17,187 Hits in 5.9 sec

Correctness Ensuring Process Configuration: An Approach Based on Partner Synthesis [chapter]

Wil van der Aalst, Niels Lohmann, Marcello La Rosa, Jingxin Xu
2010 Lecture Notes in Computer Science  
2010) Correctness ensuring process configuration : an approach based on partner synthesis (extended version). BPM Center Report . Abstract.  ...  To address this problem, we present a new verification approach inspired by the "operating guidelines" used for partner synthesis.  ...  These notions are used in Sect. 3 to define process configuration formally. Section 4 presents the solution approach for correctness ensuring configuration.  ... 
doi:10.1007/978-3-642-15618-2_9 fatcat:qfa24zji4refdpws4q4zq4no2a

Ensuring correctness during process configuration via partner synthesis

Wil M.P. van der Aalst, Niels Lohmann, Marcello La Rosa
2012 Information Systems  
To address this problem, we present a novel verification approach inspired by the "operating guidelines" used for partner synthesis.  ...  Variants of the same process can be encountered within one organization or across different organizations.  ...  The main contribution of this paper is an innovative approach for ensuring correctness during process configuration.  ... 
doi:10.1016/ fatcat:kbjcykpdpjfbpay5nemf46oywu

Towards Distributed Configuration [chapter]

Alexander Felfernig, Gerhard E. Friedrich, Dietmar Jannach, Markus Zanker
2001 Lecture Notes in Computer Science  
Furthermore, we present a basic architecture comprising several configuration agents and propose an algorithm for cooperation between distributed configuration systems that ensures correctness and completeness  ...  In this paper we motivate the integration of several configurators and give a formal definition of the distributed configuration task based on a logic theory of configuration.  ...  Our introductory example is based on an application scenario provided by one of our industry partners (Section 2).  ... 
doi:10.1007/3-540-45422-5_15 fatcat:rpcnopqpzjgudnwjsemh45khai

Guest editorial network infrastructure configuration

Paul Anderson, Carl Gunter, Charles Kalmanek, Sanjai Narain, Jonathan Smith, Rajesh Talpade, Geoffrey Xie
2009 IEEE Journal on Selected Areas in Communications  
Downloaded on October 11, 2009 at 12:04 from IEEE Xplore. Restrictions apply.  ...  He has a background in the practical administration and configuration of large computing installations, and he is particularly interested in bridging the gap between theory and practice.  ...  • How does one formally verify requirements? • How does one synthesize correct configurations from requirements? • How does one diagnose and repair configuration errors?  ... 
doi:10.1109/jsac.2009.090401 fatcat:w7pyukzvezcjfgpcgahu6qasuu

Demonstrating topoS: Theorem-prover-based synthesis of secure network configurations

Cornelius Diekmann, Andreas Korsten, Georg Carle
2015 2015 11th International Conference on Network and Service Management (CNSM)  
For the first time, the complete transition from high-level security goals to both firewall and SDN configurations is presented.  ...  We present our tool topoS which automatically synthesizes low-level network configurations from high-level security goals. The automation and a feedback loop help to prevent human errors.  ...  Isabelle/HOL is an LCFstyle theorem prover; the correctness of derived facts is based on the correctness of a small inference kernel.  ... 
doi:10.1109/cnsm.2015.7367384 dblp:conf/cnsm/DiekmannKC15 fatcat:mblhjf4sv5aevpoxbutsur7coe

The Strategic Role of Business Intelligence in the Extended Enterprise: BI Configurations for Control Affordances in Outsourcing

Joseph W. Clark
2012 2012 45th Hawaii International Conference on System Sciences  
of outsourcing can be realized through different BI configurations.  ...  Drawing on a set of control theories from the organization theory, economics, and accounting domains, we explain that BI changes the possibilities for the extended enterprise by introducing new control  ...  Research approach based on BI elements At this point in the paper, an explanation of how we define and treat "business intelligence" is perhaps becoming overdue.  ... 
doi:10.1109/hicss.2012.587 dblp:conf/hicss/Clark12 fatcat:7rf255fb6vgqdllqx4dztj4h2i

A Formal Model for Configurable Business Process with Optimal Cloud Resource Allocation

Abderrahim Ait Wakrime, Souha Boubaker, Slim Kallel, Emna Guermazi, Walid Gaaloul
2021 Journal of universal computer science (Online)  
In addition, we propose to select optimal con- figurations based on Cloud resources cost. This approach allows to provide the designers with correct and cost-effective configuration decisions.  ...  In this work, we propose a formal model based on propositional satisfiability formula allowing to find correct elements configuration including resources allocation ones.  ...  propose an approach inspired by the "operating guidelines" used for partner synthesis for verifying that configurations do not lead to behavioral issues like deadlocks and livelocks.  ... 
doi:10.3897/jucs.70978 fatcat:fw7zujodmjgspezke4twsexuna

Configural Advantage in Global Markets

C. Samuel Craig, Susan P. Douglas
2000 Journal of International Marketing  
To correct this, a linear logit transformation is employed: (1) Ln [(Freq_all + .01)/(1 — Freq_all)]. The linear regressions presented in Phases 1 through 3 are based on small populations.  ...  Figure 3 deals with managerial thought processes and approaches to risk.  ... 
doi:10.1509/jimk. fatcat:enk7p5zgcrfwbmvcj4od2zu5mq

Provably Secure Networks: Methodology and Toolset for Configuration Management [article]

Cornelius Diekmann
2017 arXiv   pre-print
Our first tool guides the process of designing networks from scratch. Our second tool facilitates the analysis of existing iptables configurations. Combined, the two form a powerful toolset.  ...  Network administration is an inherently complex task, in particular with regard to security.  ...  In addition, I want to thank all of the people who have not been listed before but who commented on the early drafts of our papers and research and gave valuable feedback: Thank you Lars Noschinski, Manuel  ... 
arXiv:1708.08228v1 fatcat:ljgwja2k6jgunl5g45jnptqx5m

Square Kilometre Array Station Configuration Using Two-Stage Beamforming

Aziz Jiwani, Tim Colegate, Nima Razavi-Ghods, Peter J. Hall, Shantanu Padhi, Jan Geralt bij de Vaate
2013 Publications Astronomical Society of Australia  
This paper illustrates the effects of two-stage beamforming on sidelobes and effective area, for two representative station layouts (regular and irregular gridded tiles on an irregular station).  ...  Two-stage beamforming within stations can reduce SKA-low signal processing load and costs, but has not been previously explored for the irregular station layouts now favoured in radio astronomy arrays.  ...  Colegate is a recipient of an Australian Postgraduate Award and a Curtin Research Scholarship.  ... 
doi:10.1017/pas.2012.023 fatcat:pwec3723r5hxtjwynksar5yvry

Inter-organizational information sharing: The role of supply network configuration and partner goal congruence

Subhashish Samaddar, Satish Nargundkar, Marcia Daley
2006 European Journal of Operational Research  
These concepts are developed using a two-dimensional classification scheme consisting of varying levels of the volume of information shared and the strategic importance of this information in an organizational  ...  Theoretical arguments and analysis of secondary data are used to develop propositions regarding the association between SN configurations and IIS types, and the role of coordination structure in such associations  ...  Intensity of relationship Proposed IIS typology Based on a synthesis of the above literature we propose a two-dimensional matrix to classify IIS (Table 1) , which looks at both the level of the strategic  ... 
doi:10.1016/j.ejor.2005.01.059 fatcat:qvqhh3opbzb4vmxzhuwupucfde

A Configurational Approach to Servitization: Review and Research Directions

Marko Kohtamäki, Stephan C. Henneberg, Veronica Martinez, Koji Kimita, Heiko Gebauer
2019 Service Science  
framework to systematically review and analyze the identified configurational servitization studies.  ...  The present study aims to take stock of the servitization literature by utilizing the contingency theory of strategy as our foundational theory and the strategy-structure-environment approach as our primary  ...  However, such studies based on a linear algebra-based enquiry system do not allow for an understanding of the complex, asymmetric, nonlinear configurations among multiple constructs and their resulting  ... 
doi:10.1287/serv.2019.0245 fatcat:p5wzzuzdzzbkpjukzpvik65hoq

Supporting distributed product configuration by integrating heterogeneous variability modeling approaches

José A. Galindo, Deepak Dhungana, Rick Rabiser, David Benavides, Goetz Botterweck, Paul Grünbacher
2015 Information and Software Technology  
We further applied the approach to support the configuration of privacy settings in the Android ecosystem based on multiple variability models.  ...  Objective: We aim to support product configuration in software ecosystems based on several variability models with different semantics that have been created using different notations.  ...  Even though the concrete example as given here is fictitious, it is based on a real-world product line of an industry partner -a medium-sized vendor from the ERP domain [18] .  ... 
doi:10.1016/j.infsof.2015.02.002 fatcat:7vikneup4bbcpfy7cxolzktwmq

Total Synthesis, Structure Revision, and Absolute Configuration of (−)-Brevenal

Haruhiko Fuwa, Makoto Ebine, Andrea J. Bourdelais, Daniel G. Baden, Makoto Sasaki
2006 Journal of the American Chemical Society  
The key features of the synthesis involved (i) convergent assembly of the pentacyclic polyether skeleton based on our developed Suzuki-Miyaura coupling chemistry and (ii) stereoselective construction of  ...  The revised structure was finally validated by completing the first total synthesis of (−)-2, which also unambiguously established the absolute configuration of the natural product.  ...  Results and Discussion Synthesis Plan Our total synthesis of structure 1 originally proposed for brevenal was based on a retrosynthetic analysis as depicted in Scheme 1.  ... 
doi:10.1021/ja066772y pmid:17177450 pmcid:PMC2575246 fatcat:smh2ncvxibhefiljomk4b7nwbu

A Configurable Conversational Agent to Trigger Students' Productive Dialogue: A Pilot Study in the CALL Domain

Stergios Tegos, Stavros Demetriadis, Thrasyvoulos Tsiatsos
2013 International Journal of Artificial Intelligence in Education  
In this work, we present MentorChat, a dialogue-based system that employs a configurable and domain-independent conversational agent for triggering students' productive dialogue.  ...  After a system overview with an emphasis on design rationale and system architecture, we present a pilot study, where the agent is evaluated in the context of the computer-assisted language learning (CALL  ...  Based on the observations of VanLehn et al. (2007) , a student-agent tutorial dialogue can offer several benefits over a monologue, such as the detection and remediation of failed communication, the correction  ... 
doi:10.1007/s40593-013-0007-3 fatcat:r6ifxphlkfhvlbhrqgzuabb5au
« Previous Showing results 1 — 15 out of 17,187 results