By Topic

Services Computing Conference (APSCC), 2011 IEEE Asia-Pacific

Date 12-15 Dec. 2011

Filter Results

Displaying Results 1 - 25 of 89
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (954 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Message from the APSCC 2011 General Conference Chairs

    Publication Year: 2011, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (132 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the APSCC 2011 Program Committee Chairs

    Publication Year: 2011, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (130 KB) | HTML iconHTML
    Freely Available from IEEE
  • APSCC 2011 Organizing Committee

    Publication Year: 2011, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • APSCC 2011 Program Committee

    Publication Year: 2011, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Welcome message from the Semantics, Services and Applications Workshop Chairs (SSA 2011)

    Publication Year: 2011, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (115 KB) | HTML iconHTML
    Freely Available from IEEE
  • Semantics, Services and Applications Workshop Committee (SSA 2011)

    Publication Year: 2011, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Semantics, Services and Applications Reviewers (SSA 2011)

    Publication Year: 2011, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Flexible Organization Structure-Based Access Control Model and Application

    Publication Year: 2011, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    RBAC as a kind of permission access control technologies supports enterprise information security effectively. However, in many cases, traditional RBAC can only establish a permission access control mechanism based on discrete group-role or user-role management inside an organization. And the user group whose organization structure is more complicated is not supported by RBAC. It is also lack of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Scrum Framework in the IT Service Support Domain

    Publication Year: 2011, Page(s):9 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    This paper is presenting an idea of applying the Scrum framework in the IT service support domain. Scrum framework is mainly used with conjunction of other agile methods in software development domain, but almost, no reporting for its usage in the support of that software, except in few cases. Scrum framework can be applied at small, medium, and as well as large organizations, and companies. We ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global-Time-Offsets Based Checkpoint Selection for Dynamic Verification of Fixed-Time Constraints in Grid Workflows

    Publication Year: 2011, Page(s):16 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    In a grid workflows, fixed-time constraints are often set at some activities to guarantee that the corresponding activities and finally the overall workflow can be timely completed. At the run-time stage, activity completion durations can vary which may lead to the violations of some fixed-time constraints. Therefore, the workflow needs to be monitored at the run-time so that some temporal violati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Trust Management for Multimedia P2P Applications in Autonomic Networking

    Publication Year: 2011, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    Trust management for multimedia P2P applications in autonomic networking, which is a mathematical evolutionary model and uses historical behaviour for trust calculation is critically analyzed. It is shown that this model is not attack resistant. Several critical remarks on its behaviour are given. An improvement is presented to overcome these shortcomings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Executional Framework for BPMN Using Orc

    Publication Year: 2011, Page(s):29 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (683 KB) | HTML iconHTML

    BPMN is widely used in Model Drive Architectures (MDA) for enterprise-scale solutions. In this paper, we shall realize an executional platform for MDA framework using BPMN. We transform BPMN into an executional framework using Orc [1]. Orc is a web orchestration language that provides uniform access to computational services, including distributed communication and data manipulation. The interesti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Embedded Software in IT on Economic Performance

    Publication Year: 2011, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (127 KB) | HTML iconHTML

    This paper exploits the economical impact on the Korea IT industry of the Embedded Software has been developed for embedded system, as a part of the fulfillment of and Electronic and Telecommunications Research Institute. The view of Embedded Soft in Europe, S. Korea, Japan, and U.S show that: IT technology related service are growing rapid and the software usage had previously growing steadily al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Impacts of Information Technology Enabled Services on Service Innovations: A Case Study in a Publishing Company

    Publication Year: 2011, Page(s):41 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (617 KB) | HTML iconHTML

    This paper aims to discover how Mook, a publishing company, connects with their users through a new tourism platform named Tripass. This platform has set some new functions, in which encourages users to participate, such as, trip planning, itinerary discussions, etc., are including new innovation services, Using Mook as a study object. This paper examines the relationships between the company and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the File System and Block IO Scheduler for SSD in Performance and Energy Consumption

    Publication Year: 2011, Page(s):48 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (543 KB) | HTML iconHTML

    SSD (Solid State Disk) is reconsidered as the next storage device, an alternative to the HDD (Hard Disk Driver). The read/write performance and energy consumption are main aspects to the users. In our experiment, we recognize that the performance and energy consumption of SSD, based on NAND Flash, are mostly related with the file system and block I/O scheduler. In order to gain higher performance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on the Influential Factors for Continual Usage of Mobile English Learning Applications

    Publication Year: 2011, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    In recent, mobile learning(m-Learning) applications market using smart phone is constantly increasing. Smart phone based English learning applications are very popular in non-English speaking countries such as Korea, Japan, and China etc.. Inspite of its high popularity there are no empirical researches on the influential factors for continual usage of mobile English learning applications. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Mobile Database Architecture

    Publication Year: 2011, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1151 KB) | HTML iconHTML

    This paper describes architecture for mobile databases where data is distributed over mobile devices. We propose strategies for query execution during mobility. The underlying architecture is based on 3G telephone networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RescueMe: An Indoor Mobile Augmented-Reality Evacuation System by Personalized Pedometry

    Publication Year: 2011, Page(s):70 - 77
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (645 KB) | HTML iconHTML

    Emergency applications have recently become widely available on modern smart phones. Nearly all of these commercial applications have focused on providing simple accident information in outdoor settings. AR in indoor environments poses unique challenges, due to the unavailability of GPS indoors and WiFi-based positioning limitations. In this paper, we propose the use of Rescue Me, a novel system b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing of Web Services: Tools and Experiments

    Publication Year: 2011, Page(s):78 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (622 KB) | HTML iconHTML

    Web services are the element based in SOA (i.e., Service Oriented Architecture) applications that are commonly used in software systems. However the validation problem on quality of web services via testing has to be improved. This paper presents two tools for conformance testing of web services. One tool for unit testing that is implemented by an on-line approach. This tool can be used to test a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FSM4WSR: A Formal Model for Verifiable Web Service Runtime

    Publication Year: 2011, Page(s):86 - 93
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Web service runtime is an important infrastructure middleware for service-based applications. It processes exchanged messages according to web service protocols. Correct implementation of web service protocols is critical for ensuring the reliability of web service runtime. In this paper, we first introduce a Service-Oriented Description Language (SODL) to precisely and concisely describe message ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.