The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Session identification is an important step in data processing of web log mining. To solve the defects in traditional session identification, an improved session identification algorithm was proposed. After identifying specific users, a great deal of frame pages were filtered, the relatively reasonable access time threshold for each page was made up according to contents of each page and all web structure...
Data mining techniques are able to derive highly sensitive knowledge from unclassified data that is not even known to database holders. Usually, data mining contains the secured information such as financial and healthcare records. To handle such large private database with, data mining algorithms with privacy is required. The privacy preserving becomes important concern when we dealing security related...
Fuzzy clustering is an important problem which is the subject of active research in several real world applications. Fuzzy c-means (FCM) algorithm is one of the most popular fuzzy clustering techniques because it is efficient, straightforward, and easy to implement. However FCM is sensitive to initialization and is easily trapped in local optima. Particle swarm optimization (PSO) is a stochastic global...
Composite Web services are often long-running, loosely coupled and cross-organizational applications. They always run in a highly dynamic environment. For the applications and environment, advanced transaction support is required to ensure the quality of reliable execution. Towards composite service adaptive mechanism unavailable for lacking transaction support, this paper proposes a self-healing...
One of the key activities needed to construct a quality service-oriented solution is specification of the architectural elements. Selection of an appropriate and proven method for specification of the elements consisted of services, flows, and components is thus fundamental to successful service-oriented system development in an enterprise. Existing methods for service specification ignore the automation...
Wireless and pervasive applications typically present critical requirements from the point of view of functional correctness, reliability, availability, security and safety. In contrast to the case of classic safety critical applications, the behavior of such applications is affected by the movements and location of users and resources. This paper presents some formal tools that enable designers to...
Web services are self-describing, platform independent applications that can be accessed over the Internet. Web services enable us to dynamically find, bind and consume the needed functionality. Semantic Web services are being developed with the vision of automating this process and to facilitate interoperable machine to machine interaction with no/minimal human intervention. Semantic descriptions...
The world have witnessed an explosive growth in the information available on the World Wide Web (WWW) over the last decade and people use it than ever before. With the everyday increasing importance of privacy, security, and wise use of computational resources, the corresponding technologies are increasingly being faced with the problem of file type detection. True identification of computer file...
Steganography is the art of hiding message in order to have a secure communication. In this paper, we present a novel technique for wave steganography for covert communication. The basic idea proposed in this paper is replacement of the bits according to the distortion afforded, with lossy or lossless hiding and recovery. Numbers of bits of the samples in cover file are replaced in accordance with...
To support legacy migration to service-oriented architecture (SOA), this paper presents a method that derives candidates of SOA services from procedural programs. In SOA, every service is supposed to be a process (procedure) with (1) open interface, (2) self-containedness, (3) coarse granularity for business. We identify such services from the source code and its data flow diagram (DFD), by analyzing...
Semantic Web services have been employed in a wide range of applications and have become a key technology in developing business operations on the Web. However, heterogeneity is a major problem of the current semantic Web service technologies. In particular, semantic Web services described by different description languages cannot work together. For example, a Web service described by OWL-S cannot...
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunities to connect heterogeneous platforms. However, those benefits make security more difficult to control. Fortunately, new standards are proposed to treat this issue, but their current use makes the architecture much more complex...
This paper proposes a new token structure for efficient handling of identity access management for online composite software services. With the requirement of ??Single Sign-On (SSO)?? for atomic services in a given composite service, this token structure binds service attributes, including workflow, providers, users, operator permission, and operation environment, together in its creation process...
Defined by the 3GPP, the IP multimedia subsystem (IMS) is an architectural framework that enables the delivery of multimedia services in mobile networks. Based on the session initiation protocol, the IMS offers unified billing, QoS negotiation mechanisms, and the possibility of combining services deployed in different environments like CAMEL and Parlay OSA. With the aim of determining the real limitations...
Service-oriented computing advocates the development of new software or services on the basis of existing services. This paradigm shows a great potential of achieving high productivity and low cost, but it faces a challenge in efficiently and correctly using existing services in producing a new application and ensuring its reliability. Building a formal model using a formal specification language...
Service creation by composing existing services and/or network resources is considered by Telecom and Internet industries as the trend for service provisioning in next generation networks. Related research work is being carried out for years, and various service composition approaches have been proposed by different standardization organizations and companies catering to different network requirements...
Telugu is an Indian language spoken by more than 50 million people in the country. Language is very rich in literature, and it requires advancements in computational approaches. Applications like machine translation, speech recognition, speech synthesis and information retrieval need a powerful morphological generator to give morphological forms of nouns and verbs. The existing Telugu morphological...
What is a cloud application precisely? In this paper, we formulate a computing cloud as a kind of graph, a computing resource such as services or intellectual property access rights as an attribute of a graph node, and the use of a resource as a predicate on an edge of the graph. We also propose to model cloud computation semantically as a set of paths in a subgraph of the cloud such that every edge...
In order to obtain full value from Business Process Management (BPM) solutions, small and medium-sized enterprises (SMEs) need to adopt an integrated suite approach that combines the Enterprise Resource Planning (ERP) functionality with the extended process capabilities. In this paper we propose a unified configurable architecture (UCA) to simplify and quicken the implementation of a BPM solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.