Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Web Services, 2004. Proceedings. IEEE International Conference on

Date 6-9 July 2004

Filter Results

Displaying Results 1 - 25 of 138
  • Polimatica: abstraction for customizable private virtual organizations in global grids

    Publication Year: 2004 , Page(s): 674 - 681
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (575 KB) |  | HTML iconHTML  

    We have developed an application service hosting middleware for enterprise information systems, "Polimatica", upon which a policy-customizable private virtual organization (pVO) is built. The pVO is a collection of customizable application services in the global grid computing environment. "Polimatica" is distinctive in terms of abstraction capabilities in (1) policy instance description, (2) view synthesis of an extensive resource data model, (3) operation aggregation on the OGSI extension interfaces. The performance to enforce the policy instances is measured in a laboratory testbed for an enterprise ASP, providing B2B e-commerce (BizEngine/WS) and interactive media communication service (LiveComm). We have verified that, in 60 seconds, the feedback loop in a pVO adjusts the application services as customized given the changing environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Realizability of conversation protocols with message contents

    Publication Year: 2004 , Page(s): 96 - 103
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (395 KB) |  | HTML iconHTML  

    A conversation protocol is a top-down specification framework which specifies desired global behaviors of a Web service composition. In our earlier work (Fu et al., 2003) we studied the problem of realizability, i.e., given a conversation protocol, can a Web service composition be synthesized to generate behaviors as specified by the protocol. Several sufficient realizability conditions were proposed by Fu et al. (2003) to ensure realizability. Conversation protocols studied by Fu et al. (2003), however, are essentially abstract control flows without data semantics. This paper extends the work by Fu et al. (2003) and achieves more accurate analysis by considering data semantics: to overcome the state-space explosion caused by the data content, we propose a symbolic analysis technique for each realizability condition. In addition, we show that the analysis of the autonomy condition can be done using an iterative refinement approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of J2EE application performance management systems

    Publication Year: 2004 , Page(s): 724 - 731
    Cited by:  Papers (2)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (323 KB) |  | HTML iconHTML  

    J2EE components and APIs have remained largely unmined, and their potential as performance barometers therefore largely unrealized, because the tools businesses have traditionally wielded to service transactions - database servers, directory services, application servers themselves - have been unable to provide businesses and software developers the access they need to capture, measure, and optimize discrete transactions. Businesses that lack insight into J2EE components and APIs lack the ability to manage some of e-business's most vital performance assets, assets that, when performing poorly or not at all, can down whole distributed applications. This paper discusses the requirements of J2EE application performance management systems and five commercial tools. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-service semantic enabled implementation of machine vs. machine business negotiation

    Publication Year: 2004 , Page(s): 106 - 115
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (416 KB) |  | HTML iconHTML  

    The ultimate target of business to business (B2B) integration and deployment is complete business process automation within and between enterprises with no human intervention. From a business point of view, negotiation is the main mechanism that modern enterprises use to achieve targets that maximise their profits. This paper proposes an automated B2B negotiation solution: the implementation of semantic-enabled machine versus machine business negotiation as a Web service. We argue that the shift from human vs. human to machine vs. machine business negotiation is facilitated by using semantic Web technology implemented with Web services. The negotiation process in this work is designed for multiple machines (a minimum of 3 computers), using a negotiation algorithm that emulates the behaviour of human business negotiations. Possible development directions are brought forward in the paper's conclusion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards intelligent Web services for automating medical service composition

    Publication Year: 2004 , Page(s): 384 - 391
    Cited by:  Papers (3)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (412 KB) |  | HTML iconHTML  

    The vision of the Semantic Web is to reduce manual discovery and usage of Web resources (documents and services) and to allow software agents to automatically identify these Web resources, integrate them and execute them for achieving the intended goals of the user. Such a composed Web service may be represented as a workflow, called service flow. Current studies of Web services are not sufficient for automatic composition. This paper presents different types of compositional knowledge required for Web service discovery and composition: syntactic, semantic and pragmatic knowledge. As a proof of concept, we have implemented our framework in a cardiovascular domain which requires advanced service discovery and composition across heterogeneous platforms of multiple organizations. Within this framework, we describe (1) How to represent the compositional knowledge, which plays a role in service discovery and composition, in DAML-S; (2) How heterogeneous medical services intemperate in a composed medical service flow. (3) To solve this knowledge level integration, we build on an ontology integration method called SEMIO (Semantic Interoperability). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logic-based Web services composition: from service description to process model

    Publication Year: 2004 , Page(s): 446 - 453
    Cited by:  Papers (24)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (465 KB) |  | HTML iconHTML  

    This paper introduces a method for automatic composition of semantic Web services using Linear Logic (LL) theorem proving. The method uses semantic Web service language (DAML-S) for external presentation of Web services, while, internally, the services are presented by extralogical axioms and proofs in LL. We use a process calculus to present the composite service formally. The process calculus is attached to the LL inference rules in the style of type theory. Thus the process model for a composite service can be generated directly from the proof. The subtyping rules that are used for semantic reasoning are presented with LL inference figures. We propose a system architecture where the DAML-S translator, the LL theorem prover and the semantic reasoner can operate together to fulfill the task. This architecture has been implemented in Java. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web services container reference architecture (WSCRA)

    Publication Year: 2004 , Page(s): 806 - 807
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    Today, Web services are pervasive and omnipresent in the Internet and within enterprises. Even though there are massive Web services specifications development underway, early adoption by developers and tool vendors is becoming a need. The potential growth of this technology is highly predictable because of its universal acceptance and use among the developer community. This industry may expect to grow enormously based on the support from various communities that benefit from this technology. Researches are carried out in various standards bodies on various aspects of Web services such as definition, architecture, security, discovery, interoperability, etc. As we are committed to the success of this technology, we need to research on service oriented containers that makes Web services potential more constructive. This paper proposes a container for Web services which can manage and monitor the state and behavior of Web services, which may address the quality of service (QoS) factor for Web services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable peer-to-peer process management - the OSIRIS approach

    Publication Year: 2004 , Page(s): 26 - 34
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (438 KB) |  | HTML iconHTML  

    The functionality of applications is increasingly being made available by services. General concepts and standards like SOAP, WSDL, and UDDI support the discovery and invocation of single Web services. State-of-the-art process management is conceptually based on a centralized process manager. The resources of this coordinator limit the number of concurrent process executions, especially since the coordinator has to persistently store each state change for recovery purposes. In this paper, we overcome this limitation by executing processes in a peer-to-peer way exploiting all nodes of the system. By distributing the execution and navigation costs, we can achieve a higher degree of scalability allowing for a much larger throughput of processes compared to centralized solutions. This paper describes our prototype system OSIRIS, which implements such a true peer-to-peer process execution. We further present very promising results verifying the advantages over centralized process management in terms of scalability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy policy compliance for Web services

    Publication Year: 2004 , Page(s): 158 - 165
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    The growth of the Internet has been accompanied by the growth of Web services (e.g. e-commerce, e-health). This proliferation of Web services and the increasing regulatory and legal requirements for personal privacy have fueled the need to protect the personal privacy of Web service users. We advocate a privacy policy negotiation approach to protecting personal privacy (Yee and Korba, 2003; ). We provided semiautomated approaches for deriving personal privacy policies (Yee and Korba, 2004). However, it is evident that approaches are also needed to ensure that providers of Web services comply with the privacy policies of service users. In this paper, we examine privacy legislation to derive requirements for privacy policy compliance systems. We then propose an architecture for a privacy policy compliance system that satisfies the requirements and discuss the strengths and weaknesses of our proposed architecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of Web services in a federated registry environment

    Publication Year: 2004 , Page(s): 270 - 278
    Cited by:  Papers (23)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (354 KB) |  | HTML iconHTML  

    The potential of a large scale growth of private and semi-private registries is creating the need for an infrastructure which can support discovery and publication over a group of autonomous registries. Recent versions of UDDI have made changes to accommodate interactions between distributed registries. In this paper, we discuss METEOR-S Web service Discovery Infrastructure, which provides an ontology-based infrastructure to access a group of registries that are divided based on business domains and grouped into federations. We also discuss how Web service discovery is carried out within a federation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web services for information extraction from the Web

    Publication Year: 2004 , Page(s): 279 - 286
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (565 KB)  

    Extracting information from the Web is a complex task with different components which can either be generic or specific to the task, going from downloading a given page, following links, querying a Web-based applications via an HTML form and the HTTP protocol, querying a Web service via the SOAP protocol, etc. Therefore building Web services which proceed to executing an information tasks can not be simply hard coded (i.e. written and compiled once and for all in a given programming language). In order to be able to build flexible information extraction Web Services we need to be able to compose different sub tasks together. We propose a, XML-based language to describe information extraction Web services as the compositions of existing Web services and specific functions. The usefulness the proposed framework is demonstrated by three real world applications. (1) Search engines: we show how to describe a task which queries Google's Web service, retrieves more information on the results by querying their respective HTTP servers, and filters them according to this information. (2) E-commerce sites : an information extraction Web service giving access to an existing HTML-based e-commerce online application such as Amazon is built. (3) Patent extraction: a last example shows how to describe an information extraction Web service which allows to query a Web-based application, extract the set of result links, follow them, and extract the needed information on the result pages. In all three applications the generated description can be easily modified and completed to further respond the user's needs and create value-added Web services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A trust-based context-aware access control model for Web-services

    Publication Year: 2004 , Page(s): 184 - 191
    Cited by:  Papers (21)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (298 KB) |  | HTML iconHTML  

    A key challenge in Web services security is the design of effective access control schemes that can adequately meet the unique security challenges posed by the Web services paradigm. Despite the recent advances in Web based access control approaches applicable to Web services, there remain issues that impede the development of effective access control models for Web services environment. Amongst them are the lack of context-aware models for access control, and reliance on identity or capability-based access control schemes. In this paper, we motivate the design of an access control scheme that addresses these issues, and propose an extended, trust-enhanced version of our XML-based role based access control (X-RBAC) framework that incorporates context-based access control. We outline the configuration mechanism needed to apply our model to the Web services environment, and also describe the implementation architecture for the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic composition of Web services with contingency plans

    Publication Year: 2004 , Page(s): 454 - 461
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (308 KB) |  | HTML iconHTML  

    The semantic Web technology and the Web services description language extensibility may be combined to describe services in an unambiguous and machine interpretable way, automating Web services discovery, selection and invocation. In this paper, we present an algorithm and a prototype for the automatic composition of Web services that implement workflows described in a high level language. Our approach has many advantages comparing to the manual creation of a simple program composition, such as smaller implementation time and cost, reliability with the generation of contingency plans, greater capacity to evolve with the dynamic service discovery, and faster execution time with the use of heuristics. We use the OWLS ontology to semantically describe Web services metadata and indexes to help selecting them. The proposed algorithm considers that equivalent services may have different interfaces and also respects preferences of the users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ad-hoc invocation of semantic Web services

    Publication Year: 2004 , Page(s): 116 - 123
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (293 KB) |  | HTML iconHTML  

    We present the Web service description framework (WSDF), which provides both a representation mechanism and a runtime system architecture for semantically enriched Web Services. We analyze existing languages such as BPEL4WS and OWL-S before addressing their deficiencies in our proposal. Our approach allows a client to invoke a service based solely on a shared ontology, i.e. without prior knowledge on the API, providing an important building block towards a global, flexible information infrastructure. Another main point is that WSDF can be applied to clients and services written in a conventional object oriented programming language. This is achieved by lifting data structures to an ontology level in which rich logical statements about services can be formalized. We also present a detailed system architecture that covers planning, invocation, and the automatic processing of the service results, which is accomplished using the observer design pattern and by asserting the result in the respective model. Furthermore, the required annotations can be specified conveniently by placing comments in the source code. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WS-QDL containing static, dynamic, and statistical factors of Web services quality

    Publication Year: 2004 , Page(s): 808 - 809
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (247 KB) |  | HTML iconHTML  

    Web services following distributed object computing technology like DCOM, CORBA provides remote procedure call mechanism based on XML-based open standard such as SOAP, WSDL, and UDDI, and it is spotlighted as means of integration and collaboration at e-business. Especially, UDDI is the Web services registry enabling to register and search Web services that takes charge of providing infrastructure for Web services. However, the existing UDDI has a few problems that searching process is very simple and it cannot provide information of Web services quality and quality-based retrieval. Therefore, this study suggests improved UDDI model that evaluates the Web services quality and use this information for searching. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location-mediated coordination of Web services in ubiquitous computing

    Publication Year: 2004 , Page(s): 822 - 823
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (409 KB) |  | HTML iconHTML  

    A fundamental issue of human-centered coordinating services in ubiquitous computing is concerned with dynamic service coordination according to users' intentions. How can we coordinate the services to assist the user in receiving a coordinated service to maximize the user's satisfaction in an environment? In order to solve this issue, we have been developing a sort of agent-based coordination framework, called "location-mediated agent coordination," that orchestrates Web services embedded in the real world and Web services on the Internet. In this paper, we show a prototype application of the framework, context-aware information assist services in a museum. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web service gateway - a step forward to e-business

    Publication Year: 2004 , Page(s): 648 - 655
    Cited by:  Papers (5)  |  Patents (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (726 KB) |  | HTML iconHTML  

    Business-to-business will be a considerable market in the near future of Internet e-business. In this future market, several providers need to be able to integrate or exchange information in providing a global service. The problem that we want to tackle in this paper is related to the existing information sources in the current Internet environment. That is how to integrate existing Web sites each other to become a new Internet service. The difficulty comes from a historical objective. Internet Web sites were developed for human users browsing and so, they do not support machine-understandable as well as interprovider interaction. To overcome this gap, we need a framework to systematically migrate the existing presentation-oriented Web sites to service-oriented one. Evidently, redeveloping all of them is an unacceptable solution. In this paper, we propose a mechanism of Web service gateway in which existing Web sites are wrapped by several Web service wrappers. Thus, without any efforts to duplicate the Web sites code, these services inherit all features from the sites while can be enriched with other Web Service features like UDDI publishing, semantic describing, etc. As a consequence, they can be easily integrated to each other in a business-to-business schema to provide a more valuable service for users. This Web service gateway was developed in Toshiba with Web Service Generator, allowing to automatically generate Web service wrappers. By using this system, several "real" Web services were generated and made available for use. The Web service gateway and these services are also presented and evaluated in this paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A DAML-based repository for QoS-aware semantic Web service selection

    Publication Year: 2004 , Page(s): 368 - 375
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (295 KB) |  | HTML iconHTML  

    The Web is moving toward a collection of interoperating Web services. Achieving this interoperability requires dynamic discovery of Web services on the basis of their capabilities. The capability of a service can be properly determined by using not only its functional description (or service interface), but also its quality attributes as judged by previous users of the service. We develop a service repository that extends UDDI registries. This repository combines an ontology of attributes with evaluation data. We base our repository on a new query and manipulation language based on DAML. Our language includes support for a rich set of operations, which are needed to maintain an attribute ontology, publish services, rate services, and select services based on their functional attributes as well as evaluations by others. We have implemented our approach and evaluated its practical completeness via a number of key query and manipulation templates. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for collaborative product commerce using Web services

    Publication Year: 2004 , Page(s): 52 - 60
    Cited by:  Papers (4)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (343 KB) |  | HTML iconHTML  

    This paper presents a novel Web-based service-oriented framework to support collaborative product commerce. The framework coordinates processes to design and manufacture a product in a loosely coupled environment using Web services. We have developed a service model using OWL. It provides facilities for companies to discover services that other companies provide. Choreography of Web services is achieved using the process grammar. Usage of process grammar helps to configure processes dynamically, facilitating collaboration among companies. The framework, therefore, provides a truly distributed architecture for management of service composition and interoperation, lending a unique functionality to the framework. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code generation for WSLAs using AXpect

    Publication Year: 2004 , Page(s): 134 - 141
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (896 KB) |  | HTML iconHTML  

    WSLAs can be viewed as describing the service aspect of Web services. By their nature, Web services are distributed. Therefore, integrating support code into a Web service application is potentially costly and error prone. Viewed from this AOP perspective, then, we present a method for integrating WSLAs into code generation using the AXpect weaver, the AOP technology for Infopipes. This helps to localize the code physically and therefore increase the eventual maintainability and enhance the reuse of the WSLA code. We then illustrate the weavers capability by using a WSLA document to codify constraints and metrics for a streaming image application that requires CPU resource monitoring. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reusable functional composition patterns for Web services

    Publication Year: 2004 , Page(s): 498 - 505
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (544 KB) |  | HTML iconHTML  

    Developers write Web service composition programs in terms of functionalities (e.g., "WebSearch") to postpone choosing which services of the same functionality to invoke (Google or Yahoo). We provide a higher level of abstraction than this for higher reuse. We express high-level "patterns" (e.g., "SearchAndCollectData") as both objects that can be "specialized" to particular applications ("SearchAnd-DownloadPapers" vs. "SearchAndAddBooksInCart") and objects that are reusable in the construction of higher-level ones. Our approach lets developers write patterns in terms of high-level functionalities (e.g., "CollectData ") and later decide on services to compose that have lower-level functionalities (e.g., "DownloadPapers" or "addBooksIn-Carts"). We describe our prototype and show an example of nested pattern specialization. We also discuss a reuse trade-off, showing that too much abstraction makes the pattern less expressive. Rather, we suggest developers capture what must be guaranteed in every context of invocation, regardless of the service selection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RAWS: reflective engineering for Web services

    Publication Year: 2004 , Page(s): 488 - 495
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    Reflection is a powerful tool for the adaptation of applications at runtime. The modification of Web services is a task that entails the modification and compilation of the source code, as well as the deployment of the new version of the Web service in the application server. In this paper, we introduce RAWS (Reflective and Adaptable Web Service), a Web service design model based on a reflective architecture of two levels. RAWS allows both the dynamic modification of the definition and implementation structure of the Web service, and the dynamic modification of the Web service behavior in order to change the existing code or to add new functionalities. All these dynamic modifications are performed directly on the code during execution, with no need to have the Web service source code. RAWS improves Web services adaptability and maintainability, as well as the ability for authorized clients to remotely modify them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reputation = f(user ranking, compliance, verity)

    Publication Year: 2004 , Page(s): 200 - 207
    Cited by:  Papers (15)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    The selection of Web services is typically based on both functional and nonfunctional attributes of the service, such as the quality of service (QoS) levels. Reputation, a widely acknowledged nonfunctional QoS attribute is currently expressed as the average of user ratings given to the service. However, this expression confines reputation to the subjective perception of the end user and is limited by the lack of an objective representation of performance history. In this paper, we address the need for a reputation mechanism that couples the subjective perception of the end user with the objective view of performance history. To represent performance history, we propose a novel QoS metric termed verity. Verity measures the degree of consistency exhibited by the service provider in delivering the quality levels laid out in the service contract, over a range of previous transactions. We express reputation as a composition of user rating, the compliance levels exhibited by the provider and the verity value. We contend that this reputation expression is a more viable attribute of quality than user rating alone. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A peer-to-peer framework for Web service discovery with ranking

    Publication Year: 2004 , Page(s): 192 - 199
    Cited by:  Papers (13)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (341 KB) |  | HTML iconHTML  

    Current Web service discovery methods are based on centralized approaches where Web services are identified based on service functionality. Examples of service functionality include car rental, hotel booking and book selling. Since higher level Web services are increasingly composed in terms of lower level Web services, it is important that service discovery not only be based on service functionality but also be based on process behavior, i.e., how a service functionality is served. Furthermore, centralized approaches to service discovery suffer from problems such as high operational and maintenance cost, single point of failure, and scalability. Another issue that has not been considered in current Web service discovery paradigms is the issue of trust and quality of service of the service provider. We, therefore, propose a structured peer-to-peer framework for Web service discovery in which Web services are located based on both service functionality and process behavior. In addition, we integrate a scalable reputation model in this distributed peer-to-peer framework to rank Web services based on both trust and service quality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Team-based agents for proactive failure handling in dynamic composition of Web services

    Publication Year: 2004 , Page(s): 782 - 785
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (264 KB) |  | HTML iconHTML  

    Currently Web services composition problems are addressed using AI planning techniques. The team-based approach, with emphases on the sharing of mental models and proactive collaboration, provides an alternative to current static approaches to Web service composition. The approach provides clear advantages for proactive handling of failures that may be encountered during execution of a complex Web service. The paper proposes a generic framework for dynamic Web-service composition, and extends the CAST architecture to realize the framework. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.