The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Source code reuse is a common practice in software development. Since industrial developers may accidentally reuse source files developed by open source software, clone detection tools are used to detect open source files in their closed source project. To execute a clone detection, developers need a database of existing open source software. While a web-service providing clone detection using a centralized...
Consumer-initiated sporadic operations on cloud applications, such as deployment, upgrade and reconfiguration, may fail because of the inherent uncertainty of operating in a cloud environment. For example, if a VM is not able to start, operations dependent on that VM will fail. In this paper we propose an approach for analyzing sporadic operations on cloud applications to facilitate recovery. We do...
At present, the tourism change information management cannot be resolved efficiently and effectively, and this may cause tourists' travel to be out of order, leaving behind much pressure to transportation, scenic spots, hotels facilities and so forth. The main reason for this is lacking adaptive handling mechanism for this situation. This paper describes the mechanism of tourism information Change...
The paper addresses Medical Hand Drawing Management System architecture and implementation. In the system, we developed four modules: hand drawing management module; patient medical records query module; hand drawing editing and upload module; hand drawing query module. The system adapts windows-based applications and encompasses web pages by ASP.NET hosting mechanism under web services platforms...
XML is a commonly used data representation format for Web applications. One of the reasons for the attractiveness of XML is its flexibility to store unstructured, semi-structured and structured data.However, supporting this flexibility is challenging from a technical perspective and several approaches have been proposed for storage of XML. The focus of this paper is hybrid storage, combining relational...
New systems can be created by assembling a set of elementary services provided by various stakeholders in a service composition. Service composition is not a trivial endeavor and several composition methods exist. Yet, these methods are hardly adopted by the field, as they need a set of well-defined and well- described services and are not able to deal with incomplete information and unambiguous descriptions...
This paper makes a quite deep research on the related theories and technologies of OGSA (Open Grid Services Architecture), Web service, etc. a new model of system integration, which constructs a dynamic linking integration mechanism with good flexibility by using the service-oriented system and cross platform property of Web service. The model can improve the efficiency of Web service and the cooperation...
Radio frequency identify (RFID) is one of technology to facilitate ubiquitous environment. For the ubiquitous environment, it is necessary to model a RFID information framework where based on network. A web service is a Service Oriented Architecture (SOA) that can achieve the purpose. Use the web services by internet; enterprise will exchange information quickly and easy. And enterprise could strategy...
Semantic web services have received a significant amount of research attention in the last years but too little effort has been put into the evaluation of the approaches so far. The main blocker of thorough evaluations is the lack of large and diverse test collections for semantic web services. In this demo we present a portal designed to help working towards common test collections by making it easy...
Approaches to Web service composition are dependent upon some form of repository to hold service descriptions. Most service composition software relies upon highly-optimized and proprietary formats for representing service descriptions and storing them into a repository. Unlike these approaches, this paper reports on the development and evolution of a standards-based service description repository...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
As distributed collaborative applications and architectures are adopting policy-based solutions for tasks such as access control, network security and data privacy, the management and consolidation of a large number of policies is becoming a crucial component of such solutions. In large-scale distributed collaborative applications like Web services, there is need for analyzing policy interaction and...
This paper proposed a two layer authorization mechanism, including traditional password system and rhythm recognition. The whole system includes two phases: preprocessing and usual operation for users. In preprocessing phase, users type password in a specific rhythm in order to record and analyse the characteristics of behaviour of users. In the second phase, how to verify a user in usual operation...
Distributed software systems are characterized by increasing autonomy. They often have the capability to sense the environment and react to it, discover the presence of other systems and take advantage of their services, adapt and re-configure themselves in accordance with the internal as well as the global state. Testing this kind of systems is challenging, and systematic and automated approaches...
Worst case execution time analysis based on measurements requires large test suites to obtain reliable numbers. We are thus developing tools to efficiently generate these test sets in a whitebox-testing approach. To make project progress measurable and guard against regressions, a benchmarking suite is sought for. We present a set of requirements that have been collected and outline the design of...
Todaypsilas e-businesses rely heavily on trust and reputation systems. These systems are key indicators for businesses performance. Businesses that interact with each other for their business needs form a digital business ecosystem (DBE). Members of DBE need to know the trust and reputation value of each other before the start of business interactions. The feedback mechanism is needed so that members...
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
In this paper we propose a way to facilitate the issue of discovering the eGovernment services that address a citizen's need. This approach is implemented in an application, which we call a semantic portal. The semantic portal is part of our SemanticGov project architecture. The portal's components and its architecture are presented and explained. The portal's conceptual modeling is based on the generic...
The paper describes an annotation-based Java framework for supporting transactional Web services. We provide a framework for automated management of compensations in business activity type extended transactions. Unlike rollbacks in traditional ACID transactions, these usually require substantial implementation effort by business programmers. Our annotations provide a flexible, intuitive and easy to...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.