2014 Asia-Pacific Services Computing Conference

4-6 Dec. 2014

Filter Results

Displaying Results 1 - 25 of 42
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for reuse | PDF file iconPDF (1502 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - vii
    Request permission for reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2014, Page(s): viii
    Request permission for reuse | PDF file iconPDF (26 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Co-chairs

    Publication Year: 2014, Page(s): ix
    Request permission for reuse | PDF file iconPDF (27 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2014, Page(s): x
    Request permission for reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2014, Page(s):xi - xiv
    Request permission for reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Keynote

    Publication Year: 2014, Page(s):xv - xvi
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (42 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Organization Patterns for Cloud Enterprise Applications

    Publication Year: 2014, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    With the popularity of cloud computing and SaaS, enterprises are willing to rent various cloud services and use them in their daily work. However, on-premise applications are still widely used inside enterprises. That is to say, to achieve the goal of business collaboration, a cloud service usually need to obtain business data from multiple sources, which include the relevant on-premise applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistent Testing Framework for Continuous Service Development

    Publication Year: 2014, Page(s):8 - 15
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    This paper presents an approach to automate modification of development assets - both test programs and system codes in continuous service development. This approach is attained by metadata, which describes structural behavior and used for transmitting updates among design model, test components, and system under test. This mechanism is illustrated with a development scenario depicting how service... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Petri Net-Based Approach to Service Composition and Monitoring in the IOT

    Publication Year: 2014, Page(s):16 - 22
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Recently, there are many improvements in Internet of Things (IOT). Through the recombination and optimization, the real-world devices can provide their functionality as web services in IOT. However, it is very difficult to cost-effectively access to the Internet of Things due to the environmental changes. In this paper, firstly, a Petri net-based model for service composition in IOT is proposed, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Communication Latency Predict-Based Method for Deploying Applications on Cloud

    Publication Year: 2014, Page(s):23 - 29
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    Nowadays, more and more applications are moving to cloud computing. How to deploy these applications optimally is a great challenge. Many cloud applications, such as scientific applications, are large-scale distributed systems that are deployed on a lot of distributed cloud nodes, and there are a lot of communications between these nodes. Therefore, taking the communication latency between cloud n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Web Services Composition for Multi-user

    Publication Year: 2014, Page(s):30 - 34
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    In a composite service for multiple users, network position of multiple users are different, leading to users perceptions to one service are different. In addition, network parameter values, which vary due to many reasons (such as network congestions), influence QoS of Web services. We propose a reliable service composition method which uses multiple candidate services to process service requests ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Coupling-Based Approach for Class Integration and Test Order

    Publication Year: 2014, Page(s):35 - 41
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    Software testing is one of the most important techniques used to assure the quality of software service. An intricate issue in software testing is the determination of test orders for the integration test of classes, known as the class integration and test order (CITO) problem. The determination of such order has an influence on the cost of created stubs for classes, which is an error-prone and co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • POC: An Optimization Strategy of EV Efficient Travelling

    Publication Year: 2014, Page(s):42 - 47
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (967 KB) | HTML iconHTML

    The popularity of electric vehicles (EVs) provides great help to solve the increasingly serious energy issues and environmental problems, but it also has limitation such as short driving range and long charging time. This paper proposed an optimization strategy for EVs to travel more efficiently called planed ordered charging (POC for short), that is, spending more time on driving and necessary ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Spatio-temporal Parallel Processing System for Traffic Sensory Data

    Publication Year: 2014, Page(s):48 - 54
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    With the continuous expansion of the scope of traffic sensor networks, traffic sensory data becomes widely available and is continuously being produced. Traffic sensory data gathered by large amounts of sensors show the massive, continuous, streaming and spatio-temporal characteristics compared to traditional traffic data. In order to satisfy the requirements of different applications with these d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Web Services Recommendation Based on User Preference

    Publication Year: 2014, Page(s):55 - 61
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Context-Aware Recommender System aims to recommend items not only similar to those already rated with the highest score, but also that could combine the contextual information with the recommendation process. Existing context-aware Web services recommendation methods directly use context as a "filter" to discard services that may conflict with the current user's preference. However, the discarded ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of Capability Opening Engine in PaaS for Internet of Vehicles

    Publication Year: 2014, Page(s):62 - 67
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    In this paper, a capability opening engine for Internet of Vehicles (IOV) PaaS is designed and implemented to solve the problems currently existing in IOV industry such as high threshold of development and industry barriers. Through the analysis of service capability opening technologies, Web Service is preferred to implement the capability opening interfaces. Partial typical interfaces are design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Event-Driven Service-Oriented Architecture for the Internet of Things

    Publication Year: 2014, Page(s):68 - 73
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    IoT (Internet of Things) bridges the physical world and information space. IoT services are environment sensitive and event-driven. The new IoT service architecture should adapt to these features. This paper analyses IoT sensing service characteristics and proposes the future services architecture. It is focused on the middleware architecture and the interface presentation technology. In the middl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Traffic Analysis for Mobile Terminal Based Multi-scale Entropy

    Publication Year: 2014, Page(s):74 - 80
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    Future networks devoted much attention to QoS of user experience. This makes it very important to understand the characteristics of user traffic. For network across multiple network layers have the characteristics of varying complexity, put forward a kind of traffic characteristics analysis method based on space and time scales. Firstly, the traffic model is established using multi-scale character... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Twig Join Algorithm for a Query with ID References

    Publication Year: 2014, Page(s):81 - 87
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    ID/IDREF feature makes XML document model become graph structure rather than tree structure, while traditional Twig join algorithms can just process simple queries without ID references. Those queries with ID references often involve attribute node or predicates with expressions which do not exist in traditional Twig pattern, so it is necessary to design the Twig join algorithm for the implement o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topic Detection from Microblog Based on Text Clustering and Topic Model Analysis

    Publication Year: 2014, Page(s):88 - 92
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1041 KB) | HTML iconHTML

    This paper raises a Microblog topic detection method based on text clustering and topic model analysis. It solves the problem that the traditional topic detection method is mainly applicable for traditional media text, which is not very effective in handling sparse Micro blog short texts. In consequence of the structural data of the Microblog, which exists rich inter-textual contextual information... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Rule-Based Recommendation for Personalization in Social Networks

    Publication Year: 2014, Page(s):93 - 100
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    All online social networks gather data that reflects users' profiles, interactive behaviors and shared activities. This data can be used to extract users' interests and make recommendations. According to abundant personal data, recommenders can identify information relevant for individuals. To reveal users' different preferences explicitly, we present a rule-based method which supports different r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.