Service Plan of Service Composition in Pervasive Computing: A Systematic Literature Review

Ryche Pranita, Suhardi, Wardani Muhamad
{"title":"Service Plan of Service Composition in Pervasive Computing: A Systematic Literature Review","authors":"Ryche Pranita, Suhardi, Wardani Muhamad","doi":"10.1109/ICITSI50517.2020.9264923","DOIUrl":null,"url":null,"abstract":"Service composition made by arranging set of services to achieve specific goals from user task. The steps taken in building service composition are obtained from the service life cycle, consisting of definition, selection, deployment, and execution phase. Service composition is more complicated in pervasive computing since service is created by a simple task deployed in distributed devices. The devices in the pervasive environment can be a service itself. Several challenges are faced in making service composition in pervasive computing, such as limited system knowledge and resource, unpredictable service availability, and heterogeneity. Hence, it requires service plan that can mapping user requests containing the planning goal and the composition corresponds to the plan. This planning process is carried out by the transformation of user requirements and business processes. In this paper, we adopt systematic literature review (SLR) and define some research question (RQ) to research in various database journal. Twenty-two articles were selected based on the search result and then reviewed. We extracted and summarized service composition using planning approach and find the implementation area in pervasive computing.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITSI50517.2020.9264923","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Service composition made by arranging set of services to achieve specific goals from user task. The steps taken in building service composition are obtained from the service life cycle, consisting of definition, selection, deployment, and execution phase. Service composition is more complicated in pervasive computing since service is created by a simple task deployed in distributed devices. The devices in the pervasive environment can be a service itself. Several challenges are faced in making service composition in pervasive computing, such as limited system knowledge and resource, unpredictable service availability, and heterogeneity. Hence, it requires service plan that can mapping user requests containing the planning goal and the composition corresponds to the plan. This planning process is carried out by the transformation of user requirements and business processes. In this paper, we adopt systematic literature review (SLR) and define some research question (RQ) to research in various database journal. Twenty-two articles were selected based on the search result and then reviewed. We extracted and summarized service composition using planning approach and find the implementation area in pervasive computing.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
普适计算中服务组合的服务计划:系统的文献综述
服务组合通过安排一组服务来实现用户任务的特定目标。构建服务组合所采取的步骤来自服务生命周期,包括定义、选择、部署和执行阶段。服务组合在普及计算中更为复杂,因为服务是由部署在分布式设备中的简单任务创建的。普适环境中的设备本身可以是一个服务。在普适计算中进行服务组合面临着一些挑战,如有限的系统知识和资源、不可预测的服务可用性和异构性。因此,它要求服务计划能够映射包含计划目标的用户请求,并且组合与计划相对应。这个规划过程是通过用户需求和业务流程的转换来实现的。本文采用系统文献综述(SLR)和界定研究问题(RQ)的方法对各类数据库期刊进行研究。根据检索结果选取22篇文章进行评审。利用规划方法对服务组合进行了提取和总结,找到了普适计算中的实现领域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Systematic Literature Review of Blockchain based Smart Contracts Platforms First-Round and Last-Round Power Analysis Attack Against AES Devices Maturity Assessment of Cyber Security in The Workforce Management Domain: A Case Study in Bank Indonesia Smartphone Application for Deep Learning-Based Rice Plant Disease Detection Fraud Detection at Self Checkout Retail using Data Mining
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1