Learn More
One can observe that more and more companies are focusing on their core compenetency and are outsourcing parts or even complete business processes to service providers. Service Level Agreements (SLAs) are used as a contractual basis to define certain non-functional properties (e.g. response time) a service has to provide. To determine the SLA of a business(More)
Software as a service (SaaS) providers exploiteconomies of scale by offering the same instance of an applicationto multiple customers typically in a single-instance multitenantarchitecture model. Therefore the applications must bescalable, multi-tenant aware and configurable. In this paper weshow how the services in a service-oriented SaaS applicationcan be(More)
Adaptable pervasive flows are dynamic workflows situated in the real world that modify their execution in order to adapt to changes in the execution environment. This requires on the one hand that a flow must be context-aware and on the other hand that it must be flexible enough to allow an easy and continuous adaptation. In this paper we propose a set of(More)
A critical aspect for pervasive computing is the possibility to discover and use process knowledge at run time depending on the specific context. This can be achieved by using an underlying service-based application and exploiting its features in terms of dynamic service discovery, selection, and composition. Pervasive process fragments represent a(More)
The construction kit principle is a well-known software engineering paradigm to foster reusability. In case the construction kit principle is applied at runtime it is even a way to implement flexibility. In today’s workflow technology the construction kit principle is applied, e.g. in in hierarchical modeling approaches using sub processes. In this(More)
Cloud computing enables cost-effective, self-service, and elastic hosting of applications in the Cloud. Applications may be partially or completely moved to the Cloud. When hosting or moving the database layer to the Cloud, challenges such as avoidance of disclosure of critical data have to be faced. The main challenges are handling different levels of(More)