Shuying Yan, Yanbo Han, Jing Wang, Chen Liu, Guiling Wang
{"title":"A User-Steering Exploratory Service Composition Approach","authors":"Shuying Yan, Yanbo Han, Jing Wang, Chen Liu, Guiling Wang","doi":"10.1109/SCC.2008.78","DOIUrl":"https://doi.org/10.1109/SCC.2008.78","url":null,"abstract":"Service orchestration logics can be difficult to be totally pre-fabricated when facing uncertain requirements. It is sometimes indispensable to get end users involved. However, there are some requirements: 1) Allow users to express their desired goals incrementally. 2) Allow users to specify key trajectory constraints. 3) Provide intelligent assistance to users in the composition. Intuitively we propose a user-steering explorative service composition approach that can support extended goals. It gives users more control and facilitates incremental development by suggesting candidate paths. During the generation of candidate paths, we use heuristics to find better plan paths, then guide users to gradually progress towards the goal. The proposed approach is verified in a typical bioinformatics scenario. The preliminary experiment results show that the approach can improve the efficiency and timelyness of service composition.","PeriodicalId":399213,"journal":{"name":"2008 IEEE International Conference on Services Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115007877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive Admission Control Algorithm for Advance Reservation in Equipment Grid","authors":"Jie Yin, Yuexuan Wang, M. Hu, Cheng Wu","doi":"10.1109/SCC.2008.13","DOIUrl":"https://doi.org/10.1109/SCC.2008.13","url":null,"abstract":"Experiments submitted to equipment grid have quality of service (QoS) requirements, and advance reservation is used to satisfy such requirements. Due to the dynamic behaviors and fluctuations of resources in equipment grid, some previously accepted advance reservations are unable to be fulfilled. In this paper, we present a predictive admission control algorithm to decide whether new advance reservation requests can be accepted according to their QoS requirements and prediction of future resource utilization. Historical data are used in this algorithm to predict future status of resources. Experiments demonstrate that our algorithm can reduce the number of accepted advance reservations that fail to be fulfilled and keep the resource utilization ratio at an acceptable level.","PeriodicalId":399213,"journal":{"name":"2008 IEEE International Conference on Services Computing","volume":"45 38","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120836368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chun Zhang, Rong N. Chang, Chang-Shing Perng, Edward So, Chunqiang Tang, Tao Tao
{"title":"Leveraging Service Composition Relationship to Improve CPU Demand Estimation in SOA Environments","authors":"Chun Zhang, Rong N. Chang, Chang-Shing Perng, Edward So, Chunqiang Tang, Tao Tao","doi":"10.1109/SCC.2008.135","DOIUrl":"https://doi.org/10.1109/SCC.2008.135","url":null,"abstract":"Service oriented architecture (SOA) helps dynamically construct composite services out of a set of low-level atomic services to satisfy customer requirements. For the purpose of capacity planning and resource provisioning, it is important to understand these services' demand for system resources, e.g., CPU. In this paper, we propose a black-box method for estimating CPU demand of service requests based on linear regression between the observed request throughput and resource utilization level. A key advantage of our method is that its input data (i.e., request-processing throughput and resource utilization) can be easily obtained without intrusive software instrumentation. Moreover, we observe that, in an SOA environment, the service composition relationship (i.e., how low-level atomic services are connected into a composite service) is either known in advance or can be discovered through various means. We leverage this composition relationship to further improve the quality of CPU demand estimation. By analyzing the dependency between a composite service and its constituent low-level atomic services using linear algebra, our method can eliminate the collinear problem introduced by the service composition relationship. Moreover, our method can further reduce the number of unknown variables in the linear regression problem, and hence reduce the time duration needed to collect input data. In a dynamic SOA environment, this translates into faster response to changing workloads and more accurate estimation. We demonstrate these advantages of our method over a baseline method through extensive evaluation.","PeriodicalId":399213,"journal":{"name":"2008 IEEE International Conference on Services Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120960070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. A. Kateros, G. Kapitsaki, N. Tselikas, I. Venieris
{"title":"A Methodology for Model-Driven Web Application Composition","authors":"D. A. Kateros, G. Kapitsaki, N. Tselikas, I. Venieris","doi":"10.1109/SCC.2008.58","DOIUrl":"https://doi.org/10.1109/SCC.2008.58","url":null,"abstract":"Web application composition can greatly benefit from the utilization of existing frameworks and reusable components, in order to reduce development effort. Frameworks implementing the model-view-controller architectural pattern standardize the development process to a great extent, while business layer components may consist of consumers of existing Web services. On this line of thought a Web application can be seen as a composition of Web services around a user interface flow. In this paper, an approach for the application of model-driven techniques for the automation of the development of such a Web application is presented. Specifically, we present a methodology for the modeling of the application using UML state transition and class diagrams and the generation of the appropriate source code and configuration files. The appropriate UML profiles to assist the service design are defined and the final transformation is performed exploiting model parsing tools.","PeriodicalId":399213,"journal":{"name":"2008 IEEE International Conference on Services Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124833243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 3-level e-Business Registry Meta Model","authors":"C. Huemer, P. Liegl, R. Schuster, M. Zapletal","doi":"10.1109/SCC.2008.54","DOIUrl":"https://doi.org/10.1109/SCC.2008.54","url":null,"abstract":"Business partners willing to do business electronically with each other must reach an agreement (1) on the economic level, (2) on the inter-organizational process choreography, and (3) on the services implementing the choreography. In order to search for a potential business partner, one will first look for a partner who offers a required service on the economic level and who supports a complementary role in a choreography, before binding to its IT services. In as much, a registry for inter-organizational systems should cover all three levels and maintain the dependencies between them. In this paper we set up on well accepted approaches on the different levels, i.e. (1) the e3value ontology, (2) the UN/CEFACT modeling methodology (UMM), and (3) the business process execution language (BPEL). We specify a registry meta model on top of ebRIM registering the artifacts on the different levels and defining their inter-dependencies.","PeriodicalId":399213,"journal":{"name":"2008 IEEE International Conference on Services Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125391342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identify Authorization Control Requirement in Business Collaboration","authors":"Daisy Daiqin He, Jian Yang","doi":"10.1109/SCC.2008.75","DOIUrl":"https://doi.org/10.1109/SCC.2008.75","url":null,"abstract":"Different types of business collaborations exist in terms of the way that the collaboration is carried out. In this paper, we will look into the characteristics of different collaborations and analyze their policy requirements accordingly. Various inconsistencies between authorization policies from different business units are identified and suggestions are made according to different types collaborations.","PeriodicalId":399213,"journal":{"name":"2008 IEEE International Conference on Services Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114934461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karima Mokhtari-Aslaoui, S. Benbernou, Mohand-Said Hacid, E. Coquery, F. Leymann
{"title":"Verification of Privacy Timed Properties in Web Service Protocols","authors":"Karima Mokhtari-Aslaoui, S. Benbernou, Mohand-Said Hacid, E. Coquery, F. Leymann","doi":"10.1109/SCC.2008.154","DOIUrl":"https://doi.org/10.1109/SCC.2008.154","url":null,"abstract":"In this work we propose an approach for verifying privacy timed-related properties of web service protocol. While in [anal] the addressed problem in business protocols is focused on the analysis and management of functional requirements that support rich timing constraints, our approach extends the previous results to capture the timed behavior of privacy constraints. Hence, we provide a model called Timed Private Business Protocol TPBP. Next, we emphasize the timed properties related to privacy in TPBP. Finally, we present the different types of timed property verification to achieve upon the timed private business protocol.","PeriodicalId":399213,"journal":{"name":"2008 IEEE International Conference on Services Computing","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122460319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Promoting Reuse via Extraction of Domain Concepts and Service Abstractions from Design Diagrams","authors":"Kalapriya Kannan, B. Srivastava","doi":"10.1109/SCC.2008.19","DOIUrl":"https://doi.org/10.1109/SCC.2008.19","url":null,"abstract":"Systematic reuse of software artifacts has been an elusive goal for several years. Service-oriented architecture (SOA) has been touted in recent years due its promise of fostering reuse. Even so, reuse with SOA continues to be limited due to the lack of formal techniques for extracting domain knowledge from existing reusable software assets. In this paper,we present an approach that extracts the domain knowledge and service abstractions from design diagrams of existing software solutions and represents it in a form that can be reused in new projects. We have implemented our approach and preliminary results indicate that both domain knowledge and service abstraction thus extracted can promote reuse of software assets to a large extent.","PeriodicalId":399213,"journal":{"name":"2008 IEEE International Conference on Services Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128119586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"wsrbench: An On-Line Tool for Robustness Benchmarking","authors":"N. Laranjeiro, Salvador Canelas, M. Vieira","doi":"10.1109/SCC.2008.123","DOIUrl":"https://doi.org/10.1109/SCC.2008.123","url":null,"abstract":"Testing Web services for robustness is a difficult task. In fact, existing development support tools do not provide any practical mean to assess Web services robustness in the presence of erroneous inputs. Previous works proposed that Web services robustness testing should be based on a set of robustness tests (i.e., invalid Web services call parameters) that are applied in order to discover both programming and design errors. Web services can be classified based on the failure modes observed. In this paper we present and discuss the architecture and use of an on-line tool that provides an easy interface for Web services robustness testing. This tool is publicly available and can be used by both web services providers (to assess the robustness of their Web services code) and consumers (to select the services that best fit their requirements). The tool is demonstrated by testing several Web services available in the Internet.","PeriodicalId":399213,"journal":{"name":"2008 IEEE International Conference on Services Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125708306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Negotiation Service for Trading Intangible Goods on Real-time Markets","authors":"F. Bodendorf, Florian Lang","doi":"10.1109/SCC.2008.159","DOIUrl":"https://doi.org/10.1109/SCC.2008.159","url":null,"abstract":"There is a constantly increasing need for dynamically trading intangible goods in today's economies. Electronic markets for intangible goods are on the rise. IT-based services support transaction activities between suppliers and customers. The vital task is negotiating a contract. Managing flexible transactions with varying market partners, considering multidimensional terms and conditions, and acting within short periods of time are crucial challenges for automated negotiation services of electronic markets. The approach of intelligent software agents as a negotiation service is presented. Aspects on negotiation protocol, software agent design and implementation are outlined. Insights into sample experiments and results are given.","PeriodicalId":399213,"journal":{"name":"2008 IEEE International Conference on Services Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122247707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}