Learn More
We present a framework that we are developing to better solve several critical issues that arise when interactive systems are extended to large displays. These issues include slow reaction times, difficulties with high numbers of concurrent interactions or user inputs, and problems that occur when combining several aspects of visualizations. In part, these(More)
We present an integration of several interface metaphors and interface components that are designed to support users interacting on large tabletop displays. These techniques— RNT, Storage bins, Interface Currents, Sticky Boards, and Sticky Notes—help solving the orientation problem on horizontal displays, allow to organize content on the interface in a(More)
In Service-oriented Architectures, business processes can be realized by composing loosely coupled services. If services in the Internet of Services with comparable functionalities but varying quality levels are available at different costs on service marketplaces, service requesters can decide, which services from which service providers to select. The(More)
Resource allocation and resource planning, especially in a SOA and Grid environment, become crucial. Particularly, in an environment with a huge number of workflow consumers requesting a decentralized cross-organizational workflow, performance evaluation and execution-management of service-oriented workflows gain in importance. The need for an effective and(More)
The past decade has seen an increasing interest in IT outsourcing as it promises companies many economic benefits. In recent years, IT paradigms, such as Software-as-a-Service or Cloud Computing using third-party services, are increasingly adopted. Current studies show that IT security and data privacy are the dominant factors affecting the perceived risk(More)
Web services enable the collaboration across organizational boundaries and, thus, are a powerful technology for implementing global Service-oriented Architectures, i.e., the Internet of Services. Despite typical security mechanisms such as message encryption, attackers can create detailed profiles of service consumers, providers, and market places by merely(More)