首页 > 最新文献

2016 IEEE International Conference on Services Computing (SCC)最新文献

英文 中文
Modeling and Evaluating Relationships and Service Contracts in Public Transportation: A Pilot Project in Italy 公共交通中关系和服务合同的建模和评估:意大利的一个试点项目
Pub Date : 2016-06-01 DOI: 10.1109/SCC.2016.72
A. Longo, M. Zappatore, Mario Alessandro Bochicchio, S. Navathe
Local transportation services are an essential component of all modern urban infrastructures. The constantly growing requirements and expectations from several stakeholders, ranging from public authorities, service providers and customers, demand a deep rethinking of the entire system. Such services must be oriented towards sustainability and everyday living, thus needing significant Quality of Service (QoS) improvement in this sector. This paper aims at highlighting the main challenges for modeling and implementing the relationships between the stakeholders in the public transportation sector and proposes a systemic modeling approach that would serve to design, implement, and monitor a QoS-regulatory document. A taxonomy of quality indicators and service levels are proposed along with metrics on the basis of athe European and Italian regulatory background as well as of the public transportation service lifecycle model. The proposed approach has been validated by developing a service analytics system deployed at the regional transportation agency in the Apulia administrative region of Southern Italy.
地方交通服务是所有现代城市基础设施的重要组成部分。来自公共当局、服务提供商和客户等利益相关者不断增长的需求和期望要求对整个系统进行深刻的重新思考。这些服务必须以可持续性和日常生活为导向,因此需要在这一领域显著提高服务质量(QoS)。本文旨在强调建模和实施公共交通部门利益相关者之间关系的主要挑战,并提出一种系统建模方法,用于设计、实施和监控qos监管文件。在欧洲和意大利监管背景以及公共交通服务生命周期模型的基础上,提出了质量指标和服务水平的分类以及度量标准。通过在意大利南部阿普利亚行政区的区域运输机构开发服务分析系统,该方法得到了验证。
{"title":"Modeling and Evaluating Relationships and Service Contracts in Public Transportation: A Pilot Project in Italy","authors":"A. Longo, M. Zappatore, Mario Alessandro Bochicchio, S. Navathe","doi":"10.1109/SCC.2016.72","DOIUrl":"https://doi.org/10.1109/SCC.2016.72","url":null,"abstract":"Local transportation services are an essential component of all modern urban infrastructures. The constantly growing requirements and expectations from several stakeholders, ranging from public authorities, service providers and customers, demand a deep rethinking of the entire system. Such services must be oriented towards sustainability and everyday living, thus needing significant Quality of Service (QoS) improvement in this sector. This paper aims at highlighting the main challenges for modeling and implementing the relationships between the stakeholders in the public transportation sector and proposes a systemic modeling approach that would serve to design, implement, and monitor a QoS-regulatory document. A taxonomy of quality indicators and service levels are proposed along with metrics on the basis of athe European and Italian regulatory background as well as of the public transportation service lifecycle model. The proposed approach has been validated by developing a service analytics system deployed at the regional transportation agency in the Apulia administrative region of Southern Italy.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128555235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Predicting Susceptibility to Phishing Victimization on Facebook 预测Facebook用户遭受网络钓鱼攻击的易感性
Pub Date : 2016-06-01 DOI: 10.1109/SCC.2016.61
Z. Alqarni, A. Algarni, Yue Xu
Social networking sites (SNSs), such as Facebook, have become part of everyday use. While many individuals and organizations use SNSs to maintain contact and to do a variety of services, attackers may see them as a prime target for performing different types of attacks. Phishing is one of the most common attacks, and one of the most challenging problems in SNSs. Existing human behaviours literature related to social capital, habitual usage, and risk perception shows a strong indication that it is possible to predict Facebook users' susceptibility to phishing victimization based on their demographics, anonymity, social capital, and risk perception. Using quantitative survey, this paper aims to predict Facebook users' susceptibility to phishing victimization based on these factors. Among the hypothesized factors, we found that it is possible to predict user's susceptibility to phishing victimization based on the user's anonymity status, the number of all friends the user is connected to, the number of strangers that the user is connected to, and the number of close friends that the user is connected to.
社交网站(sns),如Facebook,已经成为日常使用的一部分。虽然许多个人和组织使用sns来保持联系并提供各种服务,但攻击者可能会将其视为执行不同类型攻击的主要目标。网络钓鱼是最常见的攻击之一,也是sns中最具挑战性的问题之一。现有的与社会资本、习惯使用和风险感知相关的人类行为文献表明,基于Facebook用户的人口统计、匿名性、社会资本和风险感知,可以预测Facebook用户对网络钓鱼受害的易感性。本文采用定量调查的方法,旨在基于这些因素预测Facebook用户对网络钓鱼受害的易感性。在假设的因素中,我们发现可以根据用户的匿名状态、用户所连接的所有朋友的数量、用户所连接的陌生人数量以及用户所连接的亲密朋友的数量来预测用户对网络钓鱼受害的易感性。
{"title":"Toward Predicting Susceptibility to Phishing Victimization on Facebook","authors":"Z. Alqarni, A. Algarni, Yue Xu","doi":"10.1109/SCC.2016.61","DOIUrl":"https://doi.org/10.1109/SCC.2016.61","url":null,"abstract":"Social networking sites (SNSs), such as Facebook, have become part of everyday use. While many individuals and organizations use SNSs to maintain contact and to do a variety of services, attackers may see them as a prime target for performing different types of attacks. Phishing is one of the most common attacks, and one of the most challenging problems in SNSs. Existing human behaviours literature related to social capital, habitual usage, and risk perception shows a strong indication that it is possible to predict Facebook users' susceptibility to phishing victimization based on their demographics, anonymity, social capital, and risk perception. Using quantitative survey, this paper aims to predict Facebook users' susceptibility to phishing victimization based on these factors. Among the hypothesized factors, we found that it is possible to predict user's susceptibility to phishing victimization based on the user's anonymity status, the number of all friends the user is connected to, the number of strangers that the user is connected to, and the number of close friends that the user is connected to.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Linear Program for Optimal Configurable Business Processes Deployment into Cloud Federation 用于在云联盟中部署最佳可配置业务流程的线性程序
Pub Date : 2016-06-01 DOI: 10.1109/SCC.2016.31
Molka Rekik, Khouloud Boukadi, Nour Assy, Walid Gaaloul, H. Ben-Abdallah
A configurable process model is a generic model from which an enterprise can derive and execute process variants that meet its specific needs and contexts. With the advent of cloud computing and its economic pay-per-use model, enterprises are increasingly outsourcing partially or totally their process variants to cloud providers, and recently to cloud federations. A main challenge in this regard is to allocate optimally cloud resources to the process variants' activities. More specifically, an enterprise may be interested in outsourcing only those that result in an optimal deployment. Due to the diversity of the enterprise QoS requirements, the heterogeneity of resources offered by the cloud federation and the large number of possible configurations in a configurable process model, finding the optimal process variant deployment becomes a highly challenging problem. In this paper, we propose a novel approach to solve this problem through a binary/(0-1) linear program with a quadratic objective function under a set of constraints pertinent to both the enterprise and cloud federation requirements. Our prototypical implementation demonstrates the feasibility and the results of our experiments highlight the effectiveness of our proposed solution.
可配置流程模型是一种通用模型,企业可以从中派生并执行满足其特定需求和上下文的流程变体。随着云计算及其经济的按使用付费模式的出现,企业越来越多地将部分或全部流程变体外包给云提供商,最近还外包给云联盟。这方面的一个主要挑战是为流程变体的活动分配最佳的云资源。更具体地说,企业可能只对那些导致最佳部署的外包感兴趣。由于企业QoS需求的多样性、云联合提供的资源的异质性以及可配置流程模型中大量可能的配置,寻找最佳的流程变体部署成为一个极具挑战性的问题。在本文中,我们提出了一种新的方法来解决这个问题,通过一个二元/(0-1)线性规划与二次目标函数在一组约束相关的企业和云联邦需求。我们的原型实现证明了可行性,我们的实验结果突出了我们提出的解决方案的有效性。
{"title":"A Linear Program for Optimal Configurable Business Processes Deployment into Cloud Federation","authors":"Molka Rekik, Khouloud Boukadi, Nour Assy, Walid Gaaloul, H. Ben-Abdallah","doi":"10.1109/SCC.2016.31","DOIUrl":"https://doi.org/10.1109/SCC.2016.31","url":null,"abstract":"A configurable process model is a generic model from which an enterprise can derive and execute process variants that meet its specific needs and contexts. With the advent of cloud computing and its economic pay-per-use model, enterprises are increasingly outsourcing partially or totally their process variants to cloud providers, and recently to cloud federations. A main challenge in this regard is to allocate optimally cloud resources to the process variants' activities. More specifically, an enterprise may be interested in outsourcing only those that result in an optimal deployment. Due to the diversity of the enterprise QoS requirements, the heterogeneity of resources offered by the cloud federation and the large number of possible configurations in a configurable process model, finding the optimal process variant deployment becomes a highly challenging problem. In this paper, we propose a novel approach to solve this problem through a binary/(0-1) linear program with a quadratic objective function under a set of constraints pertinent to both the enterprise and cloud federation requirements. Our prototypical implementation demonstrates the feasibility and the results of our experiments highlight the effectiveness of our proposed solution.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116579989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
HAWKS: A System for Highly Available Executions of Workflows 一个高可用性工作流执行系统
Pub Date : 2016-06-01 DOI: 10.1109/SCC.2016.24
D. Schäfer, A. Weiss, M. Tariq, V. Andrikopoulos, Santiago Gómez Sáez, Lukas Krawczyk, K. Rothermel
The workflow technology is the de facto standard for managing business processes. Today, workflows are even used for automating interactions and collaborations between business partners, e.g., for enabling just-in-time production. Every workflow that is part of such a collaboration needs to be highly available. Otherwise, the business operations, e.g., the production, might be hindered or even stopped. Since today's business partners are scattered across the globe, the workflows are executed in a highly distributed and heterogeneous environment. Those environments are, however, failure-prone and, thus, providing availability is not trivial. In this work, we improve availability by replicating workflow executions, while ensuring that the outcome is the same as in a non-replicated execution. For making workflow replication easily usable with current workflow technology, we derive the requirements for modeling a workflow replication system. Then, we propose the HAWKS system, which adheres to the previously specified requirements and is compatible with current technology. We implement a proof-of-concept in the open-source workflow execution engine Apache ODE for demonstrating this compatibility. Finally, we extensively evaluate the impact of using HAWKS in terms of performance and availability in the presence of failures.
工作流技术是管理业务流程的事实上的标准。今天,工作流甚至被用于自动化业务伙伴之间的交互和协作,例如,用于支持即时生产。作为这种协作的一部分的每个工作流都需要是高度可用的。否则,可能会阻碍甚至停止生产等业务经营。由于今天的业务伙伴分散在全球各地,工作流在高度分布式和异构的环境中执行。然而,这些环境容易发生故障,因此,提供可用性并不是微不足道的。在这项工作中,我们通过复制工作流执行来提高可用性,同时确保结果与非复制执行中的结果相同。为了使工作流复制在当前的工作流技术中易于使用,我们推导了工作流复制系统建模的需求。然后,我们提出了符合先前规定要求并与当前技术兼容的HAWKS系统。我们在开源工作流执行引擎Apache ODE中实现了概念验证,以演示这种兼容性。最后,我们广泛评估了在出现故障时使用HAWKS对性能和可用性的影响。
{"title":"HAWKS: A System for Highly Available Executions of Workflows","authors":"D. Schäfer, A. Weiss, M. Tariq, V. Andrikopoulos, Santiago Gómez Sáez, Lukas Krawczyk, K. Rothermel","doi":"10.1109/SCC.2016.24","DOIUrl":"https://doi.org/10.1109/SCC.2016.24","url":null,"abstract":"The workflow technology is the de facto standard for managing business processes. Today, workflows are even used for automating interactions and collaborations between business partners, e.g., for enabling just-in-time production. Every workflow that is part of such a collaboration needs to be highly available. Otherwise, the business operations, e.g., the production, might be hindered or even stopped. Since today's business partners are scattered across the globe, the workflows are executed in a highly distributed and heterogeneous environment. Those environments are, however, failure-prone and, thus, providing availability is not trivial. In this work, we improve availability by replicating workflow executions, while ensuring that the outcome is the same as in a non-replicated execution. For making workflow replication easily usable with current workflow technology, we derive the requirements for modeling a workflow replication system. Then, we propose the HAWKS system, which adheres to the previously specified requirements and is compatible with current technology. We implement a proof-of-concept in the open-source workflow execution engine Apache ODE for demonstrating this compatibility. Finally, we extensively evaluate the impact of using HAWKS in terms of performance and availability in the presence of failures.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"66 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114016829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Time-Aware Method to Process Behavioral Similarity Calculation 一种处理行为相似性计算的时间感知方法
Pub Date : 2016-06-01 DOI: 10.1109/SCC.2016.58
Hua Huang, Rong Peng, Zaiwen Feng
Process behavioral similarity calculation is widely used in many activities of business process management, such as process mining, process clustering and process retrieval. However, most existing process behavioral similarity measurement methods do not consider variable constraints (e.g. time constraints) in process models. Since the variable constraints of tasks, especially time constraints, are crucial to quantify the differences between the executions of tasks with the same or similar labels in process models, it is significant to calculate exact process behavioral similarity with the consideration of their impacts in process models. In this paper, we formally define the process behavioral similarity with time constraints and propose a time-aware method to efficiently compute the process behavioral similarity based on the ordering relations with time constraints. Experiments illustrate that our proposal can significantly improve the rationality and accuracy of process behavioral similarity measurement.
流程行为相似度计算广泛应用于流程挖掘、流程聚类和流程检索等业务流程管理活动中。然而,大多数现有的过程行为相似性度量方法没有考虑过程模型中的变量约束(如时间约束)。由于任务的变量约束,特别是时间约束,对于量化流程模型中具有相同或相似标签的任务执行之间的差异至关重要,因此考虑其在流程模型中的影响,计算精确的流程行为相似性非常重要。本文形式化地定义了带有时间约束的过程行为相似度,并提出了一种基于时间约束的顺序关系的时间感知方法来高效地计算过程行为相似度。实验结果表明,该方法能显著提高过程行为相似性度量的合理性和准确性。
{"title":"A Time-Aware Method to Process Behavioral Similarity Calculation","authors":"Hua Huang, Rong Peng, Zaiwen Feng","doi":"10.1109/SCC.2016.58","DOIUrl":"https://doi.org/10.1109/SCC.2016.58","url":null,"abstract":"Process behavioral similarity calculation is widely used in many activities of business process management, such as process mining, process clustering and process retrieval. However, most existing process behavioral similarity measurement methods do not consider variable constraints (e.g. time constraints) in process models. Since the variable constraints of tasks, especially time constraints, are crucial to quantify the differences between the executions of tasks with the same or similar labels in process models, it is significant to calculate exact process behavioral similarity with the consideration of their impacts in process models. In this paper, we formally define the process behavioral similarity with time constraints and propose a time-aware method to efficiently compute the process behavioral similarity based on the ordering relations with time constraints. Experiments illustrate that our proposal can significantly improve the rationality and accuracy of process behavioral similarity measurement.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116166877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comprehensive Framework for Business Process Outsourcing to the Cloud 业务流程外包到云的综合框架
Pub Date : 2016-06-01 DOI: 10.1109/SCC.2016.30
M. Rekik, Khouloud Boukadi, H. Ben-Abdallah
The lack of a framework that provides for business process outsourcing to the cloud hinders the widespread adoption of this emerging computing environment. Unlike the multiple decision methods related to outsourcing classical applications in a cloud environment, there is no standard dealing with the outsourcing of business processes starting from the enterprise business concerns to select the appropriate business process to be outsourced, to a finer level of decision to select the business process fragments to be supported by the cloud. In this paper, we first present an end-to-end framework that addresses some of these shortages. The presented framework, entitled Business Process Outsourcing to the cloud (BPO2C), covers the outsourcing process lifecyle. Indeed, the BPO2C framework elaborates several phases pertinent to the outsourcing decision, starting from the elaboration of the enterprise business motivations to identify the implied business process in the outsourcing decision, to the identification of outsourceable process fragments to minimize the business process costs, duration and to mitigate cloud risks.
缺乏为业务流程外包到云提供的框架阻碍了这种新兴计算环境的广泛采用。与云环境中与外包经典应用程序相关的多种决策方法不同,没有处理业务流程外包的标准,从企业业务关注点开始选择要外包的适当业务流程,再到更精细的决策级别选择要由云支持的业务流程片段。在本文中,我们首先提出了一个解决这些不足的端到端框架。本文提出的框架名为业务流程外包到云(BPO2C),涵盖了外包流程生命周期。事实上,BPO2C框架详细阐述了与外包决策相关的几个阶段,从详细阐述企业业务动机以识别外包决策中隐含的业务流程开始,到识别可外包流程片段以最小化业务流程成本、持续时间和减轻云风险。
{"title":"A Comprehensive Framework for Business Process Outsourcing to the Cloud","authors":"M. Rekik, Khouloud Boukadi, H. Ben-Abdallah","doi":"10.1109/SCC.2016.30","DOIUrl":"https://doi.org/10.1109/SCC.2016.30","url":null,"abstract":"The lack of a framework that provides for business process outsourcing to the cloud hinders the widespread adoption of this emerging computing environment. Unlike the multiple decision methods related to outsourcing classical applications in a cloud environment, there is no standard dealing with the outsourcing of business processes starting from the enterprise business concerns to select the appropriate business process to be outsourced, to a finer level of decision to select the business process fragments to be supported by the cloud. In this paper, we first present an end-to-end framework that addresses some of these shortages. The presented framework, entitled Business Process Outsourcing to the cloud (BPO2C), covers the outsourcing process lifecyle. Indeed, the BPO2C framework elaborates several phases pertinent to the outsourcing decision, starting from the elaboration of the enterprise business motivations to identify the implied business process in the outsourcing decision, to the identification of outsourceable process fragments to minimize the business process costs, duration and to mitigate cloud risks.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122402054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Providing a Smart Industrial Environment with the Web of Things and Cloud Computing 通过物联网和云计算提供智能工业环境
Pub Date : 2016-06-01 DOI: 10.1109/SCC.2016.89
Marlon Cordeiro Domenech, Leonardo R. P. Rauta, Marcelo Dornbusch Lopes, Paulo H. Da Silva, R. C. Silva, Benjamin W. Mezger, Michelle S. Wangham
Remote monitoring and intelligent intervention of machines are essentials in a smart industrial environment. However, the heterogeneity of machines makes it difficult to construct solutions for this purpose. This work aims to describe how to provide smart industrial environments using Smart Gateways, RESTful Web Services, and Cloud Computing. In the proposed solution, a Smart Gateway is responsible for representing a given machines' resources as RESTful Web Services for clients and Web applications, sending monitored data to a persistence service in a Cloud, while also allowing for the remote control of these machines. As a proof of concept, a smart industrial environment was developed from the considerations of a real case study at an apparel factory. Functional testing and performance evaluation confirmed the feasibility of the solution in this case study.
在智能工业环境中,机器的远程监控和智能干预是必不可少的。然而,机器的异构性使得构建解决方案非常困难。这项工作旨在描述如何使用智能网关、RESTful Web服务和云计算提供智能工业环境。在建议的解决方案中,智能网关负责将给定机器的资源表示为客户端和Web应用程序的RESTful Web服务,将监视的数据发送到云中的持久性服务,同时还允许对这些机器进行远程控制。作为概念的证明,智能工业环境是基于对服装厂真实案例研究的考虑而开发的。在本案例研究中,功能测试和性能评估证实了解决方案的可行性。
{"title":"Providing a Smart Industrial Environment with the Web of Things and Cloud Computing","authors":"Marlon Cordeiro Domenech, Leonardo R. P. Rauta, Marcelo Dornbusch Lopes, Paulo H. Da Silva, R. C. Silva, Benjamin W. Mezger, Michelle S. Wangham","doi":"10.1109/SCC.2016.89","DOIUrl":"https://doi.org/10.1109/SCC.2016.89","url":null,"abstract":"Remote monitoring and intelligent intervention of machines are essentials in a smart industrial environment. However, the heterogeneity of machines makes it difficult to construct solutions for this purpose. This work aims to describe how to provide smart industrial environments using Smart Gateways, RESTful Web Services, and Cloud Computing. In the proposed solution, a Smart Gateway is responsible for representing a given machines' resources as RESTful Web Services for clients and Web applications, sending monitored data to a persistence service in a Cloud, while also allowing for the remote control of these machines. As a proof of concept, a smart industrial environment was developed from the considerations of a real case study at an apparel factory. Functional testing and performance evaluation confirmed the feasibility of the solution in this case study.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Query-Based Summarization Service from Multiple News Sources 基于查询的多新闻源摘要服务
Pub Date : 2016-06-01 DOI: 10.1109/SCC.2016.13
Elaheh Shafieibavani, M. Ebrahimi, R. Wong, Fang Chen
It can be time consuming to search Internet news, due to multiple sources reporting repetitive information. Given a query and a set of relevant text articles, query-focused multi-document summarization (QMDS) aims to generate a fluent, well-organized, and compact summary that answers the query. While QMDS helps to summarize search results, most top-performing systems for this purpose remain largely extractive. Extractive summarization extracts a group of sentences and concatenates them. In this paper, we propose a summarization service based on abstractive QMDS using multi-sentence compression (MSC). Our proposed service generates a novel summary representing the gist of the content of the source document(s). Experiments using popular summarization benchmark datasets demonstrate the effectiveness of the proposed service.
搜索互联网新闻可能会耗费大量时间,因为有多个来源报道重复的信息。给定一个查询和一组相关的文本文章,以查询为中心的多文档摘要(QMDS)旨在生成回答查询的流畅、组织良好和简洁的摘要。虽然QMDS有助于总结搜索结果,但大多数用于此目的的高性能系统在很大程度上仍然是提取的。摘要提取是将一组句子提取出来并将它们连接起来。本文提出了一种基于多句压缩(MSC)的抽象QMDS摘要服务。我们建议的服务生成一个新颖的摘要,表示源文档内容的要点。使用流行的摘要基准数据集进行的实验证明了所提出服务的有效性。
{"title":"A Query-Based Summarization Service from Multiple News Sources","authors":"Elaheh Shafieibavani, M. Ebrahimi, R. Wong, Fang Chen","doi":"10.1109/SCC.2016.13","DOIUrl":"https://doi.org/10.1109/SCC.2016.13","url":null,"abstract":"It can be time consuming to search Internet news, due to multiple sources reporting repetitive information. Given a query and a set of relevant text articles, query-focused multi-document summarization (QMDS) aims to generate a fluent, well-organized, and compact summary that answers the query. While QMDS helps to summarize search results, most top-performing systems for this purpose remain largely extractive. Extractive summarization extracts a group of sentences and concatenates them. In this paper, we propose a summarization service based on abstractive QMDS using multi-sentence compression (MSC). Our proposed service generates a novel summary representing the gist of the content of the source document(s). Experiments using popular summarization benchmark datasets demonstrate the effectiveness of the proposed service.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122548241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic Business Process Generation and Verification 动态业务流程生成和验证
Pub Date : 2016-06-01 DOI: 10.1109/SCC.2016.118
Budan Wu, Rongheng Lin, Pengjie Wang, Junliang Chen
Business process dynamics in services computing has become more and more important to satisfy today's variable enterprise requirements. Existing business process systems lack support for business process flexibility in practice, it has become increasingly difficult to cope with variable enterprise needs. To solve this problem, a dynamic business process model is introduced in this paper, and a dynamic business process generation algorithm is proposed. The verification of the generated business process is based on the Kripke structure to verify the proposed correctness properties specified in Computational Tree Logic (CTL). We implement a dynamic expansion module for dynamic business process engine based on jBPM5, in that way, a black box in the business process definition can be generated dynamically according to the Drools rules. We demonstrate the proposed approach in a real auditing business process system project. Our approach is generic and can reduce the maintenance costs and the risks during the project.
为了满足当今多变的企业需求,服务计算中的业务流程动态变得越来越重要。现有的业务流程系统缺乏对业务流程灵活性的支持,在实践中越来越难以应对多变的企业需求。为了解决这一问题,本文引入了动态业务流程模型,并提出了动态业务流程生成算法。生成的业务流程的验证基于Kripke结构,以验证在计算树逻辑(Computational Tree Logic, CTL)中指定的建议正确性属性。我们实现了基于jBPM5的动态业务流程引擎的动态扩展模块,这样就可以根据Drools规则动态生成业务流程定义中的黑盒。我们在一个实际的审计业务流程系统项目中演示了所建议的方法。我们的方法是通用的,可以减少项目期间的维护成本和风险。
{"title":"Dynamic Business Process Generation and Verification","authors":"Budan Wu, Rongheng Lin, Pengjie Wang, Junliang Chen","doi":"10.1109/SCC.2016.118","DOIUrl":"https://doi.org/10.1109/SCC.2016.118","url":null,"abstract":"Business process dynamics in services computing has become more and more important to satisfy today's variable enterprise requirements. Existing business process systems lack support for business process flexibility in practice, it has become increasingly difficult to cope with variable enterprise needs. To solve this problem, a dynamic business process model is introduced in this paper, and a dynamic business process generation algorithm is proposed. The verification of the generated business process is based on the Kripke structure to verify the proposed correctness properties specified in Computational Tree Logic (CTL). We implement a dynamic expansion module for dynamic business process engine based on jBPM5, in that way, a black box in the business process definition can be generated dynamically according to the Drools rules. We demonstrate the proposed approach in a real auditing business process system project. Our approach is generic and can reduce the maintenance costs and the risks during the project.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122622334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Securing Docker Containers from Denial of Service (DoS) Attacks 保护Docker容器免受拒绝服务(DoS)攻击
Pub Date : 2016-06-01 DOI: 10.1109/SCC.2016.123
Jeeva Chelladhurai, P. Chelliah, S. Kumar
The concept of containerization and virtualization is getting traction in the cloud based IT environments. Docker engine is popular implementation for simplifying and streamlining containerization technology. IT industry realizes numerous automation and acceleration features and facilities through the embracement of the Docker-sponsored containerization paradigm, which is an operating system (OS)-level and lightweight virtualization. However the security issues affect the widespread and confident usage of Docker platform. In this paper, we have discussed important security issues of the Docker containers as well as the related work that is being carried out in this area. Also we have proposed security algorithms and methods to address DoS attacks related issues in the Docker container technology. The preliminary experiments and testing of the security methods are promising.
容器化和虚拟化的概念在基于云的IT环境中越来越受欢迎。Docker引擎是简化和精简容器化技术的流行实现。IT行业通过采用docker支持的容器化范式实现了许多自动化和加速特性和设施,容器化范式是一种操作系统级别的轻量级虚拟化。然而,安全问题影响了Docker平台的广泛和自信的使用。在本文中,我们讨论了Docker容器的重要安全问题以及在这一领域正在进行的相关工作。此外,我们还在Docker容器技术中提出了解决DoS攻击相关问题的安全算法和方法。安全防护方法的初步实验和测试是有希望的。
{"title":"Securing Docker Containers from Denial of Service (DoS) Attacks","authors":"Jeeva Chelladhurai, P. Chelliah, S. Kumar","doi":"10.1109/SCC.2016.123","DOIUrl":"https://doi.org/10.1109/SCC.2016.123","url":null,"abstract":"The concept of containerization and virtualization is getting traction in the cloud based IT environments. Docker engine is popular implementation for simplifying and streamlining containerization technology. IT industry realizes numerous automation and acceleration features and facilities through the embracement of the Docker-sponsored containerization paradigm, which is an operating system (OS)-level and lightweight virtualization. However the security issues affect the widespread and confident usage of Docker platform. In this paper, we have discussed important security issues of the Docker containers as well as the related work that is being carried out in this area. Also we have proposed security algorithms and methods to address DoS attacks related issues in the Docker container technology. The preliminary experiments and testing of the security methods are promising.","PeriodicalId":115693,"journal":{"name":"2016 IEEE International Conference on Services Computing (SCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
期刊
2016 IEEE International Conference on Services Computing (SCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1