A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang
|
|
- Joseph Atkins
- 8 years ago
- Views:
Transcription
1 A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang ABSTRACT In recent years, many large organizations have used the Role Based Access Control (RBAC) Workflow Management System (WFMS) to manage their daily workflow. It allows the flow of work between individuals and/or departments to be clearly defined and tracked. Some of these workflow processes require human interactions, such as review/approval processes. If the specific reviewers or approvers are temporarily not available, because of sick days, business travel, vacation, etc., then these processes will be stuck in user accounts for days and may cost the company thousands or millions of dollars. This paper introduces a new temporary redirect method Acting and By- Direction, and demonstrates that this method is more efficient than the existing workflow redirect method. Keywords Workflow, Workflow Model, Workflow Management System, WFMS, Role Based Access Control, RBAC, temporary routing path, Flexible Process, Acting and By-Direction 1. INTRODUCTION Workflow Management Systems (WFMS) can be described as a technology that uses electronic systems to manage, monitor, and automate business processes. It allows the flow of work between individuals and/or departments to be clearly defined and tracked. Most of the workflow processes are developed with Role Based Access Control (RBAC) for security purposes [5]. Within a RBAC WFMS, every user is associated with one or more roles. The user s assigned roles indicate to the workflow system this user s privileges level and grants only permitted access to this user [4]. The simple and more understandable roles are often combined with organization roles (positions), departments, divisions, locations and more. Within organizations, and thus in workflow applications, the concept of a hierarchy of people/roles is prevalent. People are placed in one or more units such as department, divisions, or groups and they have different bosses, at different hierarchical levels [5]. There are also role hierarchies and permissions involved in the RBAC WFMS model [2]. Figure 1 shows a typical organizational structure. This structure clearly defines a chain of command (role hierarchies) within the organization, where the top-most role is the first in command, then the next in command is down one level, and so on. Workflow designers can use roles to specify the routing chains for the workflow process types as the example shows in Table 1. Figure 1. Organizational Structure example Table 1. Workflow processes specification example Process Types Routing Chains Employees=>Supervisors=>Managers Timecard Approval =>Time Keeping =>Accounting Employees=>Supervisors=>H.R. Maternity Leave =>Insurance =>Accounting Sick Leave (>5 Employees=>Medical Center days) =>Security=>Supervisors Purchase Order Employees=>Finance=>Purchasing Approval =>Accounting Business Travel Employees=>Supervisors=>Managers Reimbursements =>Finance=>Accounting Employees=>Supervisors=>Managers Educational =>Directors=>H.R.=>Finance Reimbursements Accounting A workflow process type is defined as a unique workflow process identifier that contains a unique routing chain. A routing chain is a list of pre-defined routing paths for a particular workflow process type, with a specific order. There are two basic types of order, sequential and parallel, as shown in Figures 2 and 3 respectively. A routing chain can be designed using sequential order, parallel order or the combination of both. Sequential order allows the workflow process instance to route to one node at a time. Figure 2 demonstrates the transitional states diagram for a sequential order workflow process instance. This instance of a workflow process type strictly follows the routing chain, starting from the first available node, then waiting for a response. If the response is a subset of {rejected, disapproved, timeout}, then the SB2-T1-1
2 workflow process instance stops and reaches an End state. If the response is in the subset of {accepted, approved}, the RBAC WFMS routes the workflow process instance to the next available node. 2. CURRENT WORKFLOW TEMPORARY REDIRECT METHOD In [1], the multi-agent based workflow management system provides some flexibility by guiding the end users to build valid workflow specifications at run time. It distributes the workload to the end users and allows them to redirect their workflow process instances. The workflow designer does not need to be aware of all of the semantics, all services offered by these workflow processes, or all steps or rules involved in the business process. The path can be virtually specified, since the physical path will be determined during the execution of workflow process instances. The creation of such models will still involve analysis of the actual processes in the organization, interviews with the users, etc., but it does not have to be as detailed as in the traditional workflows case. [1] This model provides a redirect method, but also increases the number of operations. Figure 2. Sequential order states graph A routing chain with parallel order allows the RBAC WFMS to route the workflow process instance to all nodes simultaneously. Figure 3 demonstrates the transitional states diagram for the parallel order workflow process instance. This workflow process instance reaches the End state only if all nodes have responded, or if a timeout occurs. For example, a theoretical company that has 10,000 employees is divided into 200 departments. Each department has about fifty people and three or four divisions. Supervisors are the division heads and managers are the department heads. In order for employees to get their paychecks, they are required to submit a timecard for approval each week. According to company policy, timecards have to be approved by a list of authorized personnel as shown in Table 2. Timecards are due before 2:00 p.m. every Monday. Late timecards are deferred to the next week. Table 2. Timecard Approval Personnel Example Sequence number Description 1 Submitter => any employee 2 Approver 1 => supervisor 3 Approver 2 => manager 4 Approver 3 => human resource 5 Approver 4 => time keeping 6 Approver 5 => accounting department Figure 3. Parallel order states graph Regardless of which order the routing chain follows, if one node is temporarily not available, then the workflow process instance is stuck until it reaches the timeout limit. Once the timeout occurs, the workflow process instance ends as incomplete. The end users have to resubmit the workflow process in order to complete the work. The existing workflow system provides a temporary redirect method described in Section 2. Section 3 introduces the new temporary redirect method. Section 4 demonstrates that the new redirect method is more efficient than the existing temporary redirect method. Section 5 discusses some related work. Section 6 concludes the paper and suggests future work. In this example, the workflow designers create a workflow process type: timecard approval process. This workflow process type has a unique sequential routing chain as shown in Table 2. During runtime, as soon as an employee submits a timecard approval process, a timecard approval process instance is created. Each workflow process instance has its individual routing path instance. The RBAC WFMS uses the submitter s information and follows the routing chain to determine the routing path for the particular workflow process instance. In this case, the RBAC WFMS uses the submitter s department and division to find the submitter s supervisor and routes the timecard approval process instance to the supervisor. Once the submitter s supervisor approves the timecard, the RBAC WFMS then uses the supervisor s information to find the appropriate manager, and so on. Since there are 200 departments and each department has three to four supervisors, there are a total of 600 to 800 supervisors and 200 managers. There is a good chance that one or more supervisors or managers will be temporarily out of the office. Assume that Department 001 s manager is on a business trip for two weeks. During these two weeks, Employee X is acting as SB2-T1-2
3 the manager of Department 001 for everyday business needs. However, the RBAC WFMS has no way to know that the manager of Department 001 is on travel, since he is a valid user in the system. According to the existing workflow redirect method [1], the end users (employees) can change the routing path for their workflow process instance at runtime. To complete the timecard approval process on time, all department 001 employees (about 50 of them) have to manually change their routing path to Employee X for every process instance. The total number of affected process instances for one workflow process type (timecard approval process) is: 50 process instances x 2 weeks = 100 process instances. End users must manually make the same routing path changes 100 times. If it takes at least one operation to change one workflow process instance s routing path, then 100 process instances require at least 100 operations to change the process instance s routing path. This example does not include Department 001 manager s involvement in other typical workflow process types (sick leave approval process, travel reimbursement process, educational reimbursement process, purchase requisition process, etc.). There could be hundreds or thousands of workflow process instances affected by this one person. Thus, the existing workflow redirect method requires at lease n operations (OP) to redirect n workflow process instances (WFPI). 3. THE NEW TEMPORARY REDIRECT METHOD: ACTING AND BY-DIRECTION This section introduces the Acting and By-Direction redirect method. The basic approach is to provide the temporary routing path before runtime. The key idea is to allow the unavailable node to specify a temporary substitute node to perform its duty. For instance, in the timecard approval example, if the RBAC WFMS allows the Department 001 manager to assign Employee X as his temporary substitute before he leaves, then all of his employees timecards will be automatically routed to Employee X. In fact, his employees do not need to perform any extra operation to change the instances of the routing chain for their timecards. Furthermore, when he returns from the trip, he can remove the temporary substitution. This new method, Acting and By-Direction, significantly reduces the total number of operations for redirecting the workflow process instances. Acting and By-direction can be described as authorization (permission) delegation. A delegator (a user or role that originally owns a set of permissions) authorizes a chosen person or role (the delegatee) to temporarily perform the workflow activities.. During the delegation, the delegator remains the authority to remove the delegation. There are two types of delegations possible in the RBAC Acting and By-Direction WFMS model: Acting A delegator (role/user) assigns all delegator s permissions to a specific delegatee (role/user). By-Direction A delegator (role/user) assigns a delegator s permission to a delegatee (role/user) for a specific workflow process. These Acting and By-Direction assignments are made before the workflow process instances are generated. During execution, the RBAC WFMS finds the delegatees and routes the workflow process instances to them. 3.1 Acting Assignments Acting assignment is a temporary assignment to an Actingdelegatee from the unavailable Acting-delegator. The Actingdelegatee temporarily takes over all the workflow process instances assignments from the unavailable Acting-delegator. As soon as an Acting assignment is initiated, all workflow process instances that are currently in the Acting-delegator s account are routed to the Acting-delegatee. In addition, any future workflow process instances generated during this Acting assignment period will also be routed to the Acting-delegatee. These temporarily redirected workflow process instances are known as Actinginstances. The RBAC WFMS tracks every workflow process Acting-instance and its history. When the Acting assignment is removed, all Acting-instances revert to the state they were in before the Acting assignment occurred Requirements for Acting Assignment Authorized users who have privileges to initiate Acting assignments are the Acting-delegators or workflow administrators. There is only one Acting assignment for one Acting-delegator. If the Acting-delegators are not available to authorize the Acting assignment, a workflow administrator should be able to initiate the Acting assignment for them. An Acting-delegator is permitted to assign only one Acting assignment. If they want to initiate another acting assignment, they have to remove the current Acting assignment first, and then reassign the Acting assignment. An Acting-delegatee can be defined as either a single user or a unique role. An Acting-delegatee must be different than the Acting-delegator. Furthermore, the Acting assignment permits a recursive relationship to enhance flexibility. As a result, a delegator can also be a delegatee for other acting assignments. Table 3 lists four different Acting assignments. Since recursive relationships are permitted, the final Acting-delegatee for User001 is User005 instead of User002. The RBAC WFMS routes all User001 workflow process instances to User005 instead of User002. Actually, in this example, all Acting-delegators (User001, User003, User002 and User004) have Acting assignments that point to the same final Acting-delegatee: User005. Therefore, all workflow processes instances for these Acting-delegators are eventually routed to User005. Table 3. Recursive Acting Assignments Example A Acting ID Acting-Delegators Acting-Delegatees 1 User001 User002 2 User003 User004 3 User002 User003 4 User004 User005 Example B (shown in Table 4) computes the same result as Example A: all Acting assignments are delegated to User005. SB2-T1-3
4 However, there are differences between these two examples. The key difference is that the Acting assignment in Example A indirectly delegates all the workflow process instances to User005. Example B directly assigns all the workflow process instances to User005. Each Acting assignment is an individual event, and can be removed at any time. If the Acting ID 2 assignment is removed from both examples A and B at the same time, then the resulting routing paths are different. In example A, both User001 and User002 are routed to User003 instead of User005; only User004 remains unchanged. In example B, all Acting-delegatees remain the same. Table 4. Recursive Acting Assignments Example B Acting ID Acting-Delegators Acting-Delegatees 1 User001 User005 2 User003 User005 3 User002 User005 4 User004 User By-Direction Assignments By-Direction assignments are similar to Acting assignments. The major distinction is that a By-Direction assignment only affects one specific workflow process type, whereas an Acting assignment affects all workflow process types associated with the delegator. Each By-Direction assignment must have a process type associated with it Requirements for By-Direction Assignment The authorized users who have the privileges to initiate By- Direction assignments are the By-Direction-delegators or workflow administrators. To initiate the By-Direction assignment, the By-Direction-delegator is required to select a workflow process type. In addition, the By-Direction-delegator must belong to the routing chain of the selected workflow process type. The By-Direction-delegator is permitted to assign only one By-Direction assignment for a workflow process type. Similar to the Acting requirements, a By-Direction-delegatee can also be defined as either a single user or a unique role. The By- Direction-delegatee must be different than the By-Directiondelegator within the same workflow process type. Furthermore, the By-Direction assignment permits a recursive relationship to enhance flexibility. As a result, a delegator can also be a delegatee from other By-Direction assignments for the identical workflow process type. Table 5 shows a recursive relationship from User003 (By-Direction ID 2) to User005 (By- Direction ID 4) for the Process Type ID BBX3. The RBAC WFMS routes all User003 s workflow process instances that are related to BBX3 to User005. Table 5. By-Direction Assignments Example By-Direction ID Process Type ID By-Direction Delegators By-Direction Delegatees 1 A001 User001 User002 2 BBX3 User003 User CC User002 User003 4 BBX3 User004 User005 5 BBX4 User002 User Combination of Acting and By-Direction Acting assignment is best if the delegator wants all workflow process types under his/her account temporarily transferred to another user/role. By-Direction assignment is best if only a few workflow process types need to be temporarily handled by someone else. Combining Acting and By-Direction assignments means that all temporarily redirected assignments can be accomplished under any circumstance Requirements for Acting and By-Direction Assignments By-Direction assignment always has a higher priority than Acting assignment. This means that if there is a By-Direction assignment and an Acting assignment for the same workflow process instance, the WFMS always accepts the By-Direction assignment and ignores the Acting assignment. When combining Acting and By-Direction assignments, two requirements from Sections and must be modified to avoid a circular relationship (endless loop): An Acting-delegatee must be different than the Actingdelegators and the By-Direction-delegators. The By-Direction-delegatee must be different than the By-Direction-delegators within the same workflow process type and the Acting-delegators. Figure 4 shows an example of Acting and By-Direction assignments. In this example, there are two By-Direction assignments (B1 and B2) and four Acting assignments (A1, A2, A3 and A4). B2 and A2 have the same delegator but different delegatees. So, when employees from department 021, division 011 start the RC_WPT_1 workflow process instances, the RBAC WFMS will find A2 and route the workflow process instances to the supervisor of department 021, division 012. If the same group of employees starts the RC_WPT_2 workflow process instances, the RBAC WFMS will use B2 instead of A2 and route the workflow process instances to the manager of department 021. Figure 4 Examples of Acting and By-Direction Assignments SB2-T1-4
5 3.4 Integrate with the RBAC WFMS Engine So far, we have presented the Acting and By-Direction redirect method and defined the Acting and By-Direction assignments. It is also necessary for the RBAC WFMS engine to recognize the Acting and By-Direction assignments and use them. In general, the RBAC WFMS engine routing process is described in following steps. 1. Submitter (end user) starts workflow process instance; 2. WFMS finds next_user based on the routing chain; 3. WFMS routes the process instance to next_user; 4. For parallel order, repeat steps 2 and 3 until the end of the routing chain is reached, then wait for all users responses. If all responses or a timeout is received, go to step 8. For sequential order, go to step 5; 5. Wait for user response; 6. If response is in the subset of {Accepted, Approved}, then go to step 7; 7. Check to see whether this is the last user in the routing chain. If yes, go to step 8; else go to step 2; 8. End the workflow process instance. The Acting and By-Direction functions can be inserted between steps 2 and 3 to find the actual routing path. Figure 5 shows the high-level Acting and By-Direction function. Figure 5. Acting and By-Direction Function As shown in step 2, the RBAC WFMS uses the routing chain to find the next user. This step is a required step for any existing RBAC WFMS. As soon as the next user is found, the Acting and By-Direction function is activated. The Acting and By-Direction function checks if a By-Direction assignment exists. If yes, it finds the By-Direction delegatee, replaces the next user with the By-Direction delegatee and continues with step 3. However, if no By-Direction assignment exists, it checks if there is an Acting assignment for the next user. If yes, it replaces the next user with the Acting-delegatee; else, the next user remains the same as it was in step 2. Using this technique, the RBAC WFMS engine always checks for Acting and By-Direction before it routes to the next user. Whether Acting and By-Direction assignments exist or not, the RBAC WFMS engine structure never changes. 4. COMPARING THE ACTING AND BY- DIRECTION METHOD TO THE EXISTING METHOD The scope of this paper includes proving that the Acting and By- Direction method is a faster way to temporarily redirect the RBAC workflow process. To determine if it is faster, the number of operations (OPs) used by the current redirect method (current) is compared to the Acting and By-Direction redirect method (new). We assume the following are valid: node Na within the routing chain of a workflow process type is temporarily unavailable for a period of time t. During t, node Nb will be temporarily substituted for Na. Within t, there are n workflow process instances (WFPIs) being generated and routed to Nb. Then the following is valid: new: since within t means from t_start until t_end, therefore 1 OP to generate Acting and By-Direction assignment at t_start + 1 OP to remove Acting and By-Direction assignment at t_end Total = 2 OPs from t_start to t_end current: Thus, the current workflow redirect method requires at lease n operations (OPs) to redirect n workflow process instances (WFPI). (from Section 2) Result: new: n WFPIs require 2 OPs to redirect n WFPIs from Na to Nb within t current: n WFPIs require n OPs to redirect n WFPIs from Na to Nb within t 5. RELATED WORK Many research projects [7, 8, 9, 10] are also focused on increasing the flexibility of the workflow management system. Combi and Pozzi [3] propose a workflow system that manages temporal aspects via a temporal database system, composed of a temporal layer on top of a relational DBMS. The adoption of a temporal database system will increase efficiency by allowing some additional features, such as the management of process model evolution and the selection of executing agents via a workload balance over time. Performance issues related to routing design are addressed in [6], which establishes a new routing control algorithm, Adaptive Routing Control (ARC), to find the efficient and flexible path of workflow. 6. CONCLUSION Using the result from Section 4, we can conclude that Acting and By-Direction is n/2 times faster than the current workflow redirect method when n>2. There is no way to determine the exact number of workflow process instances (n) that will be affected by the delegator before runtime. The worse case is that no workflow process instance is affected by the delegator. In that case, the Acting and By-Direction redirect method wastes two extra operations. That is a fairly small number compared to everyday flow of work between individuals. SB2-T1-5
6 In the near future, our interests are to make the Acting and By- Direction redirect method an independent, add-on workflow component. The focus will be the compatibility with the existing popular workflow management systems. It will increase the flexibility of all workflow management systems. Acting and By- Direction can be used in combination with the existing workflow redirect method. 7. REFERENCES [1] Deng, S.G., Yu, Z., Wu, Z.H., and Huang, L.C., Database theory, technology and applications (DTTA): Enhancement of workflow flexibility by composing activities at run-time, Proceedings of the 2004 ACM symposium on Applied computing, Mar [2] Botha, R.A., Eloff, J.H.P., Designing role hierarchies for access control in workflow systems, Computer Software and Applications Conference, PP , Oct [3] Combi, C., Pozzi, G., Database theory, technology and applications (DTTA): Architectures for a temporal workflow management system, Proceedings of the 2004 ACM symposium on Applied Computing, Mar [4] Dridi, F., Muschall, B., and Pernul, G., Administration of BBAC System, 2004 Big Island, Hawaii p. Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7, 70187b, Jan [5] Chaari, S., Biennier, F., Ben Amar, C., and Favrel, J., An authorization and access control model for workflow, First International Symposium on Control, Communications and Signal Processing, PP , [6] Yang, S.J., Design issues and performance improvements in routing strategy on the internet workflow, International Journal of Network Management, Vol. 13 Issue 5, Sept [7] Iwaihara, M., Jiang, H., and Kambayashi, Y., Organizational engineering (OE): An integrated model of workflows, e-contracts and solution implementation, Proceedings of the 2004 ACM symposium on Applied computing, Mar [8] Wainer, J., Bezerra, F., and Barthelmess, P., Coordination models, languages and applications (CM): Tucupi: a flexible workflow system based on overridable constraints, Proceedings of the 2004 ACM symposium on Applied computing, Mar [9] Zirpins, C., Lamersdorf, W., and Baier, T., Service composition: Flexible coordination of service interaction patterns, Proceedings of the 2nd international conference on Service oriented computing, Nov [10] Chinn, S., and Madey, G., Temporal representation and reasoning for workflow in engineering design change review Engineering Management, IEEE Transactions on Engineering Management, Volume: 47, Issue: 4, PP: , Nov SB2-T1-6
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
More informationManaging Approvals in Expenses. Understanding Approvals
Managing Approvals in Expenses Managers are often the approvers for expense transactions. The major concerns of a manager would typically include policy compliance and fiscal responsibility. Managers may
More informationCS 565 Business Process & Workflow Management Systems
CS 565 Business Process & Workflow Management Systems Professor & Researcher Department of Computer Science, University of Crete & ICS-FORTH E-mail: dp@csd.uoc.gr, kritikos@ics.forth.gr Office: K.307,
More informationClick one of the links below to navigate to the corresponding section: General. Employee Related Questions Manager Related Questions
Click one of the links below to navigate to the corresponding section: General General Employee Related Questions Manager Related Questions What is the process for completing and submitting absence requests
More informationApprovals Management Engine R12 (AME) Demystified
Approvals Management Engine R12 (AME) Demystified By Sujay Kamath Prisio Technologies Introduction In today s world, many organizations are in need of implementing proper controls in place for faster transaction
More informationDistributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
More informationProcess Automation in Semiconductor Manufacturing: Issues and Solutions
Process Automation in Semiconductor Manufacturing: Issues and Solutions Nauman Chaudhry, James Moyne, and Elke A. Rundensteiner Department of Electrical Engineering and Computer Science University of Michigan,
More informationComponent visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu
More informationWorkflow Management Standards & Interoperability
Management Standards & Interoperability Management Coalition and Keith D Swenson Fujitsu OSSI kswenson@ossi.com Introduction Management (WfM) is evolving quickly and expolited increasingly by businesses
More informationDependability in Web Services
Dependability in Web Services Christian Mikalsen chrismi@ifi.uio.no INF5360, Spring 2008 1 Agenda Introduction to Web Services. Extensible Web Services Architecture for Notification in Large- Scale Systems.
More informationSo today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
More information1.. This UI allows the performance of the business process, for instance, on an ecommerce system buy a book.
* ** Today s organization increasingly prompted to integrate their business processes and to automate the largest portion possible of them. A common term used to reflect the automation of these processes
More informationTask Placement in a Cloud with Case-based Reasoning
Task Placement in a Cloud with Case-based Reasoning Eric Schulte-Zurhausen and Mirjam Minor Institute of Informatik, Goethe University, Robert-Mayer-Str.10, Frankfurt am Main, Germany {eschulte, minor}@informatik.uni-frankfurt.de
More informationAN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING
AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING Gurpreet Singh M.Phil Research Scholar, Computer Science Dept. Punjabi University, Patiala gurpreet.msa@gmail.com Abstract: Cloud Computing
More informationImplementation of Role Based Access Control on Encrypted Data in Hybrid Cloud
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:g.ganorkar7691@gmail.com Contact: 8600200142
More informationBusiness Process Management with @enterprise
Business Process Management with @enterprise March 2014 Groiss Informatics GmbH 1 Introduction Process orientation enables modern organizations to focus on the valueadding core processes and increase
More informationPersonalized e-learning a Goal Oriented Approach
Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,
More informationMODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: tyu1@uci.edu Jun-Jang Jeng IBM T.J. Watson
More informationAttack graph analysis using parallel algorithm
Attack graph analysis using parallel algorithm Dr. Jamali Mohammad (m.jamali@yahoo.com) Ashraf Vahid, MA student of computer software, Shabestar Azad University (vahid.ashraf@yahoo.com) Ashraf Vida, MA
More information16.1 MAPREDUCE. For personal use only, not for distribution. 333
For personal use only, not for distribution. 333 16.1 MAPREDUCE Initially designed by the Google labs and used internally by Google, the MAPREDUCE distributed programming model is now promoted by several
More informationSigMo Platform based approach for automation of workflows in large scale IT-Landscape. Tarmo Ploom 2/21/2014
SigMo Platform based approach for automation of workflows in large scale IT-Landscape 2/21/2014 Agenda Starting situation Problem Solution variants Friction of project based approach Platform approach
More informationMicrosoft Dynamics GP Release. Workflow Administrator s Guide
Microsoft Dynamics GP Release Workflow Administrator s Guide December 10, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information
More informationLinking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,
More informationLoad Balancing on a Grid Using Data Characteristics
Load Balancing on a Grid Using Data Characteristics Jonathan White and Dale R. Thompson Computer Science and Computer Engineering Department University of Arkansas Fayetteville, AR 72701, USA {jlw09, drt}@uark.edu
More informationThe Virtual Assistant for Applicant in Choosing of the Specialty. Alibek Barlybayev, Dauren Kabenov, Altynbek Sharipbay
The Virtual Assistant for Applicant in Choosing of the Specialty Alibek Barlybayev, Dauren Kabenov, Altynbek Sharipbay Department of Theoretical Computer Science, Eurasian National University, Astana,
More informationSUGGEST AN INTELLIGENT FRAMEWORK FOR BUILDING BUSINESS PROCESS MANAGEMENT
SUGGEST AN INTELLIGENT FRAMEWORK FOR BUILDING BUSINESS PROCESS MANAGEMENT Almutairi Raed, Dr. Djamal Ziani Department of Information Systems College of Computers and Information Sciences King Saud University,
More informationCOMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova
COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova Computer automation of business processes: The paper presents the Workflow management system as an established technology for automation
More informationCONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences
CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences Manos Papagelis 1, 2, Dimitris Plexousakis 1, 2 and Panagiotis N. Nikolaou 2 1 Institute of Computer Science,
More informationHigh-Mix Low-Volume Flow Shop Manufacturing System Scheduling
Proceedings of the 14th IAC Symposium on Information Control Problems in Manufacturing, May 23-25, 2012 High-Mix Low-Volume low Shop Manufacturing System Scheduling Juraj Svancara, Zdenka Kralova Institute
More informationSEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.
More informationJournal of Information Technology Management SIGNS OF IT SOLUTIONS FAILURE: REASONS AND A PROPOSED SOLUTION ABSTRACT
Journal of Information Technology Management ISSN #1042-1319 A Publication of the Association of Management SIGNS OF IT SOLUTIONS FAILURE: REASONS AND A PROPOSED SOLUTION MAJED ABUSAFIYA NEW MEXICO TECH
More informationAnalysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments
Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Branko Radojević *, Mario Žagar ** * Croatian Academic and Research Network (CARNet), Zagreb, Croatia ** Faculty of Electrical
More informationA Business Process Driven Approach for Generating Software Modules
A Business Process Driven Approach for Generating Software Modules Xulin Zhao, Ying Zou Dept. of Electrical and Computer Engineering, Queen s University, Kingston, ON, Canada SUMMARY Business processes
More informationTRANSMAT Trusted Operations for Untrusted Database Applications
TRANSMAT Trusted Operations for Untrusted Database s Dan Thomsen Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113, USA email: thomsen@sctc.com Abstract This paper presents a technique
More informationRole-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
More informationIDENTIFYING PATTERNS OF WORKFLOW DESIGN RELYING ON ORGANIZATIONAL STRUCTURE ASPECTS
IDENTIFYING PATTERNS OF WORKFLOW DESIGN RELYING ON ORGANIZATIONAL STRUCTURE ASPECTS Lucinéia Heloisa Thom, Cirano Iochpe Instituto de Informática, Universidade Federal do Rio Grande do Sul, Av.Bento Conçalves,
More informationEnhanced concept of the TeamCom SCE for automated generated services based on JSLEE
Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE Thomas Eichelmann 1, 2, Woldemar Fuhrmann 3, Ulrich Trick 1, Bogdan Ghita 2 1 Research Group for Telecommunication Networks,
More informationService Level Agreements based on Business Process Modeling
Service Level Agreements based on Business Process Modeling Holger Schmidt Munich Network Management Team University of Munich, Dept. of CS Oettingenstr. 67, 80538 Munich, Germany Email: schmidt@informatik.uni-muenchen.de
More informationSIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 mdw@cs.berkeley.edu 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
More informationContents. Note: Feature commands and/or functionality may vary dependent on the telephone equipment you choose to use with this product.
Contents Address Book 4 Anonymous Call Rejection 5 Call Block 5 Call Forward 6-7 Call Hold 7 Call Log 8 Call Return 8 Call Waiting 9 Caller ID 10 Outbound Caller ID Block 10 Outbound Caller ID Deactivation
More informationHow To Balance A Single Failure With A Single Power Of Two (Sus)
Ranking Service Units for Providing and Protecting Highly Available Services with Load Balancing A. Kanso, F. Khendek, A. Hamou-Lhadj Electrical and Computer Engineering Department Concordia University
More informationThe Role of Computers in Synchronous Collaborative Design
The Role of Computers in Synchronous Collaborative Design Wassim M. Jabi, The University of Michigan Theodore W. Hall, Chinese University of Hong Kong Abstract In this paper we discuss the role of computers
More informationCassandra A Decentralized, Structured Storage System
Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922
More informationBusiness-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
More informationDevelopment of Content Management System with Animated Graph
Development of Content Management System with Animated Graph Saipunidzam Mahamad, Mohammad Noor Ibrahim, Rozana Kasbon, and Chap Samol Abstract Animated graph gives some good impressions in presenting
More informationRole Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
More informationOn the Security of Delegation in Access Control Systems
On the Security of Delegation in Access Control Systems Qihua Wang, Ninghui Li, and Hong Chen Department of Computer Science, Purdue University {wangq, ninghui, chen131}@cs.purdue.edu Abstract. Delegation
More informationIMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
More informationA Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
More informationComplexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
More informationREQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR
REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR Ulrich Bestfleisch, Joachim Herbst DaimlerChrysler AG Research and Technology Data and Process Management
More informationVerifying Semantic of System Composition for an Aspect-Oriented Approach
2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach
More informationBranch-and-Price Approach to the Vehicle Routing Problem with Time Windows
TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents
More informationA logical approach to role-based access control in a distributed environment
A logical approach to role-based access control in a distributed environment Université Paul Sabatier, IRIT COPS - February 2008 Motivation Express access control policies in distributed systems. Take
More informationIssues in Information Systems Volume 15, Issue I, pp. 52-60, 2014
ORGANIZATIONALLY AGNOSTIC BUSINESS MODELING: HOW TO MAKE BUSINESS ARCHITECTURE ADAPTABLE TO ORGANIZATIONAL CHANGE Carlos E. Martinez, The MITRE Corporation, cmartinez@mitre.org Sheila A. Cane, The MITRE
More informationFleet Size and Mix Optimization for Paratransit Services
Fleet Size and Mix Optimization for Paratransit Services Liping Fu and Gary Ishkhanov Most paratransit agencies use a mix of different types of vehicles ranging from small sedans to large converted vans
More informationProcess Modeling and Process Improvement. Process Modeling
Process Modeling and Process Improvement Process Modeling Business processes are complex, and require people with various skills and abilities to work in a cooperative fashion Processes will not be efficient
More informationAutomated QoS Support for Multimedia Disk Access
Automated QoS Support for Multimedia Disk Access Joel C. Wu, Scott Banachowski, and Scott A. Brandt Computer Science Department, University of California, Santa Cruz ABSTRACT This paper describes the AutoQoS
More informationA RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
More informationwww.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015
www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle Partner Agenda 1. Introduction 2. Overview of ERP security architecture 3. Key ERP security models 4. Building and executing
More informationSupporting Software Development Process Using Evolution Analysis : a Brief Survey
Supporting Software Development Process Using Evolution Analysis : a Brief Survey Samaneh Bayat Department of Computing Science, University of Alberta, Edmonton, Canada samaneh@ualberta.ca Abstract During
More informationDEVELOPMENT OF A WORKFLOW APPLICATION FOR VEHICLE FLEET MANAGEMENT: A CASE STUDY OF GUINNESS NIGERIA PLC
DEVELOPMENT OF A WORKFLOW APPLICATION FOR VEHICLE FLEET MANAGEMENT: A CASE STUDY OF GUINNESS NIGERIA PLC 1,* John B. Oladosu, 2 Oludare Opaleye & 3 Olusayo D. Fenwa Computer Science and Engineering Department,
More informationProcess Modeling using BPMN 2.0
Process Modeling using BPMN 2.0 This chapter provides a brief overview of Business Process Modeling Notation (BPMN) concepts with particular emphasis on the BPMN 2.0 additions. In addition, it describes
More informationWorkflow Access Control from a Business Perspective
Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID
More informationCONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
More informationA Test Case Generator for the Validation of High-Level Petri Nets
A Test Case Generator for the Validation of High-Level Petri Nets Jörg Desel Institut AIFB Universität Karlsruhe D 76128 Karlsruhe Germany E-mail: desel@aifb.uni-karlsruhe.de Andreas Oberweis, Torsten
More informationBIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective
BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016
More informationA Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
More informationIntegrating Databases, Objects and the World-Wide Web for Collaboration in Architectural Design
Integrating Databases, Objects and the World-Wide Web for Collaboration in Architectural Design Wassim Jabi, Assistant Professor Department of Architecture University at Buffalo, State University of New
More informationeach college c i C has a capacity q i - the maximum number of students it will admit
n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i
More informationA Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
More informationLecture 7: Concurrency control. Rasmus Pagh
Lecture 7: Concurrency control Rasmus Pagh 1 Today s lecture Concurrency control basics Conflicts and serializability Locking Isolation levels in SQL Optimistic concurrency control Transaction tuning Transaction
More informationDifferent Approaches using Change Impact Analysis of UML Based Design for Software Development
Different Approaches using Change Impact Analysis of UML Based Design for Software Development Ali Tariq Bhatti 1, Muhammad Murad Haider 2, Zill-e-Subhan 2 1 North Carolina A&T State University, Greensboro
More informationFinal Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
More informationAn Overview of Distributed Databases
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview
More informationSARA: A tool for service levels aware contracts
SARA: A tool for service levels aware contracts Mario Alessandro Bochicchio, Antonella Longo, Sara Giacovelli Department of Engineering for Innovation University of Salento Lecce, Italy mario.bochicchio@unisalento.it,
More informationPlease let us know if you need anything. Our customer service number is 1-866-311-5900. We re always happy to help.
Dear Valued Customer, We are proud to welcome you to the EvenLink s Crystal Clear Digital Phone service. Our network reliability, customer support and value pricing are a great combination. We appreciate
More informationMicrosoft Dynamics GP 2010
Microsoft Dynamics GP 2010 Workflow Administrator s Guide March 30, 2010 Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and
More informationLarge Scale Order Processing through Navigation Plan Concept
Large Scale Order Processing through Navigation Plan Concept João Eduardo Ferreira 1, Osvaldo K. Takai 1, Kelly R. Braghetto 1, and Calton Pu 2 1 Department of Computer Science, University of São Paulo
More informationReduce Medical Loss Ratio by Straight-Through-Processing with Oracle Health Insurance Components ORACLE WHITE PAPER JULY 2015
Reduce Medical Loss Ratio by Straight-Through-Processing with Oracle Health Insurance Components ORACLE WHITE PAPER JULY 2015 Table of Contents Introduction 1 Business Agility 2 Risk-Based Intervention
More informationMRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems Na Zhao 1, Min Chen 2, Shu-Ching Chen 1, Mei-Ling Shyu 3 1 Distributed Multimedia Information System Laboratory
More informationPhase Balancing of Distribution Systems Using a Heuristic Search Approach
Phase Balancing of Distribution Systems Using a Heuristic Search Approach Lin, Chia-Hung*, Kang, Meei-Song**, Chuang, Hui-Jen**, and Ho, Chin-Ying** *National Kaohsiung University of Applied Sciences **Kao
More informationIMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,
More informationGIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY
GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY Tazin Malgundkar 1,Madhuri Rao 2 and Dr. S.S. Mantha 3 1 Student, Computer Engineering, Thadomal Shahani Engineering College, Bandra, Mumbai, India.
More informationParallel Performance Monitoring Service for Dynamically Composed Media Web Services
Journal of Computer Science 5 (7): 487-492, 2009 ISSN 1549-3636 2009 Science Publications Parallel Performance Monitoring Service for Dynamically Composed Media Web Services 1 G. Maria Kalavathy and 2
More informationIntegrating Multi-Modal Messages across Heterogeneous Networks.
Integrating Multi-Modal Messages across Heterogeneous Networks. Ramiro Liscano, Roger Impey, Qinxin Yu * and Suhayya Abu-Hakima Institute for Information Technology, National Research Council Canada, Montreal
More informationIntroduction. Insert comments and tracked changes in the document
SharePoint 2010 Introduction Approval Workflow Approve Reject Request a change Reassign the task Cancel or delete the task Changing the document during an approval workflow will cancel the workflow Collect
More informationA Software and Hardware Architecture for a Modular, Portable, Extensible Reliability. Availability and Serviceability System
1 A Software and Hardware Architecture for a Modular, Portable, Extensible Reliability Availability and Serviceability System James H. Laros III, Sandia National Laboratories (USA) [1] Abstract This paper
More informationCHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
More informationA Software Architecture for a Photonic Network Planning Tool
A Software Architecture for a Photonic Network Planning Tool Volker Feil, Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering Pfaffenwaldring 47, D-70569 Stuttgart
More informationICS 121 Lecture Notes Spring Quarter 96
Software Management Cost Estimation Managing People Management Poor managment is the downfall of many software projects Ð Delivered software was late, unreliable, cost several times the original estimates
More informationImplementing New Approach for Enhancing Performance and Throughput in a Distributed Database
290 The International Arab Journal of Information Technology, Vol. 10, No. 3, May 2013 Implementing New Approach for Enhancing Performance and in a Distributed Database Khaled Maabreh 1 and Alaa Al-Hamami
More informationModeling Workflow Patterns
Modeling Workflow Patterns Bizagi Suite Workflow Patterns 1 Table of Contents Modeling workflow patterns... 4 Implementing the patterns... 4 Basic control flow patterns... 4 WCP 1- Sequence... 4 WCP 2-
More informationDesign and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
More informationCost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:
CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm
More informationA Contribution to Expert Decision-based Virtual Product Development
A Contribution to Expert Decision-based Virtual Product Development László Horváth, Imre J. Rudas Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Óbuda University,
More information[Refer Slide Time: 05:10]
Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture
More informationManaging Variability in Software Architectures 1 Felix Bachmann*
Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie
More informationBandwidth Allocation in a Network Virtualization Environment
Bandwidth Allocation in a Network Virtualization Environment Juan Felipe Botero jfbotero@entel.upc.edu Xavier Hesselbach xavierh@entel.upc.edu Department of Telematics Technical University of Catalonia
More information