Pierluigi Plebani

Pierluigi Plebani
Politecnico di Milano | Polimi · Department of Electronics, Information, and Bioengineering

Ph. D.

About

153
Publications
26,562
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,148
Citations
Citations since 2016
48 Research Items
771 Citations
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
Additional affiliations
June 2008 - present
Politecnico di Milano
Position
  • Professor (Assistant)
May 2005 - May 2008
Politecnico di Milano
Position
  • Research Assistant
March 2002 - May 2005
Politecnico di Milano
Position
  • PhD Student
Education
March 2002 - May 2005
Politecnico di Milano
Field of study
  • Information Engineering
September 1994 - April 2000
Politecnico di Milano
Field of study
  • Computer Science Engineering

Publications

Publications (153)
Article
Full-text available
Being the blockchain and distributed ledger technologies particularly suitable to create trusted environments where participants do not trust each other, business process management represents a proper setting in which these technologies can be adopted. In this direction, current research work primarily focuses on blockchain-oriented business proce...
Article
Full-text available
Data as a Service (DaaS) offers an effective provisioning model able to exploit the advantages of cloud computing in terms of accessibility and scalability when data providers need to make their data available to different data consumers. Nevertheless, in settings where data are generated at the edge and they need to be propagated (e.g., Industry 4...
Chapter
This chapter consists of several sections which contain contributions from members of IFIP Technical Committee 8 (Information Systems). We highlight the accomplishments of Technical Committee 8 (TC8) and its working groups over its 50 years history, and then envisage possible strategies for the future of information systems (IS) in a post-COVID wor...
Article
The efficiency and effectiveness of business processes are usually evaluated by Process Performance Indicators (PPIs), which are computed using process event logs. PPIs can be insightful only when they are measurable, i.e., reliable. This paper proposes to define PPI measurability on the basis of the quality of the data in the process logs. Then, b...
Book
This volume contains the technical papers presented in the workshops, PhD Symposium and EU Projects Track which took place at the 8th European Conference on Service-Oriented and Cloud Computing, ESOCC 2020, held in Heraklion, Crete, Greece, in September 2020: 1st International Workshop on Edge Adoption and Migration, EdgeWays 2020, 16th Internation...
Book
his book constitutes the proceedings of the Blockchain and RPA Forum, held as part of the 19th International Conference on Business Process Management, BPM 2021, which took place during September 6-10, 2021, in Rome, Italy. The Blockchain Forum and the RPA Forum have in common that they are centered around an emerging and exciting technology. The b...
Chapter
Aiming to break the software monoliths that traditional approaches usually produce as artifacts, solutions that are based on microservices consist of heterogeneous and independent software platforms to manage applications and data. In this scenario, the term polyglot persistence has been introduced to characterize software solutions where the invol...
Article
Full-text available
Pervasive sensing is increasing our ability to monitor the status of patients not only when they are hospitalized but also during home recovery. As a result, lots of data are collected and are available for multiple purposes. If operations can take advantage of timely and detailed data, the huge amount of data collected can also be useful for analy...
Chapter
Full-text available
Today business organizations operate in digital ecosystems that can be conceptualized in terms of multi-party business processes, where co-operation among parties is mandatory. Being every party a potential source of failures with impacts on the entire ecosystem, resilience is a feature that should be enforced by multi-party business processes dire...
Conference Paper
Full-text available
The ability to enable a tamper-proof distribution of immutable data has boosted the studies around the adoption of blockchains also in Business Process Management. In this direction, current research work primarily focuses on blockchain-based business process design, or on execution engines able to enact processes through smart contracts. Although...
Chapter
Full-text available
Multi-party business processes are characterized by the lack of a central coordination, as each participant controls only a portion of the process. Nonetheless, organizations often need to know how the whole process is performed, especially when artifacts belonging to an organization are manipulated by the other participants. This requires a monito...
Article
Full-text available
Modern cloud applications are required to be distributed, scalable, and reliable. The microservice architectural style enables developers to achieve this goal with reduced effort. Nonetheless, microservices deployment is not trivial due to the heterogeneity of the microservices in terms of both functional and non-functional requirements. This is al...
Article
Nowadays, every business organization operates in ecosystems and cooperation is mandatory. If, on the one hand, this increases the opportunities for the involved organizations, on the other hand, every business partner is a potential source of failures with impacts on the entire ecosystem. To avoid that these failures, which are local to one of the...
Chapter
Data-intensive applications are becoming very important in several domains including e-health, government 2.0, smart cities, and industry 4.0. In fact, the significant increase of sensor deployment in the Internet of things (IoT) environments, in conjunction with the huge amount of data that are generated by the smart and intelligent devices such a...
Chapter
Sensors, smart devices, and wearables have been widely adopted in recent years, bringing to the production of a vast amount of data which can be shared among several applications as input for their analysis. Data-intensive applications can benefit from these data but only if data are reliable and timely, and if they fit the requirements of the appl...
Chapter
Full-text available
State-of-the-art applications are typically deployed on top of cloud services which offer the illusion of infinite resources, elastic scalability, and a simple pay-per-use billing model. While this is very convenient for developers, it also comes with relatively high access latency for end users. Future application domains such as the Internet of T...
Chapter
Full-text available
The adoption of blockchain to enable a trusted monitoring of multi-party business processes is recently gaining a lot of attention, as the absence of a central authority increases the efficiency and the effectiveness of the delivery of monitoring data. At the same time, artifact-driven monitoring has been proposed to create a flexible monitoring pl...
Chapter
Although it has been initially introduced in the telecommunication domain by Cisco [1], Fog Computing is recently emerging as a hot topic also in the software domain, and especially for data-intensive applications (DIA), with the goal of creating a continuum between the resources living on the Cloud and the ones living on the Edge [3]. In fact, esp...
Book
This book constitutes the refereed proceedings of the 7th IFIP WG 2.14 European Conference on Service-Oriented and Cloud Computing, ESOCC 2018, held in Como, Italy, in September 2018. The 10 full and 5 short papers presented in this volume were carefully reviewed and selected from 32 submissions. The volume also contains one invited talk in full pa...
Article
Full-text available
Monitoring the compliance of the execution of multi-party business processes is a complex and challenging task: each actor only has the visibility of the portion of the process under its direct control, and the physical objects that belong to a party are often manipulated by other parties. Because of that, there is no guarantee that the process wil...
Conference Paper
Full-text available
State-of-the-art applications are typically deployed on top of cloud services which offer the illusion of infinite resources, elastic scalability, and a simple pay-per-use billing model. While this is very convenient for developers, it also comes with relatively high access latency for end users. Future application domains such as the Internet of T...
Conference Paper
Full-text available
The usage of sensors, smart devices, and wearables is becoming more and more common, and the amount of data they are able to generate can create a real value only if such data are properly analyzed. To this aim, the design of data-intensive applications needs to find a balance between the value of the output of the data analysis – that depends on t...
Chapter
Resiliency in process-aware information systems is based on the availability of recovery flows and alternative data for coping with missing data. In this paper, we discuss an approach to process and information modeling to support the specification of recovery flows and alternative data. In particular, we focus on processes using sensor data from d...
Conference Paper
Full-text available
Traditionally, human intervention is required to monitor a business process. Operators notify when manual activities are executed, and manually restart the monitoring whenever the process is not executed as expected. This paper presents mArtifact, an artifact-driven process monitoring platform. mArtifact uses the E-GSM artifact-centric language to...
Conference Paper
Full-text available
In a multi-party business process, the choreography defines the conversational protocol among the parties, so that the visibility of the parties’ private processes is limited to the set of operations required to respect such a protocol. Especially in scenarios where physical resources are exchanged, knowing how a resource owned by a party is manage...
Conference Paper
Monitoring of services is becoming more and more common to ensure the quality of applications and to provide the required level of service. Nowadays, the technology needed for supporting monitoring and, as a consequence, also monitoring data are widely available. On the other hand, new challenges and research issues arise concerning the design of t...
Conference Paper
Full-text available
Monitoring human-centric business processes requires human operators to manually notify to a BPMS when activities start or end. Even if nowadays smart devices, like smartphones and tablets, are adopted to make the transmission of these notifications easier, such devices usually hold a passive role, being a simple mediator between the BPMS and human...
Conference Paper
Data-intensive applications are usually developed based on Cloud resources whose service delivery model helps towards building reliable and scalable solutions. However, especially in the context of Internet of Things-based applications, Cloud Computing comes with some limitations as data, generated at the edge of the network, are processed at the c...
Conference Paper
Nowadays every business organization operates in ecosystems and cooperation is mandatory. If, on the one side, this increases the opportunities for the involved organizations, on the other side, every actor is a potential source of failures with impacts on the entire ecosystem. For this reason, resilience is a feature that multi-party business proc...
Article
Full-text available
This paper reports the re-engineering efforts for OWL-Q, a prominent semantic quality-based service description language. These efforts have focused on making OWL-Q more compact without reducing its level of expressiveness as well as enriching it with semantic rules towards semantic validation of quality specifications and new knowledge derivation....
Article
Full-text available
Control flow-based process modeling notations, like BPMN, are good at defining the normal execution flow and the management of foreseen exceptions. When unforeseen situations occur, one cannot detect if the execution is still acceptable with respect to the process definition. In contrast, artifact-centric process modeling notations, like the Guard-...
Conference Paper
Full-text available
When adopting a multi-cloud strategy, the selection of cloud providers where to deploy VMs is a crucial task for ensuring a good behaviour for the developed application. This selection is usually focused on the general information about performances and capabilities offered by the cloud providers. Less attention has been paid to the monitoring serv...
Conference Paper
Cloud computing has important impacts on the environment: data centers – that represent the physical infrastructure where the cloud resources run – are not always designed as green entities, as they consume large amounts of energy (in form of electric power or fuel) often producing significant amounts of CO2 emissions. Such emissions depend on the...
Conference Paper
Full-text available
Business processes are usually designed by means of imperative languages to model the acceptable execution of the activities performed within a system or an organization. At the same time, declarative languages are better suited to check the conformance of the states and transitions of the modeled process with respect to its actual execution. To av...
Article
Full-text available
Although the definition of service-oriented architecture (SOA) included the presence of a service registry from the beginning, the first implementations (e.g., UDDI) did not really succeed mainly because of security and governance issues. This article tackles the problem by introducing DREAM (Distributed Registry by ExAMple): a publish/subscribe-ba...
Conference Paper
Full-text available
Managing data produced in the Internet of Things according to the traditional data-center based approach is becoming no longer appropriate. Devices are improving their computational power as the processors installed on them are more and more powerful and diverse. Moreover, devices cannot guarantee a continuous connection due their mobility and limi...
Conference Paper
Full-text available
The execution of cross-organization business processes often implies the exchange of physical goods without necessarily changing the ownership of such goods. Typical examples are logistic processes where goods are managed by shipping companies that are not the owner of the goods. To ensure that these goods are properly handled, while the service is...
Article
Full-text available
The increasing utilization of cloud resources raises several issues related to their environmental impact and, more in general, sustainability. Recently, most of the contributions have focused on energy efficiency achieved through a better physical and virtual resource management. The present paper considers instead the application level, extending...
Article
Full-text available
With the increasing popularity of the cloud computing model and rapid proliferation of cloud infrastructures there are increasing concerns about energy consumption and consequent impact of cloud computing as a contributor to global CO2 emissions. To date, little is known about how to incorporate energy consumption and CO2 concerns into cloud applic...
Conference Paper
This paper proposes a semantic-based retrieval algorithm that allows the pervasive service system to find services able to return data about specific physical phenomenon (e.g. temperature, humidity), in a given location, with particular timeliness. This retrieval algorithm can be used to increase the capabilities of a self-managing pervasive system...
Conference Paper
Full-text available
The widespread adoption of cloud computing is having a big impact on the environment since the energy consumption of data centers and the resulting emissions are significantly increasing. Researchers and practitioners in this field are looking for methods to improve the energy efficiency of data centers and increase the use of green energy sources....
Conference Paper
Full-text available
The present paper discusses the issues arising from the need of presenting to the user information about the environmental impact of their applications in a cloud environment. Several aspects have to be considered: to make aware the users of the energy consumption and environmental impact of their applications, but also to make them aware about the...
Conference Paper
The development and maintenance of cloud sites are often characterized by energy waste and high CO2 emissions. Energy efficiency and the decrease of the CO2 emissions in cloud-based systems can be only obtained by adopting suitable actions and techniques (e.g., utilization of green energy sources, reduction of the number of physical and virtual mac...
Conference Paper
Full-text available
Cloud computing has a big impact on the environment since the energy consumption and the resulting CO2 emissions of data centers can be compared to the worldwide airlines traffic. Many researchers are addressing such issue by proposing methods and techniques to increase data center energy efficiency. Focusing at the application level, this paper pr...
Article
Quality of service (QoS) can be a critical element for achieving the business goals of a service provider, for the acceptance of a service by the user, or for guaranteeing service characteristics in a composition of services, where a service is defined as either a software or a software-support (i.e., infrastructural) service which is available on...
Conference Paper
The aim to reduce the energy consumption in data centres is usually analyzed in the literature from a facility and hardware standpoint. For instance, innovative cooling systems and less power hungry CPUs have been developed to save as much more energy as possible. The goal of this paper is to move the standpoint to the application level by proposin...
Article
The 4th International Workshop on Principles of Engineering Service-Oriented Systems (PESOS 2012) was held at the International Conference on Software Engineering, ICSE 2012, on June 4, 2012. The special theme of this 4th edition of PESOS was "The Internet of Services." PESOS 2012 brought together software engineering researchers from academia and...
Article
The 4th International Workshop on Principles of Engineering Service-Oriented Systems (PESOS 2012) was held at the International Conference on Software Engineering, ICSE 2012, on June 4, 2012. The special theme of this 4th edition of PESOS was "The Internet of Services." PESOS 2012 brought together software engineering researchers from academia and...
Conference Paper
Due to the increasing usage of modern IT service centers, energy consumption has been one of the top concerns for administrators. Many indicators have been proposed with different aims at several levels, but what is missing is an approach for presenting them together within meaningful indexes. The goal of this paper is to introduce our approach to...
Article
Mobile devices with their more and more powerful resources allow the development of mobile information systems in which services are not only provided by traditional systems but also autonomously executed and controlled in the mobile devices themselves. Services distributed on autonomous mobile devices allow both the development of cooperative appl...