Ontologies as a means for semantic description of web services have been discussed for many years. Various formal languages and correspoding tools using ontologies for describing web services have also been proposed (i.e. OWL-S). However, these existing approaches mainly are targeting domain experts creating ontologies. They are often too complex to be used by an average service provider offering web services online. But for offering and retrieving web services from future electronic marketplaces or service registries, a semantic service description is necessary. Therefore, in this paper an approach for an easy-to-use web-based editor for describing web services using ontologies based on the OWL-S language is proposed and evaluated. It not only supports a semantic, but also a commercial description of the web service offered, while remaining compatible with previous approaches addressing such holistic web service descriptions.
{"title":"May the Ontologies Be with You! Towards a User-Friendly Web-Based Editor for Semantic Web Service Description","authors":"Steven Blakowski, Philipp Brune","doi":"10.1109/SOSE.2016.31","DOIUrl":"https://doi.org/10.1109/SOSE.2016.31","url":null,"abstract":"Ontologies as a means for semantic description of web services have been discussed for many years. Various formal languages and correspoding tools using ontologies for describing web services have also been proposed (i.e. OWL-S). However, these existing approaches mainly are targeting domain experts creating ontologies. They are often too complex to be used by an average service provider offering web services online. But for offering and retrieving web services from future electronic marketplaces or service registries, a semantic service description is necessary. Therefore, in this paper an approach for an easy-to-use web-based editor for describing web services using ontologies based on the OWL-S language is proposed and evaluated. It not only supports a semantic, but also a commercial description of the web service offered, while remaining compatible with previous approaches addressing such holistic web service descriptions.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haozhe Wang, G. Min, Jia Hu, W. Miao, N. Georgalas
The rapid development in multimedia services has shifted the major function of the current Internet from host-centric communication to service-oriented content dissemination. Motivated by this significant change, Information-Centric Networking (ICN) has emerged as a new networking paradigm, which aims at providing natural support for efficient information retrieval over the Internet. As a crucial characteristic of ICN, in-network caching enables users to efficiently access popular content from ubiquitous caches to improve the Quality-of-Experience (QoE). Therefore, in-network caching for ICN has received considerable attention in recent years and many cache schemes and models have been proposed. However, there is a lack of research into ICN cache models under practical environments such as arbitrary topology and multimedia services exhibiting bursty nature. To bridge the gap, this paper proposes a new analytical model to gain valuable insight into the caching performance of ICN with arbitrary topology and bursty content requests. The accuracy of the proposed model is validated by comparing the analytical results with those obtained from simulation experiments. The analytical model is then used as a cost-efficient tool to investigate the impact of key network and content parameters on the performance of caching in ICN.
{"title":"Performance Evaluation of Information-Centric Networking for Multimedia Services","authors":"Haozhe Wang, G. Min, Jia Hu, W. Miao, N. Georgalas","doi":"10.1109/SOSE.2016.52","DOIUrl":"https://doi.org/10.1109/SOSE.2016.52","url":null,"abstract":"The rapid development in multimedia services has shifted the major function of the current Internet from host-centric communication to service-oriented content dissemination. Motivated by this significant change, Information-Centric Networking (ICN) has emerged as a new networking paradigm, which aims at providing natural support for efficient information retrieval over the Internet. As a crucial characteristic of ICN, in-network caching enables users to efficiently access popular content from ubiquitous caches to improve the Quality-of-Experience (QoE). Therefore, in-network caching for ICN has received considerable attention in recent years and many cache schemes and models have been proposed. However, there is a lack of research into ICN cache models under practical environments such as arbitrary topology and multimedia services exhibiting bursty nature. To bridge the gap, this paper proposes a new analytical model to gain valuable insight into the caching performance of ICN with arbitrary topology and bursty content requests. The accuracy of the proposed model is validated by comparing the analytical results with those obtained from simulation experiments. The analytical model is then used as a cost-efficient tool to investigate the impact of key network and content parameters on the performance of caching in ICN.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121304848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper practical explores the mode of art talent training in higher vocational colleges. Mainly take "Manufacturing, Learning, Creating, Trading" as the principal line. Around its surrounding is a professional form, shape and teaching environment form. Constitute a three-dimensional Pyramid model. Each focus in this model space contains the talent training model, also indicates the effect of the three forms integrating. This paper is to innovate the content of the three forms through practice as well as to explore how to make the three form organic integrated as to realize the strategic decision of "Manufacturing, Learning, Creating, Trading" talents training.
{"title":"Three Forms in One to Create Higher Vocational Education Art Talents Training Space: Practical Exploration on the Organic Integration of Professional Form, Teaching Form, Environment Form","authors":"Wei Zhao","doi":"10.1109/SOSE.2016.58","DOIUrl":"https://doi.org/10.1109/SOSE.2016.58","url":null,"abstract":"This paper practical explores the mode of art talent training in higher vocational colleges. Mainly take \"Manufacturing, Learning, Creating, Trading\" as the principal line. Around its surrounding is a professional form, shape and teaching environment form. Constitute a three-dimensional Pyramid model. Each focus in this model space contains the talent training model, also indicates the effect of the three forms integrating. This paper is to innovate the content of the three forms through practice as well as to explore how to make the three form organic integrated as to realize the strategic decision of \"Manufacturing, Learning, Creating, Trading\" talents training.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121361192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Clemens Sauerwein, M. Gander, M. Felderer, R. Breu
Crowdsourcing is a well-established concept in several application areas of computer science and information systems. While crowdsourcing is favored in areas such as information sharing, quality management or data acquisition, only little attention has been drawn to crowdsourcing capabilities for information security in the past. Since a few years an increase of crowdsourcing-based research in information security can be identified. To which extend remains unclear since a comprehensive overview of applied crowdsourcing techniques and related challenges is missing. In this paper we try to shed some light on this by conducting a systematic literature review based on the snowballing methodology. It delivered 23 relevant papers which we analyzed with respect to the following perspectives: (a) Bibliographic information, (b) applied research methodology, (c) addressed information security application context, (d) applied crowdsourcing approach, and (e) challenges for crowdsourcing-based research in information security. Finally, based on the described investigations, we give a comprehensive overview, and identify several challenges of crowdsourcing based research in information security.
{"title":"A Systematic Literature Review of Crowdsourcing-Based Research in Information Security","authors":"Clemens Sauerwein, M. Gander, M. Felderer, R. Breu","doi":"10.1109/SOSE.2016.67","DOIUrl":"https://doi.org/10.1109/SOSE.2016.67","url":null,"abstract":"Crowdsourcing is a well-established concept in several application areas of computer science and information systems. While crowdsourcing is favored in areas such as information sharing, quality management or data acquisition, only little attention has been drawn to crowdsourcing capabilities for information security in the past. Since a few years an increase of crowdsourcing-based research in information security can be identified. To which extend remains unclear since a comprehensive overview of applied crowdsourcing techniques and related challenges is missing. In this paper we try to shed some light on this by conducting a systematic literature review based on the snowballing methodology. It delivered 23 relevant papers which we analyzed with respect to the following perspectives: (a) Bibliographic information, (b) applied research methodology, (c) addressed information security application context, (d) applied crowdsourcing approach, and (e) challenges for crowdsourcing-based research in information security. Finally, based on the described investigations, we give a comprehensive overview, and identify several challenges of crowdsourcing based research in information security.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128124561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mengsong Zou, A. Zamani, J. Montes, I. Petri, O. Rana, M. Parashar
Software-defined networks (SDNs) have proven to be an efficacious tool for undertaking complex data analysis and manipulation within data intensive applications. SDN technology allows us to separate the data path from the control path, enabling in-network processing capabilities to be supported as data is migrated across the network. We propose to leverage software defined networking to gain control over the data transport service with the purpose of dynamically establishing data routes such that we can opportunistically exploit the latent computational capabilities located along the network path. This strategy allows us to minimize waiting times at the destination data center and to cope with spikes in demand for computational capability. We validate our approach using a smart building application in a multi cloud infrastructure. We show how the in-transit processing strategy increases the computational capabilities of the infrastructure and influences the percentage of job completion without significantly impacting costs and overheads.
{"title":"Leveraging In-Transit Computational Capabilities in Federated Ecosystems","authors":"Mengsong Zou, A. Zamani, J. Montes, I. Petri, O. Rana, M. Parashar","doi":"10.1109/SOSE.2016.15","DOIUrl":"https://doi.org/10.1109/SOSE.2016.15","url":null,"abstract":"Software-defined networks (SDNs) have proven to be an efficacious tool for undertaking complex data analysis and manipulation within data intensive applications. SDN technology allows us to separate the data path from the control path, enabling in-network processing capabilities to be supported as data is migrated across the network. We propose to leverage software defined networking to gain control over the data transport service with the purpose of dynamically establishing data routes such that we can opportunistically exploit the latent computational capabilities located along the network path. This strategy allows us to minimize waiting times at the destination data center and to cope with spikes in demand for computational capability. We validate our approach using a smart building application in a multi cloud infrastructure. We show how the in-transit processing strategy increases the computational capabilities of the infrastructure and influences the percentage of job completion without significantly impacting costs and overheads.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130436937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quality of software has always been a problem in every area of software use. Lack of software can cause problems during software execution and lead to different failures. Measurement and control systems (MCS) are such a group of software which use laboratory devices to obtain measurement data or to control e.g. production processes. Bugs in software can lead to variety of problems, from incorrect measurement data to device damages. For this reason it is important to deliver software of good quality. Software development should be considered a process which consists of a sequence of steps and is supported by a tool or set of tools that interoperate to make the work with the software easier. The problem is that there is no such approach nor tools for MCS systems. For this reason, a suitable method of design and validation of this group of systems has been developed. Moreover, the proper solution for supporting the proposed method has been implemented and tested. The solution consists of Business Rule Management System (BMRS) used for validating software execution data in an efficient way.
{"title":"The Method of Measurement and Control Systems Design and Validation with Use of BRMS Systems","authors":"P. Zawistowski","doi":"10.1109/SOSE.2016.61","DOIUrl":"https://doi.org/10.1109/SOSE.2016.61","url":null,"abstract":"Quality of software has always been a problem in every area of software use. Lack of software can cause problems during software execution and lead to different failures. Measurement and control systems (MCS) are such a group of software which use laboratory devices to obtain measurement data or to control e.g. production processes. Bugs in software can lead to variety of problems, from incorrect measurement data to device damages. For this reason it is important to deliver software of good quality. Software development should be considered a process which consists of a sequence of steps and is supported by a tool or set of tools that interoperate to make the work with the software easier. The problem is that there is no such approach nor tools for MCS systems. For this reason, a suitable method of design and validation of this group of systems has been developed. Moreover, the proper solution for supporting the proposed method has been implemented and tested. The solution consists of Business Rule Management System (BMRS) used for validating software execution data in an efficient way.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133943548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The increasing number of user of mobile application, it is needed to check mobile applications that contains defect or not. I proposed a SVM method in comparison with CART and Test Metrics to classify classes in application. It shows that SVM method has better result in terms of precision and accuracy. SVM accuracy reaches 83% compared with CART and Test Metrics method in mobile apps defect prediction.
{"title":"Mobile Application Software Defect Prediction","authors":"M. Ricky, Fredy Purnomo, B. Yulianto","doi":"10.1109/SOSE.2016.25","DOIUrl":"https://doi.org/10.1109/SOSE.2016.25","url":null,"abstract":"The increasing number of user of mobile application, it is needed to check mobile applications that contains defect or not. I proposed a SVM method in comparison with CART and Test Metrics to classify classes in application. It shows that SVM method has better result in terms of precision and accuracy. SVM accuracy reaches 83% compared with CART and Test Metrics method in mobile apps defect prediction.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116185791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing offers various services ranging from infrastructure to computation, software and application. These services have gained popularity in both public and enterprise domains, and they process large amount of user data with varying privacy levels. However, due to the dynamic nature of cloud services, many enterprise level security policies, standards and practices cannot be implemented in cloud which leads to different security threats. These threats can be exploited by various attackers to compromise the cloud services. In this paper threat modeling for cloud services has been done by considering various attackers such as hackers, malicious administrators, malicious users and service providers. After describing possible threats to cloud services from these attackers, methodologies to exploit those threats have been presented. Moreover, the generalization of threat model has been done to determine the threats related to a specific service functionality for various attackers in cloud.
{"title":"Threat Modeling for Services in Cloud","authors":"Muhammad Kazim, David Evans","doi":"10.1109/SOSE.2016.55","DOIUrl":"https://doi.org/10.1109/SOSE.2016.55","url":null,"abstract":"Cloud computing offers various services ranging from infrastructure to computation, software and application. These services have gained popularity in both public and enterprise domains, and they process large amount of user data with varying privacy levels. However, due to the dynamic nature of cloud services, many enterprise level security policies, standards and practices cannot be implemented in cloud which leads to different security threats. These threats can be exploited by various attackers to compromise the cloud services. In this paper threat modeling for cloud services has been done by considering various attackers such as hackers, malicious administrators, malicious users and service providers. After describing possible threats to cloud services from these attackers, methodologies to exploit those threats have been presented. Moreover, the generalization of threat model has been done to determine the threats related to a specific service functionality for various attackers in cloud.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122990008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matthias Geiger, Simon Harrer, Jörg Lenhard, G. Wirtz
The Business Process Model and Notation 2.0 (BPMN) standard has been hailed as a major step in business process modeling and automation. Recently, it has also been accepted as an ISO standard. The expectation is that vendors of business process management systems (BPMS) will switch to the new standard and natively support its execution in process engines. This paper presents an analysis of the current state and evolution of BPMN 2.0 support and implementation. We investigate how current BPMN 2.0 implementers deal with the standard, showing that native BPMN 2.0 execution still is an exception. Most BPMS do not support the execution format, despite claiming to be BPMN 2.0 compliant. Furthermore, building on past work, we evaluate three process engines that do provide native BPMN support and examine the evolution of their degree of support over a three-year period. This lets us delimit the areas of the standard that are considered important by the implementers. Since there is hardly an increase in supported features over the past three years, it seems that the implementation of the standard is more or less seen as finished by vendors and it is unlikely that features which are not available by now will be implemented in the future.
{"title":"On the Evolution of BPMN 2.0 Support and Implementation","authors":"Matthias Geiger, Simon Harrer, Jörg Lenhard, G. Wirtz","doi":"10.1109/SOSE.2016.39","DOIUrl":"https://doi.org/10.1109/SOSE.2016.39","url":null,"abstract":"The Business Process Model and Notation 2.0 (BPMN) standard has been hailed as a major step in business process modeling and automation. Recently, it has also been accepted as an ISO standard. The expectation is that vendors of business process management systems (BPMS) will switch to the new standard and natively support its execution in process engines. This paper presents an analysis of the current state and evolution of BPMN 2.0 support and implementation. We investigate how current BPMN 2.0 implementers deal with the standard, showing that native BPMN 2.0 execution still is an exception. Most BPMS do not support the execution format, despite claiming to be BPMN 2.0 compliant. Furthermore, building on past work, we evaluate three process engines that do provide native BPMN support and examine the evolution of their degree of support over a three-year period. This lets us delimit the areas of the standard that are considered important by the implementers. Since there is hardly an increase in supported features over the past three years, it seems that the implementation of the standard is more or less seen as finished by vendors and it is unlikely that features which are not available by now will be implemented in the future.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132235133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}