Abstract is missing.
- OTM 10 KeynoteBeng Chin Ooi. 1 [doi]
- OTM 10 KeynoteMichael L. Brodie. 2-3 [doi]
- COOPIS 10 - PC Co-chairs MessageHervé Panetto, Jorge Cardoso, M. Brian Blake. 6-7 [doi]
- Configurable Services in the Cloud: Supporting Variability While Enabling Cross-Organizational Process MiningWil M. P. van der Aalst. 8-25 [doi]
- A Process View Framework for Artifact-Centric Business ProcessesSira Yongchareon, Chengfei Liu. 26-43 [doi]
- Monitoring Unmanaged Business ProcessesNirmal Mukhi. 44-59 [doi]
- Fast Business Process Similarity Search with Feature-Based Similarity EstimationZhiqiang Yan, Remco M. Dijkman, Paul Grefen. 60-77 [doi]
- Quality Assessment of Business Process Models Based on ThresholdsLaura Sánchez-González, Félix García, Jan Mendling, Francisco Ruiz. 78-95 [doi]
- Merging Business Process ModelsMarcello La Rosa, Marlon Dumas, Reina Uba, Remco M. Dijkman. 96-113 [doi]
- Compliant Business Process Design Using Refinement LayersDaniel Schleicher, Tobias Anstett, Frank Leymann, David Schumm. 114-131 [doi]
- COMPRO: A Methodological Approach for Business Process ContextualisationJosé Luis de la Vara, Raian Ali, Fabiano Dalpiaz, Juan Sánchez, Paolo Giorgini. 132-149 [doi]
- Reducing Exception Handling Complexity in Business Process Modeling and Implementation: The WED-Flow ApproachJoão Eduardo Ferreira, Osvaldo Kotaro Takai, Simon Malkowski, Calton Pu. 150-167 [doi]
- Continuous Monitoring in Evolving Business NetworksMarco Comuzzi, Jochem Vonk, Paul W. P. J. Grefen. 168-185 [doi]
- Collaborative Coordination of Activities with Temporal DependenciesJörn Franke, François Charoy, Paul El Khoury. 186-203 [doi]
- Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process ContextMark Strembeck, Jan Mendling. 204-221 [doi]
- Collaborative Filtering Technique for Web Service Recommendation Based on User-Operation CombinationNguyen Ngoc Chan, Walid Gaaloul, Samir Tata. 222-239 [doi]
- Policy-Based Attestation of Service Behavior for Establishing Rigorous TrustDongxi Liu, John Zic. 240-255 [doi]
- Collecting, Annotating, and Classifying Public Web ServicesMohammed AbuJarour, Felix Naumann, Mircea Craculeac. 256-272 [doi]
- Managing Conflict of Interest in Service CompositionHaiyang Sun, Weiliang Zhao, Jian Yang. 273-290 [doi]
- Modelling and Automated Composition of User-Centric ServicesRaman Kazhamiakin, Massimo Paolucci, Marco Pistore, Heorhi Raik. 291-308 [doi]
- Coordinating Services for Accessing and Processing Data in Dynamic EnvironmentsVíctor Cuevas-Vicenttín, Genoveva Vargas-Solar, Christine Collet, Noha Ibrahim, Christophe Bobineau. 309-325 [doi]
- The Roles of Reliability and Reputation in Competitive Multi Agent SystemsSalvatore Garruzzo, Domenico Rosaci. 326-339 [doi]
- Multilayer Superimposed Information for Collaborative Annotation in WikisCarlos Solís, José Hilario Canós, Marcos R. S. Borges. 340-357 [doi]
- Supporting Complex Changes in Evolving Interrelated Web DatabanksYannis Stavrakas, George Papastefanatos. 358-375 [doi]
- Workflow ARTGanna Monakova, Frank Leymann. 376-393 [doi]
- A Behavioral Similarity Measure between Labeled Petri Nets Based on Principal Transition Sequences - (Short Paper)Jianmin Wang, Tengfei He, Lijie Wen, Nianhua Wu, Arthur H. M. ter Hofstede, Jianwen Su. 394-401 [doi]
- Efficient and Accurate Retrieval of Business Process Models through Indexing - (Short Paper)Tao Jin, Jianmin Wang, Nianhua Wu, Marcello La Rosa, Arthur H. M. ter Hofstede. 402-409 [doi]
- The Biconnected Verification of Workflow NetsArtem Polyvyanyy, Matthias Weidlich, Mathias Weske. 410-418 [doi]
- Business Process Scheduling with Resource Availability ConstraintsJiajie Xu, Chengfei Liu, Xiaohui Zhao, Sira Yongchareon. 419-427 [doi]
- Achieving Recovery in Service Composition with Assurance Points and Integration Rules - (Short Paper)Susan Darling Urban, Le Gao, Rajiv Shrestha, Andrew Courter. 428-437 [doi]
- Business Protocol Adaptation for Flexible Chain ManagementRicardo Seguel, Rik Eshuis, Paul W. P. J. Grefen. 438-445 [doi]
- Business Process Monitoring with BPath - (Short Paper)Samir Sebahi, Mohand-Said Hacid. 446-453 [doi]
- CoMaP: A Cooperative Overlay-Based Mashup PlatformOsama Al-Haj Hassan, Lakshmish Ramaswamy, John A. Miller. 454-471 [doi]
- Composing Near-Optimal Expert Teams: A Trade-Off between Skills and ConnectivityChristoph Dorn, Schahram Dustdar. 472-489 [doi]
- Complementarity in Competence Management: Framework and ImplementationNacer Boudjlida, Dong Cheng. 490-506 [doi]
- Scalable XML Collaborative Editing with Undo - (Short Paper)Stéphane Martin, Pascal Urso, Stéphane Weiss. 507-514 [doi]
- A Cooperative Approach to View Selection and Placement in P2P Systems - (Short Paper)Zohra Bellahsene, Michelle Cart, Nour Kadi. 515-522 [doi]
- Satisfaction and Coherence of Deadline Constraints in Inter-Organizational WorkflowsMouna Makni, Samir Tata, Mohamed Moez Yeddes, Nejib Ben Hadj-Alouane. 523-539 [doi]
- An Ontological Approach for Semantic Annotation of Supply Chain Process ModelsXiaodong Wang, Nan Li, Hongming Cai, Boyi Xu. 540-554 [doi]
- Defining Process Performance Indicators: An Ontological ApproachAdela del-Río-Ortega, Manuel Resinas, Antonio Ruiz Cortés. 555-572 [doi]
- Peer Rewiring in Semantic Overlay Networks under Churn - (Short Paper)Paraskevi Raftopoulou, Euripides G. M. Petrakis. 573-581 [doi]
- IS 10 - PC Co-chairs MessageGiles Hogben, Stefanos Gritzalis. 582 [doi]
- Mutual Preimage Authentication for Fast Handover in Enterprise NetworksAndreas Noack, Mark Borrmann. 583-599 [doi]
- Supporting Role Based Provisioning with Rules Using OWL and F-LogicPatrick Rempel, Basel Katt, Ruth Breu. 600-618 [doi]
- Using Real Option Thinking to Improve Decision Making in Security InvestmentVirginia N. L. Franqueira, Siv Hilde Houmb, Maya Daneva. 619-638 [doi]
- Context Sensitive Privacy Management in a Distributed EnvironmentGrzegorz Golaszewski, Janusz Górski. 639-655 [doi]
- Semantic Attestation of Node Integrity in OverlaysFabrizio Baiardi, Daniele Sgandurra. 656-671 [doi]
- Applicability of Security PatternsRoberto Ortiz, Santiago Moral-García, Santiago Moral-Rubio, Belén Vela, Javier Garzás, Eduardo Fernández-Medina. 672-684 [doi]
- Leakage Quantification of Cryptographic OperationsMichael Wibmer, Debmalya Biswas, Florian Kerschbaum. 685-700 [doi]