In the paper, we analyze the shortages of Service-Oriented Analysis and Design (SOAD) methodologies, and propose a SOAD method based on Use Case approach. Therefore, a service model is designed to facilitate service i...
详细信息
In the paper, we analyze the shortages of Service-Oriented Analysis and Design (SOAD) methodologies, and then review the features of data flow diagram as a kind of requirement analysis technology. Finally, we propose ...
详细信息
Recent researches pay more attention to stock tendency prediction, which various machine learning approaches have been proposed. In this paper, we propose an algorithm to discover self-correlation of stock price in vi...
详细信息
Recent researches pay more attention to stock tendency prediction, which various machine learning approaches have been proposed. In this paper, we propose an algorithm to discover self-correlation of stock price in virtue of the notion of time series motifs, by viewing stock price sequences as time series. Generally, time series motif is a pattern appearing frequently in a time sequence, useful to forecast the stock temporal tendencies and prices as a reliable part in time series. In the proposed approach, we firstly search for one part of time series motifs using ordinal comparison and k-NN clustering algorithm, and then attempt to discover the correlation between motifs and subsequences connected behind them. Experimental results demonstrate the positive contribution of time series motifs, the acceptable prediction accuracy, and priority of our algorithm.
Web service chaining forms one of the basic operation during Web service composition. To decide whether services can be chained, semantic matching between the I/O is usually evaluated. In this paper we propose an appr...
详细信息
Web service chaining forms one of the basic operation during Web service composition. To decide whether services can be chained, semantic matching between the I/O is usually evaluated. In this paper we propose an approach considering possible adaptation of output data before it is consumed as input by other service. We also define the corresponding rules based on which it is evaluated if the chaining is possible or not. Moreover, we deal also with the affect on workflow and service description, and their execution.
The process of semantic Web service composition arranges several Web services into one composite service to realize complex workflows with an exploitation of semantics. This paper proposes a framework to automatic sem...
详细信息
ISBN:
(纸本)9781424446469;9780769537559
The process of semantic Web service composition arranges several Web services into one composite service to realize complex workflows with an exploitation of semantics. This paper proposes a framework to automatic semantic Web service composition. Its advantage is that a huge amount of computation is performed during preprocessing and the composition approach is designed to exploit the parallel execution of processes which is nowadays supported in multiprocessor platforms. The framework is built to suit the WS Challenge competition requirements.
The process of semantic web service composition arranges several web services into one composite service to realize complex workflows with an exploitation of semantics. This paper proposes an approach to automatic sem...
详细信息
The process of semantic web service composition arranges several web services into one composite service to realize complex workflows with an exploitation of semantics. This paper proposes an approach to automatic semantic web service composition. Its advantage is good scalability regarding the complexity of user constraints and pre/post conditions. Based on these conditions it propagates the value restrictions constraint from the user goal through the overall composite service. The resulting plan depicts all the possible branches of the workflow leading to a goal. This includes the automatic generation of the conditions deciding which branch will be chosen during the execution. Finally, our approach exploits available data which can be used as input parameters for web services. If these are not offered, it searches for a web service producing them.
The design of an efficient scheduling mechanism for providing QoS in IEEE 802.16e is usually left to the designers and is a serious challenge for system developers. The performance of various services catered by WiMAX...
详细信息
There are various approaches to service composition - some of them mainly based on AI planning. Although they offer relatively good results, in some cases they are not sophisticated enough to solve real problems. We i...
详细信息
There are various approaches to service composition - some of them mainly based on AI planning. Although they offer relatively good results, in some cases they are not sophisticated enough to solve real problems. We identified some problems with automatic composition. Our belief is that the natural way to improve these techniques is to include user into the process of composing services. The goal of this paper is to present a new way of combining AI approaches incorporating also user assistance to create a meaningful plan. We shall also examine benefits of proposed combination. To demonstrate advantages of our approach we designed and implemented system performing Web service composition.
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ...
详细信息
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports the attestation for specific patterns of binary codes defined by a trusted party, mostly the software vendor, for a particular version of a software. In this paper, we present a Source-Code Oriented Attestation (SCOA) framework to enable custom built application to be attested to in the TCG attestation architecture. In SCOA, security attributes are bond with the source codes of an application instead of its binaries codes. With a proof chain generated by a Trusted Building system to record the building procedure, the challengers can determine whether the binary interacted with is genuinely built from a particular set of source codes. Moreover, with the security attribute certificates assigned to the source codes, they can determine the trustworthiness of the binary. In this paper, we present a TBS implementation with virtualization.
Web service technology aims to enable the interoperation of heterogeneous systems and the reuse of distributed functions in an unprecedented scale and has achieved significant success. There are still, however, challe...
详细信息
暂无评论