ADVENTURE State of the Art

Process Model Translation

[1]
M. Weidlich, G. Decker, A. Großkopf, and M. Weske, “BPEL to BPMN: The myth of a straight-forward mapping,” On the Move to Meaningful Internet Systems: OTM 2008, pp. 265–282, 2008.

[2]
J. C. Recker and J. Mendling, “On the translation between BPMN and BPEL: Conceptual mismatch between process modeling languages,” in The 18th International Conference on Advanced Information Systems Engineering. Proceedings of Workshops and Doctoral Consortium, 2006, pp. 521–532.

[3]
A. Polyvyanyy, J. Vanhatalo, and H. Völzer, “Simplified computation and generalization of the refined process structure tree,” Web Services and Formal Methods, pp. 25–41, 2011.

[4]
J. Vanhatalo, H. Völzer, and J. Koehler, “The refined process structure tree,” Data & Knowledge Engineering, vol. 68, no. 9, pp. 793–818, 2009.

Forecasting & Simulation

[1]
F. J. Damerau, “A technique for computer detection and correction of spelling errors,” Communications of the ACM, vol. 7, no. 3, pp. 171–176, 1964.

Calculate Differences between traces, (also between traces of adapted processes).


[2]
T. M. McCarthy and S. L. Golicic, “Implementing collaborative forecasting to improve supply chain performance,” International Journal of Physical Distribution & Logistics Management, vol. 32, no. 6, pp. 431–454, Aug. 2002.

[3]
M. M. Helms, L. P. Ettkin, and S. Chapman, “Supply chain forecasting – Collaborative forecasting supports supply chain management,” Business Process Management Journal, vol. 6, no. 5, pp. 392–407, Dec. 2000.

[4]
W. M. P. van der Aalst, “Business Process Simulation Revisited,” in Enterprise and Organizational Modeling and Simulation, J. Barjis, Ed. Springer Berlin Heidelberg, 2010, pp. 1–14.

[5]
A. Rozinat, M. T. Wynn, W. M. P. van der Aalst, A. H. M. ter Hofstede, and C. J. Fidge, “Workflow simulation for operational decision support,” Data & Knowledge Engineering, vol. 68, no. 9, pp. 834–850, Sep. 2009.

Communication Technology

[1]
Shamsuzzoha, A. and Helo, P., “Virtual enterprise architectural framework: collaboration for small and medium enterprises,” in Proceedings of the ASME 2013 International Manufacturing Science and Engineering Conference (MSEC2013), Madison, Wisconsin, USA, 2013, pp. 1–8.

[2]
Hao, Y., Shamsuzzoha, A. and Helo, P., “Designing of cloud-based virtual factory information system,” in Proceedings of the 23rd International Conference on Flexible Automation & Intelligent Manufacturing (FAIM2013), Porto, Portugal, 2013, pp. 415–426.

[3]
Shamsuzzoha, A., Abels, S. and Helo, P. , “Adaptive virtual enterprise process management: perspective of cloud-based data storage,” in Proceedings of the 15th International Conference on Enterprise Information Systems (ICEIS 2013), Angers Loire Valley, France, 2013, pp. 88–94.

[4]
R. Hans, S. Zöller, S. Abels, A. Miede, and R. Steinmetz, “Enabling Collaboration in Virtual Manufacturing Enterprises with Cloud Computing,” in Proceedings of the 19th Americas Conference on Information Systems (AMCIS 2013), Chicago, 2013, pp. 1–10.

[5]
R. Hans, D. Dahlen, S. Zöller, D. Schuller, and U. Lampe, “Enabling Virtual Manufacturing Enterprises with Cloud Computing – An Analysis of Criteria for the Selection of Database as a Service Offers,” in Advances in Sustainable and Competitive Manufacturing Systems, Porto, 2013, pp. 427–438.

[6]
A. Barros, G. Decker, M. Dumas, and F. Weber, “Correlation Patterns in Service-Oriented Architectures,” in Fundamental Approaches to Software Engineering, vol. 4422, M. Dwyer and A. Lopes, Eds. Springer Berlin / Heidelberg, 2007, pp. 245–259.

[7]
JCloud Community, “JClouds.” .

JClouds is an open source Java library. The API allows to create portable cloud applications, which can be connected to different cloud providers without changing any code.


[8]
J. Wagener, O. Spjuth, E. L. Willighagen, and J. E. Wikberg, “XMPP for cloud computing in bioinformatics supporting discovery and invocation of asynchronous web services,” BMC Bioinformatics, vol. 10, no. 1, p. 279.

XMPP is a standardized technology that uses XML messages for communication. It supports arbitrary structured messages, the management of communication partners that know each other and can communicate with each other. It supports file transfer and even VoIP calls. It is near-real time, secure and there are simple solutions to circumvent the problem of local firewalls. Most of the clients and servers are open-source and can easily be extended with a plugin system. The server systems (example: OpenFire) are open source, can be installed as distributed server systems on all operating systems. Working with XMPP from programming code is very easy as there are client libraries available for all popular programming languages and frameworks.

XMPP is not only the technology behind known IM services like Facebook-Chat, GTalk and Jabber but also in medical, research and business systems for communication of computer systems. (citations needed)

Processes and Compliance

[1]
W. W. Eckerson, Performance Dashboards: Measuring, Monitoring, and Managing Your Business. John Wiley & Sons, 2010.

[2]
L. T. Ly, S. Rinderle-Ma, D. Knuplesch, and P. Dadam, “Monitoring Business Process Compliance Using Compliance Rule Graphs,” in On the Move to Meaningful Internet Systems: OTM 2011, R. Meersman, T. Dillon, P. Herrero, A. Kumar, M. Reichert, L. Qing, B.-C. Ooi, E. Damiani, D. C. Schmidt, J. White, M. Hauswirth, P. Hitzler, and M. Mohania, Eds. Springer Berlin Heidelberg, 2011, pp. 82–99.

[3]
M. Weidlich, H. Ziekow, J. Mendling, O. Günther, M. Weske, and N. Desai, “Event-based monitoring of process execution violations,” in Business Process Management, Springer, 2011, pp. 182–198.

[4]
L. T. Ly, F. M. Maggi, M. Montali, S. Rinderle-Ma, and W. M. P. van der Aalst, “A Framework for the Systematic Comparison and Evaluation of Compliance Monitoring Approaches,” in Enterprise Distributed Object Computing Conference (EDOC), 2013 17th IEEE International, 2013, pp. 7–16.

[5]
D. Grigori, F. Casati, M. Castellanos, U. Dayal, M. Sayal, and M.-C. Shan, “Business Process Intelligence,” Computers in Industry, vol. 53, no. 3, pp. 321–343, Apr. 2004.

[6]
WenAn Tan, Weiming Shen, Lida Xu, Bosheng Zhou, and Ling Li, “A Business Process Intelligence System for Enterprise Process Performance Management,” IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 38, no. 6, pp. 745–756, Nov. 2008.

[7]
S. Kabicher-Fuchs, J. Mangler, and S. Rinderle-Ma, “Experience Breeding in Process-Aware Information Systems,” in Advanced Information Systems Engineering, C. Salinesi, M. C. Norrie, and Ó. Pastor, Eds. Springer Berlin Heidelberg, 2013, pp. 594–609.

[8]
Shamsuzzoha, A., Ferreira, F., Azevedo, A. and Helo, P., “Business Process Monitoring and Management in Virtual Enterprise through Interactive User Interface Layer,” in Proceedings of the 23rd International Conference on Flexible Automation & Intelligent Manufacturing (FAIM2013), Porto, Portugal, 2013, pp. 451–464.

[9]
T. Hildebrandt and S. Rinderle-Ma, “Toward a Sonification Concept for Business Process Monitoring,” in 19th International Conference on Auditory Display (ICAD 2013), Lodz, Poland, 2013, pp. 323–330.

[10]
T. Hildebrandt, “Towards Enhancing Business Process Monitoring with Sonification,” in Intl. Workshop on Theory and Applications of Process Visualization (TAProViz 2013), Berlin, Germany, 2013.

[11]
P. Grefen, N. Mehandjiev, G. Kouvas, G. Weichhart, and R. Eshuis, “Dynamic business network process management in instant virtual enterprises,” Comput. Ind., vol. 60, no. 2, pp. 86–103, Feb. 2009.

[12]
M. P. Papazoglou, “The Challenges of Service Evolution,” in Proceedings of the 20th international conference on Advanced Information Systems Engineering, Berlin, Heidelberg, 2008, pp. 1–15.

[13]
M. Reichert and T. Bauer, “Supporting Ad-Hoc Changes in Distributed Workflow Management Systems,” in On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, vol. 4803, R. Meersman and Z. Tari, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 150–168.

[14]
S. Rinderle, M. Reichert, and P. Dadam, “Flexible Support of Team Processes by Adaptive Workflow Systems,” Distributed and Parallel Databases, Jul-2004. [Online]. Available: http://www.springerlink.com/content/k54776285582p21g/. [Accessed: 01-Feb-2013].

[15]
B. Weber, M. Reichert, W. Wild, and S. Rinderle, “Balancing Flexibility and Security in Adaptive Process Management Systems,” Nov-2005. [Online]. Available: http://www.springerlink.com/content/d94fx02fwpjxpama/. [Accessed: 01-Feb-2013].

[16]
B. Weber, M. Reichert, W. Wild, and S. Rinderle-Ma, “Providing Integrated Life Cycle Support in Process-Aware Information Systems,” Int’l Journal of Cooperative Information Systems (IJCIS), Mar-2009. [Online]. Available: http://dbis.eprints.uni-ulm.de/269/. [Accessed: 01-Feb-2013].

[17]
M. Weske, “Workflow Management Systems: Formal Foundation, Conceptual Design, Implementation Aspects,” 2000.

[18]
M. Reichert, S. Rinderle, U. Kreher, and P. Dadam, “Adaptive Process Management with ADEPT2,” in Proceedings of the 21st International Conference on Data Engineering, Washington, DC, USA, 2005, pp. 1113–1114.

[19]
M. Reichert, P. Dadam, and T. Bauer, “Dealing with Forward and Backward Jumps in Workflow Management Systems,” Informatik - Forschung und Entwicklung, Apr-2004. [Online]. Available: http://www.springerlink.com/content/qg2pxeyb7kqgy2bp/. [Accessed: 01-Feb-2013].

[20]
J. Pflug and S. Rinderle-Ma, “Dynamic Instance Queuing in Process-Aware Information Systems,” in ACM 28th Symposium on Applied Computing, USA, 2013.

[21]
M. Leitner, J. Mangler, and S. Rinderle-Ma, “Definition and Enactment of Instance-spanning Process Constraints,” in Web Information System Engineering - WISE 2012 - 13th International Conference, 2012.

[22]
J. Mangler and S. Rinderle-Ma, “Rule-Based Synchronization of Process Activities,” in 2011 IEEE 13th Conference on Commerce and Enterprise Computing (CEC), 2011, pp. 121–128.

[23]
M. Leitner, J. Mangler, and S. Rinderle-Ma, “SPRINT- Responsibilities: Design and Development of Security Policies in Process-aware Information Systems,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 2, no. 4, pp. 1–24, Dec. 2011.

[24]
G. Stuermer, J. Mangler, and E. Schikuta, “Building a modular service oriented workflow engine,” in Service-Oriented Computing and Applications (SOCA), 2009 IEEE International Conference on, 2010, pp. 1–4.

[25]
J. Mangler, G. Stuermer, and E. Schikuta, “Cloud Process Execution Engine-Evaluation of the Core Concepts,” Arxiv preprint arXiv:1003.3330, 2010.

[26]
M. Jensen and N. Gruschka, “Privacy Against the Business Partner: Issues for Realizing End-to-End Confidentiality in Web Service Compositions,” in Database and Expert Systems Application, 2009. DEXA’09. 20th International Workshop on, 2009, pp. 117–121.

[27]
M. Montali, M. Pesic, W. M. P. van der Aalst, F. Chesani, P. Mello, and S. Storari, “Declarative specification and verification of service choreographiess,” ACM Trans. Web, vol. 4, no. 1, pp. 1–62, 2010.

[28]
W. van der Aalst, A. Mooij, C. Stahl, and K. Wolf, “Service Interaction: Patterns, Formalization, and Analysis,” in Formal Methods for Web Services, 2009, pp. 42–88.

[29]
S. Rinderle, A. Wombacher, and M. Reichert, “On the Controlled Evolution of Process Choreographies.,” in Int’l Conf. on Data Engineering, 2006, p. 124.

[30]
S. Goedertier and J. Vanthienen, “Designing Compliant Business Processes with Obligations and Permissions,” in Business Process Management 2006 Workshops, 2006, pp. 5–14.

[31]
W. M. P. V. der Aalst, “Modeling and Analyzing Interorganizational Workflows,” Application of Concurrency to System Design, International Conference on, p. 262, 1998.

process type level / inter-process coordination formal description on how interorganizational workflows are defined and correct (soundness)


[32]
J. Küster, K. Ryndina, and H. Gall, “Generation of Business Process Models for Object Life Cycle Compliance,” in Int’l Conference Business Process Management, 2007, pp. 165–181.

[33]
S. Rinderle, A. Wombacher, and M. Reichert, “Evolution of Process Choreographies in DYCHOR,” in Int’l Conf. on Cooperative Information Systems, Springer, 2006, pp. 273–290.

[34]
S. Rinderle, A. Wombacher, and M. Reichert, “Evolution of Process Choreographies in DYCHOR,” in Proc. CoopIS’06, 2006, pp. 273–290.

[35]
C. Giblin, S. Müller, and B. Pfitzmann, “From Regulatory Policies to Event Monitoring Rules: Towards Model-Driven Compliance Automation,” IBM Research GmbH, Research Report RZ-3662, 2006.

[36]
D. Fötsch, E. Pulvermüller, and W. Rossak, “Modeling and Verifying Workflow-based Regulations,” in Workshop on Regulations Modelling and their Validation and Verification, 2006.

[37]
H. Foster, S. Uchitel, J. Magee, and J. Kramer, “Model-Based Analysis of Obligations in Web Service Choreography,” in Advanced Int’l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services, 2006, p. 149.

[38]
Z. Milosevic, A. Josang, T. Dimitrakos, and M. A. Patton, “Discretionary Enforcement of Electronic Contracts,” in Enterprise Computing, 2002.

[39]
R. A. Botha and J. H. P. Eloff, “Separation of duties for access control enforcement in workflow environments,” IBM Systems Journal, vol. 40, no. 3, pp. 666–682, 2001.

[40]
C. Heinlein, “Workflow and Process Synchronization with Interaction Expressions and Graphs,” in Proceedings of the 17th International Conference on Data Engineering, Washington, DC, USA, 2001, pp. 243–252.
process level inter-process dependencies / different activities inter-workflow coordination problem process synchronisation with specific operators (e.g. using mutual exclusion)

[41]
L. Ly, S. Rinderle, and P. Dadam, “Semantic Correctness in Adaptive Process Management Systems,” in Business Process Management, 2006, vol. 02, pp. 193–208.

[42]
H. Davulcu, M. Kifer, C. R. Ramakrishnan, and I. V. Ramakrishnan, “Logic Based Modeling and Analysis of Workflows,” in Int’l Conference Principles of Database Systems, 1998, pp. 25–33.

[43]
B. Weber, M. Reichert, and S. Rinderle-Ma, “Change Patterns and Change Support Features - Enhancing Flexibility in Process-Aware Information Systems.,” Data and Knowledge Engineering, vol. 66, no. 3, pp. 438–466, 2008.

[44]
K. Namiri and N. Stojanovic, “Pattern-Based Design and Validation of Business Process Compliance,” in Int’ OTM Conferences 2007, Part I, 2007, vol. 4803, pp. 59–76.

[45]
A. K. Ghose and G. Koliadis, “Auditing Business Process Compliance,” Faculty of Informatics, University of Wollongong, 2007.

[46]
S. Rinderle-Ma and M. Leitner, “On Evolving Organizational Models without Loosing Control on Authorization Constraints in Web Service Orchestrations,” presented at the IEEE Conference on Electronic Commerce, 2010.

[47]
K. Wolf, “Does My Service Have Partners?,” in Transactions on Petri Nets and Other Models of Concurrency II, 2009, pp. 152–171.

[48]
R. A. Frosch and N. E. Gallopoulos, “Strategies for manufacturing,” Scientific American, vol. 261, no. 3, pp. 144–152, 1989.

[49]
A. Marchetti, Sarbanes-Oxley Ongoing Compliance Guide. Parson Consulting, 2007.

[50]
W. van der Aalst, H. de Beer, and B. van Dongen, “Process Mining and Verification of Properties: An Approach based on Temporal Logic,” in Int’l OnTheMove Conferences, 2005, vol. 3761, pp. 130–147.

SME and Business Aspects

[1]
Kartha, C.P., “A comparison of ISO 9000:2000 quality system standards, QS9000, ISO/TS 16949 and Baldrige criteria,” The TQM Magazine (Emerald Group Publishing Limited), vol. 16, no. Number 5: 336, 2004.

[2]
T. U. Mark Gershon, “Choosing Which Process Improvement Methodology to Implement.” Dec-2010.

[3]
D. C. G. David P. Fowler, “PPAP 4th Edition,” Jun-2006.

[4]
L. C. Thisse, “Advanced quality planning: a guide for any organization,” Quality progress, vol. 31, no. 2, pp. 73–77, 1998.

[5]
Rojas, Evelyn, Barros, Ana, Azevedo, Américo, and Batocchio, Antonio, “Business Model Development for Virtual Enterprises,” presented at the 13th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2012, Bournemouth, UK,, 2012, pp. 624–634.

This work aims at identifying the key business model elements necessary to build a
business model for virtual enterprises. Consequently, we formulate our research
question as follows: What are the relevant elements for the business model development
of a virtual enterprise? This study followed two steps. First, we reviewed the literature
on both areas of business model development) and virtual enterprises, in order to identify the business model elements suitable for virtual enterprises. Second, we carried out a pilot case study to verify if the business model elements identified are considered in practice. The case study selected is a virtual enterprise of five members formed in the Northern Region of Portugal to explore a customer need.


[6]
S. Schulte, D. Schuller, R. Steinmetz, and S. Abels, “Plug-and-Play Virtual Factories,” IEEE Internet Computing, vol. 16, no. 5, pp. 78–82, 2012.

[7]
Shamsuzzoha, A. and Helo, P., “Virtual Enterprise Management to Enhance the Manufacturing Process Collaboration,” in Proceedings of the 22nd International Conference on Flexible Automation and Intelligent Manufacturing (FAIM2013), Helsinki, Finland, 2012.

[8]
Georgi Pavlov, Atanas Manafov, Irena Pavlova, and Velimir Manafov, “An ‘Adventurous’ Approach towards Virtual Entrepreneurship,” in Proceedings of Fifth International Conference for Entrepreneurship, Innovation and Regional Development ICEIRD 2012, Sofia, Bulgaria, 2012.

[9]
S. K. Fixson, “Product architecture assessment: a tool to link product, process, and supply chain design decisions,” Journal of Operations Management, vol. 23, no. 3–4, pp. 345–369, 2005.

[10]
A. Chandrashekar and P. B. Schary, “Toward the virtual supply chain: the convergence of IT and organization,” International Journal of Logistics Management, The, vol. 10, no. 2, pp. 27–40, 1999.

[11]
M. Taylor and A. Murphy, “SMEs and e-business,” Journal of Small Business and Enterprise Development, vol. 11, no. 3, pp. 280–289, 2004.

[12]
V. Corvello and P. Migliarese, “Virtual forms for the organization of production: A comparative analysis,” International Journal of Production Economics, vol. 110, no. 1–2, pp. 5–15, 2007.

[13]
D. Chen and N. Daclin, “Barriers driven methodology for enterprise interoperability,” Establishing The Foundation Of Collaborative Networks, pp. 453–460, 2007.

[14]
V. Barba-Sánchez, M. P. Martínez-Ruiz, and A. I. Jimenez-Zarco, “Drivers, benefits and challenges of ICT adoption by small and medium sized enterprises (SMEs): A literature review,” Problems and Perspectives in Management, vol. 5, no. 1, pp. 104–115, 2007.

[15]
R. van Hoek, “Clockspeed: Winning Industry Control in the Age of Temporary Advantage,” Supply Chain Management: An International Journal, vol. 5, no. 3, p. 162, 2000.

[16]
R. A. Frosch and N. E. Gallopoulos, “Strategies for manufacturing,” Scientific American, vol. 261, no. 3, pp. 144–152, 1989.

Sensors

[1]
R. Conforti, M. La Rosa, G. Fortino, A. H. M. ter Hofstede, J. Recker, and M. Adams, “Real-time risk monitoring in business processes: A sensor-based approach,” Journal of Systems and Software, vol. 86, no. 11, pp. 2939–2965, Nov. 2013.

[2]
R. Hans, M. Zahn, U. Lampe, and A. Papageorgiou, “Energy-efficient Web Service Invocation on Mobile Devices: The Influence of Compression and Parsing,” in Proceedings of the 2nd International Conference on Mobile Services (MS 2013), Stanta Clara, 2013, pp. 1–6.

[3]
S. Zöller, C. Vollmer, M. Wachtel, R. Steinmetz, and A. Reinhardt, “Data Filtering for Wireless Sensor Networks Using Forecasting and Value of Information (accepted for publication),” in Proceedings of the 38th IEEE Conference on Local Computer Networks (LCN), 2013.

[4]
S. Zöller, M. Wachtel, F. Knapp, and R. Steinmetz, “Going All the Way -- Detecting and Transmitting Events with Wireless Sensor Networks in Logistics (accepted for publication).,” in Proceedings of the 38th IEEE Conference on Local Computer Networks (LCN), 2013.

[5]
P. Kinney, “Zigbee technology: Wireless control that simply works,” in Communications design conference, 2003, vol. 2.

[6]
S. Zöller, A. Reinhardt, M. Wachtel, and R. Steinmetz, “Integrating Wireless Sensor Nodes and Smartphones for Energy-Efficient Data Exchange in Smart Environments,” in Proceedings of the 5th IEEE PerCom International Workshop on Smart Environments and Ambient Intelligence (SENAmI), San Diego, CA, USA, 2013, pp. 652–657.

[7]
S. Zöller, A. Reinhardt, and R. Steinmetz, “Distributed Data Filtering in Logistics Wireless Sensor Networks Based on Transmission Relevance,” presented at the The 37th IEEE Conference on Local Computer Networks (LCN 2012).

[8]
D. Culler, D. Estrin, and M. Srivastava, “Guest editors’ introduction: overview of sensor networks,” Computer, vol. 37, no. 8, pp. 41–49, 2004.

[9]
M. Tubaishat and S. Madria, “Sensor networks: an overview,” IEEE potentials, vol. 22, no. 2, pp. 20–23, 2003.

[10]
L. Ruiz-Garcia, P. Barreiro, J. Rodriguez-Bermejo, and J. I. Robla, “Review. Monitoring the intermodal, refrigerated transport of fruit using sensor networks,” Spanish Journal of Agricultural Research, vol. 5, no. 2, pp. 142–156, 2007.

[11]
R. Jedermann, R. Schouten, A. Sklorz, W. Lang, and O. van Kooten, “Linking keeping quality models and sensor systems to an autonomous transport supervision system,” in Cold Chain Management–2nd international Workshop, Bonn, 2006, vol. 8.

[12]
H. Edgar, J. Callawy, and E. H. Callaway, “Wireless sensor networks: Architectures and Protocols,” Boca Raton, Florida: CRC Press, vol. 200, pp. 1–40, 2004.

[13]
R. Jedermann and W. Lang, “Mobile java code for embedded transport monitoring systems,” in Proceedings of the Embedded World Conference, Poing, 2006, pp. 771–777.

[14]
A. Reinhardt, D. Christin, M. Hollick, J. Schmitt, P. Mogre, and R. Steinmetz, “Trimming the Tree: Tailoring Adaptive Huffman Coding to Wireless Sensor Networks,” in 7th European Conference on Wireless Sensor Networks (EWSN 2010), 2010, pp. 33–48.

[15]
R. Jedermann and W. Lang, “The Minimum Number of Sensors–Interpolation of Spatial Temperature Profiles in Chilled Transports,” in 6th European Conference on Wireless Sensor Networks (EWSN), 2009, pp. 232–246.

[16]
C. Hua and T. S. . Yum, “Optimal routing and data aggregation for maximizing lifetime of wireless sensor networks,” Networking, IEEE/ACM Transactions on, vol. 16, no. 4, pp. 892–903, 2008.

[17]
K. Sohraby, D. Minoli, and T. F. Znati, Wireless sensor networks: technology, protocols, and applications. Wiley-Blackwell, 2007.

[18]
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” Communications Magazine, IEEE, vol. 40, no. 8, pp. 102–114, 2002.

[19]
R. Jedermann, J. Gehrke, M. Becker, C. Behrens, E. Morales-Kluge, O. Herzog, and W. Lang, “Transport scenario for the intelligent container,” Understanding Autonomous Cooperation and Control in Logistics, pp. 393–404.

[20]
R. Verdone, D. Dardari, G. Mazzini, and A. Conti, Wireless sensor and actuator networks: technologies, analysis and design. Academic Press, 2008.

[21]
A. Dada and F. Thiesse, “Sensor applications in the supply chain: the example of quality-based issuing of perishables,” in Proceedings of the 1st international conference on The internet of things, 2008, pp. 140–154.

[22]
C. Mascolo and M. Musolesi, “SCAR: context-aware adaptive routing in delay tolerant mobile sensor networks,” in Proceedings of the 2006 international conference on Wireless communications and mobile computing, 2006, pp. 533–538.

Semantic

[1]
S. Schulte, U. Lampe, J. Eckert, and R. Steinmetz, “LOG4SWS. KOM: Self-Adapting Semantic Web Service Discovery for SAWSDL,” in 2010 6th World Congress on Services, 2010, pp. 511–518.

[2]
S. Schulte, J. Eckert, N. Repp, and R. Steinmetz, “An approach to evaluate and enhance the retrieval of Semantic Web services,” in Service Systems and Service Management, 2008 International Conference on, 2008, pp. 1–7.

[3]
D. Martin, M. Burstein, D. Mcdermott, S. Mcilraith, M. Paolucci, K. Sycara, D. L. Mcguinness, E. Sirin, and N. Srinivasan, “Bringing semantics to web services with owl-s,” World Wide Web, vol. 10, no. 3, pp. 243–277, 2007.

[4]
M. Klusch, P. Kapahnke, and I. Zinnikus, “Sawsdl-mx2: A machine-learning approach for integrating semantic web service matchmaking variants,” in Web Services, 2009. ICWS 2009. IEEE International Conference on, 2009, pp. 335–342.

[5]
D. Fensel, Enabling Semantic Web Services: The Web Service Modeling Ontology. Springer-Verlag New York Inc, 2007.

[6]
S. Schulte, N. Repp, D. Schuller, and R. Steinmetz, “From Web Service Policies to Automatic Deviation Handling: Supporting Semantic Description of Reactions to Policy Violations,” in Semantic Computing, 2009. ICSC’09. IEEE International Conference on, 2009, pp. 312–317.

[7]
D. Schuller, A. Papageorgiou, S. Schulte, J. Eckert, N. Repp, and R. Steinmetz, “Process reliability in service oriented architectures,” in Digital Ecosystems and Technologies, 2009. DEST ’09. 3rd IEEE International Conference on, 2009, pp. 606–611.

[8]
D. Kourtesis and I. Paraskakis, “Web service discovery in the FUSION semantic registry,” in Business Information Systems, 2008, pp. 285–296.

[9]
E. Cimpian, H. Meyer, D. Roman, A. Sirbu, N. Steinmetz, S. Staab, and I. Toma, “Ontologies and Matchmaking,” Semantic Service Provisioning, pp. 19–54, 2008.

[10]
R. Akkiraju, “Semantic Web Services,” Semantic Web Services: Theory, Tools, and Applications, pp. 191–216, Chapter IX, 2007.

[11]
K. Sivashanmugam, J. A. Miller, A. P. Sheth, and K. Verma, “Framework for semantic web process composition,” International Journal of Electronic Commerce, vol. 9, no. 2, pp. 71–106, 2005.

[12]
P. Plebani and B. Pernici, “Urbe: Web service retrieval based on similarity evaluation,” Knowledge and Data Engineering, IEEE Transactions on, vol. 21, no. 11, pp. 1629–1642, 2009.

[13]
M. Klusch, P. Kapahnke, and I. Zinnikus, “Hybrid adaptive web service selection with sawsdl-mx and wsdl-analyzer,” The Semantic Web: Research and Applications, pp. 550–564, 2009.

[14]
K. Verma and A. Sheth, “Semantically annotating a web service,” Internet Computing, IEEE, vol. 11, no. 2, pp. 83–85, 2007.

[15]
J. Farrell, I. B. M. . Lausen, and D. Innsbruck, “Semantic annotations for wsdl and xml schema,” 2007. [Online]. Available: http://www.w3.org/TR/2007/REC-sawsdl-20070828/.

[16]
L. Clement, A. Hately, C. von Riegen, T. Rogers, and others, “UDDI Version 3.0. 2,” 2004. [Online]. Available: http://www.uddi.org/pubs/uddi_v3.htm.

Negotiation

[1]
Ralph Vigne, Juergen Mangler, Erich Schikuta, and Stefanie Rinderle-Ma, “WS-Agreement based Service Negotiation in a Heterogeneous Service Environment,” in Proceedings of the IEEE International Conference on Service Oriented Computing & Applications (SOCA 2012), Taipei, Taiwan, 2012.

[2]
G. Dudek and H. Stadtler, “Negotiation-based collaborative planning between supply chains partners,” European Journal of Operational Research, vol. 163, no. 3, pp. 668–687, 2005.

[3]
J. (Roger) Jiao, X. You, and A. Kumar, “An agent-based framework for collaborative negotiation in the global manufacturing supply chain network,” Robotics and Computer-Integrated Manufacturing, vol. 22, no. 3, pp. 239–255, Jul. 2006.

[4]
J. M. Zaha, A. Barros, M. Dumas, and A. Hofstede, “Let’s Dance: A Language for Service Behavior Modeling,” in On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE, vol. 4275, R. Meersman and Z. Tari, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 145–162.

[5]
W. M. P. van der Aalst, N. Lohmann, P. Massuthe, C. Stahl, and K. Wolf, “Multiparty Contracts: Agreeing and Implementing Interorganizational Processes,” The Computer Journal, vol. 53, no. 1, pp. 90–106, Jan. 2010.

Process Design and Optimization

[1]
D. Schuller, Ulrich Lampe, J. Eckert, R. Steinmetz, and S. Schulte, “Cost-driven Optimization of Complex Service-based Workflows for Stochastic QoS Parameters,” in 2012 IEEE 19th International Conference on Web Services, Waikiki, Hawaii, 2012, pp. 66–74.

Addresses QoS aware Service Composition considering stochastic QoS attributes


[2]
A. Hallerbach, T. Bauer, and M. Reichert, “Capturing variability in business process models: the Provop approach,” Journal of Software Maintenance and Evolution: Research and Practice, vol. 22, no. 6–7, pp. 519–546, 2010.

[3]
S. L. Mansar and H. A. Reijers, “Best practices in business process redesign: validation of a redesign framework,” Computers in Industry, vol. 56, no. 5, pp. 457–471, 2005.

[4]
W. M. . Van Der Aalst, M. Dumas, F. Gottschalk, A. H. . Ter Hofstede, M. La Rosa, and J. Mendling, “Correctness-preserving configuration of business process models,” in Proceedings of the Theory and practice of software, 11th international conference on Fundamental approaches to software engineering, 2008, pp. 46–61.

[5]
W. M. P. Van Der Aalst, H. A. Reijers, A. Weijters, B. F. Van Dongen, A. K. Alves de Medeiros, M. Song, and H. M. W. Verbeek, “Business process mining: An industrial application,” Information Systems, vol. 32, no. 5, pp. 713–732, 2007.