Chih-Han Chu, Menghsi Wan, Yufan Yang, J. Gao, L. Deng
{"title":"Building On-demand Marketing SaaS for Crowdsourcing","authors":"Chih-Han Chu, Menghsi Wan, Yufan Yang, J. Gao, L. Deng","doi":"10.1109/SOSE.2014.63","DOIUrl":"https://doi.org/10.1109/SOSE.2014.63","url":null,"abstract":"The concept of crowdsourcing has been introduced for years and greatly accepted by companies and enterprises. As opposed to current marketing systems, this paper designs a new marketing system by merging the idea of crowdsourcing into marketing information system (MkIS). Our purpose is to develop a cloud-based MkIS which serves as a platform and provides info publishing/tracking via various media and crowdsourcing features. To ensure accessibility and cost-efficiency, the product will be deployed as Software as a Service (SaaS), which will be capable of supporting large number of customers. The implementation of this idea is to construct a prototype system which targets enterprise and crowdsourcing service providers. The outcome has two deliverables. One is application server, which hosts the service API for web clients. Another is database server, which stores and replicates application data. The work serves as one of the first attempts for an information system flexible enough to adapt marketing, crowdsourcing, and other business workflows. Moreover, it shows the potential of the form of MkIS. This paper also presents the design and implementation of the system.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123972885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yingpu Zhu, Lu Liu, John Panneerselvam, Liang-min Wang, Zhiyuan Li
{"title":"Credit-Based Incentives in Vehicular Ad Hoc Networks","authors":"Yingpu Zhu, Lu Liu, John Panneerselvam, Liang-min Wang, Zhiyuan Li","doi":"10.1109/SOSE.2014.51","DOIUrl":"https://doi.org/10.1109/SOSE.2014.51","url":null,"abstract":"Given the resource consumption of transmitting data packets in Vehicular Ad Hoc Network (VANET), selfish nodes might refuse to transmit messages to others just for maximizing their own profits. Therefore, the communication performance within the whole network would be affected. Along with its wide-scale implementation in many road-side applications, selfish behaviors of such nodes are witnessed to be causing serious problems and degradations in VANETs. We address the impacts of the selfish nodes in the performance of VANETs and accordingly, the credit-based method is utilized to re-implement the spirit that can provide incentive for mobile nodes to cooperate with each other and report actions honestly. The simulation results demonstrated that the system earnings would decrease due to the existence of selfish nodes, thereby also proving that the incentive mechanism can facilitate mutual cooperation among nodes.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125672204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concurrent Test Algebra Execution with Combinatorial Testing","authors":"W. Tsai, Jie Luo, Guanqiu Qi, Wenjun Wu","doi":"10.1109/SOSE.2014.11","DOIUrl":"https://doi.org/10.1109/SOSE.2014.11","url":null,"abstract":"Software-as-a-Service (SaaS), a new software delivery model, plays an important role in daily life. In SaaS, mission-critical applications are composed, deployed, and executed on cloud platforms. SaaS applications needed to have high reliability and availability before publishing. Testing SaaS applications becomes important, as the large number of testing prior to their deployment. Test Algebra (TA), a algebraic system, identifies faults in combinatorial testing for SaaS applications using existing test results and eliminates those related faults. Although TA eliminates a large number of configurations from considerations, it is still difficult to finish testing enormous combinations of services in a reasonable time. To improve TA analysis, this paper proposes a concurrent TA analysis. It allocates workloads into different clusters of computers and performs TA analysis from 2-way to 6-way configurations. Different database designs are used to store the test results of various configurations. Faulty and operational table search algorithms are proposed to retrieve existing test results. One 25-component experiment is simulated using the proposed solutions. The same experiment is also simulated on multiple processors for concurrent TA analysis.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123466703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Analysis of Availability for SaaS Multi-tenant Architecture","authors":"Wenbo Su, Chuang Lin, Kun Meng, Qu Liu","doi":"10.1109/SOSE.2014.65","DOIUrl":"https://doi.org/10.1109/SOSE.2014.65","url":null,"abstract":"Software as a Service(SaaS) is increasingly becoming an important application development and delivery model. Among different implementation architectures, multi-tenant architecture(MTA) has received most attentions. Not only because it is easier to be maintained, but also increases the resource utilization. However, sharing the same instance will have impact on the availability of each tenant. Availability is a very critical attribute of tenants' SLA, but modeling and analysis of availability for MTA SaaS is challenging. In this paper, we firstly discuss the differences of availability between one-tenant and multi-tenant from tenant's view. Then we analyze the repair and failure rate based on the MTA feature and give the function expression with parameters of the number of tenant's users. And a Markov model is built for availability analysis. We solve the model and get the computation expression of the availability in a case study. Then a numerical result is obtained under the specific conditions and finally we have a simply discussion on it.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122868918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ReSpam: A Novel Reputation Based Mechanism of Defending against Tag Spam in Social Computing","authors":"Yonggang Wang, Shan Yao, Jing Li, Zhongfei Xia, Hanbing Yan, Junfeng Xu","doi":"10.1109/SOSE.2014.49","DOIUrl":"https://doi.org/10.1109/SOSE.2014.49","url":null,"abstract":"Defending against spam in tagging system is a very challenging task. This paper presents ReSpam, a novel reputation based mechanism of defending against tag spam in tagging systems. In ReSpam, timing behaviors and voting methods are introduced to defend tag spam. Each user has a global reputation which can increase or decrease after some judgement given bythe tagging system. When the system finds that the time between logging and posting is too short or the time between opening a webpage and posting a tag is too short, the reputations of all the users who post a tag of that kind will decrease. For a uncertain tag, the system requests some users to help to judge the quality of that uncertain tag. If the feedback shows that lots of users regard that tag as spam, all the users who post a tag of that kind will find their reputations lower than before. Otherwise, those users' reputations will increase. The advantage of ReSpam is its simple rationale and less computing compared to pairwise reputation based mechanism such as SpamClean and DSpam. The system ranks search result by the average reputation of annotators of each result. Experimental results show ReSpam can effectively resist tag spam and work better than some existing tag search schemes.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130386735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring a New Security Framework for Cloud Storage Using Capabilities","authors":"G. Mapp, Mahdi Aiash, Brian Ondiege, M. Clarke","doi":"10.1109/SOSE.2014.69","DOIUrl":"https://doi.org/10.1109/SOSE.2014.69","url":null,"abstract":"We are seeing the deployment of new types of networks such as sensor networks for environmental and infrastructural monitoring, social networks such as facebook, and e-Health networks for patient monitoring. These networks are producing large amounts of data that need to be stored, processed and analysed. Cloud technology is being used to meet these challenges. However, a key issue is how to provide security for data stored in the Cloud. This paper addresses this issue in two ways. It first proposes a new security framework for Cloud security which deals with all the major system entities. Secondly, it introduces a Capability ID system based on modified IPv6 addressing which can be used to implement a security framework for Cloud storage. The paper then shows how these techniques are being used to build an e-Health system for patient monitoring.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115108575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Requirements Driven Architecture Evolution in Social Networking SaaS: An Industrial Case Study","authors":"Dong Sun, Rong Peng, W. Tsai","doi":"10.1109/SOSE.2014.27","DOIUrl":"https://doi.org/10.1109/SOSE.2014.27","url":null,"abstract":"Recently many companies have featured their applications as SaaS (Software as a Service) applications where applications will be treated as services and provided online for thousands and millions of users. Social Networking SaaS (SNS) is one of the most popular kinds of SaaS. The key to the success of a SNS heavily relies on the scale of users. With the explosive growth of users, SNS's architecture should be able to change according to the demand. To better understand what kind of requirements influences SNS's architecture most, and learn the relationships between these requirements and the evolution progress of architecture, this paper carried out a dedicated analysis on a popular SNS application, Instagram. The lessons learned show that: 1) Demands on scalability and real-time are the main driven forces to architecture redesign, 2) Data coming from extensive monitoring is one of the most important sources of evolutionary requirements/issues, which drives different types of architecture evolution, 3) Reusing existing components is the key factor to evolve architecture rapidly and costly. The lessons learned can help engineers and researchers understand the co-evolution progress between requirements and architectures, and how to devise appropriate architectures to meet the possible evolution challenges for SNS.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124106220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Goal-Directed Modeling Technique towards Business Process","authors":"Yuqun Zhang, D. Perry","doi":"10.1109/SOSE.2014.18","DOIUrl":"https://doi.org/10.1109/SOSE.2014.18","url":null,"abstract":"The modeling techniques for business process are mostly graphics-based, that is argued to be simplified when the processes become too complex or expanded to provide full details. In this paper we propose a technique for modeling composite activities by including components of data, human actors and atomic activities. Furthermore, we represent business processes with composite activities using process-oriented languages. To explore the properties of the business processes under this modeling technique, we define a set of metrics that reflect the degree of data aggregation and human actor involvement of executing composite activities. Algorithms to calculate these metrics are derived based on the goal-directed nature of the modeling technique for composite activities and business processes. At last by providing a use case, we discuss the artifacts and future work for this modeling technique.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"463 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MTracer: A Trace-Oriented Monitoring Framework for Medium-Scale Distributed Systems","authors":"Jingwen Zhou, Zhenbang Chen, Haibo Mi, Ji Wang","doi":"10.1109/SOSE.2014.37","DOIUrl":"https://doi.org/10.1109/SOSE.2014.37","url":null,"abstract":"Trace-oriented runtime monitoring is a very effective method to improve the reliability of distributed systems. However, for medium-scale distributed systems, existing trace-oriented monitoring frameworks are either not powerful or efficient enough, or too complex and expensive to deploy and maintain. In this paper, we present MTracer, which is a lightweight trace-oriented monitoring system for medium-scale distributed systems. We have proposed and implemented several optimizations to improve the efficiency of the monitor server in MTracer. A web-based frontend is also provided to visualize a monitored system from different perspectives. We have validated MTracer in a real medium-scale environment. The results indicate that MTracer has a very lower overhead, and can handle more than 4000 events per second.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-tenancy and Sub-tenancy Architecture in Software-as-a-Service (SaaS)","authors":"W. Tsai, Peide Zhong","doi":"10.1109/SOSE.2014.20","DOIUrl":"https://doi.org/10.1109/SOSE.2014.20","url":null,"abstract":"Multi-tenancy architecture (MTA) is often used in Software-as-a-Service (SaaS) and the central idea is that multiple tenant applications can be developed using components stored in the SaaS infrastructure. Recently, MTA has been extended where a tenant application can have its own sub-tenants as the tenant application acts like a SaaS infrastructure. In other words, MTA is extended to STA (Sub-Tenancy Architecture). In STA, each tenant application not only needs to develop its own functionalities, but also needs to prepare an infrastructure to allow its sub-tenants to develop customized applications. This paper formulates eight models for STA, and discusses their trade-offs including their formal notations and application scenarios.","PeriodicalId":360538,"journal":{"name":"2014 IEEE 8th International Symposium on Service Oriented System Engineering","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116637948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}