default search action
SOSE 2014: Oxford, UK
- 8th IEEE International Symposium on Service Oriented System Engineering, SOSE 2014, Oxford, United Kingdom, April 7-11, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3616-8
- Paraskevi Zerva, Steffen Zschaler, Simon Miles:
A Provenance Model of Composite Services in Service-Oriented Environments. 1-12 - Christian Inzinger, Stefan Nastic, Sanjin Sehic, Michael Vögler, Fei Li, Schahram Dustdar:
MADCAT: A Methodology for Architecture and Deployment of Cloud Application Topologies. 13-22 - Kahina Hamadache, Paraskevi Zerva:
Provenance of Feedback in Cloud Services. 23-34 - Wei-Tek Tsai, Jie Luo, Guanqiu Qi, Wenjun Wu:
Concurrent Test Algebra Execution with Combinatorial Testing. 35-46 - Emmanouela Stachtiari, Nikos Vesyropoulos, George Kourouleas, Christos K. Georgiadis, Panagiotis Katsaros:
Correct-by-Construction Web Service Architecture. 47-58 - Wenjun Wu, Wei-Tek Tsai, Chao Jin, Guanqiu Qi, Jie Luo:
Test-Algebra Execution in a Cloud Environment. 59-69 - Dongmei Liu, Hong Zhu, Ian Bayley:
SOFIA: An Algebraic Specification Language for Developing Services. 70-75 - Keith de Souza, Marcelo Fantinato:
WS&i*-RGPS: An Approach to Service-Oriented Requirements Engineering Based on RGPS Metamodels. 76-81 - Zhaoning Zhang, Ziyang Li, Kui Wu, Huiba Li, Yuxing Peng, Xicheng Lu:
DLSM: Decoupled Live Storage Migration with Distributed Device Mapper Storage. 82-89 - Salwa Mohamed Alzahmi, Mohammad Abu-Matar, Rabeb Mizouni:
A Practical Tool for Automating Service Oriented Software Product Lines Derivation. 90-97 - Carolina Melo, Marcelo Fantinato, Violeta Sun, Edmir P. V. Prado:
Towards an Organizational Strategic Alignment Driven by Business Level Agreements. 98-109 - Yuqun Zhang, Dewayne E. Perry:
A Goal-Directed Modeling Technique towards Business Process. 110-121 - Marco Comuzzi, Ruben Ivan Rafael Martinez:
Customized Infrastructures for Monitoring Business Processes. 122-127 - Wei-Tek Tsai, Peide Zhong:
Multi-tenancy and Sub-tenancy Architecture in Software-as-a-Service (SaaS). 128-139 - Hailong Sun, Tao Zhao, Yu Tang, Xudong Liu:
A QoS-Aware Load Balancing Policy in Multi-tenancy Environment. 140-147 - Basel Yousef, Hong Zhu, Muhammad Younas:
Tenant Level Checkpointing of Meta-data for Multi-tenancy SaaS. 148-153 - Jihad Kheireddine Itani, Eric Gouardères, Philippe Aniorté:
Online Community Evolution Using Mediation System in SOA. 154-155 - Yingchao Zhang, Zhiping Jiang, Xiaohao Yu, Xiaoqiang Song:
Mapping Services to Activities in Service Oriented Architecture (SOA) Design: A Simulation-Driven Optimizing Method Based on DODAF2.0. 156-157 - David Webster, Paul Townend, Jie Xu:
Restructuring Web Service Interfaces to Support Evolution. 158-159 - Badis Djamaa, Mark A. Richardson, Nabil Aouf, Bob Walters:
Service Discovery in 6LoWPANs: Classification and Challenges. 160-161 - Jia Zhang, Chris Lee, Sean Xiao, Petr Votava, Tsengdar J. Lee, Ramakrishna R. Nemani, Ian T. Foster:
A Community-Driven Workflow Recommendations and Reuse Infrastructure. 162-172 - Xinyi Liu, Hailong Sun, Hanxiong Wu, Richong Zhang, Xudong Liu:
Using Sequential Pattern Mining and Interactive Recommendation to Assist Pipe-like Mashup Development. 173-180 - Richard K. Lomotey, Ralph Deters:
Towards Knowledge Discovery in Big Data. 181-191 - Naushin Nower, Yasuo Tan, Azman Osman Lim:
Efficient Temporal and Spatial Data Recovery Scheme for Stochastic and Incomplete Feedback Data of Cyber-physical Systems. 192-197 - Pierre De Vettor, Michael Mrissa, Djamal Benslimane, Salim Berbar:
A Service Oriented Architecture for Linked Data Integration. 198-203 - Mazedur Rahman, Samira Iqbal, Jerry Gao:
Load Balancer as a Service in Cloud Computing. 204-211 - Yuan-Hsin Tung, Chen-Chiu Lin, Hwai-Ling Shan:
Test as a Service: A Framework for Web Security TaaS Service in Cloud Environment. 212-217 - Stefan Kolb, Guido Wirtz:
Towards Application Portability in Platform as a Service. 218-229 - Dong Sun, Rong Peng, Wei-Tek Tsai:
Understanding Requirements Driven Architecture Evolution in Social Networking SaaS: An Industrial Case Study. 230-236 - Davide Brugali, Andrea Fernandes da Fonseca, Andrea Luzzana, Yamuna Maccarana:
Developing Service Oriented Robot Control System. 237-242 - Yan Li, Jinhua Xiong, Xinran Liu, Hong Zhang, Peng Zhang:
Folksonomy-Based In-Depth Annotation of Web Services. 243-249 - Zhen Zhang, Zhiyong Feng, Shizhan Chen:
Domain-Oriented Evaluation and Prediction for Documentation Quality of Web Services. 250-257 - Jonas Keppeler, Philipp Brune, Heiko Gewald:
A Description and Retrieval Model for Web Services Including Extended Semantic and Commercial Attributes. 258-265 - Jingwen Zhou, Zhenbang Chen, Haibo Mi, Ji Wang:
MTracer: A Trace-Oriented Monitoring Framework for Medium-Scale Distributed Systems. 266-271 - Li Zhao, Ge Fu, Qian Liu, Xinran Liu, Wei Cao:
A PCA-Based Traffic Monitoring Approach for Distributed Computing Systems. 272-277 - Hanglong Zhan, Lianghuan Kang, Donggang Cao:
DETS: A Dynamic and Elastic Task Scheduler Supporting Multiple Parallel Schemes. 278-283 - Zheng Han, Rui Chu, Haibo Mi, Huaimin Wang:
Elastic Allocator: An Adaptive Task Scheduler for Streaming Query in the Cloud. 284-289 - Pinjia He, Jieming Zhu, Jianlong Xu, Michael R. Lyu:
A Hierarchical Matrix Factorization Approach for Location-Based Web Service QoS Prediction. 290-295 - Ziyang Li, Zhaoning Zhang, Huiba Li, Yuxing Peng:
CoCache: Multi-layer Multi-path Cooperative Cache Accelerating the Deployment of Large Scale Virtual Machines. 296-301 - Haibo Mi, Huaimin Wang, Zhenbang Chen, Yangfan Zhou:
Automatic Detecting Performance Bugs in Cloud Computing Systems via Learning Latency Specification Model. 302-307 - Weidong Sun, Yijie Wang, Yongquan Fu, Xiaoqiang Pei:
A Discrete Data Dividing Approach for Erasure-Code-Based Storage Applications. 308-313 - Yumei Huang, Renyu Yang, Lei Cui, Tianyu Wo, Chunming Hu, Bo Li:
VMCSnap: Taking Snapshots of Virtual Machine Cluster with Memory Deduplication. 314-319 - Waraporn Leesakul, Paul Townend, Jie Xu:
Dynamic Data Deduplication in Cloud Storage. 320-325 - Yan Ding, Huaimin Wang, Songzheng Chen, Xiaodong Tang, Hongyi Fu, Peichang Shi:
PIIM: Method of Identifying Malicious Workers in the MapReduce System with an Open Environment. 326-331 - Ge Hu, Ting Li, Hang Dong, Hewei Yu, Miao Zhang:
Malicious Code Detection for Android Using Instruction Signatures. 332-337 - Yonggang Wang, Shan Yao, Jing Li, Zhongfei Xia, Hanbing Yan, Junfeng Xu:
ReSpam: A Novel Reputation Based Mechanism of Defending against Tag Spam in Social Computing. 338-343 - Hussain Aljahdali, Abdulaziz Albatli, Peter Garraghan, Paul Townend, Lydia Lau, Jie Xu:
Multi-tenancy in Cloud Computing. 344-351 - Yingpu Zhu, Lu Liu, John Panneerselvam, Liangmin Wang, Zhiyuan Li:
Credit-Based Incentives in Vehicular Ad Hoc Networks. 352-357 - Wenjun Wu, Chao Jin:
Customizing Scientific Data Analytic Platforms via SaaS Approach. 358-364 - Wenbo Su, Chuang Lin, Kun Meng, Qu Liu:
Modeling and Analysis of Availability for SaaS Multi-tenant Architecture. 365-369 - Ning Wang, Yang Yang, Zhenqiang Mi, Qing Ji, Kun Meng:
A Fault-Tolerant Strategy of Redeploying the Lost Replicas in Cloud. 370-375 - Wei Xiong, Wei-Tek Tsai:
HLA-Based SaaS-Oriented Simulation Frameworks. 376-383 - Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato:
Malicious Behavior Patterns. 384-389 - Parth Bhatt, Edgar Toshiro Yano, Per M. Gustavsson:
Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks. 390-395 - John S. Atkinson, John E. Mitchell, Miguel Rio, George Matich:
Your WiFi Is Leaking: Building a Low-Cost Device to Infer User Activities. 396-397 - Peter T. Breuer, Jonathan P. Bowen:
Empirical Patterns in Google Scholar Citation Counts. 398-403 - Abdullah A. H. Alzahrani, Amnon H. Eden, Majd Zohri Yafi:
Structural Analysis of the Check Point Pattern. 404-408 - Aniket Kulkarni, Ravindra Metta:
A New Code Obfuscation Scheme for Software Protection. 409-414 - Paul Smith, Alberto E. Schaeffer Filho:
Management Patterns for Smart Grid Resilience. 415-416 - Andrew Blyth:
Understanding Security Patterns for Socio-technical Systems via Responsibility Modelling. 417-421 - Benjamin Aziz, Clive Blackwell:
Using Security Patterns for Modelling Security Capabilities in Grid Systems. 422-427 - Ishbel Duncan, Jan de Muijnck-Hughes:
Security Pattern Evaluation. 428-429 - Chih-Han Chu, Menghsi Wan, Yufan Yang, Jerry Gao, Lei Deng:
Building On-demand Marketing SaaS for Crowdsourcing. 430-438 - Gianmario Motta, Linlin You, Daniele Sacco, Tianyi Ma:
CITY FEED: A Crowdsourcing System for City Governance. 439-445 - Zhenghui Hu, Wenjun Wu:
A Game Theoretic Model of Software Crowdsourcing. 446-453 - Wei-Tek Tsai, Guanqiu Qi:
A Cloud-Based Platform for Crowdsourcing and Self-Organizing Learning. 454-458 - Andrew Hugill:
Creative Computing Processes: Musical Composition. 459-464 - Jerry Fishenden:
Interactive Palimpsests. 465-469 - Runjie Liu, Hongji Yang:
Chaos and Fractal for Creative Computing. 470-473 - R. Madhusudhan, Rohith Kumar S.:
Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards. 474-477 - Suaad S. Alarifi, Stephen D. Wolthusen:
Mitigation of Cloud-Internal Denial of Service Attacks. 478-483 - Glenford E. Mapp, Mahdi Aiash, Brian Ondiege, Malcolm Clarke:
Exploring a New Security Framework for Cloud Storage Using Capabilities. 484-489 - Euijin Choo, Younghee Park, Huzefa Siyamwala:
Identifying Malicious Metering Data in Advanced Metering Infrastructure. 490-495 - Hongjun Dai, Qian Li, Meikang Qiu, Zhilou Yu, Zhiping Jia:
A Cloud Trust Authority Framework for Mobile Enterprise Information System. 496-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.