Scheduled System Maintenance
On Saturday, October 21, single article sales and account management will be unavailable until 6 PM ET.
Notice: There is currently an issue with the citation download feature. Learn more.

June 27 2014-July 2 2014

Filter Results

Displaying Results 1 - 25 of 90
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1563 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2014, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (105 KB) | HTML iconHTML
    Freely Available from IEEE
  • Messages from the Workshop Chairs

    Publication Year: 2014, Page(s):xvi - xxv
    Request permission for commercial reuse | PDF file iconPDF (364 KB) | HTML iconHTML
    Freely Available from IEEE
  • SERVICES 2014 Organizing Committee

    Publication Year: 2014, Page(s):xxvi - xxvii
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • IEEE Computer Society Technical Committee on Services Computing

    Publication Year: 2014, Page(s): xxviii
    Request permission for commercial reuse | PDF file iconPDF (266 KB)
    Freely Available from IEEE
  • Services Society

    Publication Year: 2014, Page(s): xxix
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Second International Workshop on Personalized Web Tasking - Summary

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    The objective of the Personalized Web Tasking (PWT) workshop series is to develop a community interested in the overlap between web services (as interoperable and easily composable components) and configurable personalizable applications. On the one hand, the core web-service community focuses primarily on enabling/supporting the processes around building distributed systems using services as the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalized Search: An Interactive and Iterative Approach

    Publication Year: 2014, Page(s):3 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (827 KB) | HTML iconHTML

    In the face of an information intensive Internet, searching has become the most important way to locate information efficiently. Current searching techniques are able to retrieve relevant data, however, personalization techniques are still needed to better identify different user's requirements. This paper proposes an interactive and iterative approach to infer a user's intentions implicitly, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource Description for End-User Driven Service Compositions

    Publication Year: 2014, Page(s):11 - 17
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    In the current web, end-users' involvement on creating content for the modern web applications and participation on tailoring their own web applications is increasing. These applications are often called Personalized Web Tasks. Thus, in addition to software developers, end-users are now participating in the service development through personal service configurations. End-user driven development po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Quality of Experience Driven Service Composition

    Publication Year: 2014, Page(s):18 - 20
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    Web service composition enables seamless and dynamic integration of applications on the web. Generally a user has to find services, select proper services and form a flow to create a service composition. The performance of the composed application is determined by the performance of the involved Web services. Current work in web service selection and discovery are based on non-functional, quality ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Based Face Recognition for Smart Web Tasking Applications

    Publication Year: 2014, Page(s):21 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    This position paper illustrates applications of a context-based face recognition system for smart web tasking. Context-based face recognition can provide a personalized service based on recognition face and derived context information. Using selected smart applications, we show how context-based face recognition system could help deliver personalized services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalized Web-Tasking Applications: An Online Grocery Shopping Prototype

    Publication Year: 2014, Page(s):24 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Users utilize web applications to perform everyday tasks in order to achieve personal goals. Personalized Web-Tasking (PWT) is the automation of such web interactions while exploiting personal context to enrich users experience. However, web-tasking is affected by unpredictable context behaviour -- environment, user, and infrastructure -- and situational changes. Given that current web systems are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MapReduce-Based Distributed K-Shell Decomposition for Online Social Networks

    Publication Year: 2014, Page(s):30 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (787 KB) | HTML iconHTML

    Social network analysis comprises a popular set of tools for the analysis of online social networks. Among these techniques, k-shell decomposition of a graph is a popular technique that has been used for centrality analysis, for communities discovery, for the detection of influential spreaders, and so on. The huge volume of input graphs and the environments where the algorithm needs to run i.e., l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adapting REST To REAST, Building Smarter Interactions for Personal Web Tasking

    Publication Year: 2014, Page(s):38 - 47
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB) | HTML iconHTML

    REpresentational State Transfer (REST) today represents and transfers the data-states of distrib-uted resources. Through hypermedia-based inter-actions among these representations and transfers, the web's original goal of information retrieval is accomplished. However, despite of the fact that the web today has evolved beyond information retrieval into task executions, the original web interaction... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Memory Map Timings to Discover Information Leakage to a Live VM from the Hypervisor

    Publication Year: 2014, Page(s):48 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    In this paper we present a technique for detecting information leaked from the hypervisor to the guest OS via statistical analysis of the amount of time required to map and unmap a page in memory. Analysis of these timings allows a guest to determine the number of co-located VMs on the same physical hardware as well as determine whether or not the VM is being monitored by Virtual Machine Introspec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Audit Log Management in MongoDB

    Publication Year: 2014, Page(s):53 - 57
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (458 KB) | HTML iconHTML

    In the past few years, web-based applications and their data management needs have changed dramatically. Relational databases are often being replaced by other viable alternatives, such as NoSQL databases, for reasons of scalability and heterogeneity. MongoDB, a NoSQL database, is an agile database built for scalability, performance and high availability. It can be deployed in single server enviro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Off-Line Risk Assessment of Cloud Service Provider

    Publication Year: 2014, Page(s):58 - 65
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    The acceptance of cloud as a platform to migrate applications has seen a boom in the past few decades. Hosting applications on the cloud cuts down its maintenance and infrastructure costs. Nonetheless security of these applications on the cloud is one of the primary concerns which prevents complete adoption of cloud. Although cloud provides security, they do not address it in terms of application ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventing the Mistraining of Anomaly-Based IDSs through Ensemble Systems

    Publication Year: 2014, Page(s):66 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    The security of cloud networks is heavily contingent upon their ability to detect incoming attacks. An Intrusion Detection System (IDS) monitors a network for precisely this purpose. IDSs fall into one of two categories: signature-based and anomaly-based IDSs. Whereas signature-based IDSs rely upon pre-programmed matching rules designed by security experts and are therefore limited to pre-existing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedding a Distributed Auditing Mechanism in the Service Cloud

    Publication Year: 2014, Page(s):69 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (637 KB) | HTML iconHTML

    The Cloud Security Alliance identified the "notorious nine" threats for cloud computing. The range of these threats across the cloud indicates that centralized prevention and detection would be highly inefficient, potentially reporting incidents to tenants well after they occur and are difficult to mitigate. This paper presents an auditing framework for the service cloud that distributes logging, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Cost Accounting in Service-Oriented Computing

    Publication Year: 2014, Page(s):77 - 84
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Nowadays, companies are increasingly offering their business services through computational services on the Internet in order to attract more customers and increase their revenues. However, these services have financial costs that need to be managed in order to maximize profit. Several models and techniques have been recently reported that aim at managing, controlling and reducing service costs. H... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE 2014 Fourth International Workshop on Formal Methods in Services and Cloud Computing (FM-S&C 2014) Workshop Summary

    Publication Year: 2014, Page(s):85 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB) | HTML iconHTML

    Emerging paradigm of cloud computing provides a new service delivery platform. One of the latest challenges is how to work with service computing in a cloud computing environment. Meanwhile, the convergence of service computing and cloud computing is becoming a major driving force for the adoption of both of these technologies. It has been great advances in formal methods research via tool support... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.