This paper investigates the multi-agent cooperation problems in Web services domain. For Pareto-optimal Nash equilibrium, reinforcement learning algorithms are used to solve the coordination problem in cooperative environments. Most previous works study the deterministic gain of a state. However, in practical service environments, the gain may be nondeterministic due to unstable Quality of Service (QoS). To avoid local optimal solution, we use an improved update function. The experimental results show that proposed reinforcement learning algorithm outperforms other learning methods.
{"title":"Multi-agent Reinforcement Learning for Service Composition","authors":"Yu Lei, Philip S. Yu","doi":"10.1109/SCC.2016.108","DOIUrl":"https://doi.org/10.1109/SCC.2016.108","url":null,"abstract":"This paper investigates the multi-agent cooperation problems in Web services domain. For Pareto-optimal Nash equilibrium, reinforcement learning algorithms are used to solve the coordination problem in cooperative environments. Most previous works study the deterministic gain of a state. However, in practical service environments, the gain may be nondeterministic due to unstable Quality of Service (QoS). To avoid local optimal solution, we use an improved update function. The experimental results show that proposed reinforcement learning algorithm outperforms other learning methods.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid proliferation of wireless networks and mobile devices, Mobile Peer-to-Peer (MP2P) networks have attracted a huge amount of users for resource sharing. However, in an MP2P network, peers frequently join and leave the network, which makes the network topology dynamically change. Thus, it is difficult to establish long term and effective trust relationship among peers, making trust management become a challenging task. In this paper, we propose a dynamic grouping-based trust model DGTM, to classify peers. A group is formed according to the peers' interests. The experiments illustrate that our proposed dynamic grouping-based trust model DGTM always achieves the highest successful transaction rate under different circumstances.
{"title":"A Dynamic Grouping-Based Trust Model for Mobile P2P Networks","authors":"Meijuan Jia, Huiqiang Wang, Bin Ye, Yan Wang","doi":"10.1109/SCC.2016.121","DOIUrl":"https://doi.org/10.1109/SCC.2016.121","url":null,"abstract":"With the rapid proliferation of wireless networks and mobile devices, Mobile Peer-to-Peer (MP2P) networks have attracted a huge amount of users for resource sharing. However, in an MP2P network, peers frequently join and leave the network, which makes the network topology dynamically change. Thus, it is difficult to establish long term and effective trust relationship among peers, making trust management become a challenging task. In this paper, we propose a dynamic grouping-based trust model DGTM, to classify peers. A group is formed according to the peers' interests. The experiments illustrate that our proposed dynamic grouping-based trust model DGTM always achieves the highest successful transaction rate under different circumstances.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115663908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jinliang Xu, Shangguang Wang, Sen Su, S. Kumar, Chou Wu
Latent Factor Model (LFM) is extensively used in dealing with user-item bipartite networks in service recommendation systems. To alleviate the limitations of LFM, this papers presents a novel unsupervised learning model, Latent Interest and Topic Mining model (LITM), to automatically mine the latent user interests and item topics from user-item bipartite networks. In particular, we introduce the motivation and objectives of this bipartite network based approach, and detail the model development and optimization process of the proposed LITM. This work not only provides an efficient method for latent user interest and item topic mining, but also highlights a new way to improve the accuracy of service recommendation. Experimental studies are performed and the results validate the LITM's efficiency in model training, and its ability to provide better service recommendation performance based on user-item bipartite networks are demonstrated.
{"title":"Latent Interest and Topic Mining on User-Item Bipartite Networks","authors":"Jinliang Xu, Shangguang Wang, Sen Su, S. Kumar, Chou Wu","doi":"10.1109/SCC.2016.105","DOIUrl":"https://doi.org/10.1109/SCC.2016.105","url":null,"abstract":"Latent Factor Model (LFM) is extensively used in dealing with user-item bipartite networks in service recommendation systems. To alleviate the limitations of LFM, this papers presents a novel unsupervised learning model, Latent Interest and Topic Mining model (LITM), to automatically mine the latent user interests and item topics from user-item bipartite networks. In particular, we introduce the motivation and objectives of this bipartite network based approach, and detail the model development and optimization process of the proposed LITM. This work not only provides an efficient method for latent user interest and item topic mining, but also highlights a new way to improve the accuracy of service recommendation. Experimental studies are performed and the results validate the LITM's efficiency in model training, and its ability to provide better service recommendation performance based on user-item bipartite networks are demonstrated.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117005939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service Assured task execution is an exemplary need for Enterprise Task Crowdsourcing, even when crowdsourcing tasks on open and public crowdosourcing platforms, which are characteristic of non-committed and discretionary task execution by crowd workers. Service Assurance (SA) has broader semantics than SLA fulfillment in the context of enterprise task crowdsourcing, as explained in our previous work on Service Assurance Framework for Enterprise task crowdsourcing. The framework is designed for open crowd platforms and enables to map a given requester SLA to worker SA requirements and select crowd workers who evince high probability of SA requirement fulfillment. Even with these select crowd workers, it might not be possible to implicitly assume the sustenance of workers' expected SA (which is computed based on workers' prior task executions) in the day to day task executions on the Enterprise Requester tasks, owing to the unbinding task execution facilitated by the open crowd platforms. This might result in defaulting in requester SLA fulfillment, rendering the worker selection (by the framework) futile. Hence, in addition to selecting the required SA fulfilling workers, it is essential to employ suitable SA sustaining strategies in place for sustaining the SA expected of workers. The SA Sustaining Strategies and the Service Assurance Framework together constitute for the Service Assurance Sustaining Enterprise Task Crowdsourcing Service (SAS Service)for Enterprise Tasks, which is deliberated in this paper. The SAS Service's performance is validated using appropriate crowd experiments.
{"title":"Service Assurance Sustaining Enterprise Task Crowdsourcing Service","authors":"Chithralekha Balamurugan, K. K. Budhraja","doi":"10.1109/SCC.2016.100","DOIUrl":"https://doi.org/10.1109/SCC.2016.100","url":null,"abstract":"Service Assured task execution is an exemplary need for Enterprise Task Crowdsourcing, even when crowdsourcing tasks on open and public crowdosourcing platforms, which are characteristic of non-committed and discretionary task execution by crowd workers. Service Assurance (SA) has broader semantics than SLA fulfillment in the context of enterprise task crowdsourcing, as explained in our previous work on Service Assurance Framework for Enterprise task crowdsourcing. The framework is designed for open crowd platforms and enables to map a given requester SLA to worker SA requirements and select crowd workers who evince high probability of SA requirement fulfillment. Even with these select crowd workers, it might not be possible to implicitly assume the sustenance of workers' expected SA (which is computed based on workers' prior task executions) in the day to day task executions on the Enterprise Requester tasks, owing to the unbinding task execution facilitated by the open crowd platforms. This might result in defaulting in requester SLA fulfillment, rendering the worker selection (by the framework) futile. Hence, in addition to selecting the required SA fulfilling workers, it is essential to employ suitable SA sustaining strategies in place for sustaining the SA expected of workers. The SA Sustaining Strategies and the Service Assurance Framework together constitute for the Service Assurance Sustaining Enterprise Task Crowdsourcing Service (SAS Service)for Enterprise Tasks, which is deliberated in this paper. The SAS Service's performance is validated using appropriate crowd experiments.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125986534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The speed of a device may vary since (i) IaaS hardware infrastructures are increasingly heterogeneous and (ii) devices often have a dynamically adjusted speed in order to adapt their energy consumption according to the load. This paper addresses SLA enforcement in a IaaS which includes devices whose speed vary. We show that resource management should rely on an absolute value SLA specification (i.e., a performance metric which is independent from the device speed) and a dynamic translation of this SLA into actual allocations according to the device speed. Surprisingly, while disk or network resource allocations already integrate such a scheme, CPU does not. We propose a CPU resource management system which implements absolute CPU allocation and dynamically translates it into actual CPU allocations according to CPU speed. We demonstrate and evaluate the benefits of this resource management system.
{"title":"Mitigating Performance Unpredictability in Heterogeneous Clouds","authors":"Boris Teabe, A. Tchana, D. Hagimont","doi":"10.1109/SCC.2016.83","DOIUrl":"https://doi.org/10.1109/SCC.2016.83","url":null,"abstract":"The speed of a device may vary since (i) IaaS hardware infrastructures are increasingly heterogeneous and (ii) devices often have a dynamically adjusted speed in order to adapt their energy consumption according to the load. This paper addresses SLA enforcement in a IaaS which includes devices whose speed vary. We show that resource management should rely on an absolute value SLA specification (i.e., a performance metric which is independent from the device speed) and a dynamic translation of this SLA into actual allocations according to the device speed. Surprisingly, while disk or network resource allocations already integrate such a scheme, CPU does not. We propose a CPU resource management system which implements absolute CPU allocation and dynamically translates it into actual CPU allocations according to CPU speed. We demonstrate and evaluate the benefits of this resource management system.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131683308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kai Zhang, Zhiyong Feng, Shizhan Chen, Keman Huang, Guiling Wang
With the rapid development of mobile internet and wireless network technologies, more and more people use the mobile app to call a taxicab to pick them up. Therefore, understanding the passengers' travel demand becomes crucial to improve the utilization of the taxicabs and reduce their cost. In this paper, based on spatio-temporal clustering, we propose a demand hotspots prediction framework to generate recommendation for taxi drivers. Specially, an adaptive prediction approach is presented to demand hotspots and their hotness, and then combing the driver's location and the hotness, top candidates are recommended and visually presented to drivers. Based on the dataset provided by CAR INC., the experiment shows that our approach gains a significant improvement in hotspots prediction and recommendation, with 15.21% improvement on average f-measure for prediction and 79.6% hit ratio for recommendation.
{"title":"A Framework for Passengers Demand Prediction and Recommendation","authors":"Kai Zhang, Zhiyong Feng, Shizhan Chen, Keman Huang, Guiling Wang","doi":"10.1109/SCC.2016.51","DOIUrl":"https://doi.org/10.1109/SCC.2016.51","url":null,"abstract":"With the rapid development of mobile internet and wireless network technologies, more and more people use the mobile app to call a taxicab to pick them up. Therefore, understanding the passengers' travel demand becomes crucial to improve the utilization of the taxicabs and reduce their cost. In this paper, based on spatio-temporal clustering, we propose a demand hotspots prediction framework to generate recommendation for taxi drivers. Specially, an adaptive prediction approach is presented to demand hotspots and their hotness, and then combing the driver's location and the hotness, top candidates are recommended and visually presented to drivers. Based on the dataset provided by CAR INC., the experiment shows that our approach gains a significant improvement in hotspots prediction and recommendation, with 15.21% improvement on average f-measure for prediction and 79.6% hit ratio for recommendation.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133058208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Wang, Jiantao Zhou, Jing Liu, Tenghe Au, Xiaoyu Song
The quality-of-service (QoS) is a common focus which users and service providers pay close attention to at present. For service providers, it is one of their main targets to find the optimal QoS strategy based on user preferences. However, because of the fuzziness of user preferences and the complexity of service environment, searching an optimal service strategy becomes a difficult problem. In the paper, how the QoS affects a user's satisfaction is analyzed, and then a quantitative relationship between QoS and user satisfaction is built. Based on the relationship, a user utility model of cloud service is established. In order to maximize user utility, a QoS evolutionary algorithm based on user utility model is proposed. In the algorithm, some improvement is designed to balance the contradiction between search scope and search speed in the traditional genetic algorithm. It can be seen through the experiments that the QoS optimization strategy of cloud service output by the QoS evolutionary algorithm is consistent with the target user's preferences, which can effectively enhance the cost effectiveness of service resources.
{"title":"A QoS Evolutionary Method of Cloud Service Based on User Utility Model","authors":"Yan Wang, Jiantao Zhou, Jing Liu, Tenghe Au, Xiaoyu Song","doi":"10.1109/SCC.2016.79","DOIUrl":"https://doi.org/10.1109/SCC.2016.79","url":null,"abstract":"The quality-of-service (QoS) is a common focus which users and service providers pay close attention to at present. For service providers, it is one of their main targets to find the optimal QoS strategy based on user preferences. However, because of the fuzziness of user preferences and the complexity of service environment, searching an optimal service strategy becomes a difficult problem. In the paper, how the QoS affects a user's satisfaction is analyzed, and then a quantitative relationship between QoS and user satisfaction is built. Based on the relationship, a user utility model of cloud service is established. In order to maximize user utility, a QoS evolutionary algorithm based on user utility model is proposed. In the algorithm, some improvement is designed to balance the contradiction between search scope and search speed in the traditional genetic algorithm. It can be seen through the experiments that the QoS optimization strategy of cloud service output by the QoS evolutionary algorithm is consistent with the target user's preferences, which can effectively enhance the cost effectiveness of service resources.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"39 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133137271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Log-based business operation analysis is getting more and more attention from enterprise decision makers. However, at the very first step of the analysis service, two primary obstacles are always encountered: how to process a wide variety of local event log formats and how to handle personally identifiable information weaved in an event log. Due to these obstacles, typical business analysts who do not have programming skills have lost business opportunities at the early stages. We propose a privacy-preserving data curation specification language, BELAS, for such analysts and present experimental results that show how most of a real-life event log could be processed in process analysis services.
{"title":"Adaptable Privacy-Preserving Data Curation for Business Process Analysis Services","authors":"M. Kudo, Kumiko Maeda, Fumiko Satoh","doi":"10.1109/SCC.2016.60","DOIUrl":"https://doi.org/10.1109/SCC.2016.60","url":null,"abstract":"Log-based business operation analysis is getting more and more attention from enterprise decision makers. However, at the very first step of the analysis service, two primary obstacles are always encountered: how to process a wide variety of local event log formats and how to handle personally identifiable information weaved in an event log. Due to these obstacles, typical business analysts who do not have programming skills have lost business opportunities at the early stages. We propose a privacy-preserving data curation specification language, BELAS, for such analysts and present experimental results that show how most of a real-life event log could be processed in process analysis services.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131557796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Radio Frequency Identification (RFID), specifically the Electronic Product Code (EPC, the next generation of barcode), have improved the way the world works and lives. Basing EPC as an identification, GS1 developed standard framework for common visibility of supply chain data called EPCglobal. EPC information system(EPCIS) is one of the standards which encompasses interface for sharing and capturing data triggered by different events. Because the amount of data captured and stored in each event type is huge and the query interfaces are general, it is difficult to get traceability data easily in reasonable time. Even for some traceability queries like finding products at a location in certain time are too complex to fulfill with the current EPCIS standard implementation. In this paper, by extending EPCIS query interface we have proposed an efficient, well-organized, and scalable traceability architecture. In order to effectively collect and process events in real time using our stream processing, we first proposed an efficient pub/sub based EPCIS. Then, to retrieve information effectively we proposed an adequate column family based data modeling. Finally, we have implemented our system and developed a RESTfull service interface to query track and trace information. Experimental result shows that our traceability architecture with the column based data modeling process traceability-queries more efficiently and scales gracefully.
{"title":"Traceability Architecture: Extending EPCIS to Enhance Track and Trace with NoSQL Data Model","authors":"Yalew Kidane, Daeyoung Kim","doi":"10.1109/SCC.2016.129","DOIUrl":"https://doi.org/10.1109/SCC.2016.129","url":null,"abstract":"Radio Frequency Identification (RFID), specifically the Electronic Product Code (EPC, the next generation of barcode), have improved the way the world works and lives. Basing EPC as an identification, GS1 developed standard framework for common visibility of supply chain data called EPCglobal. EPC information system(EPCIS) is one of the standards which encompasses interface for sharing and capturing data triggered by different events. Because the amount of data captured and stored in each event type is huge and the query interfaces are general, it is difficult to get traceability data easily in reasonable time. Even for some traceability queries like finding products at a location in certain time are too complex to fulfill with the current EPCIS standard implementation. In this paper, by extending EPCIS query interface we have proposed an efficient, well-organized, and scalable traceability architecture. In order to effectively collect and process events in real time using our stream processing, we first proposed an efficient pub/sub based EPCIS. Then, to retrieve information effectively we proposed an adequate column family based data modeling. Finally, we have implemented our system and developed a RESTfull service interface to query track and trace information. Experimental result shows that our traceability architecture with the column based data modeling process traceability-queries more efficiently and scales gracefully.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131617929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
People have a tendency to mimic the actions of the larger group. Herd behavior is one of the most common phenomena in our daily life. Previous studies criticized that homogeneity of herd behavior and blind conformity will cause the bubble to burst. Crowd psychology plays an important role in service marketing. However, is it possible for service operation to thrive in service industry by manipulating the herd behavior? In this study, we proposed and validated that the Cascade-based service innovation (CSI) design which utilizes the attraction effect that highlights the service value and meaning interpretation enable service innovation opportunities. The cascade-based innovation design uses service meaning interpretation as the decoy and applies the attraction effect to drive the cascade-based service innovations. The result indicates that the CSI design could facilitate service providers to manipulate and reshape their service design to achieve sustainable development of service marketing. This study applied hybrid research methodologies that combine empirical research to examine the CSI design for fads operation and qualitative case study, and explore the criteria that enables service providers to operate and manipulate fads phenomenon successfully.
{"title":"Fads Phenomenon Operation through Cascade-Based Service Innovation Design","authors":"Pin-Rui Hwang","doi":"10.1109/SCC.2016.114","DOIUrl":"https://doi.org/10.1109/SCC.2016.114","url":null,"abstract":"People have a tendency to mimic the actions of the larger group. Herd behavior is one of the most common phenomena in our daily life. Previous studies criticized that homogeneity of herd behavior and blind conformity will cause the bubble to burst. Crowd psychology plays an important role in service marketing. However, is it possible for service operation to thrive in service industry by manipulating the herd behavior? In this study, we proposed and validated that the Cascade-based service innovation (CSI) design which utilizes the attraction effect that highlights the service value and meaning interpretation enable service innovation opportunities. The cascade-based innovation design uses service meaning interpretation as the decoy and applies the attraction effect to drive the cascade-based service innovations. The result indicates that the CSI design could facilitate service providers to manipulate and reshape their service design to achieve sustainable development of service marketing. This study applied hybrid research methodologies that combine empirical research to examine the CSI design for fads operation and qualitative case study, and explore the criteria that enables service providers to operate and manipulate fads phenomenon successfully.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130706749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}