Author of the publication

Towards BPEL in the Cloud: Exploiting Different Delivery Models for the Execution of Business Processes.

, , , and . SERVICES I, page 670-677. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EMod: platform independent modelling, description and enactment of parameterisable EAI patterns., , and . Enterprise IS, 3 (3): 299-317 (2009)Combining Different Multi-tenancy Patterns in Service-Oriented Applications., , , and . EDOC, page 131-140. IEEE Computer Society, (2009)A Model-Driven Approach to Implementing Coordination Protocols in BPEL., , , , , and . Business Process Management Workshops, volume 17 of Lecture Notes in Business Information Processing, page 188-199. Springer, (2008)Customer-defined service level agreements for composite applications., , and . Enterprise IS, 3 (3): 369-391 (2009)A Framework for Optimized Distribution of Tenants in Cloud Applications., , and . IEEE CLOUD, page 252-259. IEEE, (2010)Towards BPEL in the Cloud: Exploiting Different Delivery Models for the Execution of Business Processes., , , and . SERVICES I, page 670-677. IEEE Computer Society, (2009)Towards Provisioning the Cloud: On the Usage of Multi-Granularity Flows and Services to Realize a Unified Provisioning Infrastructure for SaaS Applications., and . SERVICES I, page 3-10. IEEE Computer Society, (2008)An Algorithm for the Validation of Executable Completions of an Abstract BPEL Process., , and . Multikonferenz Wirtschaftsinformatik, GITO-Verlag, Berlin, (2008)Horizontal and vertical combination of multi-tenancy patterns in service-oriented applications., , and . Enterprise IS, 5 (1): 59-77 (2011)Generation of BPEL Customization Processes for SaaS Applications from Variability Descriptors., and . IEEE SCC (2), page 359-366. IEEE Computer Society, (2008)