首页 > 最新文献

2013 IEEE Ninth World Congress on Services最新文献

英文 中文
Adoption of Cloud Computing Services by Public Sector Organisations 公营机构采用云计算服务
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.50
M. Bellamy
Despite attractive benefits a range of barriers is inhibiting take-up of Cloud Computing services which in most public sector organisations remains at less than 5% of the ICT footprint. The generic factor inhibiting wider deployment is that use of Cloud Computing services exposes organisations to heightened risks. While the inherent risks can be managed, in the near term significant investment in skills, processes, tools and technology is a prerequisite for doing so efficiently. For many organisations that use ICT services, the level of investment needed will often be prohibitive. This has created the opportunity for the emergence of trusted cloud brokerage services that can invest strategically to assist organisations with the use of Cloud Computing services and management of the associated risks, developing service portfolios that reduce upfront costs, so that use of Cloud Computing services becomes the best choice on a project by project basis. This paper considers the benefits of Cloud Computing, identifies the barriers to take up and how these can be overcome, and considers how cloud services brokerages can potentially develop new capabilities to accelerate take-up and benefits realisation.
尽管云计算带来了诱人的好处,但仍有一系列障碍阻碍了云计算服务的采用,在大多数公共部门组织中,云计算服务仍不到ICT足迹的5%。阻碍更广泛部署的普遍因素是云计算服务的使用使组织面临更高的风险。虽然固有的风险是可以管理的,但在短期内,对技能、流程、工具和技术的重大投资是有效做到这一点的先决条件。对于许多使用ICT服务的组织来说,所需的投资水平往往是令人望而却步的。这为可信的云经纪服务的出现创造了机会,这些服务可以战略性地投资,帮助组织使用云计算服务和管理相关风险,开发降低前期成本的服务组合,从而使使用云计算服务成为每个项目的最佳选择。本文考虑了云计算的好处,确定了需要克服的障碍以及如何克服这些障碍,并考虑了云服务代理如何潜在地开发新功能来加速云计算的普及和效益的实现。
{"title":"Adoption of Cloud Computing Services by Public Sector Organisations","authors":"M. Bellamy","doi":"10.1109/SERVICES.2013.50","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.50","url":null,"abstract":"Despite attractive benefits a range of barriers is inhibiting take-up of Cloud Computing services which in most public sector organisations remains at less than 5% of the ICT footprint. The generic factor inhibiting wider deployment is that use of Cloud Computing services exposes organisations to heightened risks. While the inherent risks can be managed, in the near term significant investment in skills, processes, tools and technology is a prerequisite for doing so efficiently. For many organisations that use ICT services, the level of investment needed will often be prohibitive. This has created the opportunity for the emergence of trusted cloud brokerage services that can invest strategically to assist organisations with the use of Cloud Computing services and management of the associated risks, developing service portfolios that reduce upfront costs, so that use of Cloud Computing services becomes the best choice on a project by project basis. This paper considers the benefits of Cloud Computing, identifies the barriers to take up and how these can be overcome, and considers how cloud services brokerages can potentially develop new capabilities to accelerate take-up and benefits realisation.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129578795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A User Requirements Oriented Semantic Web Services Composition Framework 面向用户需求的语义Web服务组合框架
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.45
Sana Baccar, M. Rouached, Mohamed Abid
Web services provide an instantiation of the loosely coupled Service Oriented Architecture (SOA) and facilitate the process of enterprise application integration. However, with the explosive growth of the number of Web services published over the Internet, identifying a high quality of composite services by taking into account both functional and non-functional requirements of end users has become a real challenge that needs to be addressed. We propose in this paper an approach that adresses this challenge by considering a two-phase composition process. The composition first proceeds to generate an abstract plan based on Web service types using Dynamic Description Logics (DDL). This abstract plan is then concretized into an executable plan by selecting the appropriate Web service instances based on non-functional requirements.
Web服务提供了松散耦合的面向服务体系结构(Service Oriented Architecture, SOA)的实例化,并促进了企业应用程序集成的过程。然而,随着在Internet上发布的Web服务数量的爆炸性增长,通过考虑最终用户的功能和非功能需求来确定高质量的组合服务已经成为需要解决的真正挑战。我们在本文中提出了一种通过考虑两阶段组成过程来解决这一挑战的方法。组合首先使用动态描述逻辑(Dynamic Description logic, DDL)生成基于Web服务类型的抽象计划。然后,通过基于非功能需求选择适当的Web服务实例,将此抽象计划具体化为可执行计划。
{"title":"A User Requirements Oriented Semantic Web Services Composition Framework","authors":"Sana Baccar, M. Rouached, Mohamed Abid","doi":"10.1109/SERVICES.2013.45","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.45","url":null,"abstract":"Web services provide an instantiation of the loosely coupled Service Oriented Architecture (SOA) and facilitate the process of enterprise application integration. However, with the explosive growth of the number of Web services published over the Internet, identifying a high quality of composite services by taking into account both functional and non-functional requirements of end users has become a real challenge that needs to be addressed. We propose in this paper an approach that adresses this challenge by considering a two-phase composition process. The composition first proceeds to generate an abstract plan based on Web service types using Dynamic Description Logics (DDL). This abstract plan is then concretized into an executable plan by selecting the appropriate Web service instances based on non-functional requirements.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128913542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud 服务云中中国墙模型实施的审计要求
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.44
Sarra M. Alqahtani, R. Gamble, I. Ray
The service cloud model allows for the composition of services into an application that can respond to tenant requests. The composition of services, which may originate with different vendors, results in a service chain that supports end-to-end round trip messaging. Thus, the service cloud model must support provisioning services for the request without incurring a conflict of interest (COI) in their message exchange among vendors. Service vendors must disclose their COI classes for storage and analysis by the cloud because as services are provisioned to an application, additional conflict classes may be added, preventing the service from future compositions to avoid COI. In this paper, we present a strategy to centrally store and monitor COI classes for services in a service chain using principles of the Chinese Wall Model. We introduce a Security Monitoring Database (SMDB) that audits and monitors the COI classes as they exist or are assigned to hosted services, including the tenant services making requests. We describe an algorithm to prevent COI before provisioning services and dynamically detect it during run time due to concurrent service invocations using the SMDB information.
服务云模型允许将服务组合到可以响应租户请求的应用程序中。服务的组合(可能来自不同的供应商)产生了一个支持端到端往返消息传递的服务链。因此,服务云模型必须支持为请求提供服务,而不会在供应商之间的消息交换中产生利益冲突(COI)。服务供应商必须公开其COI类以供云存储和分析,因为在向应用程序提供服务时,可能会添加额外的冲突类,从而阻止服务将来组合以避免COI。在本文中,我们提出了一种使用中国墙模型的原则来集中存储和监控服务链中服务的COI类的策略。我们引入一个安全监视数据库(SMDB),它在COI类存在或分配给托管服务(包括发出请求的租户服务)时对它们进行审计和监视。我们描述了一种算法,用于在提供服务之前防止COI,并在运行时动态检测由于使用SMDB信息并发服务调用而导致的COI。
{"title":"Auditing Requirements for Implementing the Chinese Wall Model in the Service Cloud","authors":"Sarra M. Alqahtani, R. Gamble, I. Ray","doi":"10.1109/SERVICES.2013.44","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.44","url":null,"abstract":"The service cloud model allows for the composition of services into an application that can respond to tenant requests. The composition of services, which may originate with different vendors, results in a service chain that supports end-to-end round trip messaging. Thus, the service cloud model must support provisioning services for the request without incurring a conflict of interest (COI) in their message exchange among vendors. Service vendors must disclose their COI classes for storage and analysis by the cloud because as services are provisioned to an application, additional conflict classes may be added, preventing the service from future compositions to avoid COI. In this paper, we present a strategy to centrally store and monitor COI classes for services in a service chain using principles of the Chinese Wall Model. We introduce a Security Monitoring Database (SMDB) that audits and monitors the COI classes as they exist or are assigned to hosted services, including the tenant services making requests. We describe an algorithm to prevent COI before provisioning services and dynamically detect it during run time due to concurrent service invocations using the SMDB information.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Viral Marketing and Its Application in Enterprise Drive Operation 病毒式营销及其在企业驱动运营中的应用
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.56
Li Wang, Liang-Jie Zhang, Ning Li, Dong Liu, Yifu Guo, Jianhua Zheng, Bo Hu, Ning Ke
This paper mainly develops the operation strategy of an enterprise drive based on viral marketing. Firstly, it introduces the concept, the features and successful cases of viral marketing. Next, it introduces what is Kingdee cloud drive and shows the comparative results among Kingdee cloud drive and other drives. With respect to the market positioning, this paper designs the operation strategy. Based on viral marketing, the detailed progress and reward mechanism are put forward in order to attract more users. Finally, the lottery model is developed based on the analytic network process in the reward mechanism.
本文主要研究了基于病毒式营销的企业驱动的运营策略。首先介绍了病毒式营销的概念、特点和成功案例。接下来,介绍了什么是金蝶云硬盘,并展示了金蝶云硬盘与其他硬盘的对比结果。在市场定位方面,本文设计了经营策略。基于病毒式营销,提出了详细的流程和奖励机制,以吸引更多的用户。最后,基于奖励机制中的网络分析过程,建立了彩票模型。
{"title":"Viral Marketing and Its Application in Enterprise Drive Operation","authors":"Li Wang, Liang-Jie Zhang, Ning Li, Dong Liu, Yifu Guo, Jianhua Zheng, Bo Hu, Ning Ke","doi":"10.1109/SERVICES.2013.56","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.56","url":null,"abstract":"This paper mainly develops the operation strategy of an enterprise drive based on viral marketing. Firstly, it introduces the concept, the features and successful cases of viral marketing. Next, it introduces what is Kingdee cloud drive and shows the comparative results among Kingdee cloud drive and other drives. With respect to the market positioning, this paper designs the operation strategy. Based on viral marketing, the detailed progress and reward mechanism are put forward in order to attract more users. Finally, the lottery model is developed based on the analytic network process in the reward mechanism.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122388652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Families of Personalized Mobile Applications 面向个性化移动应用的家庭
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.21
Eleni Stroulia, D. Gibbs, Blerina Bazelli
In this position paper, we present our early work towards a software architecture for developing product lines of personalized mobile applications.
在这份意见书中,我们介绍了我们为开发个性化移动应用产品线的软件架构所做的早期工作。
{"title":"Towards Families of Personalized Mobile Applications","authors":"Eleni Stroulia, D. Gibbs, Blerina Bazelli","doi":"10.1109/SERVICES.2013.21","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.21","url":null,"abstract":"In this position paper, we present our early work towards a software architecture for developing product lines of personalized mobile applications.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133030008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Formal Modeling and Verification of Cloud Architectures: A Case Study on Hadoop 面向云架构的形式化建模与验证:以Hadoop为例
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.47
G. S. Reddy, Yuzhang Feng, Yang Liu, J. Dong, Jun Sun, K. Rajaraman
Hadoop is a popular open source implementation of MapReduce, that has a number of prominent users including Yahoo!, Facebook, and Twitter. Though several works have focused on deploying algorithms on Hadoop MapReduce, research efforts into applying formal methods to prove the correctness of hadoop systems are limited. In this paper we propose a holistic approach to verify the correctness of hadoop systems using model checking techniques. We model Hadoop's parallel architecture to constraint it to valid start up ordering and identify and prove the benefits of data locality, deadlock-freeness and non-termination among others.
Hadoop是MapReduce的一个流行的开源实现,它有许多著名的用户,包括Yahoo!Facebook和Twitter。虽然有一些工作集中在Hadoop MapReduce上部署算法,但应用形式化方法来证明Hadoop系统正确性的研究工作是有限的。在本文中,我们提出了一种使用模型检查技术来验证hadoop系统正确性的整体方法。我们对Hadoop的并行架构进行建模,以约束其有效的启动顺序,并识别和证明数据局域性、无死锁和不终止等优点。
{"title":"Towards Formal Modeling and Verification of Cloud Architectures: A Case Study on Hadoop","authors":"G. S. Reddy, Yuzhang Feng, Yang Liu, J. Dong, Jun Sun, K. Rajaraman","doi":"10.1109/SERVICES.2013.47","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.47","url":null,"abstract":"Hadoop is a popular open source implementation of MapReduce, that has a number of prominent users including Yahoo!, Facebook, and Twitter. Though several works have focused on deploying algorithms on Hadoop MapReduce, research efforts into applying formal methods to prove the correctness of hadoop systems are limited. In this paper we propose a holistic approach to verify the correctness of hadoop systems using model checking techniques. We model Hadoop's parallel architecture to constraint it to valid start up ordering and identify and prove the benefits of data locality, deadlock-freeness and non-termination among others.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Bridging the GAP between Software Certification and Trusted Computing for Securing Cloud Computing 弥合软件认证和可信计算之间的差距,确保云计算的安全
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.15
A. Muñoz, A. Maña
Despite the fact that software security certification has important advantages; among these we highlighted that it allows to increase users' trust by means of attesting security properties. However, in most of cases the system that is subject of certification is considered to be monolithic. This fact implies that existing certification schemes do not provide support for dynamic changes of components as required in Cloud Computing scenarios. In existing certification schemes certificates refer to a particular version of the product or system, changes in the system structure require a process of recertification. We propose a solution based on the combination of software certification techniques and hardware-based certification, as those provided by the Trusted Computing technology. Likewise, the main target of our approach is bringing the gap existing between the software certification and the means for hardware certification, in order to provide a solution for the whole system certification using Trusted Computing technology.
尽管软件安全认证具有重要的优势;其中我们强调,它允许通过证明安全属性来增加用户的信任。然而,在大多数情况下,作为认证主体的系统被认为是整体的。这一事实意味着,现有的认证方案不支持云计算场景中所需的组件动态更改。在现有的认证方案中,证书是指产品或系统的特定版本,系统结构的变化需要一个重新认证的过程。我们提出了一种基于软件认证技术和基于硬件的认证相结合的解决方案,正如可信计算技术所提供的那样。同样,我们的方法的主要目标是弥补软件认证与硬件认证之间存在的差距,从而为使用可信计算技术的整个系统认证提供解决方案。
{"title":"Bridging the GAP between Software Certification and Trusted Computing for Securing Cloud Computing","authors":"A. Muñoz, A. Maña","doi":"10.1109/SERVICES.2013.15","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.15","url":null,"abstract":"Despite the fact that software security certification has important advantages; among these we highlighted that it allows to increase users' trust by means of attesting security properties. However, in most of cases the system that is subject of certification is considered to be monolithic. This fact implies that existing certification schemes do not provide support for dynamic changes of components as required in Cloud Computing scenarios. In existing certification schemes certificates refer to a particular version of the product or system, changes in the system structure require a process of recertification. We propose a solution based on the combination of software certification techniques and hardware-based certification, as those provided by the Trusted Computing technology. Likewise, the main target of our approach is bringing the gap existing between the software certification and the means for hardware certification, in order to provide a solution for the whole system certification using Trusted Computing technology.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems 同时支持云计算系统中的隐私和审计
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.38
Tyrone Grandison, Sean S. E. Thorpe, Leon Stenneth
Over the last few years, cloud services have been steadily gaining traction in their use by commercial and noncommercial entities. As more and more sensitive or valuable processes, business functions and data move into the cloud, the need to improve threat identification and response, via auditing cloud transactions, increases. At the same time, the need for cloud users to protect the security and privacy of their resources has also intensified. In this paper, the problem of simultaneously supporting privacy and auditing in cloud systems is studied. Specifically, the paper discusses the guiding principles, fundamental concepts, and threat models for current cloud computing systems. Finally, we propose infrastructure that exploits a novel thin layer between the client and the cloud service provider to ensure that data storage, operation, and auditing does not reveal sensitive client information.
在过去的几年中,云服务在商业和非商业实体的使用中稳步增长。随着越来越多的敏感或有价值的流程、业务功能和数据迁移到云中,通过审计云事务来改进威胁识别和响应的需求也在增加。与此同时,云用户保护其资源的安全和隐私的需求也在加剧。本文研究了云系统中同时支持隐私和审计的问题。具体来说,本文讨论了当前云计算系统的指导原则、基本概念和威胁模型。最后,我们提出了利用客户机和云服务提供商之间的新颖薄层的基础设施,以确保数据存储、操作和审计不会泄露敏感的客户机信息。
{"title":"Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems","authors":"Tyrone Grandison, Sean S. E. Thorpe, Leon Stenneth","doi":"10.1109/SERVICES.2013.38","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.38","url":null,"abstract":"Over the last few years, cloud services have been steadily gaining traction in their use by commercial and noncommercial entities. As more and more sensitive or valuable processes, business functions and data move into the cloud, the need to improve threat identification and response, via auditing cloud transactions, increases. At the same time, the need for cloud users to protect the security and privacy of their resources has also intensified. In this paper, the problem of simultaneously supporting privacy and auditing in cloud systems is studied. Specifically, the paper discusses the guiding principles, fundamental concepts, and threat models for current cloud computing systems. Finally, we propose infrastructure that exploits a novel thin layer between the client and the cloud service provider to ensure that data storage, operation, and auditing does not reveal sensitive client information.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114444432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Real-Time Analytics in the Cloud 走向云端的实时分析
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.36
Amr Osman, M. El-Refaey, A. Elnaggar
The data explosion and the tremendous growth in the volume of data generated from various IT services places an enormous demand on harnessing and smartly analyzing the generated data and enterprise contents. According to recent studies, it is predicted that the volume of such data will become 26 fold in the next five years. While there might be some existing technologies to support this, industry is frantically exploring new models that lead to more efficient and higher performance solutions. With the aid of cloud computing and high performance analytics such as scalable-parallel machine learning, big data could be the fuel to a smarter cloud-powered IT world. Through our work, we provide a state-of-the-art review of high-performance advanced cloud analytics in the literature in attempt to find the ideal real-time platform for distributed analytic computations.
数据爆炸和各种IT服务生成的数据量的巨大增长对利用和智能分析生成的数据和企业内容提出了巨大的需求。根据最近的研究,预计在未来五年内,这类数据的数量将增加26倍。虽然可能有一些现有的技术支持这一点,但业界正在疯狂地探索新的模式,以带来更高效、更高性能的解决方案。在云计算和高性能分析(如可扩展并行机器学习)的帮助下,大数据可能成为更智能的云驱动IT世界的燃料。通过我们的工作,我们在文献中提供了高性能先进云分析的最新综述,试图找到分布式分析计算的理想实时平台。
{"title":"Towards Real-Time Analytics in the Cloud","authors":"Amr Osman, M. El-Refaey, A. Elnaggar","doi":"10.1109/SERVICES.2013.36","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.36","url":null,"abstract":"The data explosion and the tremendous growth in the volume of data generated from various IT services places an enormous demand on harnessing and smartly analyzing the generated data and enterprise contents. According to recent studies, it is predicted that the volume of such data will become 26 fold in the next five years. While there might be some existing technologies to support this, industry is frantically exploring new models that lead to more efficient and higher performance solutions. With the aid of cloud computing and high performance analytics such as scalable-parallel machine learning, big data could be the fuel to a smarter cloud-powered IT world. Through our work, we provide a state-of-the-art review of high-performance advanced cloud analytics in the literature in attempt to find the ideal real-time platform for distributed analytic computations.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115834282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Social Ontology and Semantic Actions: Enabling Social Networking Services for Distributed Web Tasking 社会本体和语义行为:为分布式Web任务提供社会网络服务
Pub Date : 2013-06-28 DOI: 10.1109/SERVICES.2013.23
J. Ng, Diana H. Lau
End-users are confined by the social networking platforms that they invest effort in to set up their social contacts and relationships. The centralized, monopolized, and silo approach of today's social networking providers discourage interoperability across platforms. Enterprises struggle to find a common social networking approach to deal with the diversity of social networking platforms of choice of their users. Though each social networking platform provides their own APIs for externalizing users' social data, they are not designed to interoperate with other platforms. In this paper, we propose Social Ontology and Semantic Actions (SOSA) as a de-centralized, inter-operable social networking model and runtime services that enterprises can use as social networking middleware components for interoperability of social networking platforms of their users. SOSA provides platform agnostic construct for contacts; relationship axiom association with contacts, with inherent inferences to compute memberships given a relationship axiom. SOSA also enables binding with enterprise services as semantic actions of a given relationship axiom. Social relationship can also be used incontext with enterprise services and distributed web tasking.
最终用户受限于他们投入精力建立社交联系和关系的社交网络平台。当今社交网络提供商的集中式、垄断式和竖井式方法阻碍了跨平台的互操作性。企业努力寻找一种通用的社交网络方法来应对用户选择的社交网络平台的多样性。尽管每个社交网络平台都提供了自己的api来外部化用户的社交数据,但它们并不是为与其他平台进行互操作而设计的。在本文中,我们提出社会本体和语义动作(Social Ontology and Semantic Actions, SOSA)作为一种分散的、可互操作的社交网络模型和运行时服务,企业可以将其用作社交网络中间件组件,实现其用户的社交网络平台的互操作性。SOSA为联系人提供平台无关的构造;关系公理与联系人的关联,用给定关系公理的固有推理来计算成员关系。SOSA还支持将企业服务绑定为给定关系公理的语义操作。社会关系也可以在企业服务和分布式web任务的上下文中使用。
{"title":"Social Ontology and Semantic Actions: Enabling Social Networking Services for Distributed Web Tasking","authors":"J. Ng, Diana H. Lau","doi":"10.1109/SERVICES.2013.23","DOIUrl":"https://doi.org/10.1109/SERVICES.2013.23","url":null,"abstract":"End-users are confined by the social networking platforms that they invest effort in to set up their social contacts and relationships. The centralized, monopolized, and silo approach of today's social networking providers discourage interoperability across platforms. Enterprises struggle to find a common social networking approach to deal with the diversity of social networking platforms of choice of their users. Though each social networking platform provides their own APIs for externalizing users' social data, they are not designed to interoperate with other platforms. In this paper, we propose Social Ontology and Semantic Actions (SOSA) as a de-centralized, inter-operable social networking model and runtime services that enterprises can use as social networking middleware components for interoperability of social networking platforms of their users. SOSA provides platform agnostic construct for contacts; relationship axiom association with contacts, with inherent inferences to compute memberships given a relationship axiom. SOSA also enables binding with enterprise services as semantic actions of a given relationship axiom. Social relationship can also be used incontext with enterprise services and distributed web tasking.","PeriodicalId":169370,"journal":{"name":"2013 IEEE Ninth World Congress on Services","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125066241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2013 IEEE Ninth World Congress on Services
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1