Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Services (SERVICES), 2012 IEEE Eighth World Congress on

Date 24-29 June 2012

Filter Results

Displaying Results 1 - 25 of 67
  • SERVICES 2012: 2012 IEEE Eighth World Congress on Services [Cover art]

    Publication Year: 2012 , Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (764 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (764 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (118 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (168 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012 , Page(s): v - ix
    Save to Project icon | Request Permissions | PDF file iconPDF (144 KB)  
    Freely Available from IEEE
  • SERVICES 2012 Keynote Sessions [Nine Keynote and Keynote Panel Sessions]

    Publication Year: 2012 , Page(s): x - xvi
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (404 KB)  

    Summary form only given. Provides an abstract for each of the presentations in the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICWS/SCC/CLOUD/SERVICES 2012 Tutorials [abstracts for six tutorials]

    Publication Year: 2012 , Page(s): xvii - xviii
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB)  

    Summary form only given. Provides an abstract for each of the thre perspective paper presentations and lists each presenter. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Technical Committee on Services Computing (TC-SVC)

    Publication Year: 2012 , Page(s): xix
    Save to Project icon | Request Permissions | PDF file iconPDF (242 KB)  
    Freely Available from IEEE
  • Scheduling Multiple Scientific and Engineering Workflows through Task Clustering and Best-Fit Allocation

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1110 KB) |  | HTML iconHTML  

    Most previous workflow scheduling research focused on scheduling a single workflow on parallel systems. Recent researches show that utilizing idle time slots between scheduled tasks is a promising direction for efficient multiple workflow scheduling. Stavrinides and Karatza proposed a list scheduling approach to efficient utilization of the idle time slots through bin packing techniques. In this paper, we elaborate on this direction and develop a new approach to further improve multiple workflow scheduling performance through two techniques. The first, in contrast with the list scheduling approach, is clustering the tasks within workflows into groups before allocation. This can reduce inter-task communication cost and thus improve workflow execution performance. The second technique tries to make a balance between tasks' start time and the fitness of idle time slots when allocating task groups. The proposed approach has been evaluated with a series of simulation experiments and compared to the previous method. The results show that our approach outperforms the previous method significantly, up to 51% performance improvement in terms of average makespan. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Tolerant Clustering in Scientific Workflows

    Publication Year: 2012 , Page(s): 9 - 16
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1030 KB) |  | HTML iconHTML  

    Task clustering has been proven to be an effective method to reduce execution overhead and increase the computational granularity of workflow tasks executing on distributed resources. However, a job composed of multiple tasks may have a greater risk of suffering from failures than a job composed of a single task. Our theoretic analysis and simulation results demonstrate that failures can have a significant impact on the runtime performance of workflows that use existing clustering policies that ignore failures. We therefore propose two general failure modeling frameworks (task failure model and job failure model) to address these performance issues. We show the necessity to consider the fault tolerance in the task failure model. Based on the task failure model, we propose three methods to improve the workflow performance in dynamic environments. A simulation-based evaluation is performed and it shows that our approach can improve the workflow makespan significantly for two important applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UTPB: A Benchmark for Scientific Workflow Provenance Storage and Querying Systems

    Publication Year: 2012 , Page(s): 17 - 24
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (682 KB) |  | HTML iconHTML  

    A crucial challenge for scientific workflow management systems is to support the efficient and scalable storage and querying of large provenance datasets that record the history of in silico experiments. As new provenance management systems are being developed, it is important to have benchmarks that can evaluate these systems and provide an unbiased comparison. In this paper, based on the requirements for scientific workflow provenance systems, we design an extensible benchmark that features a collection of techniques and tools for workload generation, query selection, performance measurement, and experimental result interpretation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Template and Frame Based Experiment Workflows in Modeling and Simulation Software with WORMS

    Publication Year: 2012 , Page(s): 25 - 32
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (697 KB) |  | HTML iconHTML  

    The integration of workflows into modeling and simulation tools promises to provide easier reproduction and provenance of simulation data and its generating process. We present the use of workflow templates and frames realized in WORMS to support and document activities involved in executing simulation experiments. Thereby we make use of functionalities provided by the validation environment FAMVal and the plug-in-based modeling and simulation framework JAMES II. The role of workflows, templates, and frames in modeling and simulation research will be illuminated by a simple simulation study in which the amount of a chemical species in the equilibrium state shall be maximized. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Identification Problem: A Description

    Publication Year: 2012 , Page(s): 33 - 40
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (453 KB) |  | HTML iconHTML  

    Scientific data are often annotated based on their properties, which are not maintained during further data processing. Not maintaining annotations results in loss of information. Decisions made on such incomplete information may be wrong. In this paper the problem of propagating annotations along a data processing chain is formulated. In particular, an annotation of a data element is an identification that this data element exhibits a specific property. The propagation of this property from the input of an operation to its output is called the identification problem. In this paper the identification problem is described as a clustering problem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refurbishing Legacy Biological Workflows SPROUTS Case Study

    Publication Year: 2012 , Page(s): 41 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (398 KB) |  | HTML iconHTML  

    Scientific discovery relies on an experimental framework that corroborates hypotheses with experiments that are complex reproducible processes generating and transforming large datasets. The methods, implicit in the process, capture the semantics of the data, thus they are responsible for the generation of scientific information and discovery of scientific knowledge. Scientific workflows provide the semantics needed to wrap scientific data from their capture, analysis, publication, and archival. By annotating data with the processes that produce them, the scientist no longer manages data but information and allows their meaningful interpretation and integration. Any change to a scientific workflow may impact significantly the quality of the data produced, their semantics, their future analysis, use, integration, and distribution, as well as the performance of the execution. Yet, scientific workflows are typically transformed over time, updated with new versions of the tools that compose them, extended to new functionality, and composed. In this paper we discuss the various impacts of workflow transformation and illustrate them with a case study on the Structural Prediction for pRotein fOlding UTility System (SPROUTS) Workflow. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WS-RM: Resource Management Using Web Service

    Publication Year: 2012 , Page(s): 50 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (641 KB) |  | HTML iconHTML  

    We have been participated in the early research work of using Web service for system management and its standardization work. In this paper, we first review the concept of using Web service for management and compare two main industry standardization efforts - WSDM and WS-Management. We present WS-RM, our resource management model, its implementation, the testbed and management scenarios. Then, we present several selected gap items that are identified between realworld management requirements and current standard as well as our proposed solutions. In the end, we discuss some future work into cloud computing management and using Web service for management integration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of Cloud-Based Scalability and Load with an Automation Testing Tool in Virtual World

    Publication Year: 2012 , Page(s): 57 - 64
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (589 KB) |  | HTML iconHTML  

    The development in cloud computing provides limitless capacity which provides opportunity to evaluate an application performance based on its nature to scale. This paper aims at the analysis of Performance using the Google App Engine(cloud computing paradigm). Virtual Office application is chosen as example to perform experiment of testing the scalability in turn maintaining the performance. An Automation Testing Tool - Test Harness has been used to perform the scale testing of the application while being deployed on the cloud. Results have seen shown in the form of request type and response times(Average time taken/request). Taken into account the consideration that when the application load goes up the Google Cloud expands(increases instance hours) without affecting the running application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RESTful Sensor Web Enablement Services for Wireless Sensor Networks

    Publication Year: 2012 , Page(s): 65 - 72
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (648 KB) |  | HTML iconHTML  

    Due to the large number of sensor manufacturers and differing accompanying protocols, integrating diverse sensors into observation systems is not straightforward. A coherent infrastructure is needed to treat sensors in an interoperable, platform-independent and uniform way. The concept of the Sensor Web reflects such a kind of infrastructure for automatically discovering and accessing appropriate information from heterogeneous sensor devices over the Internet. In this context, the Open Geospatial Consortium (OGC) established the Sensor Web Enablement (SWE) initiative that specifies standard interfaces and encodings to remotely access, encode and exchange the sensed data. However, SWE standards have several gaps that limitate its capabilities to achieve the sensor Web desires. In this paper, we address the problems related to the data format and the architectural style followed by the implementation of the SWE services. Indeed, we propose the adoption of the lightweight Representational State Transfer (REST) web services concept and the usage of JavaScript Object Notation (JSON) format as an alternative to the verbose XML one for the exchanged messages. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Decentralized Approach for Web Services

    Publication Year: 2012 , Page(s): 73 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (757 KB) |  | HTML iconHTML  

    This paper presents a context-aware and decentralized identity platform, which in turn can be used to create social networks or collaboration platforms. Its originality lies in providing an increased privacy and control over a user's online identity, user group management, resource ownership and content sharing. This paper addresses the shortcomings of current identity and resource management systems, especially the lack of context in which data sharing takes place on the Internet. Moreover, it discusses the advantages for users to have a decentralized resource management system, while at the same time remaining in control of the data they share, as well as the device on which it is stored. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Massive Event Data Analysis and Processing Service Development Environment Using DFD

    Publication Year: 2012 , Page(s): 80 - 87
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (833 KB) |  | HTML iconHTML  

    In these days, there are a lot of massive event data appeared every day because networked devices such as smartphones and kind of sensors become very common. Every service provider intends to analyze the event data and discovers a new business rule for real time event processing service. We proposed a methodology which integrates such kind of data analysis and service development using DFD (Data Flow Diagram) which is independent from implementations, and we developed its prototype for evaluations. The methodology and the tool separate the concern of a developer and an analyst, moreover, we succeeded to confirm that the prototype tool reduced actual analysis and service development costs dramatically. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Key Success Factors Influencing ERP Implementation Success

    Publication Year: 2012 , Page(s): 88 - 91
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (544 KB) |  | HTML iconHTML  

    Enterprise Resource Planning (ERP) application is often viewed as a strategic investment that can provide significant competitive advantage with positive return thus contributing to the firms' revenue and growth. Despite such strategic importance given to ERP the implementation success to achieve the desired goal has been viewed disappointing. There have been numerous industry stories about failures of ERP initiatives. There have also been stories reporting on the significant benefits achieved from successful ERP initiatives. This study review the industry and academic literature on ERP results and identify possible trends or factors which may help future ERP initiatives achieve greater success and less failure. The purpose of this study is to review the industry and academic literature on ERP results, identify and discuss critical success factors which may help future ERP initiatives achieve greater success and less failure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Failures in Dynamic Composite Services with Proactive Monitoring Technique

    Publication Year: 2012 , Page(s): 92 - 99
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (893 KB) |  | HTML iconHTML  

    Web service composition is a new paradigm to develop distributed and reactive software-intensive systems. Predicting and preventing failures of dynamic composite services is an important and challenge problem due to the dynamically evolving attribute. In previous work, we propose CASSANDRA, a novel proactive monitoring technique with the ability to predict and prevent the potential failures happening in dynamic evolvable system. In this paper, we concretize the approach into web service composition field. By combining runtime information and design-time specification of basic services, the approach can analyse future -step models ahead of the current service execution states. Then, this model can be used to check with a set of desired properties represented by property sequence chart. Initial experiments on an online medicine case study validates our approach and shows encouraging results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Latencies of Service Invocation and Processing of the REST and SOAP Web Service Interfaces

    Publication Year: 2012 , Page(s): 100 - 107
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (501 KB) |  | HTML iconHTML  

    This paper studies the latencies experienced by the Web service client invoking a proprietary multimedia messaging service with both REST and SOAP interfaces implemented. This study has been made utilising XML, JSON, MTOM/XOP and Google Protostuff message and message content encodings where available. We study the overall round trip time from the start of the request to the response returning to the client. Furthermore, we measure and analyse the phases the request travels through to the server and the return of an associated response. The results of the overall round trip time and distribution of the delays along the service invocation path is presented to ultimately aid and justify a selection of the better performing interface implementation and associated message encoding scheme for the solution. Both interfaces implement the same functionality of registering a client, sending and receiving a message and finally unregistering. Therefore, the results are highly comparable which show differences not only between REST and SOAP but also between XML and JSON and how it can be further improved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SoaML and UPIA Model Integration for Secure Distributed SOA Clouds

    Publication Year: 2012 , Page(s): 108 - 115
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (957 KB) |  | HTML iconHTML  

    The U.S. Department of Defense (DoD) specifies the Department of Defense Architecture Framework (DoDAF) for military architecture models. Industry typically uses different modeling tools, including the Unified Modeling Language. There are many modeling techniques for Service Oriented Architecture (SOA). DoDAF supports SOA through DoDAF version 2.0. Industry supports SOA through several toolsets including UML Profile-based Integrated Architecture (UPIA) and the SOA modeling language (SoaML). This paper presents background information on SOA modeling techniques and some methods to transition between DoD and commercial tools. Variables and metrics for analysis in SOA models are presented. UPIA is advanced as a means to transition between DoDAF 2.0 and SoaML. SoaML is rendered within UPIA models to help address potential future DoD initiatives for implementation of SOA within cloud architectures. This paper advances methods for industry-to-DoDAF model integration for secure distributed SOA clouds and provides background on defense and industry modeling techniques for enterprise-class SOA. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overlay Architectures Enabling Cloud Computing for Multi-level Security Environments

    Publication Year: 2012 , Page(s): 116 - 124
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (585 KB) |  | HTML iconHTML  

    Herein, we consider how overlay architectures can be deployed in order to support usage management in cloud computing. We contrast filter-centric perimeter and policy-centric overlay approaches toward usage management of sensitive content from the perspective of cross-domain solutions and then demonstrate a path from current systems to distributed policy-centric overlay methods. We first cover the need for overlay networks supporting usage management by highlighting the pending migration to utility computing models and the current shortcomings of those kinds of systems from a variety of perspectives. We also briefly cover the state of usage management within these kinds of systems, also examining the known state of the art in proposed cross domain solutions. We then compare and contrast the advantages of policy-based overlay systems to solving usage management issues over sensitive materials within multi-level security environments. We then demonstrate a migration path from current to future solutions. We close with our current and future directions of research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Propositional Logic-Based and Evidence-Rich Trustworthiness Evaluation for Web Services

    Publication Year: 2012 , Page(s): 125 - 132
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (877 KB) |  | HTML iconHTML  

    With more and more Web services available on the Internet, users reuse these services in their own applications. Because Web services are delivered by third parties and hosted on remote servers, it becomes a big problem to determine the trustworthiness of the Web services. Many Web services trustworthiness evaluation approaches have been proposed, however, the trustworthy evidences used in these approaches are limited and the methods proposed lack customizability and extensibility, which makes them difficult to apply. In this paper, we propose a lightweight Propositional Logic-based Web services trustworthiness evaluation method, which is customizable, extensible, and easy to apply in reality. First we collect comprehensive trustworthy evidences including both objective trustworthy evidences (e.g. QoS) and subjective evidences (e.g. reputation) from the Internet. Then we propose a Propositional Logic-based Web services trustworthiness evaluation model, which is customizable and extensible, to capture users' trustworthiness requirements. Finally, the trustworthiness of all Web services are evaluated and returned to the users via a Web services search engine. To validate the effectiveness of our approach, two experiments are conducted on a large-scale real-world dataset. The experimental results show that our method is easy to use and can effectively evaluate Web services trustworthiness, which helps users to reuse Web services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.