The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Awareness computing aims at our final goal in computer science to simulate human's awareness and cognition. Awareness of social network knowledge in everyday life is actively enabled by big data society. In this paper, we investigate infrastructure for big data analytics for social network services, and propose TF-IDF calculation on big data infrastructure to be aware of social relations on social...
The following topics are dealt with: digital content; digital life; e-learning; Web service; HCI; information security; mobile computing; wireless communication; vehicular technology; image processing; computer graphics; multimedia technologies; computer architecture; SoC; embedded systems; artificial intelligence; knowledge discovery; fuzzy systems; computer networks; Web technologies; biomedical...
This paper presents a two-level architecture for semantic P2P service discovery, which not only supports functionality-based service discovery but also provides flexible management mechanism for domain ontology. At the first level, a backbone is constructed on the basis of a category ontology, and the management task of domain ontology is distributed to the backbone peers on a per category basis....
Measurement methods have significant meaning for user's trust to software trustworthiness. Data mining is one of technologies through which measurement methods and tools can collect trustworthiness data to calculate software trustworthiness. In this paper, a Measurement Method based on Data Mining (MMDM) is proposed, trying to improve correctness of conclusion made by user toward provider's service...
Web service discovery is a mechanism to obtain descriptions of Web services based on the requester's functional or non-functional requirements. UDDI (Universal Description, Discovery and Integration) is the first step towards meeting the requester's functional requirements. The Web service architecture involving UDDI does not provide an efficient and effective discovery mechanism. The UDDI is large...
The Web service resource framework (WSRF) announced in January 2004 is a new mechanism to express how web services interact with the stateful resources, and it has achieved the fusion of Web services and grid services. For the grid application development, WSRF.NET is much easier than Globus Toolkit 4 and it is based on Windows. As WSRF.NET doesn't provide an available scheduler, we introduce Condor...
Facing the enlarging scale of Grid and its increasing number of users, the Grid Service Providers (GSPs) need to evaluate and manage the trust of all users effectively. A D-S-theory-based multi-level trust evaluation model is proposed in this paper to solve the problem. In accord with the architecture for Grid, this model makes the result more reasonable and accurate, restrains the attacks such as...
As is known to all, the shortcomings of traditional SOAP-based Web service and the older XML-RPC protocols, such as lacking of addressability and connectedness, greatly limit the modeling and abstraction of enterprise resources. In order to integrate the resources of enterprise information systems in heterogeneous environment, this paper proposes a REST-based resource-oriented approach to integrate...
Public logistics information platform, a unified and openness information platform, has logistics information as center, network as rely, assets as tie, and market as guidance. And grid technology can integrate the information isolated islands in logist alliance, share information recourses and solve cooperative problem from system level seamlessly. So the grid application in logistics field will...
The design and implementation of today's complex embedded systems including custom hardware and software is still to a large extent based on a collaboration of heterogeneous, semi-manual and often poorly inter-connected design methods and tools. This usually results in repetitive and longer development cycles. This paper describes an intelligent web service to automatically produce non-standard and...
Web-oriented Architectures provide a way of designing an IT system by using a variety of Web Procedures, i.e., procedures (or services) called over the Web. The idea of (typically atomic) components that are black boxes, have interfaces, and can be assembled into a larger process is fundamental and has existed since the early days of distributed systems. Two particular types of modern distributed...
The characteristics for the mode of present airlines' IT architecture are summarized in this paper, and also analyzed are the challenges of profoundly changing business environment of civil aviation to IT and business. That discussion induces the reorientation of airlines' IT value. From the standpoint that the key of the IT value is to pursue business sustainable innovation and agility with composite...
One of the major challenges faced by the Web services platform is how to compose a more appropriate new value added web service according to the user's requirements and preferences, and adapt it at runtime. To this end, we suggest in this paper a QoS-oriented approach to build more efficient composite web services and personalize this composition on-the-fly by taking into account user context, requirements,...
This paper aims to present a method of creating architectures which allow monitoring occurrence of failure in Service oriented Architectures (SoA). The presented approach extends Discrete Event Systems techniques to produce a method of automated creation of Diagnoser Service which monitors interaction between the services to identify if a failure has happened and the type of failure. To do so, a formal...
Declared `dead' for quite a while now, many legacy mainframe applications are still happily productive and will continue to be. Within them mainframe database management systems like Adabas or IMS are utilized as well as related programming languages like Natural or COBOL. However, those applications are often only badly, if at all, integrated with newer enterprise applications. This article describes...
Curse of dimensionality is a major difficulty with the classic optimization methods for high dimensional applications in which the problem size grows rapidly and mostly exponential with the number of space. In this work we present a simple yet effective multi-agent approach to apply distributed particle swarm optimization to meet such demand. Lip detection in color images, as a high-dimensional problem,...
The ability to match user's goals with service offers is the key to service discovery. In this paper we present an ontology-based architecture for service discovery. In our architecture, ontologies are used to give machine-understandable descriptions, and there is a central discovery platform acting as a mediator for requesters and providers. Service offers are described by abstract services, general...
In order to improve the scalability, reliability and stability of the semantic Web service composition system, and to achieve ontology-based semantic Web services composition efficiently, this paper presents a P2P-based Semantic Web services (P2PSWS) composition system architecture. This architecture combines the advantages of centralized and decentralized structures. It distributes the functions...
Automatic service composition typically consists of logical composition to produce an abstract workflow, followed by physical composition to transform it into a concrete workflow satisfying composition properties, such as Quality of service (QoS), preferences, and logic constraints. The composition properties have not been considered together up to now and, because they are abstract during the logical...
In literature it is common to find that a self-healing architecture is made up basically of three modules: monitoring, diagnosis, and recovery. Of these three modules, the diagnosis module represents a crucial point, since in this one the state that keeps the system is established. Nevertheless, a standardized way does not exist to implement this module in this kind of architecture. In this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.