By Topic

Internet and Web Applications and Services, 2007. ICIW '07. Second International Conference on

Date 13-19 May 2007

Filter Results

Displaying Results 1 - 25 of 73
  • Second International Conference on Internet and Web Applications and Services - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Second International Conference on Internet and Web Applications and Services - Title page

    Publication Year: 2007, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Second International Conference on Internet and Web Applications and Services - Copyright notice

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Second International Conference on Internet and Web Applications and Services - TOC

    Publication Year: 2007, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • ICIW 2007 Preface

    Publication Year: 2007, Page(s):vi - vii
    Request permission for commercial reuse | PDF file iconPDF (29 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICIW 2007 Committees

    Publication Year: 2007, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Exploiting Proximity in Cooperative Download of Large Files in Peer-to-Peer Networks

    Publication Year: 2007, Page(s): 1
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    Peer-to-peer networks have long being used for file sharing among the connected peers. Recently, the popular BitTorrent tool has permitted the exchange of large sized files by dividing it into fragments, and enabling the peers to exchange the fragments amongst themselves through an overlay network. Each file requires the establishment of a separate overlay among the peers. In this paper, we explor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Framework for Dynamic Verification of Peer-to-Peer Systems

    Publication Year: 2007, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    Ensuring dependability and security of peer-to-peer (P2P) systems is an intricate task due to the autonomous and volatile nature of peers and the decentralization that characterizes such systems. Dynamic verification provides the means of monitoring aspects of peer behaviour at runtime and the capacity to react to identified violations with the aim of preserving the system in the desired state. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Open Tracing System for P2P File Sharing Systems

    Publication Year: 2007, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    This paper describes the open P2P tracing system which aims to improve the research community's understanding of P2P file sharing systems by providing continuous and up-to-date traffic data which is anonymized and made freely accessible to all interested parties. It is our hope that this open data set will grow over time into a resource capable of exposing trends in P2P network usage and promote r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reputation Management Techniques in DHT-Based Peer-to-Peer Networks

    Publication Year: 2007, Page(s): 4
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Reputation evaluation and trust management techniques are successfully used in the peer-to-peer (P2P) environment due to its notable similarity to the human community. These techniques present a quite efficient solution to cope with some types of malicious activity in P2P networks. Recently, a great number of P2P platforms use distributed Hash table (DHT) -based overlay-networks that provide effec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P2P Middleware for Extending the Reach, Scale and Functionality of Content Delivery Networks

    Publication Year: 2007, Page(s): 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (857 KB) | HTML iconHTML

    The contribution of this paper is a novel peer-to-peer (P2P) middleware solution for extending the reach, scale and functionality of content delivery networks (CDNs). The research problem of extending legacy CDN functionality towards user-to-user content networking and enhancing the CDN quality attributes of reach and scale are addressed. The proposed P2P middleware solution extends the reach and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Secure Mobile P2P Systems

    Publication Year: 2007, Page(s): 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    The growth of mobile devices with near PC equivalent capabilities has brought with it the possibility of mobile P2P systems. However, the nature of mobile devices brings additional issues that need to be considered, especially for when considering system security. This paper presents our initial work on the EU funded PEPERS project that seeks to support the development of secure mobile P2P applica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Topology Management Algorithms for Unstructured P2P Networks

    Publication Year: 2007, Page(s): 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    In this paper we present new topology management algorithms used to self-organize the overlay of a peer-to- peer network. The algorithms are node selection, node removal, overload estimation and overtaking algorithms. The algorithms have been evaluated using a simple P2P scenario using the P2P realm network simulator. Based on the simulation results, the algorithms produce an overlay which is stab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Static Verification Framework for Secure Peer-to-Peer Applications

    Publication Year: 2007, Page(s): 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    In this paper we present a static verification framework to support the design and verification of secure peer-to-peer applications. The framework supports the specification, modeling, and analysis of security aspects together with the general characteristics of the system, during early stages of the development life-cycle. The approach avoids security issues to be taken into consideration as a se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Software Architecture for the Provisioning of Mobile Services in Peer-to-Peer Environments

    Publication Year: 2007, Page(s): 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    Service-oriented computing (SOC) is the computational paradigm that utilizes services as fundamental elements to develop applications/solutions. To build a service model, SOC relies on the service-oriented architecture (SOA), which is a way of reorganizing software applications and infrastructures in a set of interacting services. This paper proposes a layered architectural model of the abstractio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Node Selection Algorithm for Many-to-Many Mappings in Peer-to-Peer Networks

    Publication Year: 2007, Page(s): 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    To achieve high performance and resilience to failures, many peer-to-peer (P2P) systems have begun to use striping and collaborative downloading, where each peer can download the file or pieces of the file from a number of peers in parallel, and at the same time, serve them to some other peers. These P2P systems intrinsically involve many-to-many mappings from the servers to the clients (or peers ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-Way/Hybrid Clustering Architecture for Peer to Peer Systems

    Publication Year: 2007, Page(s): 11
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (461 KB) | HTML iconHTML

    In this paper, we propose a novel hybrid topology and interest based clustering to organize the overlay network in order to reduce startup latency and service interruption probability. Our method uses a clustering technique to organize the peers according to their interests and locality information. The proposed technique is compared with the current unstructured P2P architectures in terms of aver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WordRank: A Method for Finding Search-Ad Keywords for Internet Merchants

    Publication Year: 2007, Page(s): 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    Search engines enable merchants to associate on-line ads with relevant keywords (for instance, through [Adwords].) Both merchants and search engines benefit economically from the merchants having as many appropriate keywords as possible. The space of keywords is large - it is useful to algorithmically generate keywords for merchants. Information about keywords is scarce, but it is known which merc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    Applying Formal Methods to Compositionality Description of Web Service

    Publication Year: 2007, Page(s): 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB) | HTML iconHTML

    Notice of Violation of IEEE Publication Principles

    "Applying Formal Methods to Compositionality Description of Web Service,"
    by HuaiKou Miao and JunFeng Wu
    in the Proceedings of the Second International Conference on Internet and Web Applications and Services ICIW '07. pp.13-18, May 2007

    After careful and considered review of the content and authorship of this paper by a duly c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intersection-Based Matchmaking for Semantic Web Service Discovery

    Publication Year: 2007, Page(s): 14
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    For semantic Web service discovery, matchmaking techniques are used to compare descriptions of semantically annotated services issued by service requesters and providers. Such semantic descriptions are typically expressed in ontology languages to capture the functionality of a service in a meaningful and machine - interpretable way. Among various other techniques proposed in the literature, inters... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Service Composition Approaches: From Industrial Standards to Formal Methods

    Publication Year: 2007, Page(s): 15
    Cited by:  Papers (32)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    Composition of Web services is much studied to support business-to-business and enterprise application integration in e-commerce. Current Web service composition approaches range from practical languages aspiring to become standards (like BPEL, WS-CDL, OWL-S and WSMO) to theoretical models (like automata, Petri nets and process algebras). In this paper we compare these approaches w.r.t. a selected... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Test Bed for Web Services Protocols

    Publication Year: 2007, Page(s): 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    Transactions across composed Web services (WS) are usually non-trivial and require the use of some pre-agreed or standard protocols. Proper specification and implementation of these protocols are critical for the correct execution and termination of transactions; incomplete or ambiguous specifications can give rise to interoperability problems. We have recently proposed a framework for specifying ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Refined Goal Model for Semantic Web Services

    Publication Year: 2007, Page(s): 17
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    The idea of service orientation envisions dynamic detection and execution of suitable Web services for solving a particular request. Most realization approaches pay only little attention to the client side of such architectures. We therefore promote a goal-driven approach: a client merely specifies the objective to be achieved in terms of a goal, and the system resolves this by automated detection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture for Web Services Filtering and Clustering

    Publication Year: 2007, Page(s): 18
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    The need for filtering of services results from the ever growing number of available Web services which offer similar functionalities. The filtering process is based not only on the functional aspects of services, but also on non-functional ones. One of the weaknesses of the filtering process is lack of high efficiency and its complexity as processing ontological descriptions and reasoning on them... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Web Services in Corporate Memories

    Publication Year: 2007, Page(s): 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    We present our experiment in integrating semantic web services in the existing corporate semantic web server architecture we use to implement corporate memories. We rely on a semantic web search engine, to provide a semantic registry and automatically discover and invoke corporate applications wrapped into semantically annotated web services. Using rules we also demonstrate how to compose the web ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.