首页 > 最新文献

2013 IEEE International Conference on Services Computing最新文献

英文 中文
A Web Service Recommendation Approach Based on Situation Awareness 基于态势感知的Web服务推荐方法
Pub Date : 2013-06-28 DOI: 10.1109/SCC.2013.103
Chen Liu, Huiping Lin, Yibing Xiong
With the development of Service-Oriented Technologies, the amount of Web services grows rapidly. Situation awareness, as a very important computing paradigm which can provide more reasonable and complete representation of the user's environment, can be benefit to the discovering of the service user's requirement. Therefore in this paper, we explore to use the situational information to recommend services which satisfy the requirement of users better and meanwhile improve the QoS prediction accuracy. Both the convergences between users' service selections in different situations and their QoS experiences have been taken into account. Moreover, we investigate the potential relationships between the situations structure and the services selection. Experiment results indicate that our method achieves ideal performance.
随着面向服务技术的发展,Web服务的数量迅速增长。态势感知作为一种非常重要的计算范式,能够更合理、更完整地表示用户所处的环境,有利于发现服务用户的需求。因此,本文探索利用情境信息来推荐更符合用户需求的服务,同时提高QoS预测精度。同时考虑了用户在不同情况下服务选择的收敛性和用户的QoS体验。此外,我们还探讨了情境结构与服务选择之间的潜在关系。实验结果表明,该方法达到了理想的性能。
{"title":"A Web Service Recommendation Approach Based on Situation Awareness","authors":"Chen Liu, Huiping Lin, Yibing Xiong","doi":"10.1109/SCC.2013.103","DOIUrl":"https://doi.org/10.1109/SCC.2013.103","url":null,"abstract":"With the development of Service-Oriented Technologies, the amount of Web services grows rapidly. Situation awareness, as a very important computing paradigm which can provide more reasonable and complete representation of the user's environment, can be benefit to the discovering of the service user's requirement. Therefore in this paper, we explore to use the situational information to recommend services which satisfy the requirement of users better and meanwhile improve the QoS prediction accuracy. Both the convergences between users' service selections in different situations and their QoS experiences have been taken into account. Moreover, we investigate the potential relationships between the situations structure and the services selection. Experiment results indicate that our method achieves ideal performance.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reputation-Aware QoS Value Prediction of Web Services 基于声誉感知的Web服务QoS值预测
Pub Date : 2013-06-28 DOI: 10.1109/SCC.2013.43
Weiwei Qiu, Zibin Zheng, Xinyu Wang, Xiaohu Yang, Michael R. Lyu
QoS value prediction of Web services is an important research issue for service recommendation, selection and composition. Collaborative Filtering (CF) is one of the most widely used methods which employs QoS values contributed by similar users to make predictions. Therefore, historical QoS values contributed by different users can have great impacts on prediction results. However, existing Web service QoS value prediction approaches did not take data credibility into consideration, which may impact the prediction accuracy. To address this problem, we propose a reputation-aware QoS value prediction approach, which first calculates the reputation of each user based on their contributed values, and then takes advantage of reputation-based ranking to exclude the values contributed by untrustworthy users. CF QoS prediction approach is finally used to predict the missing QoS values based on the purified dataset. Experimental results show that our approach has higher prediction accuracy than other approaches.
Web服务的QoS值预测是服务推荐、选择和组合的重要研究课题。协同过滤(CF)是应用最广泛的一种方法,它利用相似用户提供的QoS值进行预测。因此,不同用户贡献的历史QoS值会对预测结果产生很大影响。然而,现有的Web服务QoS值预测方法没有考虑数据的可信度,这可能会影响预测的准确性。为了解决这一问题,我们提出了一种基于声誉感知的QoS价值预测方法,该方法首先根据每个用户的贡献值计算其声誉,然后利用基于声誉的排名来排除不可信用户的贡献值。最后利用CF QoS预测方法,在纯化数据集的基础上对缺失的QoS值进行预测。实验结果表明,该方法具有较高的预测精度。
{"title":"Reputation-Aware QoS Value Prediction of Web Services","authors":"Weiwei Qiu, Zibin Zheng, Xinyu Wang, Xiaohu Yang, Michael R. Lyu","doi":"10.1109/SCC.2013.43","DOIUrl":"https://doi.org/10.1109/SCC.2013.43","url":null,"abstract":"QoS value prediction of Web services is an important research issue for service recommendation, selection and composition. Collaborative Filtering (CF) is one of the most widely used methods which employs QoS values contributed by similar users to make predictions. Therefore, historical QoS values contributed by different users can have great impacts on prediction results. However, existing Web service QoS value prediction approaches did not take data credibility into consideration, which may impact the prediction accuracy. To address this problem, we propose a reputation-aware QoS value prediction approach, which first calculates the reputation of each user based on their contributed values, and then takes advantage of reputation-based ranking to exclude the values contributed by untrustworthy users. CF QoS prediction approach is finally used to predict the missing QoS values based on the purified dataset. Experimental results show that our approach has higher prediction accuracy than other approaches.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"13 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131437292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Towards Provenance Aware Design of Service Compositions: A Methodology for Analysing the Provenance Awareness in Service Designs 面向服务组合的来源意识设计:一种分析服务设计中来源意识的方法
Pub Date : 2013-06-28 DOI: 10.1109/SCC.2013.17
Paraskevi Zerva, S. Zschaler, S. Miles
Specifying and analysing non-functional properties (NFPs) is essential for driving architectural decisions and validating composite service designs. Only where NFPs have been specified can we choose between services with similar functionality that would better satisfy our non-functional requirements. Meanwhile, incorporating provenance functionality into service-oriented systems' design is becoming crucial for users, allowing them to query the generation methods and origins of the data the system outputs. This need is particularly evident in compositions of services, where audits of individual services do not provide a connected picture of the composition's processing history. Making provenance awareness (ability to answer provenance queries) an explicit NFP in composite service specifications would enable composite service designers to analyse whether they meet provenance-related requirements. In this paper, we discuss a framework for designing and analysing provenance awareness for service compositions. We envision this as a basis for analysing the impact of provenance on other NFPs such as performance and storage.
指定和分析非功能属性(NFPs)对于驱动架构决策和验证组合服务设计至关重要。只有在指定了NFPs的情况下,我们才能在具有类似功能的服务之间进行选择,从而更好地满足我们的非功能需求。同时,将来源功能整合到面向服务系统的设计中对用户来说变得至关重要,允许他们查询系统输出的数据的生成方法和来源。这种需求在服务组合中尤为明显,因为对单个服务的审计并不能提供组合处理历史的连接图。在组合服务规范中将来源意识(回答来源查询的能力)作为显式的NFP,将使组合服务设计人员能够分析它们是否满足与来源相关的需求。本文讨论了一个用于设计和分析服务组合的来源感知的框架。我们将此设想为分析来源对其他NFPs(如性能和存储)的影响的基础。
{"title":"Towards Provenance Aware Design of Service Compositions: A Methodology for Analysing the Provenance Awareness in Service Designs","authors":"Paraskevi Zerva, S. Zschaler, S. Miles","doi":"10.1109/SCC.2013.17","DOIUrl":"https://doi.org/10.1109/SCC.2013.17","url":null,"abstract":"Specifying and analysing non-functional properties (NFPs) is essential for driving architectural decisions and validating composite service designs. Only where NFPs have been specified can we choose between services with similar functionality that would better satisfy our non-functional requirements. Meanwhile, incorporating provenance functionality into service-oriented systems' design is becoming crucial for users, allowing them to query the generation methods and origins of the data the system outputs. This need is particularly evident in compositions of services, where audits of individual services do not provide a connected picture of the composition's processing history. Making provenance awareness (ability to answer provenance queries) an explicit NFP in composite service specifications would enable composite service designers to analyse whether they meet provenance-related requirements. In this paper, we discuss a framework for designing and analysing provenance awareness for service compositions. We envision this as a basis for analysing the impact of provenance on other NFPs such as performance and storage.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124930223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integrated Syntax and Semantic Validation for Services Computing 服务计算的集成语法和语义验证
Pub Date : 2013-06-28 DOI: 10.1109/SCC.2013.71
Lixin Tao, S. Golikov
XML syntax and semantic validations are critical to the correct service transaction specification and service integration based on existing distributed and heterogeneous computing services. This research proves that the current industry practice of XSLT-based Schematron validation may produce invalid results, and contributes a reusable XML validator component that supports sound integrated syntax/semantic validations and event-driven integration with its environment through public APIs.
XML语法和语义验证对于正确的服务事务规范和基于现有分布式和异构计算服务的服务集成至关重要。这项研究证明了当前基于xslt的Schematron验证的行业实践可能会产生无效的结果,并提供了一个可重用的XML验证器组件,该组件支持可靠的集成语法/语义验证以及通过公共api与环境进行事件驱动的集成。
{"title":"Integrated Syntax and Semantic Validation for Services Computing","authors":"Lixin Tao, S. Golikov","doi":"10.1109/SCC.2013.71","DOIUrl":"https://doi.org/10.1109/SCC.2013.71","url":null,"abstract":"XML syntax and semantic validations are critical to the correct service transaction specification and service integration based on existing distributed and heterogeneous computing services. This research proves that the current industry practice of XSLT-based Schematron validation may produce invalid results, and contributes a reusable XML validator component that supports sound integrated syntax/semantic validations and event-driven integration with its environment through public APIs.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114547319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Risk Assessment and Trust in Services Computing: Applications and Experience 服务计算中的风险评估与信任:应用与经验
Pub Date : 2013-06-28 DOI: 10.1109/SCC.2013.41
P. Townend, V. Viduto, D. Webster, K. Djemame, L. Lau, V. Dimitrova, Jie Xu, S. Fores, Charlie Dibsdale, J. Austin, John McAvoy, Stephen Hobson
Service-orientation is effective at managing complexity and dynamicity at a programmatic level, but there is still much work to be done in understanding and improving the trust that users place in a system's outputs, and the extent to which they understand the associated risks of decisions recommended by a system. This is crucial if we are to improve the uptake and real-world effectiveness of service-based decision-support systems whilst also reducing the risks (both perceived and actual) of using such systems. This paper presents the current progress of the STRAPP project, which is designing and engineering novel trust and risk assessment mechanisms for services computing and applying these to a number of real-world service-based decision-support systems. A new layered architecture model for trust and risk is introduced and described in detail, and we present our state-of-the-art work in risk-assessment, demonstrating the relationship between provenance data and risk via a mathematical model. We then give a detailed description of our latest software demonstrator, integrated into the Rolls-Royce Equipment Health Management system, and comprehensively discuss the lessons we have learnt from developing such a complex, holistic, and applied real-world system. Finally, we describe the future work we plan to complete.
面向服务在管理编程级别的复杂性和动态性方面是有效的,但是在理解和提高用户对系统输出的信任以及他们对系统建议的决策的相关风险的理解程度方面仍有许多工作要做。如果我们要提高基于服务的决策支持系统的吸收和实际有效性,同时减少使用此类系统的风险(感知和实际),这一点至关重要。本文介绍了STRAPP项目的当前进展,该项目正在设计和设计用于服务计算的新型信任和风险评估机制,并将其应用于许多现实世界的基于服务的决策支持系统。介绍并详细描述了一种新的信任和风险分层架构模型,并介绍了我们在风险评估方面的最新工作,通过数学模型展示了来源数据与风险之间的关系。然后,我们详细描述了我们最新的软件演示器,集成到劳斯莱斯设备健康管理系统中,并全面讨论了我们从开发这样一个复杂的、整体的、应用于现实世界的系统中学到的经验教训。最后,我们描述了我们未来计划完成的工作。
{"title":"Risk Assessment and Trust in Services Computing: Applications and Experience","authors":"P. Townend, V. Viduto, D. Webster, K. Djemame, L. Lau, V. Dimitrova, Jie Xu, S. Fores, Charlie Dibsdale, J. Austin, John McAvoy, Stephen Hobson","doi":"10.1109/SCC.2013.41","DOIUrl":"https://doi.org/10.1109/SCC.2013.41","url":null,"abstract":"Service-orientation is effective at managing complexity and dynamicity at a programmatic level, but there is still much work to be done in understanding and improving the trust that users place in a system's outputs, and the extent to which they understand the associated risks of decisions recommended by a system. This is crucial if we are to improve the uptake and real-world effectiveness of service-based decision-support systems whilst also reducing the risks (both perceived and actual) of using such systems. This paper presents the current progress of the STRAPP project, which is designing and engineering novel trust and risk assessment mechanisms for services computing and applying these to a number of real-world service-based decision-support systems. A new layered architecture model for trust and risk is introduced and described in detail, and we present our state-of-the-art work in risk-assessment, demonstrating the relationship between provenance data and risk via a mathematical model. We then give a detailed description of our latest software demonstrator, integrated into the Rolls-Royce Equipment Health Management system, and comprehensively discuss the lessons we have learnt from developing such a complex, holistic, and applied real-world system. Finally, we describe the future work we plan to complete.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Provenance-Based Access Control in the Cloud 云中基于来源的访问控制
Pub Date : 2013-06-28 DOI: 10.1109/SCC.2013.51
Julien Lacroix, Omar Boucelma
This paper describes a provenance-based access control system for the cloud. The system combines both provenance and access-control models together with a rule-based mechanism. The system allows rule propagation (in the cloud) and a central execution engine for enforcing security and trustworthiness.
本文描述了一种基于溯源的云访问控制系统。该系统将来源和访问控制模型与基于规则的机制结合在一起。该系统允许规则传播(在云中)和中央执行引擎来执行安全性和可信度。
{"title":"Provenance-Based Access Control in the Cloud","authors":"Julien Lacroix, Omar Boucelma","doi":"10.1109/SCC.2013.51","DOIUrl":"https://doi.org/10.1109/SCC.2013.51","url":null,"abstract":"This paper describes a provenance-based access control system for the cloud. The system combines both provenance and access-control models together with a rule-based mechanism. The system allows rule propagation (in the cloud) and a central execution engine for enforcing security and trustworthiness.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122793631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PSRPS: A Workload Pattern Sensitive Resource Provisioning Scheme for Cloud Systems PSRPS:云系统的工作负载模式敏感资源分配方案
Pub Date : 2013-06-28 DOI: 10.1109/SCC.2013.49
Feifei Zhang, Jie Wu, Zhihui Lu
On-demand resource provisioning is with great challenge in cloud systems. The key problem is how to learn about the future workload in advance to help determine resource allocation. There are various prediction models developed to predict the future workload. The major problem of previous researches is that they assume that application workload has static pattern. In practice, so many application workloads have hybrid dynamic pattern overtime. To achieve high prediction accuracy, we find that it's essential to detect both workload pattern stage and the changes in the model parameters. In this paper, we present a Pattern Sensitive Resource Provisioning Scheme, named PSRPS. It can recognize application workload patterns and choose suitable prediction models for prediction online. Besides, when there is maladjustment in prediction models, PSRPS can switch prediction models or adjust the parameters of the model by itself to adaptively to guarantee prediction accuracy.
在云系统中,按需资源供应是一个巨大的挑战。关键问题是如何提前了解未来的工作负载,以帮助确定资源分配。开发了各种预测模型来预测未来的工作负载。以往研究的主要问题是假定应用程序工作负载具有静态模式。在实践中,许多应用程序工作负载都具有混合动态模式超时。为了达到较高的预测精度,我们发现必须同时检测工作负载模式阶段和模型参数的变化。本文提出了一种模式敏感的资源分配方案PSRPS。它可以识别应用程序的工作负载模式,并选择合适的预测模型进行在线预测。此外,当预测模型存在失调时,PSRPS可以切换预测模型或自适应调整模型参数,以保证预测精度。
{"title":"PSRPS: A Workload Pattern Sensitive Resource Provisioning Scheme for Cloud Systems","authors":"Feifei Zhang, Jie Wu, Zhihui Lu","doi":"10.1109/SCC.2013.49","DOIUrl":"https://doi.org/10.1109/SCC.2013.49","url":null,"abstract":"On-demand resource provisioning is with great challenge in cloud systems. The key problem is how to learn about the future workload in advance to help determine resource allocation. There are various prediction models developed to predict the future workload. The major problem of previous researches is that they assume that application workload has static pattern. In practice, so many application workloads have hybrid dynamic pattern overtime. To achieve high prediction accuracy, we find that it's essential to detect both workload pattern stage and the changes in the model parameters. In this paper, we present a Pattern Sensitive Resource Provisioning Scheme, named PSRPS. It can recognize application workload patterns and choose suitable prediction models for prediction online. Besides, when there is maladjustment in prediction models, PSRPS can switch prediction models or adjust the parameters of the model by itself to adaptively to guarantee prediction accuracy.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126768687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Private and Anonymous Data Storage and Distribution in Cloud 云中的私有和匿名数据存储和分发
Pub Date : 2013-06-28 DOI: 10.1109/SCC.2013.53
Qi Duan, Yongge Wang, Fadi Mohsen, E. Al-Shaer
Cloud storage systems have received extensive attention in recent years. Many individuals and business organizations are beginning to move their data to cloud environments. It becomes increasingly important to investigate secure file storage in cloud environments. In this paper, we present a secure distributed file distribution system in which the customers can directly choose appropriate design parameters and service providers. In our scheme, we use novel coding techniques that almost achieve the Shannon information bound with very efficient coding and decoding process. Our evaluations show the correctness and efficiency of the coding scheme. We show that the problem to find the satisfying file distribution under certain cost and security constraints is NP-hard, and present the Satisfiability Modulo Theories (SMT) formalization to find the satisfying data share distribution with cost and security constraints. The SMT formalization is flexible to be applied to other threshold based cloud file distribution system and can accommodate other constraints. We also analyse the security of the scheme by defining the security metric (compromising probability) for both the eavesdropping and DoS attackers and show that one must carefully choose design parameters to achieve the required security.
近年来,云存储系统受到了广泛的关注。许多个人和企业组织开始将他们的数据迁移到云环境中。研究云环境中的安全文件存储变得越来越重要。本文提出了一种安全的分布式文件分发系统,用户可以直接选择合适的设计参数和服务提供商。在我们的方案中,我们使用了新颖的编码技术,几乎实现了香农信息绑定,具有非常高效的编码和解码过程。我们的评估表明了编码方案的正确性和有效性。我们证明了在一定成本和安全约束下寻找令人满意的文件分布的问题是np困难的,并给出了在成本和安全约束下寻找令人满意的数据共享分布的可满足模理论(SMT)形式化。SMT形式化可以灵活地应用于其他基于阈值的云文件分发系统,并且可以适应其他约束。我们还通过定义窃听和DoS攻击者的安全度量(妥协概率)来分析方案的安全性,并表明必须仔细选择设计参数以实现所需的安全性。
{"title":"Private and Anonymous Data Storage and Distribution in Cloud","authors":"Qi Duan, Yongge Wang, Fadi Mohsen, E. Al-Shaer","doi":"10.1109/SCC.2013.53","DOIUrl":"https://doi.org/10.1109/SCC.2013.53","url":null,"abstract":"Cloud storage systems have received extensive attention in recent years. Many individuals and business organizations are beginning to move their data to cloud environments. It becomes increasingly important to investigate secure file storage in cloud environments. In this paper, we present a secure distributed file distribution system in which the customers can directly choose appropriate design parameters and service providers. In our scheme, we use novel coding techniques that almost achieve the Shannon information bound with very efficient coding and decoding process. Our evaluations show the correctness and efficiency of the coding scheme. We show that the problem to find the satisfying file distribution under certain cost and security constraints is NP-hard, and present the Satisfiability Modulo Theories (SMT) formalization to find the satisfying data share distribution with cost and security constraints. The SMT formalization is flexible to be applied to other threshold based cloud file distribution system and can accommodate other constraints. We also analyse the security of the scheme by defining the security metric (compromising probability) for both the eavesdropping and DoS attackers and show that one must carefully choose design parameters to achieve the required security.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127228838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Variations in Performance Measurements of Multi-core Processors: A Study of n-Tier Applications 多核处理器性能测量的变化:n层应用的研究
Pub Date : 2013-06-28 DOI: 10.1109/SCC.2013.116
Junhee Park, Qingyang Wang, D. Jayasinghe, Jack Li, Yasuhiko Kanemasa, Masazumi Matsubara, Daisaku Yokoyama, M. Kitsuregawa, C. Pu
The prevalence of multi-core processors has raised the question of whether applications can use the increasing number of cores efficiently in order to provide predictable quality of service (QoS). In this paper, we study the horizontal scalability of n-tier application performance within a multicore processor (MCP). Through extensive measurements of the RUBBoS benchmark, we found one major source of performance variations within MCP: the mapping of cores to virtual CPUs can significantly lower on-chip cache hit ratio, causing performance drops of up to 22% without obvious changes in resource utilization. After we eliminated these variations by fixing the MCP core mapping, we measured the impact of three mainstream hypervisors (the dominant Commercial Hypervisor, Xen, and KVM) on intra-MCP horizontal scalability. On a quad-core dual-processor (total 8 cores), we found some interesting similarities and dissimilarities among the hypervisors. An example of similarities is a non-monotonic scalability trend (throughput increasing up to 4 cores and then decreasing for more than 4 cores) when running a browse-only CPU-intensive workload. This problem can be traced to the management of last level cache of CPU packages. An example of dissimilarities among hypervisors is their handling of write operations in mixed read/write, I/O-intensive workloads. Specifically, the Commercial Hypervisor is able to provide more than twice the throughput compared to KVM. Our measurements show that both MCP cache architecture and the choice of hypervisors indeed have an impact on the efficiency and horizontal scalability achievable by applications. However, despite their differences, all three mainstream hypervisors have difficulties with the intra-MCP horizontal scalability beyond 4 cores for n-tier applications.
多核处理器的流行提出了一个问题,即应用程序是否能够有效地利用越来越多的核心来提供可预测的服务质量(QoS)。本文研究了多核处理器(MCP)内n层应用程序性能的水平可扩展性。通过对RUBBoS基准的广泛测量,我们发现了MCP中性能变化的一个主要来源:内核到虚拟cpu的映射可以显著降低片上缓存命中率,导致性能下降高达22%,而资源利用率没有明显变化。在我们通过修复MCP核心映射消除了这些变化之后,我们测量了三个主流管理程序(占主导地位的商业管理程序、Xen和KVM)对MCP内部水平可伸缩性的影响。在四核双处理器(总共8核)上,我们发现了管理程序之间一些有趣的相似点和不同点。类似的一个例子是,当运行仅浏览的cpu密集型工作负载时,非单调的可伸缩性趋势(吞吐量在4核以下增加,在4核以上减少)。这个问题可以追溯到CPU包的最后一级缓存的管理。管理程序之间的一个不同之处是它们在混合读/写、I/ o密集型工作负载中对写操作的处理。具体来说,商用Hypervisor能够提供比KVM高两倍以上的吞吐量。我们的测量表明,MCP缓存架构和管理程序的选择确实对应用程序可实现的效率和水平可伸缩性有影响。然而,尽管它们存在差异,但对于n层应用程序,所有这三种主流管理程序都难以实现超过4核的内部mcp水平可伸缩性。
{"title":"Variations in Performance Measurements of Multi-core Processors: A Study of n-Tier Applications","authors":"Junhee Park, Qingyang Wang, D. Jayasinghe, Jack Li, Yasuhiko Kanemasa, Masazumi Matsubara, Daisaku Yokoyama, M. Kitsuregawa, C. Pu","doi":"10.1109/SCC.2013.116","DOIUrl":"https://doi.org/10.1109/SCC.2013.116","url":null,"abstract":"The prevalence of multi-core processors has raised the question of whether applications can use the increasing number of cores efficiently in order to provide predictable quality of service (QoS). In this paper, we study the horizontal scalability of n-tier application performance within a multicore processor (MCP). Through extensive measurements of the RUBBoS benchmark, we found one major source of performance variations within MCP: the mapping of cores to virtual CPUs can significantly lower on-chip cache hit ratio, causing performance drops of up to 22% without obvious changes in resource utilization. After we eliminated these variations by fixing the MCP core mapping, we measured the impact of three mainstream hypervisors (the dominant Commercial Hypervisor, Xen, and KVM) on intra-MCP horizontal scalability. On a quad-core dual-processor (total 8 cores), we found some interesting similarities and dissimilarities among the hypervisors. An example of similarities is a non-monotonic scalability trend (throughput increasing up to 4 cores and then decreasing for more than 4 cores) when running a browse-only CPU-intensive workload. This problem can be traced to the management of last level cache of CPU packages. An example of dissimilarities among hypervisors is their handling of write operations in mixed read/write, I/O-intensive workloads. Specifically, the Commercial Hypervisor is able to provide more than twice the throughput compared to KVM. Our measurements show that both MCP cache architecture and the choice of hypervisors indeed have an impact on the efficiency and horizontal scalability achievable by applications. However, despite their differences, all three mainstream hypervisors have difficulties with the intra-MCP horizontal scalability beyond 4 cores for n-tier applications.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123439536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Awareness of Social Influence for Service Recommendation 服务推荐的社会影响意识
Pub Date : 2013-06-28 DOI: 10.1109/SCC.2013.95
Wuhui Chen, Incheon Paik, Takazumi Tanaka, B. Kumara
With increasing presence and adoption of Web Services on the World Wide Web, to recommend suitable services to users has become an important issue. However, existing personalization approaches, such as collaborative filtering or content based recommendations, are ignoring services' sociability because of the isolation of services without social relationships among them, and lacking of consideration of social influence. Therefore, there is a need for more accurate means to interlink them in a social-enhanced interest network, and to analyze and quantify the social influence. In this paper, we propose a methodology to connect distributed services into a global social service network for social influence-aware service recommendation, called recommend-as-you-go. First, we propose a novel platform to construct a global social service network by linking distributed services with social link using quality of social link, and then we propose a flexible model for effective awareness of social influence to provide a quantitative measure of the influential strength, Next, a novel social influence-aware service recommendation approach is presented based on global social service network, and finally, the experiment results show that our new approach can solve the quality of service recommendation problem well with quick query response, low usage threshold and high accuracy with user preferences by recommend-as-you-go.
随着万维网上Web服务的出现和采用的增加,向用户推荐合适的服务已成为一个重要的问题。然而,现有的个性化方法,如协同过滤或基于内容的推荐,由于服务之间没有社会关系,并且缺乏对社会影响的考虑,因此忽略了服务的社交性。因此,需要更准确的手段将它们联系在一个社会增强的利益网络中,并分析和量化其社会影响。在本文中,我们提出了一种方法,将分布式服务连接到一个全球社会服务网络中,用于社会影响力感知服务推荐,称为“随你去推荐”。首先,我们提出了一种新的平台,利用社会链接的质量将分布式服务与社会链接链接起来,构建全球社会服务网络;然后,我们提出了一种灵活的社会影响力有效感知模型,为影响力强度提供了定量度量;其次,我们提出了一种新的基于全球社会服务网络的社会影响力感知服务推荐方法;实验结果表明,该方法可以很好地解决服务质量推荐问题,具有查询响应快、使用阈值低、准确度高的特点。
{"title":"Awareness of Social Influence for Service Recommendation","authors":"Wuhui Chen, Incheon Paik, Takazumi Tanaka, B. Kumara","doi":"10.1109/SCC.2013.95","DOIUrl":"https://doi.org/10.1109/SCC.2013.95","url":null,"abstract":"With increasing presence and adoption of Web Services on the World Wide Web, to recommend suitable services to users has become an important issue. However, existing personalization approaches, such as collaborative filtering or content based recommendations, are ignoring services' sociability because of the isolation of services without social relationships among them, and lacking of consideration of social influence. Therefore, there is a need for more accurate means to interlink them in a social-enhanced interest network, and to analyze and quantify the social influence. In this paper, we propose a methodology to connect distributed services into a global social service network for social influence-aware service recommendation, called recommend-as-you-go. First, we propose a novel platform to construct a global social service network by linking distributed services with social link using quality of social link, and then we propose a flexible model for effective awareness of social influence to provide a quantitative measure of the influential strength, Next, a novel social influence-aware service recommendation approach is presented based on global social service network, and finally, the experiment results show that our new approach can solve the quality of service recommendation problem well with quick query response, low usage threshold and high accuracy with user preferences by recommend-as-you-go.","PeriodicalId":370898,"journal":{"name":"2013 IEEE International Conference on Services Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130881298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 IEEE International Conference on Services Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1