Jutta Mülle | Karlsruhe Institute of Technology (KIT) (original) (raw)

Papers by Jutta Mülle

Research paper thumbnail of Datenbankkonzepte f�r Ingenieuranwendungen: ein �bersicht �ber den Stand der Entwicklung

Research paper thumbnail of Sicherheit und technischer Datenschutz in Informationssystemen

Research paper thumbnail of Reduction of data-value-aware process models: A relevance-based approach

Research paper thumbnail of Results from the Verification of Models of Spectrum Auctions

Lecture notes in business information processing, 2022

Research paper thumbnail of Technologien und Prozesse für robuste getaktete Logistiknetzwerke : LogoTakt ; Schlussbericht des Karlsruher Instituts für Technologie ; Teil 1 (kurze Darstellung) und Teil 2 (eingehende Darstellung) ; Verbundprojekt mit dem Förderkennzeichen A bis I

Research paper thumbnail of Verteilung und Integration von Informationen im Verkehrsbereich

Verteilung und Mobilität spielen in der Verkehrstelematik eine große Rolle. Die verwendeten Daten... more Verteilung und Mobilität spielen in der Verkehrstelematik eine große Rolle. Die verwendeten Datenquellen sind im Allgemeinen heterogen und von unterschiedlicher Qualität. Im Rahmen des Verbundprojektes OVID der Universität Karlsruhe (TH) bot das Institut für Programmstrukturen und Datenorganisation (IPD) im Sommersemester 2004 ein Seminar mit dem Titel "Verteilung und Integration von Informationen im Verkehrsbereich" an. In diesem Seminar wurden Fragestellungen untersucht, die sich mit den Anforderungen und existierenden Techniken für hochgradige Verteilung und Mobilität von Datenquellen im Verkehrsbereich beschäftigten. Die dabei erzielten Ergebnisse werden in diesem Bericht vorgestellt.

Research paper thumbnail of A Hybrid Approach for Generating Compatible WS-BPEL Partner Processes

Lecture Notes in Computer Science, 2006

The Business Process Execution Language for Web Services provides an technology to aggregate enca... more The Business Process Execution Language for Web Services provides an technology to aggregate encapsulated functionalities for defining high-value Web services. For a distributed application in a B2B interaction, the partners simply need to expose their behavior as BPEL processes and compose them. Still, modeling and composing BPEL processes can be complex and error-prone. With formal methods like Petri nets, it

Research paper thumbnail of Unterstützung der integrierten Gebäudeplanung und -Verwaltung mit einem topologischen Kerndatenmodell

An einem Teil der Topologie architektonischer Räume, dem Volumenadjazenzgraphen (VAG), wird gezei... more An einem Teil der Topologie architektonischer Räume, dem Volumenadjazenzgraphen (VAG), wird gezeigt wie topologisches Modellieren Anwendungen der Bauplanung integrieren kann. Dazu wird ein Prototyp vorgestellt, der im wesentlichen aus drei Komponenten besteht: Mit dem Anforderungsmanager werden Anforderungen eigegeben, die formal gut handhabbar sind. Mit dem Topologiemanager werden diese Anforderungen mit gezeichneten Räumen kombiniert. Die topologischen Relationen in den Zeichnungen werden mit den entsprechenden Funktionen des GIS ermittelt und in eine Datenbank exportiert. Der Anforderungsprüfer vergleicht dann die Anforderungsdaten, die mit Hilfe des Anforderungsmanagers erzeugt wurden, mit den Topologiedaten. Dieser Ansatz soll zeigen, wie topologische Modelle eine Formalisierung semantisch hochstehender Informationen als Eigenschaften von Graphen bzw. topologischen Komplexen ermöglichen.

Research paper thumbnail of A Practical Strategy the Modularization of Courseware Design. In: Professionelles Wissensmanagement – Erfahrungen und Visionen: Adaptive E-Learning and Metadata

In order to enable courseware reuse, it is necessary to decompose learning materials into managea... more In order to enable courseware reuse, it is necessary to decompose learning materials into manageable learning objects. Most scientific projects and organizations that are concerned with courseware reuse and exchange like Ariadne [2], IMS Global Learning Consortium [4], Educause [3], the IEEE Learning Technologies Standards Committee [8] with its

Research paper thumbnail of 2008, ‘Automated derivation of executable business processes from choreographies

Abstract: In this paper, we address the challenge of deriving both, executable WS-BPEL processes ... more Abstract: In this paper, we address the challenge of deriving both, executable WS-BPEL processes and their respective WSDL interface specifications from choreographies written in WS-CDL for business processes in Virtual Organizations (VOs). The major issues hereby are the differences in the vocabulary of WS-CDL and WSBPEL as well as the information gap between a choreography and an executable orchestration. The information gap results from the requirement imposed by the VO environment to establish a process-based collaboration in a top-down fashion. High-level choreography descriptions are hereby the basis for the derivation of detailed executable processes. The first issue is addressed with a detailed translation table; the second, more severe one requires the use of a role specific knowledge base. This knowledge base delivers process subsets modeling detailed role internal activities while avoiding their exposure to collaborating roles. The combined solution is a CDL2BPEL algorith...

Research paper thumbnail of Automated Derivation of Executable Business Processes from Choreographies in Virtual Organizations

Abstract: In this paper, we address the challenge of deriving both, executable WS-BPEL processes ... more Abstract: In this paper, we address the challenge of deriving both, executable WS-BPEL processes and their respective WSDL interface specifications from choreographies written in WS-CDL for business processes in Virtual Organizations (VOs). The major issues hereby are the differences in the vocabulary of WS-CDL and WSBPEL as well as the information gap between a choreography and an executable orchestration. The information gap results from the requirement imposed by the VO environment to establish a process-based collaboration in a top-down fashion. High-level choreography descriptions are hereby the basis for the derivation of detailed executable processes. The first issue is addressed with a detailed translation table; the second, more severe one requires the use of a role specific knowledge base. This knowledge base delivers process subsets modeling detailed role internal activities while avoiding their exposure to collaborating roles. The combined solution is a CDL2BPEL algorith...

Research paper thumbnail of Lockemann: Modular Development of Multimedia Courseware. WISE 2000, the first international conference on web information systems engineering Volume 2

The use of multimedia in courseware and web-based learning is a current topic. This is influenced... more The use of multimedia in courseware and web-based learning is a current topic. This is influenced by the wide availability and the permanently improving technical possibilities. The employment of multimedia technology in education makes it possible to illustrate and to grasp complex processes and coherences. However, the development of multimedia content is still a very costly and tedious task. In order to reduce the costs and efforts needed to build multimedia contents, it is desirable to organize the content in a modular way so that it can be (re)used and created cooperatively. In this paper, we present a development process for multimedia contents that supports a modular cooperative design of multimedia courseware. We argue that applying modularity to courseware design not only reduces the costs but also allows the development of a high-quality reusable and configurable courseware. Configurable courseware can be adapted to meet the needs and characteristics of different lecturers...

Research paper thumbnail of Creating, Filling, and Using a Repository of Reusable Learning Objects for Database Courses

this paper, we will show how the repository is created, how existing material can be fed into it,... more this paper, we will show how the repository is created, how existing material can be fed into it, and how a new course can be build using the existing and new materials. As an example, we have chosen one of the topics that occur frequently in database courses, normalization. The remainder of the paper is structured as follows. In Section 2, we give a brief overview of the process, Section 3 explains how the repository is generated and filled, while Section 4 describes its usage. A brief overview of related work is given in Section 5. The paper ends with a conclusion in Section 6. Throughout most of the paper, we have used a two-column style, where the left column contains explaining text, while the right one shows figures taken from the example scenario

Research paper thumbnail of A Framework for Dealing with Dynamic Buildings

ABSTRACT: The design world of architects and engineers is changing. Costs arising during the whol... more ABSTRACT: The design world of architects and engineers is changing. Costs arising during the whole life cycle of a building are being taken into account. Therefore, complex tools to support design decisions are coming up, and an increasing number of experts from a great variety of disciplines will have to cooperate in a more and more interrelated and sophisticated manner. Our hypothesis is, that an integrated framework based on the metaphor of a “ dynamic building ” as component-based, spatial model will bridge between the information technical representation and the “ classical ” building planning. All planning, cooperation, usage, and aging processes of the building life cycle will be reflected in such a “ virtual ” dynamic building, for which we are developing an appropriate framework. 1

Research paper thumbnail of Semantic support for security-annotated business process models

Abstract. Service-Oriented Architectures (SOA) benefit from business processes (BP), which orches... more Abstract. Service-Oriented Architectures (SOA) benefit from business processes (BP), which orchestrate web services (WS) and human actors in cross organizational environments. In this setting, handling the security and privacy issues while exchanging and processing personal data is essential. This lacks for secure business processes management. To achieve this, we represent security constraints descriptively by annotating process models, aiming to enforce these constraints by a secure business process management system (BPMS).To assist the process modeler in annotating process models, we introduce in this paper a tool which provides semantic interoperability during process design. By enforcing a shared conceptualization (ontology) of the security and privacy domains with an ontology base grounded in natural language this tool called knowledge annotator is able to make annotation recommendations according to knowledge stored in a knowledge base. The annotator is validated in an emplo...

Research paper thumbnail of Using a Context Knowledge Base for the Verification of Vehicle Test Processes

Diagnostic frameworks in the vehicle production domain are important to guarantee the quality of ... more Diagnostic frameworks in the vehicle production domain are important to guarantee the quality of the outcomes of the manufacturing process. Recently, the test processes in these frameworks are becoming more complex due to the use of a large amount of components and electronic devices in modern vehicles. To achieve high quality test processes we take a model checking approach to check that the test processes comply with relevant requirements. We have analyzed the requirements for vehicle test processes and the relevant context information for verification. We use this information to create a context knowledge base, containing information about the components and their relationships and constraints of our application domain, i.e. vehicle test processes. Our goal is to automatically verify test processes, specified in different notations, with a model checking approach. The requirement rules are dynamically generated at verification time from the context knowledge base. The approach is...

Research paper thumbnail of A Security Language for BPMN Process Models

Security mechanisms are essential for business processes. Currently, business-process-management ... more Security mechanisms are essential for business processes. Currently, business-process-management systems (BPMSs) provide relatively little security support, and programmers must be familiar with interfaces of security mechanisms that are not part of BPMSs. Enforcing security constraints for a business process leads to high implementation and maintenance costs. Our approach in turn is a wholistic one, providing security support from the modelling to the runtime phase of a businessprocess lifecycle. As current security-modelling approaches lack features important for business processes, we propose a sophisticated language to formulate respective constraints. In addition, we considerably ease the specification of how users can control their security preferences at runtime. Our security language is embedded in BPMN. We have extended an open-source BPMS on the modelling, configuration and execution layer. The BPMS extensions transform BPMN schemas with security constraints into executabl...

Research paper thumbnail of Making Courseware Reusable

In this paper we discuss how the development of reusable courseware can be supported by using mod... more In this paper we discuss how the development of reusable courseware can be supported by using modularization and ontologies. We argue that those concepts will enhance the quality of courseware and its cooperative development as well as the degree of its reusability and exchange. An adequate development process is presented, and it is shortly sketched how to use the resulting courseware in a new manner. Our goal is to provide an approach to develop adaptable learning material that can be reused by different authors and educators and even students for many target groups in different contexts.

Research paper thumbnail of Verification of Data-Value-Aware Processes and a Case Study on Spectrum Auctions

2020 IEEE 22nd Conference on Business Informatics (CBI), 2020

Verification techniques are fundamental to improve the reliability of process designs in practice... more Verification techniques are fundamental to improve the reliability of process designs in practice. In application domains like auctions, the issue is extremely valuable; the goal of auction designers is to prevent undesirable executions and maximize certain outcome measures. Current verification approaches tend to be confined to control flows, even though data values play a significant role. We address this issue by proposing a new data-value-aware verification approach: We enhance process models with information on data values. Then we transform the data-value-aware process models to Petri Nets, respecting the semantics of data value usages. By employing an off-the-shelf model checker and specifying data-value centered properties, one can now verify data-value-aware process models. A distinctive feature of our approach is the specification of data values and of their modifications during the process. This enables the verification of interesting properties in many domains. We evalua...

Research paper thumbnail of A Strategy for the Modularization of Courseware

In order to enable courseware reuse, learning platforms nowadays require the materials to be deco... more In order to enable courseware reuse, learning platforms nowadays require the materials to be decomposed into small independent learning units. When trying to fulfill this need, authors face the problem of not knowing how to determine suitable learning objects in their content. What is the appropriate size of one such object? The rather general and abstract definitions for learning objects found in the literature are not very helpful for answering this question. What authors need is an operational definition, which can be directly applied to the learning materials. This paper proposes such a set of formal yet practical definitions by describing learning objects along their contents and resource type and shows how these definitions are used by our platform, SCORE.

Research paper thumbnail of Datenbankkonzepte f�r Ingenieuranwendungen: ein �bersicht �ber den Stand der Entwicklung

Research paper thumbnail of Sicherheit und technischer Datenschutz in Informationssystemen

Research paper thumbnail of Reduction of data-value-aware process models: A relevance-based approach

Research paper thumbnail of Results from the Verification of Models of Spectrum Auctions

Lecture notes in business information processing, 2022

Research paper thumbnail of Technologien und Prozesse für robuste getaktete Logistiknetzwerke : LogoTakt ; Schlussbericht des Karlsruher Instituts für Technologie ; Teil 1 (kurze Darstellung) und Teil 2 (eingehende Darstellung) ; Verbundprojekt mit dem Förderkennzeichen A bis I

Research paper thumbnail of Verteilung und Integration von Informationen im Verkehrsbereich

Verteilung und Mobilität spielen in der Verkehrstelematik eine große Rolle. Die verwendeten Daten... more Verteilung und Mobilität spielen in der Verkehrstelematik eine große Rolle. Die verwendeten Datenquellen sind im Allgemeinen heterogen und von unterschiedlicher Qualität. Im Rahmen des Verbundprojektes OVID der Universität Karlsruhe (TH) bot das Institut für Programmstrukturen und Datenorganisation (IPD) im Sommersemester 2004 ein Seminar mit dem Titel "Verteilung und Integration von Informationen im Verkehrsbereich" an. In diesem Seminar wurden Fragestellungen untersucht, die sich mit den Anforderungen und existierenden Techniken für hochgradige Verteilung und Mobilität von Datenquellen im Verkehrsbereich beschäftigten. Die dabei erzielten Ergebnisse werden in diesem Bericht vorgestellt.

Research paper thumbnail of A Hybrid Approach for Generating Compatible WS-BPEL Partner Processes

Lecture Notes in Computer Science, 2006

The Business Process Execution Language for Web Services provides an technology to aggregate enca... more The Business Process Execution Language for Web Services provides an technology to aggregate encapsulated functionalities for defining high-value Web services. For a distributed application in a B2B interaction, the partners simply need to expose their behavior as BPEL processes and compose them. Still, modeling and composing BPEL processes can be complex and error-prone. With formal methods like Petri nets, it

Research paper thumbnail of Unterstützung der integrierten Gebäudeplanung und -Verwaltung mit einem topologischen Kerndatenmodell

An einem Teil der Topologie architektonischer Räume, dem Volumenadjazenzgraphen (VAG), wird gezei... more An einem Teil der Topologie architektonischer Räume, dem Volumenadjazenzgraphen (VAG), wird gezeigt wie topologisches Modellieren Anwendungen der Bauplanung integrieren kann. Dazu wird ein Prototyp vorgestellt, der im wesentlichen aus drei Komponenten besteht: Mit dem Anforderungsmanager werden Anforderungen eigegeben, die formal gut handhabbar sind. Mit dem Topologiemanager werden diese Anforderungen mit gezeichneten Räumen kombiniert. Die topologischen Relationen in den Zeichnungen werden mit den entsprechenden Funktionen des GIS ermittelt und in eine Datenbank exportiert. Der Anforderungsprüfer vergleicht dann die Anforderungsdaten, die mit Hilfe des Anforderungsmanagers erzeugt wurden, mit den Topologiedaten. Dieser Ansatz soll zeigen, wie topologische Modelle eine Formalisierung semantisch hochstehender Informationen als Eigenschaften von Graphen bzw. topologischen Komplexen ermöglichen.

Research paper thumbnail of A Practical Strategy the Modularization of Courseware Design. In: Professionelles Wissensmanagement – Erfahrungen und Visionen: Adaptive E-Learning and Metadata

In order to enable courseware reuse, it is necessary to decompose learning materials into managea... more In order to enable courseware reuse, it is necessary to decompose learning materials into manageable learning objects. Most scientific projects and organizations that are concerned with courseware reuse and exchange like Ariadne [2], IMS Global Learning Consortium [4], Educause [3], the IEEE Learning Technologies Standards Committee [8] with its

Research paper thumbnail of 2008, ‘Automated derivation of executable business processes from choreographies

Abstract: In this paper, we address the challenge of deriving both, executable WS-BPEL processes ... more Abstract: In this paper, we address the challenge of deriving both, executable WS-BPEL processes and their respective WSDL interface specifications from choreographies written in WS-CDL for business processes in Virtual Organizations (VOs). The major issues hereby are the differences in the vocabulary of WS-CDL and WSBPEL as well as the information gap between a choreography and an executable orchestration. The information gap results from the requirement imposed by the VO environment to establish a process-based collaboration in a top-down fashion. High-level choreography descriptions are hereby the basis for the derivation of detailed executable processes. The first issue is addressed with a detailed translation table; the second, more severe one requires the use of a role specific knowledge base. This knowledge base delivers process subsets modeling detailed role internal activities while avoiding their exposure to collaborating roles. The combined solution is a CDL2BPEL algorith...

Research paper thumbnail of Automated Derivation of Executable Business Processes from Choreographies in Virtual Organizations

Abstract: In this paper, we address the challenge of deriving both, executable WS-BPEL processes ... more Abstract: In this paper, we address the challenge of deriving both, executable WS-BPEL processes and their respective WSDL interface specifications from choreographies written in WS-CDL for business processes in Virtual Organizations (VOs). The major issues hereby are the differences in the vocabulary of WS-CDL and WSBPEL as well as the information gap between a choreography and an executable orchestration. The information gap results from the requirement imposed by the VO environment to establish a process-based collaboration in a top-down fashion. High-level choreography descriptions are hereby the basis for the derivation of detailed executable processes. The first issue is addressed with a detailed translation table; the second, more severe one requires the use of a role specific knowledge base. This knowledge base delivers process subsets modeling detailed role internal activities while avoiding their exposure to collaborating roles. The combined solution is a CDL2BPEL algorith...

Research paper thumbnail of Lockemann: Modular Development of Multimedia Courseware. WISE 2000, the first international conference on web information systems engineering Volume 2

The use of multimedia in courseware and web-based learning is a current topic. This is influenced... more The use of multimedia in courseware and web-based learning is a current topic. This is influenced by the wide availability and the permanently improving technical possibilities. The employment of multimedia technology in education makes it possible to illustrate and to grasp complex processes and coherences. However, the development of multimedia content is still a very costly and tedious task. In order to reduce the costs and efforts needed to build multimedia contents, it is desirable to organize the content in a modular way so that it can be (re)used and created cooperatively. In this paper, we present a development process for multimedia contents that supports a modular cooperative design of multimedia courseware. We argue that applying modularity to courseware design not only reduces the costs but also allows the development of a high-quality reusable and configurable courseware. Configurable courseware can be adapted to meet the needs and characteristics of different lecturers...

Research paper thumbnail of Creating, Filling, and Using a Repository of Reusable Learning Objects for Database Courses

this paper, we will show how the repository is created, how existing material can be fed into it,... more this paper, we will show how the repository is created, how existing material can be fed into it, and how a new course can be build using the existing and new materials. As an example, we have chosen one of the topics that occur frequently in database courses, normalization. The remainder of the paper is structured as follows. In Section 2, we give a brief overview of the process, Section 3 explains how the repository is generated and filled, while Section 4 describes its usage. A brief overview of related work is given in Section 5. The paper ends with a conclusion in Section 6. Throughout most of the paper, we have used a two-column style, where the left column contains explaining text, while the right one shows figures taken from the example scenario

Research paper thumbnail of A Framework for Dealing with Dynamic Buildings

ABSTRACT: The design world of architects and engineers is changing. Costs arising during the whol... more ABSTRACT: The design world of architects and engineers is changing. Costs arising during the whole life cycle of a building are being taken into account. Therefore, complex tools to support design decisions are coming up, and an increasing number of experts from a great variety of disciplines will have to cooperate in a more and more interrelated and sophisticated manner. Our hypothesis is, that an integrated framework based on the metaphor of a “ dynamic building ” as component-based, spatial model will bridge between the information technical representation and the “ classical ” building planning. All planning, cooperation, usage, and aging processes of the building life cycle will be reflected in such a “ virtual ” dynamic building, for which we are developing an appropriate framework. 1

Research paper thumbnail of Semantic support for security-annotated business process models

Abstract. Service-Oriented Architectures (SOA) benefit from business processes (BP), which orches... more Abstract. Service-Oriented Architectures (SOA) benefit from business processes (BP), which orchestrate web services (WS) and human actors in cross organizational environments. In this setting, handling the security and privacy issues while exchanging and processing personal data is essential. This lacks for secure business processes management. To achieve this, we represent security constraints descriptively by annotating process models, aiming to enforce these constraints by a secure business process management system (BPMS).To assist the process modeler in annotating process models, we introduce in this paper a tool which provides semantic interoperability during process design. By enforcing a shared conceptualization (ontology) of the security and privacy domains with an ontology base grounded in natural language this tool called knowledge annotator is able to make annotation recommendations according to knowledge stored in a knowledge base. The annotator is validated in an emplo...

Research paper thumbnail of Using a Context Knowledge Base for the Verification of Vehicle Test Processes

Diagnostic frameworks in the vehicle production domain are important to guarantee the quality of ... more Diagnostic frameworks in the vehicle production domain are important to guarantee the quality of the outcomes of the manufacturing process. Recently, the test processes in these frameworks are becoming more complex due to the use of a large amount of components and electronic devices in modern vehicles. To achieve high quality test processes we take a model checking approach to check that the test processes comply with relevant requirements. We have analyzed the requirements for vehicle test processes and the relevant context information for verification. We use this information to create a context knowledge base, containing information about the components and their relationships and constraints of our application domain, i.e. vehicle test processes. Our goal is to automatically verify test processes, specified in different notations, with a model checking approach. The requirement rules are dynamically generated at verification time from the context knowledge base. The approach is...

Research paper thumbnail of A Security Language for BPMN Process Models

Security mechanisms are essential for business processes. Currently, business-process-management ... more Security mechanisms are essential for business processes. Currently, business-process-management systems (BPMSs) provide relatively little security support, and programmers must be familiar with interfaces of security mechanisms that are not part of BPMSs. Enforcing security constraints for a business process leads to high implementation and maintenance costs. Our approach in turn is a wholistic one, providing security support from the modelling to the runtime phase of a businessprocess lifecycle. As current security-modelling approaches lack features important for business processes, we propose a sophisticated language to formulate respective constraints. In addition, we considerably ease the specification of how users can control their security preferences at runtime. Our security language is embedded in BPMN. We have extended an open-source BPMS on the modelling, configuration and execution layer. The BPMS extensions transform BPMN schemas with security constraints into executabl...

Research paper thumbnail of Making Courseware Reusable

In this paper we discuss how the development of reusable courseware can be supported by using mod... more In this paper we discuss how the development of reusable courseware can be supported by using modularization and ontologies. We argue that those concepts will enhance the quality of courseware and its cooperative development as well as the degree of its reusability and exchange. An adequate development process is presented, and it is shortly sketched how to use the resulting courseware in a new manner. Our goal is to provide an approach to develop adaptable learning material that can be reused by different authors and educators and even students for many target groups in different contexts.

Research paper thumbnail of Verification of Data-Value-Aware Processes and a Case Study on Spectrum Auctions

2020 IEEE 22nd Conference on Business Informatics (CBI), 2020

Verification techniques are fundamental to improve the reliability of process designs in practice... more Verification techniques are fundamental to improve the reliability of process designs in practice. In application domains like auctions, the issue is extremely valuable; the goal of auction designers is to prevent undesirable executions and maximize certain outcome measures. Current verification approaches tend to be confined to control flows, even though data values play a significant role. We address this issue by proposing a new data-value-aware verification approach: We enhance process models with information on data values. Then we transform the data-value-aware process models to Petri Nets, respecting the semantics of data value usages. By employing an off-the-shelf model checker and specifying data-value centered properties, one can now verify data-value-aware process models. A distinctive feature of our approach is the specification of data values and of their modifications during the process. This enables the verification of interesting properties in many domains. We evalua...

Research paper thumbnail of A Strategy for the Modularization of Courseware

In order to enable courseware reuse, learning platforms nowadays require the materials to be deco... more In order to enable courseware reuse, learning platforms nowadays require the materials to be decomposed into small independent learning units. When trying to fulfill this need, authors face the problem of not knowing how to determine suitable learning objects in their content. What is the appropriate size of one such object? The rather general and abstract definitions for learning objects found in the literature are not very helpful for answering this question. What authors need is an operational definition, which can be directly applied to the learning materials. This paper proposes such a set of formal yet practical definitions by describing learning objects along their contents and resource type and shows how these definitions are used by our platform, SCORE.