The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper reports our research on utilizing discernibility matrix method of Rough Set (RS) theory to improve the OGC web services (OWSs) semantic search. Based on RS theory, we build a description vocabulary reduction model involving attributes and spatial relation for OWSs and implement knowledge reduction on Geographic Information Service (GISe) instance-database. Also, the semantic reasoning framework...
This paper presents an overview of a scheme (RESWS) to enable Web Service providers to be able to evolve their service interface in a non-backwards compatible way and still maintain compatibility with existing consumers. The need for a non-passive approach to evolving services while still remaining backwards compatible is highlighted and presented based on a clear need identified within the literature...
Service-orientation is effective at managing complexity and dynamicity at a programmatic level, but there is still much work to be done in understanding and improving the trust that users place in a system's outputs, and the extent to which they understand the associated risks of decisions recommended by a system. This is crucial if we are to improve the uptake and real-world effectiveness of service-based...
Service-Oriented Computing (SOC) provides a flexible framework in which applications may be built up from services, often distributed across a network. One of the promises of SOC is that of Dynamic Binding where abstract consumer requests are bound to concrete service instances at runtime, thereby offering a high level of flexibility and adaptability. Existing research has so far focused mostly on...
As modern information systems become increasingly business- and safety-critical, it is extremely important to improve both the trust that a user places in a system and their understanding of the risks associated with making a decision. This paper presents the STRAPP framework, a generic framework that supports both of these goals through the use of personalised provenance reasoning engines and state-of-art...
Service-Oriented Computing (SOC) provides a flexible framework in which applications are built up from services, often distributed across a network. One of the promises of SOC is that of Dynamic Binding where abstract consumer requests are bound to concrete service instances at runtime. What is clear from existing research is that there exist several components that help to provide the necessary behavior...
Large-scale data processing systems frequently require users to make timely and high-value business decisions based upon information that is received from a variety of heterogeneous sources. Such heterogeneity is especially true of service-oriented systems, which are often dynamic in nature and composed of multiple interacting services. However, in order to establish user trust in such systems, there...
This paper presents the development of REF-WS an approach to enable a Web Service provider to reliably evolve their service through the application of refactoring transformations. REF-WS is intended to aid service providers, particularly in a reliability and performance constrained domain as it permits upgraded 'non-backwards compatible' services to be deployed into a performance constrained network...
In recent years, Service Oriented Architectures (SOA) have risen in use as an architectural style for distributed systems. They have many desirable features such as flexibility, software reuse and cost benefits. In addition to this, SOA enables and indeed encourages the binding of services at runtime in the form of dynamic binding. Here, services are bound to service requests at runtime and the choice...
For the provision of dependable search and rescue capability in dynamic and unpredictable disaster areas, each networked node should have ability to (1) autonomously support and co-operate with each other in a peer-to-peer (P2P) manner to quickly discover and dependably self-configure services available on the disaster area to deliver a real-time capability; (2) modify their behaviours to deliver...
For provision of dependable search and rescue capability in dynamic and unpredictable disaster areas, the networked nodes should have the ability to autonomously support and co-operate with each other in a peer-to-peer (P2P) manner to quickly configure any services available on the disaster area to deliver a real-time capability. In this paper, we present an innovative architectural approach which...
Dependability is a key factor in any software system due to the potential costs in both time and money a failure may cause. Given the complexity of grid applications that rely on dependable grid middleware, tools for the assessment of grid middleware are highly desirable. Our past research, based around our fault injection technology (FIT) framework and its implementation, WS-FIT, has demonstrated...
Modern distributed applications are embedding an increasing degree of dynamism, from dynamic supply-chain management, enterprise federations, and virtual collaborations to dynamic service interactions across organisations. Such dynamism leads to new security challenges. Collaborating services may belong to different security realms but often have to be engaged dynamically at run time. If their security...
Web services provide the potential to offer interoperability of distributed business-to-business application integration between autonomous organisations, regardless of platforms, operating systems or languages. For both user and vendor organisations, this raises immediate problems of trust, security, privacy and prevention of malicious attacks. Until these problems are addressed and solved properly,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.