摘要:
A system and method of assessing and refining quality of Web services (WSDL) definitions for enabling automatic discovery and matching thereof, which includes normalizing definition elements and identifying at least one element as being at least one of cryptic, ambiguous, and unclear to provide a normalization output, assessing a quality of the at least one definition element based on the normalization output, classifying the identified at least one definition element into at least one predetermined category, and providing a quality assessment output, and automatically generating a recommendation for changing at least one definition element based on at least one of the normalization output and the quality assessment output, thereby enabling automatic discovery and matching thereof.
摘要:
A system and method of assessing and refining quality of Web services (WSDL) definitions for enabling automatic discovery and matching thereof, which includes normalizing definition elements and identifying at least one element as being at least one of cryptic, ambiguous, and unclear to provide a normalization output, assessing a quality of the at least one definition element based on the normalization output, classifying the identified at least one definition element into at least one predetermined category, and providing a quality assessment output, and automatically generating a recommendation for changing at least one definition element based on at least one of the normalization output and the quality assessment output, thereby enabling automatic discovery and matching thereof.
摘要:
A system and method is provided for the ontological representation of the meta-models of businesses and their processes, activities, and components in one or more semantic web markup languages to enable reasoning and analyzing of instances of enterprise business models to infer relationships of business entities which are previously unknown or not clear from the original business model instance.
摘要:
A system and method allow a user to extract the set of customizations performed on an application and use these to estimate the time and effort and cost of (a) migrating to a new version of the application and/or (b) consolidating systems. The user can browse the extracted data and select configuration elements for re-use. After downloading the one or more configurations and comparing them, the user selects elements of the configurations for re-use. The first step is to scan one or more application systems and extract the configuration data using a surveyor. The method according to the invention automatically identifies configuration differences. The user then selects configuration elements for re-use. A graphic user interface (GUI) can be provided which allows the user to make these selections by dragging and dropping selected elements to a “To Be” configuration. The selected configurations are then uploaded and installed on an instance of the application.
摘要:
A recommendation system exploits a repository of mashups to provide design-time assistance to the user through relevant suggestions as to what outputs can be generated along with the best plans to generate those outputs. An output ranker ranks the outputs of the system base on their popularity scores, and a planner uses metric planning algorithms and a configurable utility function. The system takes into account popularity and semantic similarity when recommending services and sources.
摘要:
A system and method is provided for the ontological representation of the meta-models of businesses and their processes, activities, and components in one or more semantic web markup languages to enable reasoning and analyzing of instances of enterprise business models to infer relationships of business entities which are previously unknown or not clear from the original business model instance.
摘要:
A system and method allow a user to extract the set of customizations performed on an application and use these to estimate the time and effort and cost of (a) migrating to a new version of the application and/or (b) consolidating systems. The user can browse the extracted data and select configuration elements for re-use. After downloading the one or more configurations and comparing them, the user selects elements of the configurations for re-use. The first step is to scan one or more application systems and extract the configuration data using a surveyor. The method according to the invention automatically identifies configuration differences. The user then selects configuration elements for re-use. A graphic user interface (GUI) can be provided which allows the user to make these selections by dragging and dropping selected elements to a “To Be” configuration. The selected configurations are then uploaded and installed on an instance of the application.
摘要:
A recommendation system exploits a repository of mashups to provide design-time assistance to the user through relevant suggestions as to what outputs can be generated along with the best plans to generate those outputs. An output ranker ranks the outputs of the system base on their popularity scores, and a planner uses metric planning algorithms and a configurable utility function. The system takes into account popularity and semantic similarity when recommending services and sources.
摘要:
An authorization engine is provided in a remote device for mobile authorization using policy based access control. To ensure that remote devices can enforce consistent authorization policies even when the devices are not connected to the server, the remote device downloads the relevant authorization policies when the business objects are downloaded and enforces the policies when operations are invoked. The memory footprint of downloadable authorization policies is reduced to fit onto a resource-constrained remote device. A policy evaluation engine interprets and enforces the downloaded policies on the remote device using only the limited computational resources of the remote device.
摘要:
An authorization engine is provided in a remote device for mobile authorization using policy based access control. To ensure that remote devices can enforce consistent authorization policies even when the devices are not connected to the server, the remote device downloads the relevant authorization policies when the business objects are downloaded and enforces the policies when operations are invoked. The memory footprint of downloadable authorization policies is reduced to fit onto a resource-constrained remote device. A policy evaluation engine interprets and enforces the downloaded policies on the remote device using only the limited computational resources of the remote device.