotis Tsaparas,et al.  Review Synthesis for Micro-Review Summarization , 2015, WSDM.

[168]  Lianping Chen,et al.  Continuous Delivery: Huge Benefits, but Challenges Too , 2015, IEEE Software.

[169]  Holger Ziekow,et al.  Towards a Big Data Analytics Framework for IoT and Smart City Applications , 2015 .

[170]  Michael Rosemann,et al.  The Six Core Elements of Business Process Management , 2015, Handbook on Business Process Management.

[171]  S. Puškorius The Methodology of Calculation the Quality of Life Index , 2015 .

[172]  Faïez Gargouri,et al.  Enhanced Association Rules over Ontology Resources , 2015, Int. J. Web Appl..

[173]  Ming-Whei Feng,et al.  Complex event processing for the Internet of Things and its applications , 2014, 2014 IEEE International Conference on Automation Science and Engineering (CASE).

[174]  Athanasios V. Vasilakos,et al.  Web services composition: A decade's overview , 2014, Inf. Sci..

[175]  Celson Lima,et al.  Discovering semantic relations from unstructured data for ontology enrichment: Asssociation rules based approach , 2014, 2014 9th Iberian Conference on Information Systems and Technologies (CISTI).

[176]  Jeremy Yallop,et al.  Lightweight Higher-Kinded Polymorphism , 2014, FLOPS.

[177]  David Garlan,et al.  Stochastic game analysis and latency awareness for proactive self-adaptation , 2014, SEAMS 2014.

[178]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[179]  Paolo Bellavista,et al.  Quality of Service in Wide Scale Publish—Subscribe Systems , 2014, IEEE Communications Surveys & Tutorials.

[180]  Carlos Canal,et al.  People as a Service: A Mobile-centric Model for Providing Collective Sociological Profiles , 2014, IEEE Software.

[181]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[182]  Chen Jun,et al.  Design of Complex Event-Processing IDS in Internet of Things , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.

[183]  Elaine Shi,et al.  Authenticated data structures, generically , 2014, POPL.

[184]  Inmaculada Medina-Bulo,et al.  Approaching the Internet of Things through Integrating SOA and Complex Event Processing , 2014 .

[185]  Stasys Puškorius,et al.  Theoretical Model of Estimating the Quality of Life Index , 2014 .

[186]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[187]  Oliver Kopp,et al.  TOSCA: Portable Automated Deployment and Management of Cloud Applications , 2014, Advanced Web Services.

[188]  Oliver Kopp,et al.  Winery - A Modeling Tool for TOSCA-Based Cloud Applications , 2013, ICSOC.

[189]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[190]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[191]  Ke Shi,et al.  Data Mining Techniques for Wireless Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.

[192]  Bo Yang,et al.  A Generic Framework for Application Configuration Discovery with Pluggable Knowledge , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[193]  Michael J. Covington,et al.  Threat implications of the Internet of Things , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[194]  Fu Xiao,et al.  In situ performance comparison and evaluation of three chiller sequencing control strategies in a super high-rise building , 2013 .

[195]  Bradley R. Schmerl,et al.  Evolving an adaptive industrial software system to use architecture-based self-adaptation , 2013, 2013 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[196]  Daniel Moldovan,et al.  On estimating actuation delays in elastic computing systems , 2013, 2013 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[197]  Carlo Ghezzi,et al.  Managing non-functional uncertainty via model-driven adaptivity , 2013, 2013 35th International Conference on Software Engineering (ICSE).

[198]  Dursun Delen,et al.  Data, information and analytics as services , 2013, Decis. Support Syst..

[199]  Dursun Delen,et al.  Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud , 2013, Decis. Support Syst..

[200]  Kody M. Powell,et al.  Optimal chiller loading in a district cooling system with thermal energy storage , 2013 .

[201]  Mukesh Singhal,et al.  Collaboration in multicloud computing environments: Framework and security issues , 2013, Computer.

[202]  Matthew Metheny,et al.  Security and Privacy in Public Cloud Computing , 2013, CloudCom 2013.

[203]  Philippe Lalanda,et al.  Autonomic Computing: Principles, Design and Implementation (Undergraduate Topics in Computer Science) , 2013 .

[204]  M. Elena Hernando,et al.  Naïve Bayesian Learning based Multi Agent Architecture for Telemedicine , 2013 .

[205]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[206]  Carlo Ghezzi,et al.  Self-adaptive software needs quantitative verification at runtime , 2012, CACM.

[207]  Jane Siegel,et al.  Cloud Services Measures for Global Use: The Service Measurement Index (SMI) , 2012, 2012 Annual SRII Global Conference.

[208]  Parastoo Mohagheghi,et al.  Towards a Domain-Specific Language to Deploy Applications in the Clouds , 2012, CLOUD 2012.

[209]  Jianhua Ma,et al.  Resources Collaborative Scheduling Model Based on Trust Mechanism in Cloud , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[210]  Krishnendu Roy,et al.  An SLA-based Framework for Estimating Trustworthiness of a Cloud , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[211]  Andrea Zisman,et al.  Proactive adaptation of service composition , 2012, 2012 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[212]  Marin Litoiu,et al.  Model-based adaptive DoS attack mitigation , 2012, 2012 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[213]  Rogério de Lemos,et al.  Evaluation of resilience in self-adaptive systems using probabilistic model-checking , 2012, 2012 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[214]  Dana Petcu,et al.  MODAClouds: A model-driven approach for the design and execution of applications on multiple Clouds , 2012, 2012 4th International Workshop on Modeling in Software Engineering (MISE).

[215]  Diego Zamboni,et al.  Learning CFEngine 3 - automated system administration for sites of any size , 2012 .

[216]  Fabienne Boyer,et al.  Verification of a self-configuration protocol for distributed applications in the cloud , 2012, SAC '12.

[217]  Berkant Barla Cambazoglu,et al.  A large-scale sentiment analysis for Yahoo! answers , 2012, WSDM '12.

[218]  Parastoo Mohagheghi,et al.  Towards CloudML, a Model-based Approach to Provision Resources in the Clouds , 2012 .

[219]  Frank Eliassen,et al.  Adaptable service composition for very-large-scale internet of things systems , 2011, MDS '11.

[220]  Max Mühlhäuser,et al.  Towards a Trust Management System for Cloud Computing , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[221]  Rocco Aversa,et al.  Proceedings of the Federated Conference on Computer Science and Information Systems pp. 973–980 ISBN 978-83-60810-22-4 An Analysis of mOSAIC ontology for Cloud Resources annotation , 2022 .

[222]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[223]  Ying Zou,et al.  Ontology-driven service composition for end-users , 2011, Service Oriented Computing and Applications.

[224]  Fabienne Boyer,et al.  Self-Configuration of Distributed Applications in the Cloud , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[225]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[226]  Opher Etzion,et al.  Event Processing in Action , 2010 .

[227]  Omar F. El-Gayar,et al.  Developing a Semantic Web-Based Distributed Model Management System: Experiences and Lessons Learned , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[228]  Barbara Weber,et al.  Investigating the Process of Process Modeling with Cheetah Experimental Platform , 2010, ER-POIS@CAiSE.

[229]  Anne H. H. Ngu,et al.  Semantic-Based Mashup of Composite Applications , 2010, IEEE Transactions on Services Computing.

[230]  Michael T. Goodrich,et al.  Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems , 2009, Algorithmica.

[231]  Ulf Norell,et al.  A Brief Overview of Agda - A Functional Language with Dependent Types , 2009, TPHOLs.

[232]  H. Lorenz Be-In-Be-Out payment systems for public transport , 2009 .

[233]  Muli Ben-Yehuda,et al.  The Reservoir model and architecture for open federated cloud computing , 2009, IBM J. Res. Dev..

[234]  Bradley R. Schmerl,et al.  Evaluating the effectiveness of the Rainbow self-adaptive system , 2009, 2009 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems.

[235]  Ladan Tahvildari,et al.  Self-adaptive software: Landscape and research challenges , 2009, TAAS.

[236]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[237]  Julie A. McCann,et al.  A survey of autonomic computing—degrees, models, and applications , 2008, CSUR.

[238]  Samir Chatterjee,et al.  A Design Science Research Methodology for Information Systems Research , 2008 .

[239]  David Luckham,et al.  The power of events - an introduction to complex event processing in distributed enterprise systems , 2002, RuleML.

[240]  Matthias Klusch,et al.  Semantic Web Service Description , 2008 .

[241]  Ricardo López Santillán,et al.  Lo bonito, limpio y seguro: usos del espacio de la Ciudad de México por una fracción de clase media , 2007 .

[242]  Andreas Voss,et al.  Fast-dm: A free program for efficient diffusion model analysis , 2007, Behavior research methods.

[243]  Harald C. Gall,et al.  Generation of Business Process Models for Object Life Cycle Compliance , 2007, BPM.

[244]  Richard S. Hall,et al.  iPOJO: an Extensible Service-Oriented Component Framework , 2007, IEEE International Conference on Services Computing (SCC 2007).

[245]  Minos N. Garofalakis,et al.  MashMaker: mashups for the masses , 2007, SIGMOD '07.

[246]  Michael T. Goodrich,et al.  On the Cost of Persistence and Authentication in Skip Lists , 2007, WEA.

[247]  Fabien Dagnat,et al.  Dependency Management in Software Component Deployment , 2007, Electron. Notes Theor. Comput. Sci..

[248]  Oscar Pastor,et al.  Model-driven architecture in practice - a software production environment based on conceptual modeling , 2007 .

[249]  Sam Supakkul,et al.  Representing Security Goals, Policies, and Objects , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[250]  Dong-Ryeol Shin,et al.  Multi-agent system based efficient healthcare service , 2006, 2006 8th International Conference Advanced Communication Technology.

[251]  Gene Tsudik,et al.  Authentication and integrity in outsourced databases , 2006, TOS.

[252]  Paul M. Taylor,et al.  Assessment of the potential impact of a reminder system on the reduction of diagnostic errors: a quasi-experimental study , 2006, BMC Medical Informatics Decis. Mak..

[253]  David Sinreich,et al.  An architectural blueprint for autonomic computing , 2006 .

[254]  Alberto RibesAbstract,et al.  Multi agent systems , 2019, Proceedings of the 2005 International Conference on Active Media Technology, 2005. (AMT 2005)..

[255]  Rene Saint-Germain,et al.  Information Security Management Best Practice Based on ISO/IEC 17799 , 2005 .

[256]  Timothy E. Lindquist,et al.  Automated support for service-based software development and integration , 2005, J. Syst. Softw..

[257]  Arvinder Kaur,et al.  Component Based Software Engineering , 2010 .

[258]  Salim Hariri,et al.  Autonomic Computing: An Overview , 2004, UPP.

[259]  Cesare Pautasso,et al.  From Web Service Composition to Megaprogramming , 2004, TES.

[260]  Peter Dayan,et al.  Q-learning , 1992, Machine Learning.

[261]  Albert Chan,et al.  Evaluating Provider Adherence in a Trial of a Guideline-Based Decision Support System for Hypertension , 2004, MedInfo.

[262]  Ying Chen,et al.  An efficient spatial publish/subscribe system for intelligent location-based services , 2003, DEBS '03.

[263]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[264]  T. Oinn,et al.  Soaplab - a unified Sesame door to analysis tools , 2003 .

[265]  Richard Y. Wang,et al.  Data quality assessment , 2002, CACM.

[266]  Emil C. Lupu,et al.  A Survey of Policy Specification Approaches , 2002 .

[267]  Thomas Gyger,et al.  EasyRide: Active Transponders for a Fare Collection System , 2001, IEEE Micro.

[268]  Premkumar T. Devanbu,et al.  Generating wrappers for command line programs: the Cal-Aggie Wrap-O-Matic project , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.

[269]  Dinesh C. Verma,et al.  Policy Based SLA Management in Enterprise Networks , 2001, POLICY.

[270]  Anind K. Dey,et al.  Understanding and Using Context , 2001, Personal and Ubiquitous Computing.

[271]  Jian Pei,et al.  Mining frequent patterns without candidate generation , 2000, SIGMOD '00.

[272]  Emil C. Lupu,et al.  Conflicts in Policy-Based Distributed Systems Management , 1999, IEEE Trans. Software Eng..

[273]  Christos T. Karamanolis,et al.  Elements of distributed algorithms-modeling and analysis with petri nets Wolfgang Reisig [Book review] , 1999, IEE Proceedings - Software.

[274]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[275]  Mahadev Satyanarayanan,et al.  Fundamental challenges in mobile computing , 1996, PODC '96.

[276]  Corporate Act-Net Consortium,et al.  The active database management system manifesto: a rulebase of ADBMS features , 1996, SGMD.

[277]  Jacques Ferber,et al.  Les Systèmes multi-agents: vers une intelligence collective , 1995 .

[278]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[279]  H R Warner,et al.  Innovation review: Iliad--a medical diagnostic support program. , 1994, Topics in health information management.

[280]  Morris Sloman,et al.  Policy Conflict Analysis in Distributed System Management , 1994 .

[281]  Tomasz Imielinski,et al.  Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.

[282]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993 .

[283]  Philip Wadler,et al.  Monads for functional programming , 1995, NATO ASI PDC.

[284]  Eugenio Moggi,et al.  Notions of Computation and Monads , 1991, Inf. Comput..

[285]  Umeshwar Dayal,et al.  The architecture of an active database management system , 1989, SIGMOD '89.

[286]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[287]  Donald P. Ballou,et al.  Modeling Data and Process Quality in Multi-Input, Multi-Output Information Systems , 1985 .

[288]  H. E. Pople,et al.  Internist-1, an experimental computer-based diagnostic consultant for general internal medicine. , 1982, The New England journal of medicine.