The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The orientation towards web service technology gives a raise to huge number of functionally similar web services. Hence, quality of service is becoming more important and even essential in web service technology as a distinctive criterion. Generally providers have sufficient information about the really provided quality, however, clients don't. Service level agreements that define the relationship...
The fast growth of the number of deployed Web services is transforming the enterprises from data-oriented systems into service-oriented systems. In this context, the selection of the best web service that satisfies specific QoS values among a group of web services with similar functionalities is becoming a challenging issue. To this aim, we investigate in this paper a methodology for web service selection...
The main issues for the fulfillment service level agreements (SLA) are concerned with problem of variability of QoS properties (vQoS). Indeed, the QoS properties may evolve frequently either because of internal changes or because of workload fluctuations. To solve the vQoS problem, we first introduced three variability operators: replicate, delete and replace. These operators will be used to reconfigure...
With the incessant growth of Web services on the Internet, designing effective Web service recommendation technologies based on Quality of Service (QoS) is becoming more and more important. Neighborhood-based Collaborative Filtering has been widely used for Web service recommendation, in which similarity measurement and QoS prediction are two key steps. However, traditional similarity models and QoS...
Composite applications leveraging the functionalities offered by Web services are today the underpinnings of enterprise computing. However, current Web services composition systems make only use of functional requirements in the selection process of component Web services, while the transactional consistency and quality of service (QoS) are crucial parameters of most business applications. In this...
Mobile devices with their various form factors have become the most convenient and pervasive computing platform, whether to carry out everyday business or to get online. Mobile users tend to adopt the fast food trend even in consuming online mobile services and functionalities. The Web service approach promises great flexibility in offering software functionality over the network, while maintaining...
With the development of service-oriented computing environments, QoS-aware service selection has been a more and more important research issue. In service composition environments, QoS attributes of atomic services are always aggregated for computing the QoS of the composite services, which has been reported in many previous studies. However, there are situations that some QoS attributes cannot be...
Reputation is useful for establishing trust between Web service (WS) providers and WS consumers. In the context of WS composition, a challenging issue of reputation management is to propagate a user's impression of a composite WS (i.e., the user's feedback rating) to its component WSs. In this paper, we propose a Shapley value based approach which can achieve fair impression propagation, that is,...
The issue of services composition to offer seamless access to a variety of high level services has received widespread attention in recent years. The proposed approaches have been mainly issued from the research undertaken jointly on Workflow and AI-based planning techniques. These methods are based in general on strong assumptions: static environment, deterministic invocation of the services. However,...
Researchers in data intensive domains, like the Virtual Physiological Human initiative (VPH-I), are commonly overwhelmed with the vast and increasing amount of data available. Advanced studies in biomedicine and other domains often require a considerable amount of effort to achieve data access to a critical mass of relevant data to analyze the problem at hand. We aim to improve this situation and...
With the increase of the number of web services on the Internet, QoS driven service selection as an important way to satisfy user's constraint on quality and maintain the runtime performance of services, has received much attention. The existing QoS driven service selection approaches always assume that the estimated QoS data is effective and trustworthy, which is actually impossible in reality. This...
The service-oriented approach is becoming more and more popular to integrate highly heterogeneous systems. Web services are the natural evolution of conventional middleware technologies to support Web-based and enterprise level integration. Formal testing of such Web-based technology is a key point to guarantee its reliability. In this paper, we choose a non-intrusive approach based on monitoring...
Web service composition is to integrate existing web services to provide a compound service which satisfies specified requirement. However, traditional web service compositions fail to provide different compound services under various scenarios. In this paper, we propose an approach to compose services with context. A context ontology is defined to describe the scenario for user. An abstract service...
This paper presents a methodology to perform passive testing of behavioural conformance for the web services based on the security rule. The proposed methodology can be used either to check a trace (offline checking) or to runtime verification (online checking) with timing constraints, including future and past time. In order to perform this: firstly, we use the Nomad language to define the security...
Virtualization has enabled the use of virtual machine (VM) based resource providers to offer computing power as a service. However, one important feature is to have certainty about the planed or expected performance of the applications that run inside the VMs. Therefore, consolidating the work load of web-based applications, with time-varying resource requirements, should be done in an automated way...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.