In modern computer system, system logs are important for problem determination in troubleshooting. Especially in the troubleshooting of systems, system administrators need to understand overview of the problems and identify the root causes quickly, and system logs can help the system administrators. However large numbers of unfamiliar system logs when are generated problems occur, and it's difficult to understand and use them. Most of the existing methods for interpreting system logs don't work immediately and are not useful for troubleshooting situations. We have devised a new method for mining log formats and retrieving log types and parameters in incremental log messages. By creating a structured tree using the nodes generated from log messages, we created a method for mining and refining log format continuously in realtime. Our experiments shows that our method can identify the formats of real system logs without prior knowledge.
{"title":"Incremental Mining of System Log Format","authors":"M. Mizutani","doi":"10.1109/SCC.2013.73","DOIUrl":"https://doi.org/10.1109/SCC.2013.73","url":null,"abstract":"In modern computer system, system logs are important for problem determination in troubleshooting. Especially in the troubleshooting of systems, system administrators need to understand overview of the problems and identify the root causes quickly, and system logs can help the system administrators. However large numbers of unfamiliar system logs when are generated problems occur, and it's difficult to understand and use them. Most of the existing methods for interpreting system logs don't work immediately and are not useful for troubleshooting situations. We have devised a new method for mining log formats and retrieving log types and parameters in incremental log messages. By creating a structured tree using the nodes generated from log messages, we created a method for mining and refining log format continuously in realtime. Our experiments shows that our method can identify the formats of real system logs without prior knowledge.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125317563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing offers lots of attractive benefits to individuals and organizations. However, the adoption rate is a far cry from what it really deserves. Lack of well defined Service Level Agreement (SLA) is one of the key factors. This research aims to provide better understanding of the status quo of the current public cloud service level agreements and to recommend best practices. We conducted a content analysis on around thirty SLAs to identify commonly stated attributes and commonly missing attributes. A follow up case study interviewed a selection of cloud customers further investigates the importance of SLA attributes and its relationship with potential business. The result reveals that some of the commonly missed attributes such as customer support, data protection plan are considered as very important attributes and most SLA attributes are directly related with business values.
{"title":"Systematic Analysis of Public Cloud Service Level Agreements and Related Business Values","authors":"Menghua Qiu, Ying Zhou, Chen Wang","doi":"10.1109/SCC.2013.24","DOIUrl":"https://doi.org/10.1109/SCC.2013.24","url":null,"abstract":"Cloud computing offers lots of attractive benefits to individuals and organizations. However, the adoption rate is a far cry from what it really deserves. Lack of well defined Service Level Agreement (SLA) is one of the key factors. This research aims to provide better understanding of the status quo of the current public cloud service level agreements and to recommend best practices. We conducted a content analysis on around thirty SLAs to identify commonly stated attributes and commonly missing attributes. A follow up case study interviewed a selection of cloud customers further investigates the importance of SLA attributes and its relationship with potential business. The result reveals that some of the commonly missed attributes such as customer support, data protection plan are considered as very important attributes and most SLA attributes are directly related with business values.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125068071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, many approaches have been proposed to facilitate business process design. They attempted to measure the similarity between business processes, merge business process models, mine event logs or recommend activities. In this paper, we present a merging approach that also aims at facilitating business process design. However, instead of merging business process models, we merge process fragments around a particular activity to construct a consolidated fragment for each activity. This consolidated fragment is presented as a configurable sub-process which allows process designers to overview the interactions of an activity and configure them to create business process variants according to particular requirements. The approach has been implemented as an application and tested against a large collection of business process models taken from different domains. Experimental results show that our approach produces concise and efficient configurable fragments.
{"title":"Assisting Business Process Design with Configurable Process Fragments","authors":"Nour Assy, Nguyen Ngoc Chan, Walid Gaaloul","doi":"10.1109/SCC.2013.97","DOIUrl":"https://doi.org/10.1109/SCC.2013.97","url":null,"abstract":"In recent years, many approaches have been proposed to facilitate business process design. They attempted to measure the similarity between business processes, merge business process models, mine event logs or recommend activities. In this paper, we present a merging approach that also aims at facilitating business process design. However, instead of merging business process models, we merge process fragments around a particular activity to construct a consolidated fragment for each activity. This consolidated fragment is presented as a configurable sub-process which allows process designers to overview the interactions of an activity and configure them to create business process variants according to particular requirements. The approach has been implemented as an application and tested against a large collection of business process models taken from different domains. Experimental results show that our approach produces concise and efficient configurable fragments.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"397 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126754921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dong Liu, Li Wang, Jianhua Zheng, Ke Ning, Liang-Jie Zhang
In this paper, we propose a novel model for finding experts on a given topic using social influence analysis in enterprise social network. In enterprise social networks, employees usually talk about some topics relevant to their tasks. With the integration of social technology in BPM (Business Process Management), more expertise characteristics are reflected by their actions in social networks. Social networks became an important place for sharing expertise. We explore the potential of enterprise social networks, such as Yammer and IBM Connections, as a source of expertise evidence. In this work, we utilized influence analysis approach to find experts in enterprise social network. Generally, not all experts have the habit of sharing their expertise in social networks. So expert finding approaches, such as simply using link analysis, are of limited use. Our approach can address this problem. The experimental results show that the proposed approach can find real experts, not just managers with higher influence. Empirical results have also been presented to demonstrate the effectiveness of the proposed models.
在本文中,我们提出了一个利用企业社会网络中的社会影响分析来寻找特定主题专家的新模型。在企业社交网络中,员工通常会谈论一些与他们的任务相关的话题。随着社交技术在BPM (Business Process Management,业务流程管理)中的集成,更多的专业特征通过其在社交网络中的行为得以体现。社交网络成为分享专业知识的重要场所。我们将探索企业社交网络(如Yammer和IBM Connections)作为专业知识证据来源的潜力。在这项工作中,我们利用影响力分析的方法来寻找企业社交网络中的专家。一般来说,并不是所有的专家都有在社交网络上分享专业知识的习惯。因此,专家寻找方法,例如简单地使用链接分析,用处有限。我们的方法可以解决这个问题。实验结果表明,所提出的方法可以找到真正的专家,而不仅仅是具有较高影响力的管理者。实证结果也证明了所提出模型的有效性。
{"title":"Influence Analysis Based Expert Finding Model and Its Applications in Enterprise Social Network","authors":"Dong Liu, Li Wang, Jianhua Zheng, Ke Ning, Liang-Jie Zhang","doi":"10.1109/SCC.2013.72","DOIUrl":"https://doi.org/10.1109/SCC.2013.72","url":null,"abstract":"In this paper, we propose a novel model for finding experts on a given topic using social influence analysis in enterprise social network. In enterprise social networks, employees usually talk about some topics relevant to their tasks. With the integration of social technology in BPM (Business Process Management), more expertise characteristics are reflected by their actions in social networks. Social networks became an important place for sharing expertise. We explore the potential of enterprise social networks, such as Yammer and IBM Connections, as a source of expertise evidence. In this work, we utilized influence analysis approach to find experts in enterprise social network. Generally, not all experts have the habit of sharing their expertise in social networks. So expert finding approaches, such as simply using link analysis, are of limited use. Our approach can address this problem. The experimental results show that the proposed approach can find real experts, not just managers with higher influence. Empirical results have also been presented to demonstrate the effectiveness of the proposed models.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud data centers are networked server farms commonly composed of heterogeneous servers with a wide variety of computing capacities. Virtualization technology, in Cloud data centers, has improved server utilization and server consolidation. However, virtual machines may require unbalanced levels of computing resources (e.g., a virtual machine running a compute-intensive application with low memory requirements) causing resource usage imbalances within physical servers. In this paper, an agent-based distributed approach capable of balancing different types of workloads (e.g., memory workload) by using virtual machine live migration is proposed. Agents acting as server managers are equipped with 1) a collaborative workload balancing protocol, and 2) a set of workload balancing policies (e.g., resource usage migration thresholds and virtual machine migration heuristics) to simultaneously consider both server heterogeneity and virtual machine heterogeneity. The experimental results show that policy-based workload balancing is effectively achieved despite dealing with server heterogeneity and heterogeneous workloads.
{"title":"Policy-Based Agents for Virtual Machine Migration in Cloud Data Centers","authors":"J. Gutierrez-Garcia, A. Ramirez-Nafarrate","doi":"10.1109/SCC.2013.55","DOIUrl":"https://doi.org/10.1109/SCC.2013.55","url":null,"abstract":"Cloud data centers are networked server farms commonly composed of heterogeneous servers with a wide variety of computing capacities. Virtualization technology, in Cloud data centers, has improved server utilization and server consolidation. However, virtual machines may require unbalanced levels of computing resources (e.g., a virtual machine running a compute-intensive application with low memory requirements) causing resource usage imbalances within physical servers. In this paper, an agent-based distributed approach capable of balancing different types of workloads (e.g., memory workload) by using virtual machine live migration is proposed. Agents acting as server managers are equipped with 1) a collaborative workload balancing protocol, and 2) a set of workload balancing policies (e.g., resource usage migration thresholds and virtual machine migration heuristics) to simultaneously consider both server heterogeneity and virtual machine heterogeneity. The experimental results show that policy-based workload balancing is effectively achieved despite dealing with server heterogeneity and heterogeneous workloads.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131131524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In healthcare IT environment there are disparate functional systems and they need to collaborate to support healthcare enterprise workflow. While messaging standard and service-oriented approach provides general interoperability practice, they lack sufficient support for semantic interoperability. Semantic web service technology has proved useful to improve semantic interoperability by annotating service interfaces with domain ontologies in the healthcare domain. However, current approaches rely on ad-hoc manual effort to define semantic annotation and there lacks a generalized, cost-effective approach to automatically generate semantic web service descriptions from domain knowledge to ensure consistency and interoperability. In this paper, we propose a mapping-based approach to utilize healthcare domain knowledge to reduce the effort of manually creating semantic annotation. Specifically, we establish modeling ontology for Health Level 7 (HL7) messaging standard and define its semantic mapping to Web Service Modeling Ontology (WSMO). A use case illustrates generating WSMO service annotation using this mapping with HL7 standard model as input. This mapping allows separation of concern and enables automatic annotation, and thus eases introducing semantic technology into healthcare environment unfamiliar with semantics.
{"title":"From Healthcare Messaging Standard to Semantic Web Service Description: Generating WSMO Annotation from HL7 with Mapping-Based Approach","authors":"Hongchao Nie, Shasha Li, Xudong Lu, H. Duan","doi":"10.1109/SCC.2013.74","DOIUrl":"https://doi.org/10.1109/SCC.2013.74","url":null,"abstract":"In healthcare IT environment there are disparate functional systems and they need to collaborate to support healthcare enterprise workflow. While messaging standard and service-oriented approach provides general interoperability practice, they lack sufficient support for semantic interoperability. Semantic web service technology has proved useful to improve semantic interoperability by annotating service interfaces with domain ontologies in the healthcare domain. However, current approaches rely on ad-hoc manual effort to define semantic annotation and there lacks a generalized, cost-effective approach to automatically generate semantic web service descriptions from domain knowledge to ensure consistency and interoperability. In this paper, we propose a mapping-based approach to utilize healthcare domain knowledge to reduce the effort of manually creating semantic annotation. Specifically, we establish modeling ontology for Health Level 7 (HL7) messaging standard and define its semantic mapping to Web Service Modeling Ontology (WSMO). A use case illustrates generating WSMO service annotation using this mapping with HL7 standard model as input. This mapping allows separation of concern and enables automatic annotation, and thus eases introducing semantic technology into healthcare environment unfamiliar with semantics.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130953049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Increasing the productivity of Service-Oriented Software Engineering through a model-driven methodology needs to go beyond business service modeling and the automation of transforming models that adhere to the SOA style. Commonly, business analysts focus on modeling business processes. Then, IT developers implement software architectures that are automatically generated from the process models. In this paper, we look forward to maintaining the alignment between business services and their supporting IT assets when business settings evolve. We introduce an approach for an incremental synchronization between business process models and component configuration models that follow SOA architectural principles. We automate the change forward propagation by enforcing in-place translations of the updates on the models in order to preserve their consistency.
{"title":"Alignment and Change Propagation between Business Processes and Service-Oriented Architectures","authors":"Karim Dahman, F. Charoy, C. Godart","doi":"10.1109/SCC.2013.101","DOIUrl":"https://doi.org/10.1109/SCC.2013.101","url":null,"abstract":"Increasing the productivity of Service-Oriented Software Engineering through a model-driven methodology needs to go beyond business service modeling and the automation of transforming models that adhere to the SOA style. Commonly, business analysts focus on modeling business processes. Then, IT developers implement software architectures that are automatically generated from the process models. In this paper, we look forward to maintaining the alignment between business services and their supporting IT assets when business settings evolve. We introduce an approach for an incremental synchronization between business process models and component configuration models that follow SOA architectural principles. We automate the change forward propagation by enforcing in-place translations of the updates on the models in order to preserve their consistency.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133883689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michele Stecca, Martino Fornasa, P. Baglietto, M. Maresca
In the last few years different solutions have been proposed for the composition of Web APIs. In this paper we focus on the scalability problems appearing when the software platform in charge of executing Service Compositions (which are defined as Directed Acyclic Graphs, DAGs) is supposed to support huge numbers of concurrent executions. This is the case of viral applications as well as of Cloud Computing scenarios where Service Compositions are deployed and executed in multi-tentant platforms implementing different paradigms such as Business Process as a Service, Mashup as a Service, Service Composition as a Service. The proposed solution exploits the Asynchronous I/O paradigm for the efficient utilization of system resources such as threads and memory.
{"title":"Scalable Service Composition Execution through Asynchronous I/O","authors":"Michele Stecca, Martino Fornasa, P. Baglietto, M. Maresca","doi":"10.1109/SCC.2013.38","DOIUrl":"https://doi.org/10.1109/SCC.2013.38","url":null,"abstract":"In the last few years different solutions have been proposed for the composition of Web APIs. In this paper we focus on the scalability problems appearing when the software platform in charge of executing Service Compositions (which are defined as Directed Acyclic Graphs, DAGs) is supposed to support huge numbers of concurrent executions. This is the case of viral applications as well as of Cloud Computing scenarios where Service Compositions are deployed and executed in multi-tentant platforms implementing different paradigms such as Business Process as a Service, Mashup as a Service, Service Composition as a Service. The proposed solution exploits the Asynchronous I/O paradigm for the efficient utilization of system resources such as threads and memory.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In e-commerce and e-service environments, transaction context is important when evaluating the trust level of a seller or a service provider in a forthcoming transaction. However, most existing trust evaluation models compute a single value to reflect the general trust level of a seller without taking any transaction context into account. In the literature, a trust vector approach has been proposed to resolve the above problem. In particular, the trust vector contains different sets of trust values (termed as CTT values) so as to outline a seller's reputation profile. As a result, buyers can identify the potential risk existing in a forthcoming transaction (e.g., value imbalance, i.e. a malicious seller may build up a high level of trust by selling cheap products and then deceive buyers by inducing them to purchase more expensive products) and thus avoid monetary losses. In computing CTT values, some approaches are proposed that store the precomputed aggregation results over large-scale ratings and transaction data of a seller, so as to deliver prompt responses to a buyer's query. Though these approaches allocate relatively small space to each seller for storing the aggregation results, if applied in a system with millions of sellers, space consumption will be intolerable. In this paper, we propose a novel model for CTT computation with fixed storage space, which provides a trade-off between aggregation detail and storage space. It is particular suitable for CTT computation where a request is regarding a seller's trust in recent time period, e.g., the latest six months, rather than six months plus one day. We have conducted experiments on both an eBay dataset and a synthetic dataset to illustrate its good efficiency in responding to buyers' CTT queries.
{"title":"A Novel Model for Contextual Transaction Trust Computation with Fixed Storage Space in E-Commerce and E-Service Environments","authors":"Haibin Zhang, Yan Wang","doi":"10.1109/SCC.2013.108","DOIUrl":"https://doi.org/10.1109/SCC.2013.108","url":null,"abstract":"In e-commerce and e-service environments, transaction context is important when evaluating the trust level of a seller or a service provider in a forthcoming transaction. However, most existing trust evaluation models compute a single value to reflect the general trust level of a seller without taking any transaction context into account. In the literature, a trust vector approach has been proposed to resolve the above problem. In particular, the trust vector contains different sets of trust values (termed as CTT values) so as to outline a seller's reputation profile. As a result, buyers can identify the potential risk existing in a forthcoming transaction (e.g., value imbalance, i.e. a malicious seller may build up a high level of trust by selling cheap products and then deceive buyers by inducing them to purchase more expensive products) and thus avoid monetary losses. In computing CTT values, some approaches are proposed that store the precomputed aggregation results over large-scale ratings and transaction data of a seller, so as to deliver prompt responses to a buyer's query. Though these approaches allocate relatively small space to each seller for storing the aggregation results, if applied in a system with millions of sellers, space consumption will be intolerable. In this paper, we propose a novel model for CTT computation with fixed storage space, which provides a trade-off between aggregation detail and storage space. It is particular suitable for CTT computation where a request is regarding a seller's trust in recent time period, e.g., the latest six months, rather than six months plus one day. We have conducted experiments on both an eBay dataset and a synthetic dataset to illustrate its good efficiency in responding to buyers' CTT queries.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122081903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Care processes in healthcare organizations are very complex and difficult to define precisely in advance. Furthermore, a specific process for the same disease can vary according to the characteristics of a patient and his or her situation at hand. In order to provide personalized healthcare services to patients, it is essential to identify the context of the patients. This paper presents an integrated architecture of context-aware business process management system based on ubiquitous computing technologies. By detecting the current health status of a patient using various ubiquitous devices such as RFID and smart sensors, the proposed system helps healthcare professionals provide personalized healthcare services.
{"title":"Context-Aware Business Process Management for Personalized Healthcare Services","authors":"Junho Moon, Dongsoo Kim","doi":"10.1109/SCC.2013.88","DOIUrl":"https://doi.org/10.1109/SCC.2013.88","url":null,"abstract":"Care processes in healthcare organizations are very complex and difficult to define precisely in advance. Furthermore, a specific process for the same disease can vary according to the characteristics of a patient and his or her situation at hand. In order to provide personalized healthcare services to patients, it is essential to identify the context of the patients. This paper presents an integrated architecture of context-aware business process management system based on ubiquitous computing technologies. By detecting the current health status of a patient using various ubiquitous devices such as RFID and smart sensors, the proposed system helps healthcare professionals provide personalized healthcare services.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121630161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}