scispace - formally typeset
Search or ask a question
Author

Schahram Dustdar

Bio: Schahram Dustdar is an academic researcher from Vienna University of Technology. The author has contributed to research in topics: Cloud computing & Web service. The author has an hindex of 70, co-authored 804 publications receiving 28237 citations. Previous affiliations of Schahram Dustdar include London School of Economics and Political Science & Danske Bank.


Papers
More filters
Journal ArticleDOI
01 Jun 2007
TL;DR: Common architecture principles of context-aware systems are presented and a layered conceptual design framework is derived to explain the different elements common to mostcontext-aware architectures.
Abstract: Context-aware systems offer entirely new opportunities for application developers and for end users by gathering context data and adapting systems behaviour accordingly. Especially in combination with mobile devices, these mechanisms are of high value and are used to increase usability tremendously. In this paper, we present common architecture principles of context-aware systems and derive a layered conceptual design framework to explain the different elements common to most context-aware architectures. Based on these design principles, we introduce various existing context-aware systems focusing on context-aware middleware and frameworks, which ease the development of context-aware applications. We discuss various approaches and analyse important aspects in context-aware computing on the basis of the presented systems.

2,036 citations

Journal ArticleDOI
TL;DR: A service-oriented computing promotes the idea of assembling application components into a network of services that can be loosely coupled to create flexible, dynamic business processes and agile applications that span organizations and computing platforms.
Abstract: Service-oriented computing promotes the idea of assembling application components into a network of services that can be loosely coupled to create flexible, dynamic business processes and agile applications that span organizations and computing platforms An SOC research road map provides a context for exploring ongoing research activities

2,030 citations

Book ChapterDOI
Wil M. P. van der Aalst1, Wil M. P. van der Aalst2, A Arya Adriansyah1, Ana Karla Alves de Medeiros3, Franco Arcieri4, Thomas Baier5, Tobias Blickle6, Jagadeesh Chandra Bose1, Peter van den Brand, Ronald Brandtjen, Joos C. A. M. Buijs1, Andrea Burattin7, Josep Carmona8, Malu Castellanos9, Jan Claes10, Jonathan Cook11, Nicola Costantini, Francisco Curbera12, Ernesto Damiani13, Massimiliano de Leoni1, Pavlos Delias, Boudewijn F. van Dongen1, Marlon Dumas14, Schahram Dustdar15, Dirk Fahland1, Diogo R. Ferreira16, Walid Gaaloul17, Frank van Geffen18, Sukriti Goel19, CW Christian Günther, Antonella Guzzo20, Paul Harmon, Arthur H. M. ter Hofstede1, Arthur H. M. ter Hofstede2, John Hoogland, Jon Espen Ingvaldsen, Koki Kato21, Rudolf Kuhn, Akhil Kumar22, Marcello La Rosa2, Fabrizio Maria Maggi1, Donato Malerba23, RS Ronny Mans1, Alberto Manuel, Martin McCreesh, Paola Mello24, Jan Mendling25, Marco Montali26, Hamid Reza Motahari-Nezhad9, Michael zur Muehlen27, Jorge Munoz-Gama8, Luigi Pontieri28, Joel Ribeiro1, A Anne Rozinat, Hugo Seguel Pérez, Ricardo Seguel Pérez, Marcos Sepúlveda29, Jim Sinur, Pnina Soffer30, Minseok Song31, Alessandro Sperduti7, Giovanni Stilo4, Casper Stoel, Keith D. Swenson21, Maurizio Talamo4, Wei Tan12, Christopher Turner32, Jan Vanthienen33, George Varvaressos, Eric Verbeek1, Marc Verdonk34, Roberto Vigo, Jianmin Wang35, Barbara Weber36, Matthias Weidlich37, Ton Weijters1, Lijie Wen35, Michael Westergaard1, Moe Thandar Wynn2 
01 Jan 2012
TL;DR: This manifesto hopes to serve as a guide for software developers, scientists, consultants, business managers, and end-users to increase the maturity of process mining as a new tool to improve the design, control, and support of operational business processes.
Abstract: Process mining techniques are able to extract knowledge from event logs commonly available in today’s information systems. These techniques provide new means to discover, monitor, and improve processes in a variety of application domains. There are two main drivers for the growing interest in process mining. On the one hand, more and more events are being recorded, thus, providing detailed information about the history of processes. On the other hand, there is a need to improve and support business processes in competitive and rapidly changing environments. This manifesto is created by the IEEE Task Force on Process Mining and aims to promote the topic of process mining. Moreover, by defining a set of guiding principles and listing important challenges, this manifesto hopes to serve as a guide for software developers, scientists, consultants, business managers, and end-users. The goal is to increase the maturity of process mining as a new tool to improve the (re)design, control, and support of operational business processes.

1,135 citations

Book ChapterDOI
TL;DR: The goal of this roadmap paper is to summarize the state-of-the-art and to identify critical challenges for the systematic software engineering of self-adaptive systems.
Abstract: The goal of this roadmap paper is to summarize the state-of-the-art and to identify critical challenges for the systematic software engineering of self-adaptive systems. The paper is partitioned into four parts, one for each of the identified essential views of self-adaptation: modelling dimensions, requirements, engineering, and assurances. For each view, we present the state-of-the-art and the challenges that our community must address. This roadmap paper is a result of the Dagstuhl Seminar 08031 on "Software Engineering for Self-Adaptive Systems," which took place in January 2008.

1,133 citations

Journal ArticleDOI
TL;DR: The success of the Internet of Things and rich cloud services have helped create the need for edge computing, in which data processing occurs in part at the network edge, rather than completely in the cloud.
Abstract: The success of the Internet of Things and rich cloud services have helped create the need for edge computing, in which data processing occurs in part at the network edge, rather than completely in the cloud. Edge computing could address concerns such as latency, mobile devices' limited battery life, bandwidth costs, security, and privacy.

938 citations


Cited by
More filters
Book
01 Jan 1995
TL;DR: In this article, Nonaka and Takeuchi argue that Japanese firms are successful precisely because they are innovative, because they create new knowledge and use it to produce successful products and technologies, and they reveal how Japanese companies translate tacit to explicit knowledge.
Abstract: How has Japan become a major economic power, a world leader in the automotive and electronics industries? What is the secret of their success? The consensus has been that, though the Japanese are not particularly innovative, they are exceptionally skilful at imitation, at improving products that already exist. But now two leading Japanese business experts, Ikujiro Nonaka and Hiro Takeuchi, turn this conventional wisdom on its head: Japanese firms are successful, they contend, precisely because they are innovative, because they create new knowledge and use it to produce successful products and technologies. Examining case studies drawn from such firms as Honda, Canon, Matsushita, NEC, 3M, GE, and the U.S. Marines, this book reveals how Japanese companies translate tacit to explicit knowledge and use it to produce new processes, products, and services.

7,448 citations

Proceedings ArticleDOI
22 Jan 2006
TL;DR: Some of the major results in random graphs and some of the more challenging open problems are reviewed, including those related to the WWW.
Abstract: We will review some of the major results in random graphs and some of the more challenging open problems. We will cover algorithmic and structural questions. We will touch on newer models, including those related to the WWW.

7,116 citations

Journal ArticleDOI
TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Abstract: This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies, and Internet protocols. The basic premise is to have smart sensors collaborate directly without human involvement to deliver a new class of applications. The current revolution in Internet, mobile, and machine-to-machine (M2M) technologies can be seen as the first phase of the IoT. In the coming years, the IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making. This paper starts by providing a horizontal overview of the IoT. Then, we give an overview of some technical details that pertain to the IoT enabling technologies, protocols, and applications. Compared to other survey papers in the field, our objective is to provide a more thorough summary of the most relevant protocols and application issues to enable researchers and application developers to get up to speed quickly on how the different protocols fit together to deliver desired functionalities without having to go through RFCs and the standards specifications. We also provide an overview of some of the key IoT challenges presented in the recent literature and provide a summary of related research work. Moreover, we explore the relation between the IoT and other emerging technologies including big data analytics and cloud and fog computing. We also present the need for better horizontal integration among IoT services. Finally, we present detailed service use-cases to illustrate how the different protocols presented in the paper fit together to deliver desired IoT services.

6,131 citations