Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00032
Sonia Cisneros-Cabrera, P. Sampaio, N. Mehandjiev
Manufacturing in supply chains commonly involves collaboration between multiple and diverse enterprises forming temporary coalitions. The matchmaking and assembly of multi-organizational resources to respond to a business opportunity is a key stage in production and supply chain management, particularly in the selection of suppliers taking into account enterprises of different sizes, capabilities and marketplace reputations. Industry 4.0 technologies can have a positive impact on collaborative manufacturing by digitalizing the team formation stage, speeding-up the collaboration process, minimizing supplier risk and maximizing coalition potential. This paper proposes a microservice for team formation to facilitate collaborative manufacturing in the context of Industry 4.0, guided by Design Science research practices and involving stakeholders' vision from the automotive and aviation industries. From a technical perspective, the microservice design is conceived to facilitate interoperability with Business-to-Business (B2B) platforms.
{"title":"A B2B Team Formation Microservice for Collaborative Manufacturing in Industry 4.0","authors":"Sonia Cisneros-Cabrera, P. Sampaio, N. Mehandjiev","doi":"10.1109/SERVICES.2018.00032","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00032","url":null,"abstract":"Manufacturing in supply chains commonly involves collaboration between multiple and diverse enterprises forming temporary coalitions. The matchmaking and assembly of multi-organizational resources to respond to a business opportunity is a key stage in production and supply chain management, particularly in the selection of suppliers taking into account enterprises of different sizes, capabilities and marketplace reputations. Industry 4.0 technologies can have a positive impact on collaborative manufacturing by digitalizing the team formation stage, speeding-up the collaboration process, minimizing supplier risk and maximizing coalition potential. This paper proposes a microservice for team formation to facilitate collaborative manufacturing in the context of Industry 4.0, guided by Design Science research practices and involving stakeholders' vision from the automotive and aviation industries. From a technical perspective, the microservice design is conceived to facilitate interoperability with Business-to-Business (B2B) platforms.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121909176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/services.2018.00012
{"title":"IEEE Services 2018 Industry Program","authors":"","doi":"10.1109/services.2018.00012","DOIUrl":"https://doi.org/10.1109/services.2018.00012","url":null,"abstract":"","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124610346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00039
Zhipeng Gao, Jie Meng, Qian Wang, Yang Yang
Mobile edge computing is a promising paradigm to compensate for the lack of traditional cloud computing, which has a variety of application scenarios. However, the migration of user-generated data in edge networks is a key issue which involves in transmission costs, the mobility of users, transmission resources, etc. In this paper, we focus on migrating deadline-varying user-generated data to edge servers, considering the tasks characteristics and contact patterns between nodes. We design a heuristic algorithm and propose the online algorithm using real-time information to save the cost of transmission. Further, we conduct the extensive simulations to demonstrate the effectiveness of our algorithms.
{"title":"Service Migration for Deadline-Varying User-Generated Data in Mobile Edge-Clouds","authors":"Zhipeng Gao, Jie Meng, Qian Wang, Yang Yang","doi":"10.1109/SERVICES.2018.00039","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00039","url":null,"abstract":"Mobile edge computing is a promising paradigm to compensate for the lack of traditional cloud computing, which has a variety of application scenarios. However, the migration of user-generated data in edge networks is a key issue which involves in transmission costs, the mobility of users, transmission resources, etc. In this paper, we focus on migrating deadline-varying user-generated data to edge servers, considering the tasks characteristics and contact patterns between nodes. We design a heuristic algorithm and propose the online algorithm using real-time information to save the cost of transmission. Further, we conduct the extensive simulations to demonstrate the effectiveness of our algorithms.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121514321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/services.2018.00013
{"title":"2nd IEEE Women in Services Computing Workshop","authors":"","doi":"10.1109/services.2018.00013","DOIUrl":"https://doi.org/10.1109/services.2018.00013","url":null,"abstract":"","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134069809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00042
V. Gopal, Shikha Fadnavis, Joel Coffman
Key management is one of the biggest challenges in cryptography. Traditionally, organizations stored cryptographic keys using file-based storage, which is insecure due to the lack of sufficient authentication. To overcome this issue, industry has moved towards using Hardware Security Modules (HSMs) for storing cryptographic keys. However, storing keys on HSMs does not ensure high availability if they fail due to network outages or lack of sufficient resources. Major cloud offerings provide high-availability key management solutions, but their cost may be prohibitively high for small-and mid-sized organizations. In this paper, we propose a system that combines distributed object storage with Trusted Platform Modules (TPMs) to ensure secure storage of keys, high availability of sensitive data, and ease of deployment. We envision this system as an attractive alternative for key management in private and public cloud settings.
{"title":"Low-Cost Distributed Key Management","authors":"V. Gopal, Shikha Fadnavis, Joel Coffman","doi":"10.1109/SERVICES.2018.00042","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00042","url":null,"abstract":"Key management is one of the biggest challenges in cryptography. Traditionally, organizations stored cryptographic keys using file-based storage, which is insecure due to the lack of sufficient authentication. To overcome this issue, industry has moved towards using Hardware Security Modules (HSMs) for storing cryptographic keys. However, storing keys on HSMs does not ensure high availability if they fail due to network outages or lack of sufficient resources. Major cloud offerings provide high-availability key management solutions, but their cost may be prohibitively high for small-and mid-sized organizations. In this paper, we propose a system that combines distributed object storage with Trusted Platform Modules (TPMs) to ensure secure storage of keys, high availability of sensitive data, and ease of deployment. We envision this system as an attractive alternative for key management in private and public cloud settings.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134376572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00023
Khalid Khawaji, Ibrahim Almubark, Abdullah Almalki, Bradley W Taylor
The healthcare industry is a complex domain involving a range of different interests including individual patients, medical service providers, hospitals, clinics, and support organizations, including insurance, testing, and research organizations. Given increasing patient loading, accelerating expansion of domain knowledge, advent of online healthcare and the greater number of institutions now participating in medical decision making, the challenges of its management are daunting. Handling of data has already evolved from individual care providers operating in isolation to varied approaches more reliant on automated systems. Expert systems have become more welcome, but in isolation, provide limited assistance. We develop a corpus of automatically captured information using workflow technology of patient history, testing and treatment along with disease research, symptoms, and treatment. We present an automated method using topic modeling and knowledge-based similarity measurements to suggest meaningful similarities between patients and applicable diagnoses.
{"title":"Similarity Matching for Workflows in Medical Domain Using Topic Modeling","authors":"Khalid Khawaji, Ibrahim Almubark, Abdullah Almalki, Bradley W Taylor","doi":"10.1109/SERVICES.2018.00023","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00023","url":null,"abstract":"The healthcare industry is a complex domain involving a range of different interests including individual patients, medical service providers, hospitals, clinics, and support organizations, including insurance, testing, and research organizations. Given increasing patient loading, accelerating expansion of domain knowledge, advent of online healthcare and the greater number of institutions now participating in medical decision making, the challenges of its management are daunting. Handling of data has already evolved from individual care providers operating in isolation to varied approaches more reliant on automated systems. Expert systems have become more welcome, but in isolation, provide limited assistance. We develop a corpus of automatically captured information using workflow technology of patient history, testing and treatment along with disease research, symptoms, and treatment. We present an automated method using topic modeling and knowledge-based similarity measurements to suggest meaningful similarities between patients and applicable diagnoses.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"2018 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134481464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00025
Lu Peng, Rongheng Lin
With the continuous development of communications industry, the majority of users gradually enjoy a variety of communications services. In the meantime, however, more and more fraud phones appears in the user's daily life. Although there are currently many interception schemes for fraud phones, they all belong to passive interception and rely on intelligent terminals. Therefore, this paper proposes a fraud phone calls analysis method based on label propagation community detection algorithm (LPA). Call content data are transformed into complex network. The LPA algorithm is used to generate fraud communities on this complex network. Detail analysis is also carried out for extracting the detail of communities. Results show that the methods can help to quickly identity the fraud phone calls.
{"title":"Fraud Phone Calls Analysis Based on Label Propagation Community Detection Algorithm","authors":"Lu Peng, Rongheng Lin","doi":"10.1109/SERVICES.2018.00025","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00025","url":null,"abstract":"With the continuous development of communications industry, the majority of users gradually enjoy a variety of communications services. In the meantime, however, more and more fraud phones appears in the user's daily life. Although there are currently many interception schemes for fraud phones, they all belong to passive interception and rely on intelligent terminals. Therefore, this paper proposes a fraud phone calls analysis method based on label propagation community detection algorithm (LPA). Call content data are transformed into complex network. The LPA algorithm is used to generate fraud communities on this complex network. Detail analysis is also carried out for extracting the detail of communities. Results show that the methods can help to quickly identity the fraud phone calls.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/services.2018.00009
{"title":"IEEE Services 2018 Keynotes","authors":"","doi":"10.1109/services.2018.00009","DOIUrl":"https://doi.org/10.1109/services.2018.00009","url":null,"abstract":"","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00015
M. Fang
The Canadian Department of National Defence has been issuing Operational Clothing at no cost to Canadian Armed Forces (CAF) members based on tear and wear through clothing stores for many years. A significant change will be introduced: CAF is considering using annual point allocations and quantity caps to manage the expenditure of Operational Clothing though an e-business. To build such a point system, this research studied usage patterns of Operational Clothing and identified the differentiating factors affecting the usage patterns based on ten years of massive individual clothing transaction data and individual personnel data. Not only traditional statistical tests but also diagnostic analytics have been used for the analysis. The results of this study will inform decision making on the establishment of the new point system for managing expenditure of the Operational Clothing for CAF.
{"title":"Pattern Recognition on Usage of Operational Clothing in Canadian Armed Forces","authors":"M. Fang","doi":"10.1109/SERVICES.2018.00015","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00015","url":null,"abstract":"The Canadian Department of National Defence has been issuing Operational Clothing at no cost to Canadian Armed Forces (CAF) members based on tear and wear through clothing stores for many years. A significant change will be introduced: CAF is considering using annual point allocations and quantity caps to manage the expenditure of Operational Clothing though an e-business. To build such a point system, this research studied usage patterns of Operational Clothing and identified the differentiating factors affecting the usage patterns based on ten years of massive individual clothing transaction data and individual personnel data. Not only traditional statistical tests but also diagnostic analytics have been used for the analysis. The results of this study will inform decision making on the establishment of the new point system for managing expenditure of the Operational Clothing for CAF.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/services.2018.00011
{"title":"IEEE Services 2018 Tutorial Program","authors":"","doi":"10.1109/services.2018.00011","DOIUrl":"https://doi.org/10.1109/services.2018.00011","url":null,"abstract":"","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125517227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}