2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)最新文献

筛选
英文 中文
User Interaction with a Technology Evolution Model to Select Most Viable Enterprise Information Systems 用户交互与技术演化模型选择最可行的企业信息系统
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA) Pub Date : 2019-11-01 DOI: 10.1109/SOCA.2019.00030
A. Skulimowski, Inez Badecka
{"title":"User Interaction with a Technology Evolution Model to Select Most Viable Enterprise Information Systems","authors":"A. Skulimowski, Inez Badecka","doi":"10.1109/SOCA.2019.00030","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00030","url":null,"abstract":"One of alternative ways to achieve a competitive advantage by an enterprise in the ICT area is to select the most prospective information system (IS) as a seed technology. The latter is defined as a first technology from a given area implemented in an enterprise, that determines or strongly influences the choice of further technologies from the same area. Seed ICT selection is particularly relevant for enterprises whose core business activity relies on online service provision. In this paper we present a user-requirement-based interaction scheme of an application that models the evolution of enterprise ISs, taking into account the production patterns of software releases, the functionalities offered, the users' community growth trends, and other factors. The evolution is modeled by hybrid discrete-time/discrete-event systems, and multi-models built with them. The technology choice is supported by multicriteria ranking algorithms that apply IS innovativeness forecasts. Moreover, this evolution model of enterprise IS can handle different uncertainties and cyber security issues. We present the use cases and scenarios, model management, and the knowledge base that stores time series, IS characteristics and forecasts. The use of this application is illustrated by a real-life example of three popular open-source CMSs. We conclude that an informed choice of the first IS and the corresponding enterprise architecture as a seed technology is particularly relevant for start-ups and SMEs. An extended variant of the above application may also provide decision support to developer teams seeking software evolution models to discover and apply the best-possible technology development and market strategies.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131934043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service-Oriented Architecture for Intelligent Management with Data Analytics and Visualization 面向服务的数据分析和可视化智能管理体系结构
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA) Pub Date : 2019-11-01 DOI: 10.1109/SOCA.2019.00018
Hsuan-Yu Lin, Yu-Hsuan Chiu, W. Liao, Ray-I Chang
{"title":"Service-Oriented Architecture for Intelligent Management with Data Analytics and Visualization","authors":"Hsuan-Yu Lin, Yu-Hsuan Chiu, W. Liao, Ray-I Chang","doi":"10.1109/SOCA.2019.00018","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00018","url":null,"abstract":"Future intelligent management systems compose of heterogeneous devices with lots of applications cooperatively to analyze data. Recent advances in Service-Oriented Architecture (SOA) provide opportunities for solving this challenge with reusability, composability, and abstraction. In this paper, we develop an intelligent management platform using cloud computing and SOA. It provides different service modules to collect, store, analyze, and visualize the Internet of Things (IoT) data to fit Cyber-Physical System (CPS), all these functions are wrapped as RESTful APIs so it can be imported to other applications, making the same service can be reused to meet the requirements of different fields. In addition, an editable dynamic dashboard service is proposed to personalize the management demand in a click-and-drag way. Users can analyze and observe data for intelligent management. Finally, we apply these services to build three different applications to validate the power of our service platform.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132937196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Title Page III 第三页
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA) Pub Date : 2019-11-01 DOI: 10.1109/soca.2019.00002
{"title":"Title Page III","authors":"","doi":"10.1109/soca.2019.00002","DOIUrl":"https://doi.org/10.1109/soca.2019.00002","url":null,"abstract":"","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133412391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of a Personal Authentication System T-Time 一个个人认证系统的实现
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA) Pub Date : 2019-11-01 DOI: 10.1109/SOCA.2019.00019
Gi-Chul Yang, H. Oh
{"title":"Implementation of a Personal Authentication System T-Time","authors":"Gi-Chul Yang, H. Oh","doi":"10.1109/SOCA.2019.00019","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00019","url":null,"abstract":"Currently, the most commonly used personal authentication system for digital deveces use text-based passwords. However, long passwords which increse the security are hard to remember and decrease the usability. Nowadays, alternative systems are used such as graphical password systems and biometrics systems. Each of them has its own problem also. Lost password cannot be replaced in case of biometric system and graphical password systems are weak at shoulder-surfing attacks. This paper describes implementation of a new personal authentication scheme called T-TIME. T-TIME uses touch signal generation time information which is cumbersome to identify by watching.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134146861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Step-by-Step Guidelines for Making Smart Contract Smarter 让智能合约更智能的分步指南
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA) Pub Date : 2019-11-01 DOI: 10.1109/SOCA.2019.00012
Ya-wen Jeng, Yung-Chen Hsieh, Ja-Ling Wu
{"title":"Step-by-Step Guidelines for Making Smart Contract Smarter","authors":"Ya-wen Jeng, Yung-Chen Hsieh, Ja-Ling Wu","doi":"10.1109/SOCA.2019.00012","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00012","url":null,"abstract":"Different from traditional programs, which run on local machines or in the clouds, smart contracts run mostly on miners' devices; moreover, users of smart contracts have to pay fees (i.e., gases in Ethereum) to miners for executing transactions on the blockchain. Lacking of enough experiences in developing smart contracts makes writing low cost and high efficiency smart contracts becoming a very challenging task. In this work, by collating existing approaches and developing new methods for reducing gas consumption, a set of systematical step-by-step guidelines for developing low cost smart contracts is proposed. To prove its usefulness, ZoKrates verifier, a very complicated and costly contract, is used to demonstrate how our scheme can effectively cut the gas consumption down.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DIMON: Distributed Monitoring System for Decentralized Edge Clouds in Guifi.net 戴蒙:贵网分布式边缘云的分布式监控系统
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA) Pub Date : 2019-11-01 DOI: 10.1109/SOCA.2019.00009
R. P. Centelles, Mennan Selimi, Felix Freitag, L. Navarro
{"title":"DIMON: Distributed Monitoring System for Decentralized Edge Clouds in Guifi.net","authors":"R. P. Centelles, Mennan Selimi, Felix Freitag, L. Navarro","doi":"10.1109/SOCA.2019.00009","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00009","url":null,"abstract":"Community-built telecommunication networks such as Guifi.net demonstrate how end users can actively collaborate in the self-provision of network services, for instance by operating a self-organized distributed monitoring system. Network monitoring is performed by many small servers at the users' premises but data are only accessible via a centralized interface. Besides, due to network partitions and churn of the monitoring servers, failures in the monitoring system are frequent, leaving parts of the network unmonitored. Distributed databases are a promising solution for data replication under network partition condition, but they suffer from a trade-off between data consistency and availability. Furthermore, these databases are used in data centers with abundant computing resources, not in light edge networks. In this work we present DIMON, a reliable edge-based, eventually-consistent monitoring system that leverages CRDT-based data structures implemented in AntidoteDB. Conflict-free replicated data types (CRDTs) are able to converge to a consistent state in environments with network partitions as those found in edge networks. Our results give insights on the load of AntidoteDB on edge devices under different scenarios of read and write operations. The experiments carried out in a production network with a real system implemented contribute to the research community's knowledge about the available technologies for a consistent replicated data storage layer to support edge computing clouds.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127599331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Serving Machine Learning Workloads in Resource Constrained Environments: a Serverless Deployment Example 在资源受限环境中服务机器学习工作负载:无服务器部署示例
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA) Pub Date : 2019-09-08 DOI: 10.1109/SOCA.2019.00016
Angelos Christidis, Roy Davies, S. Moschoyiannis
{"title":"Serving Machine Learning Workloads in Resource Constrained Environments: a Serverless Deployment Example","authors":"Angelos Christidis, Roy Davies, S. Moschoyiannis","doi":"10.1109/SOCA.2019.00016","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00016","url":null,"abstract":"Deployed AI platforms typically ship with bulky system architectures which present bottlenecks and a high risk of failure. A serverless deployment can mitigate these factors and provide a cost-effective, automatically scalable (up or down) and elastic real-time on-demand AI solution. However, deploying high complexity production workloads into serverless environments is far from trivial, e.g., due to factors such as minimal allowance for physical codebase size, low amount of runtime memory, lack of GPU support and a maximum runtime before termination via timeout. In this paper we propose a set of optimization techniques and show how these transform a codebase which was previously incompatible with a serverless deployment into one that can be successfully deployed in a serverless environment; without compromising capability or performance. The techniques are illustrated via worked examples that have been deployed live on rail data and realtime predictions on train movements on the UK rail network. The similarities of a serverless environment to other resource constrained environments (IoT, Mobile) means the techniques can be applied to a range of use cases.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115687886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service 基于自适应霍夫曼编码哈希树的云存储服务违规实时证明
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA) Pub Date : 2018-01-23 DOI: 10.1109/SOCA.2019.00029
Jehn-Ruey Jiang, Wei-Sheng Chung
{"title":"Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service","authors":"Jehn-Ruey Jiang, Wei-Sheng Chung","doi":"10.1109/SOCA.2019.00029","DOIUrl":"https://doi.org/10.1109/SOCA.2019.00029","url":null,"abstract":"This paper proposes two adaptive Huffman coding hash tree algorithms to construct the hash tree of a file system. The algorithms are used to design the real-time proof of violation (PoV) scheme for the cloud storage service to achieve mutual non-repudiation between the user and the service provider. The PoV scheme can then generate cryptographic proofs once the service-level agreement (SLA) is violated. Based on adaptive Huffman coding, the proposed algorithms add hash tree nodes dynamically when a file is accessed for the first time. Every node keeps a count to reflect the frequency of occurrence of the associated file, and all nodes' counts and the tree structure are adjusted on-the-fly for every file access. This can significantly reduce the memory and computation overheads required by the PoV scheme. The file access patterns of the NCUCCWiki and the SNIA IOTTA datasets are used to evaluate the performance of the proposed algorithms. The algorithms are also compared with a related hash tree construction algorithm used in a PoV scheme, named ERA, to show their superiority in performance.","PeriodicalId":113517,"journal":{"name":"2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128897622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信