The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The constantly changing business processes will lead to web service conflicts; not to mention if a chosen service becomes overcrowded or damaged, it may cause severe impact on general processes. To deal with this problem, we propose a framework that is able to replace similar services, which can substitute the unavailable service. This paper presents investigation on the related approach of web service...
Increasingly video-on-demand (VoD) applications have been ported to cloud platforms. Leveraging the elastic resource provisioning of the cloud, it is believed that VoD applications should attain high performance cost-effectively. In this paper we propose an approach that aims to solve the fundamental resource reservation and scheduling problem of configuring the cloud utility to meet SLAs for VoD...
Cloud computing brings many advantages in terms of externalization, service delivery, elasticity, dependability and scalability. Nevertheless, it can be exposed to several vulnerabilities and security attacks. Therefore, we propose, in our UBIS (Ubiquity and Integration of Services) project, an architectural model that aims to satisfy cloud user requirements and cloud security challenges. For this...
Summary form only given. Information Assurance (IA) grew out of the field of computer network security. However, IA is a much broader term than network security and relates to the managing of the risks associated with the use, processing, storage, and transmission of information. The most basic model of IA relies on three properties: confidentiality, integrity, and availability, thus it is often referred...
In this paper, a novel data burst assembly algorithm which based on control channel availability and traffic type is presented. In this mechanism, a burst is created only if its control packet can be transmitted and can be packed as different length according to traffic type to adapt the network requirement best dynamically. The variable Lstep which defined as the variation of the size threshold,...
Storage QoS methodology has been extensively mentioned in large-scale storage systems. Since storage resources tend to be heterogeneous and dynamic changed, efficient storage states capturing becomes essential. In this paper we propose a novel capturing and preserving mechanism, called change state capture (CSC). CSC can capture the changed state when storage provider QoS modified. The changed event...
In the current implementation of SOA using Web services, where different services can provide the same functionality for consumers, QoSs of these services are essential in determining the most suitable services for consumers. Although QoS for web services has attracted wide attention in the literature for the past few years, most of the current efforts did not consider the multi-stakeholders nature...
Distributed software systems are characterized by increasing autonomy. They often have the capability to sense the environment and react to it, discover the presence of other systems and take advantage of their services, adapt and re-configure themselves in accordance with the internal as well as the global state. Testing this kind of systems is challenging, and systematic and automated approaches...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
We developed a quality of service (QoS) management system to support service level management (SLM) for global enterprise services. The QoS management system is integrated with one of our enterprise services in a preproduction system, an identical system as the production system but in a test environment. Lab experiments showed that our integrated solution helps global enterprise services to better...
In this paper we discuss the use cases for monitoring of Web services for compliance with policies and service level agreements. In particular, the quality of service associated with Web service interactions and its monitoring rely on the proper use by both parties of related Web service protocols. This monitoring is best served by an event-centric model and an extensible scripting language, such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.