By Topic

Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific

Date 12-15 Dec. 2011

Filter Results

Displaying Results 1 - 25 of 89
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (954 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (28 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (141 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (185 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (154 KB)  
    Freely Available from IEEE
  • Message from the APSCC 2011 General Conference Chairs

    Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (132 KB)  
    Freely Available from IEEE
  • Message from the APSCC 2011 Program Committee Chairs

    Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (130 KB)  
    Freely Available from IEEE
  • APSCC 2011 Organizing Committee

    Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (126 KB)  
    Freely Available from IEEE
  • APSCC 2011 Program Committee

    Page(s): xv - xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (121 KB)  
    Freely Available from IEEE
  • Welcome message from the Semantics, Services and Applications Workshop Chairs (SSA 2011)

    Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (115 KB)  
    Freely Available from IEEE
  • Semantics, Services and Applications Workshop Committee (SSA 2011)

    Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (113 KB)  
    Freely Available from IEEE
  • Semantics, Services and Applications Reviewers (SSA 2011)

    Page(s): xix
    Save to Project icon | Request Permissions | PDF file iconPDF (125 KB)  
    Freely Available from IEEE
  • Flexible Organization Structure-Based Access Control Model and Application

    Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (330 KB) |  | HTML iconHTML  

    RBAC as a kind of permission access control technologies supports enterprise information security effectively. However, in many cases, traditional RBAC can only establish a permission access control mechanism based on discrete group-role or user-role management inside an organization. And the user group whose organization structure is more complicated is not supported by RBAC. It is also lack of the adaptability of dynamic changes to the complex organization structure. To solve these problems, a permission model called Flexible Organization Structure-Based Access Control (FOSBAC) is proposed, which combines the flexible organization structure with the access control to achieve the dynamic management of permissions. First, the general framework and the formal description of FOSBAC are given. Then, the application template using the XACML specification is constructed and an analysis on a case of accessing financial statements is used to demonstrate the feasibility of the application. Finally, it is shown that FOSBAC possesses better adaptability to complex organization structure and higher management efficiency in comparison with RBAC and ROBAC. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Scrum Framework in the IT Service Support Domain

    Page(s): 9 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (445 KB)  

    This paper is presenting an idea of applying the Scrum framework in the IT service support domain. Scrum framework is mainly used with conjunction of other agile methods in software development domain, but almost, no reporting for its usage in the support of that software, except in few cases. Scrum framework can be applied at small, medium, and as well as large organizations, and companies. We expect that Scrum can change the IT service support from cost center into revenue and more value added center. We also expect that Scrum framework can change some companies' profiles. The results achieved in a real life example are prosperous and fruitful, as we will present in this paper a reported real-life example of applying the Scrum framework in the IT Service Support along with the results achieved. In the case study we present here in the previous work section the framework was applied in a horizontal fashion. We will propose a vertical way of the framework application, and another new idea of dynamic Sprint planning along some of the expected results. As this idea is newly applied to that domain, so the horizontal, the vertical framework application ways, or the dynamic sprint planning idea will need more experimenting, and documenting in order to reach a solid conclusions, and results. We will recommend some of the future work that need to be done in that domain, and scope in order to document the topic more, rather than being just some self-experiences. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global-Time-Offsets Based Checkpoint Selection for Dynamic Verification of Fixed-Time Constraints in Grid Workflows

    Page(s): 16 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (272 KB) |  | HTML iconHTML  

    In a grid workflows, fixed-time constraints are often set at some activities to guarantee that the corresponding activities and finally the overall workflow can be timely completed. At the run-time stage, activity completion durations can vary which may lead to the violations of some fixed-time constraints. Therefore, the workflow needs to be monitored at the run-time so that some temporal violations can be identified timely and consequently some exception handling actions can be taken in time. However, existing temporal verification strategies conduct some unnecessary computations and comparisons which impact the efficiency of overall temporal verification. To address this problem, we present a global-time-offsets based temporal verification approach. With our approach, the time cost for dynamic verification of the fixed-time constraints will be reduced. The experimental result further demonstrates that our approach is more efficient than others. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Trust Management for Multimedia P2P Applications in Autonomic Networking

    Page(s): 24 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (400 KB) |  | HTML iconHTML  

    Trust management for multimedia P2P applications in autonomic networking, which is a mathematical evolutionary model and uses historical behaviour for trust calculation is critically analyzed. It is shown that this model is not attack resistant. Several critical remarks on its behaviour are given. An improvement is presented to overcome these shortcomings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Executional Framework for BPMN Using Orc

    Page(s): 29 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (683 KB) |  | HTML iconHTML  

    BPMN is widely used in Model Drive Architectures (MDA) for enterprise-scale solutions. In this paper, we shall realize an executional platform for MDA framework using BPMN. We transform BPMN into an executional framework using Orc [1]. Orc is a web orchestration language that provides uniform access to computational services, including distributed communication and data manipulation. The interesting features of Orc are its capability to specify patterns like multi-merge, discriminator, arbitrary cycles, several multiple instances etc. cleanly. It supports the realization of the map-reduce paradigm for distributed computing and thus, provides a powerful MDA approach for business analysts to express their solutions. It will enable creation/simulation of mock scenarios and the use of verification/validation/debugging in an integrated way. In this paper, we describe a transformation of BPMN core elements to Orc. We use a graph based approach where a Business Process Diagram(BPD) diagram is validated and then converted to a set of Orc computation structures. We describe the transformations along with an implementation and illustrate the process with an example. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Embedded Software in IT on Economic Performance

    Page(s): 37 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (127 KB) |  | HTML iconHTML  

    This paper exploits the economical impact on the Korea IT industry of the Embedded Software has been developed for embedded system, as a part of the fulfillment of and Electronic and Telecommunications Research Institute. The view of Embedded Soft in Europe, S. Korea, Japan, and U.S show that: IT technology related service are growing rapid and the software usage had previously growing steadily all over Korea, now the growth rate is slower in Korea. The importance of embedded software will grow as usage and penetration throws, providing benefits to still greater parts of the IT business and traditional industry. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Impacts of Information Technology Enabled Services on Service Innovations: A Case Study in a Publishing Company

    Page(s): 41 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (617 KB) |  | HTML iconHTML  

    This paper aims to discover how Mook, a publishing company, connects with their users through a new tourism platform named Tripass. This platform has set some new functions, in which encourages users to participate, such as, trip planning, itinerary discussions, etc., are including new innovation services, Using Mook as a study object. This paper examines the relationships between the company and their users, in order to have the best understanding in how Mook uses Web 2.0-based community to make a connection with users. The findings of this paper figure out some characteristics in service innovations. Tripass is aiming to complete integrated ICT suites including Web 2.0 technologies. MOOK provides the tourism information from the database connecting to Google Maps and Street Views for assisting bloggers' photographs and tourists in itineraries arrangement. On the other side, the tourists are able to use the online functions to discuss their itineraries with their friends. In addition, they may also download complete tour itineraries from Tripass into handheld devices. Finally, Mook provides new technological options for users to have a new experience in Tripass in order to offer continuously services links to terminal devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the File System and Block IO Scheduler for SSD in Performance and Energy Consumption

    Page(s): 48 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (543 KB) |  | HTML iconHTML  

    SSD (Solid State Disk) is reconsidered as the next storage device, an alternative to the HDD (Hard Disk Driver). The read/write performance and energy consumption are main aspects to the users. In our experiment, we recognize that the performance and energy consumption of SSD, based on NAND Flash, are mostly related with the file system and block I/O scheduler. In order to gain higher performance and lower energy consumption, we test the different combination of file system and scheduler under workload simulator, File bench, using three kinds of commercial SSDs. According to the different combination of file system and block I/O, we analyze the performance parameter, IOPS, and energy consumption parameter, POWER, under some special workload. Lastly, we present a parameter, aggregative indicator (AI), to evaluate the overall characteristic of some combination of file system and block I/O, which synthesizes IOPS and POWER. It is to find a better combination for special workload. In the experiment, the combination of extent file system (ext2 or ext3) and CFQ expresses better more value of the aggregative indicator than others. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on the Influential Factors for Continual Usage of Mobile English Learning Applications

    Page(s): 56 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (277 KB) |  | HTML iconHTML  

    In recent, mobile learning(m-Learning) applications market using smart phone is constantly increasing. Smart phone based English learning applications are very popular in non-English speaking countries such as Korea, Japan, and China etc.. Inspite of its high popularity there are no empirical researches on the influential factors for continual usage of mobile English learning applications. In this research, we show the influential factors affecting the continual usage of mobile application for English learning through survey of actual users. According to the analysis results of 160 users, mobility, self-initiation, and utilitarian value are positive influence factors for continual usage. This study will contribute to smart phone based learning application developers, mobile learning researchers and language learning contents creators. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Mobile Database Architecture

    Page(s): 62 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1151 KB) |  | HTML iconHTML  

    This paper describes architecture for mobile databases where data is distributed over mobile devices. We propose strategies for query execution during mobility. The underlying architecture is based on 3G telephone networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RescueMe: An Indoor Mobile Augmented-Reality Evacuation System by Personalized Pedometry

    Page(s): 70 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (645 KB) |  | HTML iconHTML  

    Emergency applications have recently become widely available on modern smart phones. Nearly all of these commercial applications have focused on providing simple accident information in outdoor settings. AR in indoor environments poses unique challenges, due to the unavailability of GPS indoors and WiFi-based positioning limitations. In this paper, we propose the use of Rescue Me, a novel system based on indoor mobile AR applications using personalized pedometry and one that recommends the most optimal, uncrowded exit path to users. We have developed the Rescue Me application for use within large scale buildings, with complex paths. We show how Rescue Meleverages the sensors on a smart phone, in conjunction with emergency information and daily-based user behavior, to deliver evacuation information in emergency situations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing of Web Services: Tools and Experiments

    Page(s): 78 - 85
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (622 KB) |  | HTML iconHTML  

    Web services are the element based in SOA (i.e., Service Oriented Architecture) applications that are commonly used in software systems. However the validation problem on quality of web services via testing has to be improved. This paper presents two tools for conformance testing of web services. One tool for unit testing that is implemented by an on-line approach. This tool can be used to test a web service-based and/or an orchestration by simulating its partners. The other focuses on verification of a timed trace with respect to a set of constraints. Specially, we can use this tool to verify on-line or off-line a timed trace. Finally, we show our experiments on a real-life case study, Product Retriever, by combining the two tools. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FSM4WSR: A Formal Model for Verifiable Web Service Runtime

    Page(s): 86 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (438 KB) |  | HTML iconHTML  

    Web service runtime is an important infrastructure middleware for service-based applications. It processes exchanged messages according to web service protocols. Correct implementation of web service protocols is critical for ensuring the reliability of web service runtime. In this paper, we first introduce a Service-Oriented Description Language (SODL) to precisely and concisely describe message processing logics for web service protocol implementations. Then, we propose a formal model for verifiable web service runtime, named FSM4WSR, based on Estelle (an ISO formal description standard). FSM4WSR uses module and channel to capture the essential components of the runtime architecture. Furthermore, the internal behaviors in each module are formally described by using a combination of the extended finite-state machine and SODL. Based on FSM4WSR, we automatically generate the web service protocol implementations and construct a verifiable web service runtime system, named XServices SODL Runtime. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.