首页 > 最新文献

2015 IEEE International Conference on Web Services最新文献

英文 中文
Conversion Infrastructure for Maintaining High Availability of Web Services Using Multiple Service Providers 使用多个服务提供者维护Web服务高可用性的转换基础结构
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.110
P. Melliar-Smith, L. Moser
Web Services allow an enterprise to focus on its own business expertise and to employ information technology services offered by others, however, doing so exposes the enterprise to the risk of loss of service or data, if the service provider fails. The use of multiple service providers reduces the risk of failure, but it introduces the complication of incompatible service interfaces, data formats, and stored data. In this paper, we propose a conversion infrastructure that facilitates the use of multiple alternative Web Services at different service providers, to achieve high availability, even in the event of a failure or a catastrophe.
Web服务允许企业专注于自己的业务专长,并使用他人提供的信息技术服务,但是,如果服务提供者出现故障,这样做会使企业面临服务或数据丢失的风险。使用多个服务提供者降低了失败的风险,但它引入了不兼容的服务接口、数据格式和存储数据的复杂性。在本文中,我们提出了一种转换基础设施,它可以促进在不同的服务提供者处使用多个备选Web服务,以实现高可用性,即使在发生故障或灾难的情况下也是如此。
{"title":"Conversion Infrastructure for Maintaining High Availability of Web Services Using Multiple Service Providers","authors":"P. Melliar-Smith, L. Moser","doi":"10.1109/ICWS.2015.110","DOIUrl":"https://doi.org/10.1109/ICWS.2015.110","url":null,"abstract":"Web Services allow an enterprise to focus on its own business expertise and to employ information technology services offered by others, however, doing so exposes the enterprise to the risk of loss of service or data, if the service provider fails. The use of multiple service providers reduces the risk of failure, but it introduces the complication of incompatible service interfaces, data formats, and stored data. In this paper, we propose a conversion infrastructure that facilitates the use of multiple alternative Web Services at different service providers, to achieve high availability, even in the event of a failure or a catastrophe.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"10 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128744494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Heuristic Recovery of Missing Events in Process Logs 流程日志中缺失事件的启发式恢复
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.24
Wei Song, Xiaoxu Xia, H. Jacobsen, Pengcheng Zhang, Hao Hu
Event logs are of paramount significance for process mining and complex event processing. Yet, the quality of event logs remains a serious problem. Missing events of logs are usually caused by omitting manual recording, system failures, and hybrid storage of executions of different processes. It has been proved that the problem of minimum recovery based on a priori process specification is NP-hard. State-of-the-art approach is still lacking in efficiency because of the large search space. To address this issue, in this paper, we leverage the technique of process decomposition and present heuristics to efficiently prune the unqualified sub-processes that fail to generate the minimum recovery. We employ real-world processes and their incomplete sequences to evaluate our heuristic approach. The experimental results demonstrate that our approach achieves high accuracy as the state-of-the-art approach does, but it is more efficient.
事件日志对于流程挖掘和复杂事件处理具有重要意义。然而,事件日志的质量仍然是一个严重的问题。日志事件丢失通常是由于忽略手工记录、系统故障和不同进程执行的混合存储造成的。证明了基于先验工艺规范的最小回收率问题是np困难的。由于搜索空间大,最先进的方法仍然缺乏效率。为了解决这个问题,在本文中,我们利用过程分解技术和启发式方法来有效地修剪那些不能产生最小恢复的不合格子过程。我们使用现实世界的过程和它们的不完全序列来评估我们的启发式方法。实验结果表明,该方法与现有方法相比具有较高的精度,但效率更高。
{"title":"Heuristic Recovery of Missing Events in Process Logs","authors":"Wei Song, Xiaoxu Xia, H. Jacobsen, Pengcheng Zhang, Hao Hu","doi":"10.1109/ICWS.2015.24","DOIUrl":"https://doi.org/10.1109/ICWS.2015.24","url":null,"abstract":"Event logs are of paramount significance for process mining and complex event processing. Yet, the quality of event logs remains a serious problem. Missing events of logs are usually caused by omitting manual recording, system failures, and hybrid storage of executions of different processes. It has been proved that the problem of minimum recovery based on a priori process specification is NP-hard. State-of-the-art approach is still lacking in efficiency because of the large search space. To address this issue, in this paper, we leverage the technique of process decomposition and present heuristics to efficiently prune the unqualified sub-processes that fail to generate the minimum recovery. We employ real-world processes and their incomplete sequences to evaluate our heuristic approach. The experimental results demonstrate that our approach achieves high accuracy as the state-of-the-art approach does, but it is more efficient.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Service-Based Framework for Mobile Social Messaging in PaaS Systems PaaS系统中基于服务的移动社交消息传递框架
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.108
Lijun Mei, Hao Chen, Shaochun Li, Qicheng Li, Guangtai Liang, Jeaha Yang
With the rapid growth of cloud computing, developing business applications on Platform-as-a-Service (PaaS) systems is increasingly popular among industry companies. Various services are developed to support different business requirements on PaaS systems. However, to the best of our knowledge, currently there is no service that provides mobile social messaging services to enable users of their apps to share messages in their social networks (e.g., We Chat, Whats App, Kaka Talk). Lack of such mobile social messaging services prevents industry companies from succeeding in drastic market competitions (e.g., Capture high customer satisfactory). In this paper, we propose a service-based framework to enable the mobile social messaging in PaaS systems (e.g., IBM Blue mix). Using this framework, developers can focus on the service encapsulation of existing applications, and define their business process flows via the conversation management in our platform (no coding work is needed). As such, our framework can effectively reduce the development workload for mobile social messaging in PaaS systems.
随着云计算的快速发展,在平台即服务(PaaS)系统上开发业务应用程序在行业公司中越来越流行。开发了各种服务来支持PaaS系统上的不同业务需求。然而,据我们所知,目前还没有一种服务提供移动社交信息服务,使其应用程序的用户能够在他们的社交网络中分享信息(例如,We Chat, what App, Kaka Talk)。缺乏这样的移动社交信息服务阻碍了行业公司在激烈的市场竞争中取得成功(例如,获取高客户满意度)。在本文中,我们提出了一个基于服务的框架来实现PaaS系统(例如,IBM Blue组合)中的移动社交消息传递。使用这个框架,开发人员可以专注于现有应用程序的服务封装,并通过我们平台中的会话管理定义他们的业务流程流(不需要编码工作)。因此,我们的框架可以有效地减少PaaS系统中移动社交消息传递的开发工作量。
{"title":"A Service-Based Framework for Mobile Social Messaging in PaaS Systems","authors":"Lijun Mei, Hao Chen, Shaochun Li, Qicheng Li, Guangtai Liang, Jeaha Yang","doi":"10.1109/ICWS.2015.108","DOIUrl":"https://doi.org/10.1109/ICWS.2015.108","url":null,"abstract":"With the rapid growth of cloud computing, developing business applications on Platform-as-a-Service (PaaS) systems is increasingly popular among industry companies. Various services are developed to support different business requirements on PaaS systems. However, to the best of our knowledge, currently there is no service that provides mobile social messaging services to enable users of their apps to share messages in their social networks (e.g., We Chat, Whats App, Kaka Talk). Lack of such mobile social messaging services prevents industry companies from succeeding in drastic market competitions (e.g., Capture high customer satisfactory). In this paper, we propose a service-based framework to enable the mobile social messaging in PaaS systems (e.g., IBM Blue mix). Using this framework, developers can focus on the service encapsulation of existing applications, and define their business process flows via the conversation management in our platform (no coding work is needed). As such, our framework can effectively reduce the development workload for mobile social messaging in PaaS systems.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131310448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Web Service Composition Based on Reinforcement Learning 基于强化学习的Web服务组合
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.103
Yu Lei, Jiantao Zhou, Fengqi Wei, Yongqiang Gao, Bo Yang
How we manage Web services depends on how we understand their variable parts and invariable parts. Studying them separately could make Web service research much easier and make our software architecture much more loose-coupled. We summarize two variable parts that affect Web service compositions: uncertain invocation results and uncertain quality of services. These uncertain factors affect success rate of service composition. Previous studies model the Web service problem as a planning problem, while this problem is considered as an uncertain planning problem in this paper. Specifically, we use Partially Observable Markov Decision Process to deal with the uncertain planning problem for service composition. According to the uncertain model, we propose a reinforcement learning method, which is an uncertainty planning method, to compose web services. The proposed method does not need to know complete information of services, instead it uses historical data and estimates the successful possibilities that services are composed together with respect to service outcomes and QoS. Simulation experiments verify the validity of the algorithm, and the results also show that our method improves the success rate of the service composition.
我们如何管理Web服务取决于我们如何理解它们的可变部分和不变部分。分别研究它们可以使Web服务研究更加容易,并使我们的软件体系结构更加松耦合。我们总结了影响Web服务组合的两个可变部分:不确定的调用结果和不确定的服务质量。这些不确定因素影响着服务组合的成功率。以往的研究将Web服务问题建模为一个规划问题,而本文将Web服务问题视为一个不确定规划问题。具体来说,我们使用部分可观察马尔可夫决策过程来处理服务组合的不确定规划问题。根据不确定模型,提出了一种强化学习方法,即不确定规划方法来组合web服务。该方法不需要知道服务的完整信息,而是使用历史数据,根据服务结果和QoS来估计服务组合成功的可能性。仿真实验验证了算法的有效性,结果也表明该方法提高了服务组合的成功率。
{"title":"Web Service Composition Based on Reinforcement Learning","authors":"Yu Lei, Jiantao Zhou, Fengqi Wei, Yongqiang Gao, Bo Yang","doi":"10.1109/ICWS.2015.103","DOIUrl":"https://doi.org/10.1109/ICWS.2015.103","url":null,"abstract":"How we manage Web services depends on how we understand their variable parts and invariable parts. Studying them separately could make Web service research much easier and make our software architecture much more loose-coupled. We summarize two variable parts that affect Web service compositions: uncertain invocation results and uncertain quality of services. These uncertain factors affect success rate of service composition. Previous studies model the Web service problem as a planning problem, while this problem is considered as an uncertain planning problem in this paper. Specifically, we use Partially Observable Markov Decision Process to deal with the uncertain planning problem for service composition. According to the uncertain model, we propose a reinforcement learning method, which is an uncertainty planning method, to compose web services. The proposed method does not need to know complete information of services, instead it uses historical data and estimates the successful possibilities that services are composed together with respect to service outcomes and QoS. Simulation experiments verify the validity of the algorithm, and the results also show that our method improves the success rate of the service composition.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121153218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Measuring the Potential for Victimization in Malicious Content 测量在恶意内容中受害的可能性
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.49
M. Hale, R. Gamble, John Hale, Charles Haney, Jessica Lin, Charles Walter
Sending malicious content to users for obtaining personnel, financial, or intellectual property has become a multi-billion dollar criminal enterprise. This content is primarily presented in the form of emails, social media posts, and phishing websites. User training initiatives seek to minimize the impact of malicious content through improved vigilance. Training works best when tailored to specific user deficiencies. However, tailoring training requires understanding how malicious content victimizes users. In this paper, we link a set of malicious content design factors, in the form of degradations and sophistications, to their potential to form a victimization prediction metric. The design factors examined are developed from an analysis of over 100 pieces of content from email, social media and websites. We conducted an experiment using a sample of the content and a game-based simulation platform to evaluate the efficacy of our victimization prediction metric. The experimental results and their analysis are presented as part of the evaluation.
向用户发送恶意内容以获取人员、财务或知识产权已经成为一个价值数十亿美元的犯罪企业。这些内容主要以电子邮件、社交媒体帖子和网络钓鱼网站的形式呈现。用户培训计划旨在通过提高警惕性来尽量减少恶意内容的影响。针对特定用户缺陷的培训效果最好。然而,定制培训需要了解恶意内容是如何伤害用户的。在本文中,我们以降级和复杂的形式将一组恶意内容设计因素与它们形成受害预测指标的潜力联系起来。这些设计因素是对来自电子邮件、社交媒体和网站的100多篇内容进行分析后得出的。我们使用内容样本和基于游戏的模拟平台进行了一项实验,以评估受害预测指标的有效性。实验结果及其分析是评价的一部分。
{"title":"Measuring the Potential for Victimization in Malicious Content","authors":"M. Hale, R. Gamble, John Hale, Charles Haney, Jessica Lin, Charles Walter","doi":"10.1109/ICWS.2015.49","DOIUrl":"https://doi.org/10.1109/ICWS.2015.49","url":null,"abstract":"Sending malicious content to users for obtaining personnel, financial, or intellectual property has become a multi-billion dollar criminal enterprise. This content is primarily presented in the form of emails, social media posts, and phishing websites. User training initiatives seek to minimize the impact of malicious content through improved vigilance. Training works best when tailored to specific user deficiencies. However, tailoring training requires understanding how malicious content victimizes users. In this paper, we link a set of malicious content design factors, in the form of degradations and sophistications, to their potential to form a victimization prediction metric. The design factors examined are developed from an analysis of over 100 pieces of content from email, social media and websites. We conducted an experiment using a sample of the content and a game-based simulation platform to evaluate the efficacy of our victimization prediction metric. The experimental results and their analysis are presented as part of the evaluation.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121749660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Service Mining from Legacy Database Applications 从遗留数据库应用程序中挖掘服务
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.66
Diptikalyan Saha
As software consumption is shifting to mobile platforms, enterprises are looking for efficient ways to reuse their existing legacy systems by exposing their functionalities as services. Mining services from legacy code is therefore an important problem for the enterprises. In this paper we present a technique for mining service candidates from the database applications. Central to our mining technique is the specification and identification of data-access patterns which specify how a program interacts with the databases. In addition to finding service candidates which are internal functions in the source code, we also provide an algorithm to expose the function as a stateless service by generating a wrapper function around the internal function. We demonstrate the effectiveness of our technique on two open source applications and twelve industrial applications.
随着软件消费向移动平台转移,企业正在寻找有效的方法,通过将现有遗留系统的功能公开为服务来重用它们。因此,从遗留代码中挖掘服务是企业面临的一个重要问题。本文提出了一种从数据库应用程序中挖掘候选服务的技术。我们挖掘技术的核心是数据访问模式的规范和识别,这些模式指定程序如何与数据库交互。除了查找作为源代码内部函数的候选服务外,我们还提供了一种算法,通过在内部函数周围生成包装器函数,将函数公开为无状态服务。我们在两个开源应用程序和十二个工业应用程序中演示了我们的技术的有效性。
{"title":"Service Mining from Legacy Database Applications","authors":"Diptikalyan Saha","doi":"10.1109/ICWS.2015.66","DOIUrl":"https://doi.org/10.1109/ICWS.2015.66","url":null,"abstract":"As software consumption is shifting to mobile platforms, enterprises are looking for efficient ways to reuse their existing legacy systems by exposing their functionalities as services. Mining services from legacy code is therefore an important problem for the enterprises. In this paper we present a technique for mining service candidates from the database applications. Central to our mining technique is the specification and identification of data-access patterns which specify how a program interacts with the databases. In addition to finding service candidates which are internal functions in the source code, we also provide an algorithm to expose the function as a stateless service by generating a wrapper function around the internal function. We demonstrate the effectiveness of our technique on two open source applications and twelve industrial applications.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122730942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using WADL Specifications to Develop and Maintain REST Client Applications 使用WADL规范开发和维护REST客户端应用程序
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.21
Marios Fokaefs, Eleni Stroulia
Service orientation is one of the most popular paradigms for developing modular distributed software systems. In spite of the substantial research effort dedicated to the development of methods and tools to support SOAP-based service-oriented application development, in practice, RESTful services have surpassed SOAP-based services in popularity and adoption, primarily due to the simplicity of their invocation. However, poor adoption of REST specification standards and lack of systematic development tools have given rise to many, more or less compliant, variants of the Restful style constraints, which undermine the evolvability and interoperability of these systems. In this paper, we describe a tool that supports the systematization of RESTful application development, through the use of semi-automatically constructed WADL interface specifications, without compromising the ease of the overall practice. We illustrate the use and advantages of our tool on real-world REST APIs. Additionally, we comment on how REST APIs are documented, especially in comparison to the auto-generated WADLs.
面向服务是开发模块化分布式软件系统最流行的范例之一。尽管有大量的研究工作致力于开发支持基于soap的面向服务的应用程序开发的方法和工具,但在实践中,RESTful服务在流行和采用方面已经超过了基于soap的服务,这主要是由于其调用的简单性。然而,REST规范标准的不良采用和缺乏系统的开发工具已经产生了许多或多或少兼容的Restful风格约束的变体,这些变体破坏了这些系统的可发展性和互操作性。在本文中,我们描述了一个工具,它通过使用半自动构造的WADL接口规范来支持RESTful应用程序开发的系统化,而不会影响总体实践的易用性。我们将演示我们的工具在真实REST api上的使用和优势。此外,我们还评论了如何记录REST api,特别是如何与自动生成的wsdl进行比较。
{"title":"Using WADL Specifications to Develop and Maintain REST Client Applications","authors":"Marios Fokaefs, Eleni Stroulia","doi":"10.1109/ICWS.2015.21","DOIUrl":"https://doi.org/10.1109/ICWS.2015.21","url":null,"abstract":"Service orientation is one of the most popular paradigms for developing modular distributed software systems. In spite of the substantial research effort dedicated to the development of methods and tools to support SOAP-based service-oriented application development, in practice, RESTful services have surpassed SOAP-based services in popularity and adoption, primarily due to the simplicity of their invocation. However, poor adoption of REST specification standards and lack of systematic development tools have given rise to many, more or less compliant, variants of the Restful style constraints, which undermine the evolvability and interoperability of these systems. In this paper, we describe a tool that supports the systematization of RESTful application development, through the use of semi-automatically constructed WADL interface specifications, without compromising the ease of the overall practice. We illustrate the use and advantages of our tool on real-world REST APIs. Additionally, we comment on how REST APIs are documented, especially in comparison to the auto-generated WADLs.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131443106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
BiNet: Trust Sub-network Extraction Using Binary Ant Colony Algorithm in Contextual Social Networks 基于二元蚁群算法的上下文社交网络信任子网络提取
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.51
Xiaoming Zheng, Yan Wang, M. Orgun
Online Social Networks (OSNs) have become an integral part of daily life in recent years. OSNs contain important participants, the trust relations between participants, and the contexts in which participants interact with each other. All of these have a great influence on the prediction of the trust between a source participant and a target participant, which is important for a participant's decision-making process in many applications, such as seeking service providers. However, predicting the trust from a source participant to a target one based on the whole social network is not really feasible. Thus, prior to trust prediction, the extraction of a small-scale sub-network containing most of the important nodes and contextual information with a high density rate could make trust prediction more efficient and effective. However, extracting such a sub-network has been proved to be an NP-Complete problem. To address this challenging problem, we propose BiNet: a social context-aware trust sub-network extraction model to search for near-optimal solutions effectively and efficiently. In this model, we first capture important factors that affect the trust between participants in OSNs. Next, we define a utility function to measure the trust factors of each node in a social network. At last, we design a novel binary ant colony algorithm with newly designed initialization and mutation processes for sub-network extraction incorporating the utility function. The experiments, conducted on two popular datasets of Epinion and Slash dot, demonstrate that our approach can extract sub-networks covering important participants and contextual information while keeping a high density rate. Our approach is superior to the state-of-the-art approaches in terms of the quality of extracted sub-networks within the same execution time.
近年来,在线社交网络已经成为人们日常生活中不可或缺的一部分。osn包含重要的参与者、参与者之间的信任关系以及参与者之间相互交互的环境。这些都对源参与者和目标参与者之间的信任预测有很大的影响,这对许多应用中参与者的决策过程至关重要,例如寻找服务提供者。然而,基于整个社会网络来预测源参与者对目标参与者的信任是不现实的。因此,在进行信任预测之前,以高密度率提取包含大部分重要节点和上下文信息的小规模子网络,可以提高信任预测的效率和效果。然而,这种子网络的提取已被证明是一个np完全问题。为了解决这个具有挑战性的问题,我们提出了BiNet:一个社会上下文感知的信任子网络提取模型,以有效和高效地搜索接近最优的解决方案。在该模型中,我们首先捕获影响osn中参与者之间信任的重要因素。接下来,我们定义了一个效用函数来衡量社会网络中每个节点的信任因素。最后,我们设计了一种新的二元蚁群算法,并设计了新的初始化和突变过程,用于结合效用函数的子网络提取。在Epinion和Slash dot两个流行的数据集上进行的实验表明,我们的方法可以提取覆盖重要参与者和上下文信息的子网络,同时保持较高的密度率。我们的方法在相同执行时间内提取子网络的质量方面优于最先进的方法。
{"title":"BiNet: Trust Sub-network Extraction Using Binary Ant Colony Algorithm in Contextual Social Networks","authors":"Xiaoming Zheng, Yan Wang, M. Orgun","doi":"10.1109/ICWS.2015.51","DOIUrl":"https://doi.org/10.1109/ICWS.2015.51","url":null,"abstract":"Online Social Networks (OSNs) have become an integral part of daily life in recent years. OSNs contain important participants, the trust relations between participants, and the contexts in which participants interact with each other. All of these have a great influence on the prediction of the trust between a source participant and a target participant, which is important for a participant's decision-making process in many applications, such as seeking service providers. However, predicting the trust from a source participant to a target one based on the whole social network is not really feasible. Thus, prior to trust prediction, the extraction of a small-scale sub-network containing most of the important nodes and contextual information with a high density rate could make trust prediction more efficient and effective. However, extracting such a sub-network has been proved to be an NP-Complete problem. To address this challenging problem, we propose BiNet: a social context-aware trust sub-network extraction model to search for near-optimal solutions effectively and efficiently. In this model, we first capture important factors that affect the trust between participants in OSNs. Next, we define a utility function to measure the trust factors of each node in a social network. At last, we design a novel binary ant colony algorithm with newly designed initialization and mutation processes for sub-network extraction incorporating the utility function. The experiments, conducted on two popular datasets of Epinion and Slash dot, demonstrate that our approach can extract sub-networks covering important participants and contextual information while keeping a high density rate. Our approach is superior to the state-of-the-art approaches in terms of the quality of extracted sub-networks within the same execution time.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130387996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Service Recommendation for Mashup Composition with Implicit Correlation Regularization 隐式关联正则化Mashup组合的服务推荐
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.38
Lina Yao, Xianzhi Wang, Quan Z. Sheng, Wenjie Ruan, Wei Zhang
In this paper, we explore service recommendation and selection in the reusable composition context. The goal is to aid developers finding the most appropriate services in their composition tasks. We specifically focus on mashups, a domain that increasingly targets people without sophisticated programming knowledge. We propose a probabilistic matrix factorization approach with implicit correlation regularization to solve this problem. In particular, we advocate that the co-invocation of services in mashups is driven by both explicit textual similarity and implicit correlation of services, and therefore develop a latent variable model to uncover the latent connections between services by analyzing their co-invocation patterns. We crawled a real dataset from Programmable Web, and extensively evaluated the effectiveness of our proposed approach.
在本文中,我们探讨了可重用组合上下文中的服务推荐和选择。其目标是帮助开发人员在其组合任务中找到最合适的服务。我们特别关注mashup,这个领域越来越多地针对没有复杂编程知识的人。我们提出了一种带有隐式相关正则化的概率矩阵分解方法来解决这个问题。特别是,我们主张mashup中服务的共同调用由服务的显式文本相似性和隐式相关性驱动,因此开发了一个潜在变量模型,通过分析服务的共同调用模式来揭示服务之间的潜在连接。我们从可编程Web中抓取了一个真实的数据集,并广泛评估了我们提出的方法的有效性。
{"title":"Service Recommendation for Mashup Composition with Implicit Correlation Regularization","authors":"Lina Yao, Xianzhi Wang, Quan Z. Sheng, Wenjie Ruan, Wei Zhang","doi":"10.1109/ICWS.2015.38","DOIUrl":"https://doi.org/10.1109/ICWS.2015.38","url":null,"abstract":"In this paper, we explore service recommendation and selection in the reusable composition context. The goal is to aid developers finding the most appropriate services in their composition tasks. We specifically focus on mashups, a domain that increasingly targets people without sophisticated programming knowledge. We propose a probabilistic matrix factorization approach with implicit correlation regularization to solve this problem. In particular, we advocate that the co-invocation of services in mashups is driven by both explicit textual similarity and implicit correlation of services, and therefore develop a latent variable model to uncover the latent connections between services by analyzing their co-invocation patterns. We crawled a real dataset from Programmable Web, and extensively evaluated the effectiveness of our proposed approach.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124820724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Enabling the Extraction and Insertion of Reusable Choreography Fragments 支持抽取和插入可重用的编排片段
Pub Date : 2015-06-27 DOI: 10.1109/ICWS.2015.96
A. Weiss, V. Andrikopoulos, Michael Hahn, D. Karastoyanova
Reuse of service orchestrations or service compositions is extensively studied in the literature of process modeling. Sub-processes, process templates, process variants, and process reference models are employed as reusable elements for these purposes. The concept of process fragments has been previously introduced in order to capture parts of a process model and store them for later reuse. However, similar efforts on facilitating the reuse of processes that cross the boundaries of organizations expressed as service choreographies are not available yet. In this paper, we introduce the concept of choreography fragments as reusable elements for service choreography modeling. Choreography fragments can be extracted from choreography models, adapted, stored, and later inserted into new models. Based on a formal model for choreography fragments, we define methods and algorithms for the extraction and insertion of fragments from and into service choreographies. We then discuss an experimental and proof-of-concept evaluation of our proposal.
服务编排或服务组合的重用在流程建模的文献中得到了广泛的研究。子过程、过程模板、过程变量和过程参考模型被用作这些目的的可重用元素。之前介绍了流程片段的概念,以便捕获流程模型的部分并存储它们以供以后重用。然而,在促进以服务编排形式表示的跨组织边界的流程重用方面,还没有类似的努力。在本文中,我们引入了将编排片段作为服务编排建模的可重用元素的概念。可以从编排模型中提取编排片段,对其进行调整、存储,然后将其插入到新的模型中。基于编排片段的形式化模型,我们定义了用于从服务编排中提取和插入片段的方法和算法。然后,我们讨论了我们的建议的实验和概念验证评估。
{"title":"Enabling the Extraction and Insertion of Reusable Choreography Fragments","authors":"A. Weiss, V. Andrikopoulos, Michael Hahn, D. Karastoyanova","doi":"10.1109/ICWS.2015.96","DOIUrl":"https://doi.org/10.1109/ICWS.2015.96","url":null,"abstract":"Reuse of service orchestrations or service compositions is extensively studied in the literature of process modeling. Sub-processes, process templates, process variants, and process reference models are employed as reusable elements for these purposes. The concept of process fragments has been previously introduced in order to capture parts of a process model and store them for later reuse. However, similar efforts on facilitating the reuse of processes that cross the boundaries of organizations expressed as service choreographies are not available yet. In this paper, we introduce the concept of choreography fragments as reusable elements for service choreography modeling. Choreography fragments can be extracted from choreography models, adapted, stored, and later inserted into new models. Based on a formal model for choreography fragments, we define methods and algorithms for the extraction and insertion of fragments from and into service choreographies. We then discuss an experimental and proof-of-concept evaluation of our proposal.","PeriodicalId":250871,"journal":{"name":"2015 IEEE International Conference on Web Services","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123041454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2015 IEEE International Conference on Web Services
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1