Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Service-Oriented Computing and Applications (SOCA), 2012 5th IEEE International Conference on

Date 17-19 Dec. 2012

Filter Results

Displaying Results 1 - 25 of 51
  • Table of contents

    Publication Year: 2012 , Page(s): 1 - 7
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (100 KB)  
    Freely Available from IEEE
  • Organization

    Publication Year: 2012 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • Flexible information design for business process visualizations

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (356 KB) |  | HTML iconHTML  

    Profound understanding of business processes is a key success factor for Business Process Management (BPM). As more and more analytical information like runtime data from process execution or statistical data from business intelligence are available, the problem of business process complexity becomes apparent. Process-relevant information needs to be provided as fast as possible while considering easy and fast interpretation and dynamic changes in stakeholders' demands. The static and use-case specific creation or modification of process visualizations shown in current approaches and tools, however, is complex, time consuming, inflexible and thus costly. To address these shortcomings, we introduce a template-based approach that decouples the creation of visualization templates from concrete process visualizations. The binding of customization points of visualization templates to analytical process information is supported by a graphical editor that enables customization of visualizations in a fast and flexible manner. Moreover, due to the separation of concerns, our approach improves the usability of process visualizations because templates may be created by graphic experts independently from specific visualization demands. The feasibility of our concept is demonstrated by a prototypical implementation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application-level performance monitoring of cloud services based on the complex event processing paradigm

    Publication Year: 2012 , Page(s): 1 - 8
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (987 KB) |  | HTML iconHTML  

    Monitoring of applications deployed to Infrastructure-as-a-Service clouds is still an open problem. In this paper, we discuss an approach based on the complex event processing paradigm, which allows application developers to specify and monitor high-level application performance metrics. We use the case of a Web 2.0 sentiment analysis application to illustrate the limitations we currently experience with regard to cloud monitoring, and show how our approach allows for more expressive definitions of monitored metrics. Furthermore, we indicate how the higher-level metrics produced by our approach can be used to increase application elasticity in an existing cloud middleware. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive load shedding via fuzzy control in data stream management systems

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1151 KB) |  | HTML iconHTML  

    Data stream management systems (DSMS) aim to process massive data streams in a timely fashion to support important applications, e.g., financial market analysis. However, DSMS can be overloaded due to large bursts in data stream arrivals and data-dependent query executions. To avoid overloads, we design a new load shedding scheme by applying distributed fuzzy logic control, which is very effective to deal with uncertainties in highly dynamic systems such as DSMS, based on the per-stream backlog and selectivity of each query operator. We have implemented our approach by extending an open source distributed DSMS. The performance evaluation using high-rate Internet traces shows that our approach closely supports a specified backlog bound for each data stream queue, while improving the query processing delay, with little overhead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object identity set algebra for object-oriented database systems

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (193 KB) |  | HTML iconHTML  

    Object identity set algebra is presented in the paper. The algebra is efficient to express queries to objects and gains support from underlying relational algebra and formal language theories. The algebra lies on top of relational algebra in the structure of layered mathematical models guiding object-oriented database systems. Object identity set algebra is defined precisely to apply mathematical set functions for querying objects in database systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spectrum-based fault diagnosis for service-oriented software systems

    Publication Year: 2012 , Page(s): 1 - 8
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (547 KB) |  | HTML iconHTML  

    Due to the loosely coupled and highly dynamic nature of service-oriented systems, the actual configuration of such system only fully materializes at runtime, rendering many of the traditional quality assurance approaches useless. In order to enable service systems to recover from and adapt to runtime failures, an important step is to detect failures and diagnose problematic services automatically. This paper presents a lightweight, fully automated, spectrum-based diagnosis technique for service-oriented software systems that is combined with a framework-based online monitor. An experiment with a case system is set up to validate the feasibility of pinpointing problematic service operations. The results indicate that this approach is able to identify problematic service operations correctly in 72% of the cases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A module-based approach for structural matching of process models

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2657 KB) |  | HTML iconHTML  

    The current tendency of information system organizations to work with process models has led to an increase in the importance of the comparison of these models stored in some collection or repository. Comparing process models for similarity or dissimilarity search faces two main challenges: (1) Finding the most relevant/irrelevant process model to a particular process or query of interest, and (2) Decreasing the time complexity to achieve this task. Many approaches have been proposed to improve the relevance of returned processes depending on matching the graphs that represent these processes. This generally turns to a graph matching problem known to be an NP-Hard problem. In this paper, we propose to decompose process model graphs into modules in order to improve the precision of the returned results while keeping a polynomial time complexity of matchmaking. The Modules are sub-parts of the process model that capture the most important sub-structures of the process graph. With these modules, the original process graph can be represented by a tree which is more easier to match. We have evaluated our approach within a benchmark of process graphs. The results of our experiments confirm that our approach obtains more relevant results with less time than a typical graph matching based method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern-based process discovery

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (308 KB) |  | HTML iconHTML  

    Service-oriented systems consist of services exchanging messages. The service interactions often only form at runtime, and implicitly define instances of a business process. Our research addresses the problem of identifying process instances, so that process analytics and optimization techniques may be applied to service-oriented systems. We introduce a novel approach to discover process instances, which takes a catalog of messaging patterns and actual message logs as input. The pattern catalog describes abstract, common service interactions, while the message logs comprise service correlation information of the concrete system under consideration. We present the required concepts, a prototype, and an experimental evaluation of our approach. Results show that pattern-based process discovery is a feasible option to discover process instances in service-oriented systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software framework for enabling smart services

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (472 KB) |  | HTML iconHTML  

    `Smart' becomes a buzzword in many sectors of the society. Among them, Smart Service is an emerging paradigm for delivering services with `smartness' features. A key ingredient of smart services is various types of contexts including mobile and social contexts. With the advent of sensor technology and availability in mobile devices, contexts become a key source of information from which situations can be inferred. And, situation-specific services have a high potential of being smart services. However, a number of fundamental technical issues remain unresolved, especially in the area of software framework for developing and deploying smart services. In this paper, we present a software framework for context-aware smart life services, Smart Service Framework (SSF). We begin by defining smart services with key characteristics, and define our architectural design of the SSF. We also define a process for provisioning smart services. And, we specify guidelines and algorithms needed for carrying out the four activities in the process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rule-based approach for dynamic adaptation of service flow

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3011 KB) |  | HTML iconHTML  

    In this paper, we propose a rule-based dynamic approach for the online adaptation of service flow. The situations that may trigger the dynamic adaptation are analyzed and categorized. For each type of situation, a set of Event Condition Action (ECA) rules is devised to identify the problem and automatically select proper alternative services or subflows to remedy the situation. The alternatives are selected to retain the semantics of the original flow but comply with the new situation or QoS constraints. The scope of adaptation is deliberately arranged to minimize the impact and conserve the recovery cost. Preliminary implementation and evaluation results demonstrate that our techniques can successfully identify problematic situations and construct alternative flows to satisfy user requirements and QoS constraints with very low overhead. The generality and flexibility of our approach also enable the proposed techniques to be applicable to a wide range of applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk in modern IT service landscapes: Towards a dynamic model

    Publication Year: 2012 , Page(s): 1 - 4
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (166 KB) |  | HTML iconHTML  

    The “Cloud Computing” paradigm is gaining ground with new IT service providers and traditional IT out-sourcing providers alike. Customers want to use cloud computing solutions with all their advertised advantages and without the hassle of traditional long term outsourcing migration and contracting. Risk is at the center of attention when dealing with the adoption of cloud services. Because of the security concerns and the consequential reservations towards the acceptance of public cloud computing platforms, a lot has been done to improve security and trust in these environments. However, most of the implementations and research regarding this issue is concerning technical security risks with a focus on preventing perimeter-based attacks. Security and trust issues beyond perimeter based security risks have gained little attention. This paper identifies the need to look beyond technical issues and turns the attention to improving compliance and governance in cloud environments. In this process the focus is set on the discontinuity cap between existing methods to identify and evaluate IT risks and the treatment of these risks with Service Level Agreements. To close this cap a model for a dynamic view on current IT risk is proposed to comply with modern IT environments that are composed of an ampleness of different services. The model has a strong corporate context and will help companies to evaluate their current risk exposure and thus make better decisions when choosing their services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On evolving partitioned Web Service orchestrations

    Publication Year: 2012 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (596 KB) |  | HTML iconHTML  

    Many researches argue that centralized Web Service (WS) orchestrations stop short in dealing with key requirements such as scalability, privacy and reliability. Consequently, fragmentation and decentralization have been proposed to overcome these limitations. In detail, the centralized orchestration is fragmented into behaviorally equivalent distributed partitions such that their combined execution recreates the function of the original orchestration. However, the evolving nature of business processes created the need for an efficient change support. Since the decentralization leads to the distribution of the activities, the control and data flows, it becomes difficult to specify the changes directly on the derived partitions. Therefore, it is more judicious to specify the changes on the centralized orchestration model and propagate them to the derived partitions. In this paper, we propose a comprehensive change framework for partitioned WS orchestration scenarios and demonstrate how to specify and propagate the changes from the centralized model to its resulting decentralized partitions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost-driven service provisioning in hybrid clouds

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (192 KB) |  | HTML iconHTML  

    Hybrid clouds, which comprise nodes both in a private cloud and in a public cloud, have emerged as a new model for service providers to deploy their services. However, given Quality-of-Service requirements for each service, the question of on how many private and public nodes to deploy the services in the most cost-effective way remains to be answered. The challenges faced in the hybrid cloud stem from the disparate time-varying requests across multiple services, the different cost structures of both types of nodes, and the performance characteristics of nodes. In this paper, we propose a novel algorithm to dynamically optimize the allocation of private and public nodes across services, with special focus on the performance-cost tradeoff between private and public nodes. The algorithm is based on an analytical cost-performance framework for service deployment in hybrid clouds. Our evaluation results based on trace-driven simulation show that our proposed node allocation algorithm can effectively achieve a good cost-performance ratio, compared to the deployment of purely public and private cloud. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting RESTful services from Web applications

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (465 KB) |  | HTML iconHTML  

    The Web contains large amount of information and services primarily intended for human users. A Web application offers high user experience and responsiveness. A user performs different task, such as reserving flight tickets from a Web application. A task is a set of activities required for a user to achieve a goal. Similar tasks are often used in different websites. Therefore, facilitating their reuse would improve development productivity and ease maintenance of Web applications. However, designing a reusable Web application component is often neglected by Web developers due to the pressure for the time-to-market. To circumvent this limitation, we propose an approach to interactively identify tasks from Web applications and represent these tasks as services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WS-Agreement based service negotiation in a heterogeneous service environment

    Publication Year: 2012 , Page(s): 1 - 8
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (215 KB) |  | HTML iconHTML  

    With the ever increasing importance of web services and the Cloud as a reliable commodity to provide business value as well as consolidate IT infrastructure, electronic contracts have become very important. WS-Agreement has itself established as a well accepted container format for describing such contracts. However, the semantic interpretation of the terms contained in these contracts, as well as the process of agreeing to contracts when multiple options have to be considered (negotiation), are still pretty much dealt with on a case by case basis. In this paper we address the issues of diverging contracts and varying contract negotiation protocols by introducing the concept of a contract aware marketplace, which abstracts from the heterogeneous offers of different services providers. This allows for the automated consumption of services solely based on preferences, instead of additional restrictions such as understanding of contract terms and/or negotiation protocols. We also contribute an evaluation of several existing negotiation concepts/protocols. We think that reducing the complexity for automated contract negotiation and thus service consumption is a key for the success of future service and Cloud infrastructures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selecting the right mobile app paradigms

    Publication Year: 2012 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (558 KB) |  | HTML iconHTML  

    The explosion of mobile applications both in number and variety raises the need of shedding light on their architecture, composition and quality. Indeed, it is crucial to understand which mobile application paradigm fits better to what type of application and usage. Such understanding has direct consequences on the user experience, the development cost and sale revenues of mobile apps. In this paper, we identified four main mobile application paradigms and evaluated them from the developer, user and service provider viewpoints. To ensure objectivity and soundness we start by defining high level criteria and then breaking down in finer-grained criteria. After a theoretical evaluation an implementation was carried out as a practical verification. The selected application is object recognition app, which is both exciting and challenging to develop. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel two-phase approach for QoS-aware service composition based on history records

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (355 KB) |  | HTML iconHTML  

    Existing service composition approaches usually assume that the quality of service does not change over time. Actually, the performance of a service may fluctuate due to the dynamic environments, which may violate the end-to-end QoS constraints or degrade the QoS of a composite service. History records (or QoS records) can exhibit QoS fluctuations over the past period and reflect the actual performance of a service. Thus, a novel Two-Phase Approach for Service Composition (TPASC) based on QoS records is presented to address the problem. The proposed approach has the two phases: one is preliminary filtering, where a heuristic QoS decomposition algorithm is proposed to decompose the end-to-end QoS constraints into local constraints, and then some promising services are selected in terms of the probability that they can meet the local constraints; the other is MIP (Mixed Integer Programming)-based service selection, where QoS records associated with each promising service are reduced by K-means clustering method, and then a MIP model is proposed to rank and select services in terms of the reduced QoS records. The experimental results show TPASC can conduct service composition with high efficiency and significant cost savings in dynamic environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revenue maximization with quality assurance for composite web services

    Publication Year: 2012 , Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (373 KB) |  | HTML iconHTML  

    Service composition is one of the major approaches in service oriented architecture (SOA) based systems. Due to the inherent stochastic nature of services execution environment the issue of composite service quality assurance within SOA is a very challenging one. Such heterogeneous environment requires dynamic, run-time composition of services. We show how to determine a policy that satisfies the quality assurance for the composite service provider with the aim of revenue maximization for this provider. The quality assurance is defined as the probability that end-to-end deadline will be met, while taking into account service availability, (composite) service response-time and costs. The calculated policy is determined using dynamic programming and allows fast decision making for run-time composition. Besides, we determine the end-to-end response-time distributions resulting from determined policies. We illustrate the proposed solution with a number of experiments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time service process scheduling with intermediate deadline overrun management

    Publication Year: 2012 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (949 KB) |  | HTML iconHTML  

    This paper presents a robust scheduling framework for service processes with end-to-end deadlines. Service processes are admitted using capacity-based admission control, which assigns intermediate deadlines for individual services. At run-time, the system can respond to intermediate deadline faults by adjusting the deadlines assigned and reevaluate the system's schedulability. Intermediate deadline adjustment algorithms are proposed to efficiently adjust a subset of the overrunning process. Experimental results show that the proposed intermediate deadline adjustment algorithms can effectively reduce the end-to-end deadline miss ratio by up to 30%, compared to the original system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Composing trustworthy context-dependent services

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (111 KB) |  | HTML iconHTML  

    The two key issues in service-oriented applications should be that every provided service meets the expected trust level set by the service requester, and the provided service satisfies its contract in the context of service provision. In order to enforce these issues, it is necessary to specify in the service its trustworthiness properties, and the relationship between its contracts and the contexts in which it is to be provided. However, current approaches have failed to specify them. To remedy this situation, we have presented a new service model (ConfiguredService) and a new service provision framework (FrSeC). In this paper, we focus on the composition of trustworthy context-dependent services as supported by ConfiguredService and FrSeC. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eventlets: Components for the integration of event streams with SOA

    Publication Year: 2012 , Page(s): 1 - 9
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (397 KB) |  | HTML iconHTML  

    Cyber physical systems (CPS) react to changes in the environment and have become widely adopted in many domains. One key functionality to achieve this reactivity is the processing of event streams. To profit from this reactive behavior in service-oriented architectures (SOA), event stream processing needs to be encapsulated in a service-like manner. We thus introduce the concept of event applets, in short Eventlets, to provide developers and architects alike with a generic and reusable component model for encapsulating event stream processing logic. Eventlets have a managed lifecycle and are activated automatically upon arrival of appropriate events. We introduce our distributed Eventlet middleware architecture and implementation based on industry-strength message-oriented middleware. Our evaluation shows that Eventlets simplify the development of reactive components and that they can compete with traditional event processing approaches in terms of performance. Eventlets enable easy distribution of event stream processing components and are a suitable foundation for scalable applications that combine SOA with CPS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • M2M Platform-as-a-Service for sustainability governance

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (258 KB) |  | HTML iconHTML  

    Recently, cloud computing technologies have been employed for large-scale machine-to-machine (M2M) systems, as they could potentially offer better solutions for managing monitoring data and analytics applications to support the needs of different consumers. However, there exist complex relationships between monitored objects, monitoring data, analysis features, and stakeholders in M2M that require efficient ways to handle these complex relationships. This paper presents techniques for linking and managing monitored objects, sustainability monitoring data and analytics applications for different stakeholders in cloud-based M2M systems. We describe a Platform-as-a-Service for sustainability governance that implements these techniques. We also illustrate our prototype based on a real-world cloud system for facility monitoring. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.