首页 > 最新文献

2015 IEEE International Conference on Web Services最新文献

英文 中文
Conversion Infrastructure for Maintaining High Availability of Web Services Using Multiple Service Providers 使用多个服务提供者维护Web服务高可用性的转换基础结构
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.110
P. Melliar-Smith, L. Moser
Web Services allow an enterprise to focus on its own business expertise and to employ information technology services offered by others, however, doing so exposes the enterprise to the risk of loss of service or data, if the service provider fails. The use of multiple service providers reduces the risk of failure, but it introduces the complication of incompatible service interfaces, data formats, and stored data. In this paper, we propose a conversion infrastructure that facilitates the use of multiple alternative Web Services at different service providers, to achieve high availability, even in the event of a failure or a catastrophe.
Web服务允许企业专注于自己的业务专长,并使用他人提供的信息技术服务,但是,如果服务提供者出现故障,这样做会使企业面临服务或数据丢失的风险。使用多个服务提供者降低了失败的风险,但它引入了不兼容的服务接口、数据格式和存储数据的复杂性。在本文中,我们提出了一种转换基础设施,它可以促进在不同的服务提供者处使用多个备选Web服务,以实现高可用性,即使在发生故障或灾难的情况下也是如此。
{"title":"Conversion Infrastructure for Maintaining High Availability of Web Services Using Multiple Service Providers","authors":"P. Melliar-Smith, L. Moser","doi":"10.1109/ICWS.2015.110","DOIUrl":"https://doi.org/10.1109/ICWS.2015.110","url":null,"abstract":"Web Services allow an enterprise to focus on its own business expertise and to employ information technology services offered by others, however, doing so exposes the enterprise to the risk of loss of service or data, if the service provider fails. The use of multiple service providers reduces the risk of failure, but it introduces the complication of incompatible service interfaces, data formats, and stored data. In this paper, we propose a conversion infrastructure that facilitates the use of multiple alternative Web Services at different service providers, to achieve high availability, even in the event of a failure or a catastrophe.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"10 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128744494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Heuristic Recovery of Missing Events in Process Logs 流程日志中缺失事件的启发式恢复
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.24
Wei Song, Xiaoxu Xia, H. Jacobsen, Pengcheng Zhang, Hao Hu
Event logs are of paramount significance for process mining and complex event processing. Yet, the quality of event logs remains a serious problem. Missing events of logs are usually caused by omitting manual recording, system failures, and hybrid storage of executions of different processes. It has been proved that the problem of minimum recovery based on a priori process specification is NP-hard. State-of-the-art approach is still lacking in efficiency because of the large search space. To address this issue, in this paper, we leverage the technique of process decomposition and present heuristics to efficiently prune the unqualified sub-processes that fail to generate the minimum recovery. We employ real-world processes and their incomplete sequences to evaluate our heuristic approach. The experimental results demonstrate that our approach achieves high accuracy as the state-of-the-art approach does, but it is more efficient.
事件日志对于流程挖掘和复杂事件处理具有重要意义。然而,事件日志的质量仍然是一个严重的问题。日志事件丢失通常是由于忽略手工记录、系统故障和不同进程执行的混合存储造成的。证明了基于先验工艺规范的最小回收率问题是np困难的。由于搜索空间大,最先进的方法仍然缺乏效率。为了解决这个问题,在本文中,我们利用过程分解技术和启发式方法来有效地修剪那些不能产生最小恢复的不合格子过程。我们使用现实世界的过程和它们的不完全序列来评估我们的启发式方法。实验结果表明,该方法与现有方法相比具有较高的精度,但效率更高。
{"title":"Heuristic Recovery of Missing Events in Process Logs","authors":"Wei Song, Xiaoxu Xia, H. Jacobsen, Pengcheng Zhang, Hao Hu","doi":"10.1109/ICWS.2015.24","DOIUrl":"https://doi.org/10.1109/ICWS.2015.24","url":null,"abstract":"Event logs are of paramount significance for process mining and complex event processing. Yet, the quality of event logs remains a serious problem. Missing events of logs are usually caused by omitting manual recording, system failures, and hybrid storage of executions of different processes. It has been proved that the problem of minimum recovery based on a priori process specification is NP-hard. State-of-the-art approach is still lacking in efficiency because of the large search space. To address this issue, in this paper, we leverage the technique of process decomposition and present heuristics to efficiently prune the unqualified sub-processes that fail to generate the minimum recovery. We employ real-world processes and their incomplete sequences to evaluate our heuristic approach. The experimental results demonstrate that our approach achieves high accuracy as the state-of-the-art approach does, but it is more efficient.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Service-Based Framework for Mobile Social Messaging in PaaS Systems PaaS系统中基于服务的移动社交消息传递框架
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.108
Lijun Mei, Hao Chen, Shaochun Li, Qicheng Li, Guangtai Liang, Jeaha Yang
With the rapid growth of cloud computing, developing business applications on Platform-as-a-Service (PaaS) systems is increasingly popular among industry companies. Various services are developed to support different business requirements on PaaS systems. However, to the best of our knowledge, currently there is no service that provides mobile social messaging services to enable users of their apps to share messages in their social networks (e.g., We Chat, Whats App, Kaka Talk). Lack of such mobile social messaging services prevents industry companies from succeeding in drastic market competitions (e.g., Capture high customer satisfactory). In this paper, we propose a service-based framework to enable the mobile social messaging in PaaS systems (e.g., IBM Blue mix). Using this framework, developers can focus on the service encapsulation of existing applications, and define their business process flows via the conversation management in our platform (no coding work is needed). As such, our framework can effectively reduce the development workload for mobile social messaging in PaaS systems.
随着云计算的快速发展,在平台即服务(PaaS)系统上开发业务应用程序在行业公司中越来越流行。开发了各种服务来支持PaaS系统上的不同业务需求。然而,据我们所知,目前还没有一种服务提供移动社交信息服务,使其应用程序的用户能够在他们的社交网络中分享信息(例如,We Chat, what App, Kaka Talk)。缺乏这样的移动社交信息服务阻碍了行业公司在激烈的市场竞争中取得成功(例如,获取高客户满意度)。在本文中,我们提出了一个基于服务的框架来实现PaaS系统(例如,IBM Blue组合)中的移动社交消息传递。使用这个框架,开发人员可以专注于现有应用程序的服务封装,并通过我们平台中的会话管理定义他们的业务流程流(不需要编码工作)。因此,我们的框架可以有效地减少PaaS系统中移动社交消息传递的开发工作量。
{"title":"A Service-Based Framework for Mobile Social Messaging in PaaS Systems","authors":"Lijun Mei, Hao Chen, Shaochun Li, Qicheng Li, Guangtai Liang, Jeaha Yang","doi":"10.1109/ICWS.2015.108","DOIUrl":"https://doi.org/10.1109/ICWS.2015.108","url":null,"abstract":"With the rapid growth of cloud computing, developing business applications on Platform-as-a-Service (PaaS) systems is increasingly popular among industry companies. Various services are developed to support different business requirements on PaaS systems. However, to the best of our knowledge, currently there is no service that provides mobile social messaging services to enable users of their apps to share messages in their social networks (e.g., We Chat, Whats App, Kaka Talk). Lack of such mobile social messaging services prevents industry companies from succeeding in drastic market competitions (e.g., Capture high customer satisfactory). In this paper, we propose a service-based framework to enable the mobile social messaging in PaaS systems (e.g., IBM Blue mix). Using this framework, developers can focus on the service encapsulation of existing applications, and define their business process flows via the conversation management in our platform (no coding work is needed). As such, our framework can effectively reduce the development workload for mobile social messaging in PaaS systems.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131310448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Web Service Composition Based on Reinforcement Learning 基于强化学习的Web服务组合
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.103
Yu Lei, Jiantao Zhou, Fengqi Wei, Yongqiang Gao, Bo Yang
How we manage Web services depends on how we understand their variable parts and invariable parts. Studying them separately could make Web service research much easier and make our software architecture much more loose-coupled. We summarize two variable parts that affect Web service compositions: uncertain invocation results and uncertain quality of services. These uncertain factors affect success rate of service composition. Previous studies model the Web service problem as a planning problem, while this problem is considered as an uncertain planning problem in this paper. Specifically, we use Partially Observable Markov Decision Process to deal with the uncertain planning problem for service composition. According to the uncertain model, we propose a reinforcement learning method, which is an uncertainty planning method, to compose web services. The proposed method does not need to know complete information of services, instead it uses historical data and estimates the successful possibilities that services are composed together with respect to service outcomes and QoS. Simulation experiments verify the validity of the algorithm, and the results also show that our method improves the success rate of the service composition.
我们如何管理Web服务取决于我们如何理解它们的可变部分和不变部分。分别研究它们可以使Web服务研究更加容易,并使我们的软件体系结构更加松耦合。我们总结了影响Web服务组合的两个可变部分:不确定的调用结果和不确定的服务质量。这些不确定因素影响着服务组合的成功率。以往的研究将Web服务问题建模为一个规划问题,而本文将Web服务问题视为一个不确定规划问题。具体来说,我们使用部分可观察马尔可夫决策过程来处理服务组合的不确定规划问题。根据不确定模型,提出了一种强化学习方法,即不确定规划方法来组合web服务。该方法不需要知道服务的完整信息,而是使用历史数据,根据服务结果和QoS来估计服务组合成功的可能性。仿真实验验证了算法的有效性,结果也表明该方法提高了服务组合的成功率。
{"title":"Web Service Composition Based on Reinforcement Learning","authors":"Yu Lei, Jiantao Zhou, Fengqi Wei, Yongqiang Gao, Bo Yang","doi":"10.1109/ICWS.2015.103","DOIUrl":"https://doi.org/10.1109/ICWS.2015.103","url":null,"abstract":"How we manage Web services depends on how we understand their variable parts and invariable parts. Studying them separately could make Web service research much easier and make our software architecture much more loose-coupled. We summarize two variable parts that affect Web service compositions: uncertain invocation results and uncertain quality of services. These uncertain factors affect success rate of service composition. Previous studies model the Web service problem as a planning problem, while this problem is considered as an uncertain planning problem in this paper. Specifically, we use Partially Observable Markov Decision Process to deal with the uncertain planning problem for service composition. According to the uncertain model, we propose a reinforcement learning method, which is an uncertainty planning method, to compose web services. The proposed method does not need to know complete information of services, instead it uses historical data and estimates the successful possibilities that services are composed together with respect to service outcomes and QoS. Simulation experiments verify the validity of the algorithm, and the results also show that our method improves the success rate of the service composition.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121153218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Measuring the Potential for Victimization in Malicious Content 测量在恶意内容中受害的可能性
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.49
M. Hale, R. Gamble, John Hale, Charles Haney, Jessica Lin, Charles Walter
Sending malicious content to users for obtaining personnel, financial, or intellectual property has become a multi-billion dollar criminal enterprise. This content is primarily presented in the form of emails, social media posts, and phishing websites. User training initiatives seek to minimize the impact of malicious content through improved vigilance. Training works best when tailored to specific user deficiencies. However, tailoring training requires understanding how malicious content victimizes users. In this paper, we link a set of malicious content design factors, in the form of degradations and sophistications, to their potential to form a victimization prediction metric. The design factors examined are developed from an analysis of over 100 pieces of content from email, social media and websites. We conducted an experiment using a sample of the content and a game-based simulation platform to evaluate the efficacy of our victimization prediction metric. The experimental results and their analysis are presented as part of the evaluation.
向用户发送恶意内容以获取人员、财务或知识产权已经成为一个价值数十亿美元的犯罪企业。这些内容主要以电子邮件、社交媒体帖子和网络钓鱼网站的形式呈现。用户培训计划旨在通过提高警惕性来尽量减少恶意内容的影响。针对特定用户缺陷的培训效果最好。然而,定制培训需要了解恶意内容是如何伤害用户的。在本文中,我们以降级和复杂的形式将一组恶意内容设计因素与它们形成受害预测指标的潜力联系起来。这些设计因素是对来自电子邮件、社交媒体和网站的100多篇内容进行分析后得出的。我们使用内容样本和基于游戏的模拟平台进行了一项实验,以评估受害预测指标的有效性。实验结果及其分析是评价的一部分。
{"title":"Measuring the Potential for Victimization in Malicious Content","authors":"M. Hale, R. Gamble, John Hale, Charles Haney, Jessica Lin, Charles Walter","doi":"10.1109/ICWS.2015.49","DOIUrl":"https://doi.org/10.1109/ICWS.2015.49","url":null,"abstract":"Sending malicious content to users for obtaining personnel, financial, or intellectual property has become a multi-billion dollar criminal enterprise. This content is primarily presented in the form of emails, social media posts, and phishing websites. User training initiatives seek to minimize the impact of malicious content through improved vigilance. Training works best when tailored to specific user deficiencies. However, tailoring training requires understanding how malicious content victimizes users. In this paper, we link a set of malicious content design factors, in the form of degradations and sophistications, to their potential to form a victimization prediction metric. The design factors examined are developed from an analysis of over 100 pieces of content from email, social media and websites. We conducted an experiment using a sample of the content and a game-based simulation platform to evaluate the efficacy of our victimization prediction metric. The experimental results and their analysis are presented as part of the evaluation.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121749660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Service Mining from Legacy Database Applications 从遗留数据库应用程序中挖掘服务
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.66
Diptikalyan Saha
As software consumption is shifting to mobile platforms, enterprises are looking for efficient ways to reuse their existing legacy systems by exposing their functionalities as services. Mining services from legacy code is therefore an important problem for the enterprises. In this paper we present a technique for mining service candidates from the database applications. Central to our mining technique is the specification and identification of data-access patterns which specify how a program interacts with the databases. In addition to finding service candidates which are internal functions in the source code, we also provide an algorithm to expose the function as a stateless service by generating a wrapper function around the internal function. We demonstrate the effectiveness of our technique on two open source applications and twelve industrial applications.
随着软件消费向移动平台转移,企业正在寻找有效的方法,通过将现有遗留系统的功能公开为服务来重用它们。因此,从遗留代码中挖掘服务是企业面临的一个重要问题。本文提出了一种从数据库应用程序中挖掘候选服务的技术。我们挖掘技术的核心是数据访问模式的规范和识别,这些模式指定程序如何与数据库交互。除了查找作为源代码内部函数的候选服务外,我们还提供了一种算法,通过在内部函数周围生成包装器函数,将函数公开为无状态服务。我们在两个开源应用程序和十二个工业应用程序中演示了我们的技术的有效性。
{"title":"Service Mining from Legacy Database Applications","authors":"Diptikalyan Saha","doi":"10.1109/ICWS.2015.66","DOIUrl":"https://doi.org/10.1109/ICWS.2015.66","url":null,"abstract":"As software consumption is shifting to mobile platforms, enterprises are looking for efficient ways to reuse their existing legacy systems by exposing their functionalities as services. Mining services from legacy code is therefore an important problem for the enterprises. In this paper we present a technique for mining service candidates from the database applications. Central to our mining technique is the specification and identification of data-access patterns which specify how a program interacts with the databases. In addition to finding service candidates which are internal functions in the source code, we also provide an algorithm to expose the function as a stateless service by generating a wrapper function around the internal function. We demonstrate the effectiveness of our technique on two open source applications and twelve industrial applications.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122730942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using WADL Specifications to Develop and Maintain REST Client Applications 使用WADL规范开发和维护REST客户端应用程序
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.21
Marios Fokaefs, Eleni Stroulia
Service orientation is one of the most popular paradigms for developing modular distributed software systems. In spite of the substantial research effort dedicated to the development of methods and tools to support SOAP-based service-oriented application development, in practice, RESTful services have surpassed SOAP-based services in popularity and adoption, primarily due to the simplicity of their invocation. However, poor adoption of REST specification standards and lack of systematic development tools have given rise to many, more or less compliant, variants of the Restful style constraints, which undermine the evolvability and interoperability of these systems. In this paper, we describe a tool that supports the systematization of RESTful application development, through the use of semi-automatically constructed WADL interface specifications, without compromising the ease of the overall practice. We illustrate the use and advantages of our tool on real-world REST APIs. Additionally, we comment on how REST APIs are documented, especially in comparison to the auto-generated WADLs.
面向服务是开发模块化分布式软件系统最流行的范例之一。尽管有大量的研究工作致力于开发支持基于soap的面向服务的应用程序开发的方法和工具,但在实践中,RESTful服务在流行和采用方面已经超过了基于soap的服务,这主要是由于其调用的简单性。然而,REST规范标准的不良采用和缺乏系统的开发工具已经产生了许多或多或少兼容的Restful风格约束的变体,这些变体破坏了这些系统的可发展性和互操作性。在本文中,我们描述了一个工具,它通过使用半自动构造的WADL接口规范来支持RESTful应用程序开发的系统化,而不会影响总体实践的易用性。我们将演示我们的工具在真实REST api上的使用和优势。此外,我们还评论了如何记录REST api,特别是如何与自动生成的wsdl进行比较。
{"title":"Using WADL Specifications to Develop and Maintain REST Client Applications","authors":"Marios Fokaefs, Eleni Stroulia","doi":"10.1109/ICWS.2015.21","DOIUrl":"https://doi.org/10.1109/ICWS.2015.21","url":null,"abstract":"Service orientation is one of the most popular paradigms for developing modular distributed software systems. In spite of the substantial research effort dedicated to the development of methods and tools to support SOAP-based service-oriented application development, in practice, RESTful services have surpassed SOAP-based services in popularity and adoption, primarily due to the simplicity of their invocation. However, poor adoption of REST specification standards and lack of systematic development tools have given rise to many, more or less compliant, variants of the Restful style constraints, which undermine the evolvability and interoperability of these systems. In this paper, we describe a tool that supports the systematization of RESTful application development, through the use of semi-automatically constructed WADL interface specifications, without compromising the ease of the overall practice. We illustrate the use and advantages of our tool on real-world REST APIs. Additionally, we comment on how REST APIs are documented, especially in comparison to the auto-generated WADLs.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131443106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
BiNet: Trust Sub-network Extraction Using Binary Ant Colony Algorithm in Contextual Social Networks 基于二元蚁群算法的上下文社交网络信任子网络提取
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.51
Xiaoming Zheng, Yan Wang, M. Orgun
Online Social Networks (OSNs) have become an integral part of daily life in recent years. OSNs contain important participants, the trust relations between participants, and the contexts in which participants interact with each other. All of these have a great influence on the prediction of the trust between a source participant and a target participant, which is important for a participant's decision-making process in many applications, such as seeking service providers. However, predicting the trust from a source participant to a target one based on the whole social network is not really feasible. Thus, prior to trust prediction, the extraction of a small-scale sub-network containing most of the important nodes and contextual information with a high density rate could make trust prediction more efficient and effective. However, extracting such a sub-network has been proved to be an NP-Complete problem. To address this challenging problem, we propose BiNet: a social context-aware trust sub-network extraction model to search for near-optimal solutions effectively and efficiently. In this model, we first capture important factors that affect the trust between participants in OSNs. Next, we define a utility function to measure the trust factors of each node in a social network. At last, we design a novel binary ant colony algorithm with newly designed initialization and mutation processes for sub-network extraction incorporating the utility function. The experiments, conducted on two popular datasets of Epinion and Slash dot, demonstrate that our approach can extract sub-networks covering important participants and contextual information while keeping a high density rate. Our approach is superior to the state-of-the-art approaches in terms of the quality of extracted sub-networks within the same execution time.
近年来,在线社交网络已经成为人们日常生活中不可或缺的一部分。osn包含重要的参与者、参与者之间的信任关系以及参与者之间相互交互的环境。这些都对源参与者和目标参与者之间的信任预测有很大的影响,这对许多应用中参与者的决策过程至关重要,例如寻找服务提供者。然而,基于整个社会网络来预测源参与者对目标参与者的信任是不现实的。因此,在进行信任预测之前,以高密度率提取包含大部分重要节点和上下文信息的小规模子网络,可以提高信任预测的效率和效果。然而,这种子网络的提取已被证明是一个np完全问题。为了解决这个具有挑战性的问题,我们提出了BiNet:一个社会上下文感知的信任子网络提取模型,以有效和高效地搜索接近最优的解决方案。在该模型中,我们首先捕获影响osn中参与者之间信任的重要因素。接下来,我们定义了一个效用函数来衡量社会网络中每个节点的信任因素。最后,我们设计了一种新的二元蚁群算法,并设计了新的初始化和突变过程,用于结合效用函数的子网络提取。在Epinion和Slash dot两个流行的数据集上进行的实验表明,我们的方法可以提取覆盖重要参与者和上下文信息的子网络,同时保持较高的密度率。我们的方法在相同执行时间内提取子网络的质量方面优于最先进的方法。
{"title":"BiNet: Trust Sub-network Extraction Using Binary Ant Colony Algorithm in Contextual Social Networks","authors":"Xiaoming Zheng, Yan Wang, M. Orgun","doi":"10.1109/ICWS.2015.51","DOIUrl":"https://doi.org/10.1109/ICWS.2015.51","url":null,"abstract":"Online Social Networks (OSNs) have become an integral part of daily life in recent years. OSNs contain important participants, the trust relations between participants, and the contexts in which participants interact with each other. All of these have a great influence on the prediction of the trust between a source participant and a target participant, which is important for a participant's decision-making process in many applications, such as seeking service providers. However, predicting the trust from a source participant to a target one based on the whole social network is not really feasible. Thus, prior to trust prediction, the extraction of a small-scale sub-network containing most of the important nodes and contextual information with a high density rate could make trust prediction more efficient and effective. However, extracting such a sub-network has been proved to be an NP-Complete problem. To address this challenging problem, we propose BiNet: a social context-aware trust sub-network extraction model to search for near-optimal solutions effectively and efficiently. In this model, we first capture important factors that affect the trust between participants in OSNs. Next, we define a utility function to measure the trust factors of each node in a social network. At last, we design a novel binary ant colony algorithm with newly designed initialization and mutation processes for sub-network extraction incorporating the utility function. The experiments, conducted on two popular datasets of Epinion and Slash dot, demonstrate that our approach can extract sub-networks covering important participants and contextual information while keeping a high density rate. Our approach is superior to the state-of-the-art approaches in terms of the quality of extracted sub-networks within the same execution time.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130387996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
QoE Evaluation Based on QoS and QoBiz Parameters Applied to an OTT Service 基于QoS和QoBiz参数的QoS评价在OTT服务中的应用
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.86
Diego Rivera, N. Kushik, C. Fuenzalida, A. Cavalli, N. Yevtushenko
In this paper, we present a framework for evaluating the QoE of a service that includes functional and non-functional service requirements. Non-functional requirements are classified into objective, subjective, and business parameters that affect Quality of Service (QoS), Quality of Experience (QoE), and Quality of Business (QoBiz), correspondingly. As those metrics have a strong dependency between each other, we discuss how the QoE of a web-based Over-The-Top service (OTT) can be evaluated taking into account subjective, objective and business parameters. The functional service behavior is described by an Extended Finite State Machine (EFSM) in which non-functional objective, subjective and business-related parameters are tracked using context variables and corresponding updating functions. These parameters are used to evaluate the QoE of the service. We show that the corresponding model allows to keep a track of a user-service interaction. Moreover, the model of the service integrates subjective, objective and business parameters, and thus, can be applied to the QoE evaluation of any OTT service.
在本文中,我们提供了一个框架,用于评估包含功能和非功能服务需求的服务的QoE。非功能需求被分为客观、主观和业务参数,它们会相应地影响服务质量(QoS)、体验质量(QoE)和业务质量(QoBiz)。由于这些指标之间有很强的依赖性,我们将讨论如何在考虑主观、客观和业务参数的情况下评估基于web的OTT服务的QoE。功能性服务行为由扩展有限状态机(EFSM)描述,其中使用上下文变量和相应的更新函数跟踪非功能性目标、主观和业务相关参数。这些参数用于评估服务的QoE。我们展示了相应的模型允许跟踪用户-服务交互。此外,该服务模型集成了主观、客观和业务参数,因此可以应用于任何OTT服务的QoE评价。
{"title":"QoE Evaluation Based on QoS and QoBiz Parameters Applied to an OTT Service","authors":"Diego Rivera, N. Kushik, C. Fuenzalida, A. Cavalli, N. Yevtushenko","doi":"10.1109/ICWS.2015.86","DOIUrl":"https://doi.org/10.1109/ICWS.2015.86","url":null,"abstract":"In this paper, we present a framework for evaluating the QoE of a service that includes functional and non-functional service requirements. Non-functional requirements are classified into objective, subjective, and business parameters that affect Quality of Service (QoS), Quality of Experience (QoE), and Quality of Business (QoBiz), correspondingly. As those metrics have a strong dependency between each other, we discuss how the QoE of a web-based Over-The-Top service (OTT) can be evaluated taking into account subjective, objective and business parameters. The functional service behavior is described by an Extended Finite State Machine (EFSM) in which non-functional objective, subjective and business-related parameters are tracked using context variables and corresponding updating functions. These parameters are used to evaluate the QoE of the service. We show that the corresponding model allows to keep a track of a user-service interaction. Moreover, the model of the service integrates subjective, objective and business parameters, and thus, can be applied to the QoE evaluation of any OTT service.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125229323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Location Analytics as a Service: Providing Insights for Heterogeneous Spatiotemporal Data 位置分析作为一种服务:为异构时空数据提供见解
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.114
B. Deva, Peter Ruppel
The increasing availability of positioning data from mobile devices facilitates new opportunities for location analytics systems, which provide insights into the movement behavior of targets across various localities. Similar to web analytics systems, positioning data can be utilized to count, for example, returning visitors in venues, calculate visit frequencies for certain time intervals, or to identify typical movement paths for different groups of visitors inside and outside buildings. However, a major challenge for location analytics is still to deal with the heterogeneity of data from various positioning systems. In thispaper we present a platform that enables location analytics as a service and copes with the heterogeneous spatiotemporal data of diverse accuracy, frequency, and coverage. Furthermore, it allows to query large positioning datasets according to various data dimensions and metrics. In an additional four-month field trial the applicability of our approach was reviewed using the example of WLAN positioning data from an office environment.
来自移动设备的定位数据越来越多,为位置分析系统提供了新的机会,可以深入了解目标在不同地点的运动行为。与网络分析系统类似,定位数据可以用于统计场地的回访人数,计算特定时间间隔内的访问频率,或者确定建筑物内外不同人群的典型移动路径。然而,位置分析的一个主要挑战仍然是处理来自不同定位系统的数据的异质性。在本文中,我们提出了一个平台,使位置分析成为一种服务,并处理不同精度、频率和覆盖范围的异构时空数据。此外,它还允许根据不同的数据维度和度量查询大型定位数据集。在另外一个为期四个月的现场试验中,使用来自办公环境的WLAN定位数据示例审查了我们方法的适用性。
{"title":"Location Analytics as a Service: Providing Insights for Heterogeneous Spatiotemporal Data","authors":"B. Deva, Peter Ruppel","doi":"10.1109/ICWS.2015.114","DOIUrl":"https://doi.org/10.1109/ICWS.2015.114","url":null,"abstract":"The increasing availability of positioning data from mobile devices facilitates new opportunities for location analytics systems, which provide insights into the movement behavior of targets across various localities. Similar to web analytics systems, positioning data can be utilized to count, for example, returning visitors in venues, calculate visit frequencies for certain time intervals, or to identify typical movement paths for different groups of visitors inside and outside buildings. However, a major challenge for location analytics is still to deal with the heterogeneity of data from various positioning systems. In thispaper we present a platform that enables location analytics as a service and copes with the heterogeneous spatiotemporal data of diverse accuracy, frequency, and coverage. Furthermore, it allows to query large positioning datasets according to various data dimensions and metrics. In an additional four-month field trial the applicability of our approach was reviewed using the example of WLAN positioning data from an office environment.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116552564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2015 IEEE International Conference on Web Services
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1