


default search action
SOSE 2014: Oxford, UK
- 8th IEEE International Symposium on Service Oriented System Engineering, SOSE 2014, Oxford, United Kingdom, April 7-11, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3616-8

- Paraskevi Zerva, Steffen Zschaler, Simon Miles:

A Provenance Model of Composite Services in Service-Oriented Environments. 1-12 - Christian Inzinger

, Stefan Nastic
, Sanjin Sehic, Michael Vögler, Fei Li, Schahram Dustdar
:
MADCAT: A Methodology for Architecture and Deployment of Cloud Application Topologies. 13-22 - Kahina Hamadache, Paraskevi Zerva:

Provenance of Feedback in Cloud Services. 23-34 - Wei-Tek Tsai, Jie Luo, Guanqiu Qi

, Wenjun Wu:
Concurrent Test Algebra Execution with Combinatorial Testing. 35-46 - Emmanouela Stachtiari, Nikos Vesyropoulos, George Kourouleas, Christos K. Georgiadis

, Panagiotis Katsaros
:
Correct-by-Construction Web Service Architecture. 47-58 - Wenjun Wu, Wei-Tek Tsai, Chao Jin, Guanqiu Qi

, Jie Luo:
Test-Algebra Execution in a Cloud Environment. 59-69 - Dongmei Liu, Hong Zhu, Ian Bayley:

SOFIA: An Algebraic Specification Language for Developing Services. 70-75 - Keith de Souza, Marcelo Fantinato

:
WS&i*-RGPS: An Approach to Service-Oriented Requirements Engineering Based on RGPS Metamodels. 76-81 - Zhaoning Zhang, Ziyang Li, Kui Wu, Huiba Li, Yuxing Peng, Xicheng Lu:

DLSM: Decoupled Live Storage Migration with Distributed Device Mapper Storage. 82-89 - Salwa Mohamed Alzahmi, Mohammad Abu-Matar, Rabeb Mizouni

:
A Practical Tool for Automating Service Oriented Software Product Lines Derivation. 90-97 - Carolina Melo, Marcelo Fantinato

, Violeta Sun
, Edmir P. V. Prado:
Towards an Organizational Strategic Alignment Driven by Business Level Agreements. 98-109 - Yuqun Zhang, Dewayne E. Perry:

A Goal-Directed Modeling Technique towards Business Process. 110-121 - Marco Comuzzi

, Ruben Ivan Rafael Martinez:
Customized Infrastructures for Monitoring Business Processes. 122-127 - Wei-Tek Tsai, Peide Zhong:

Multi-tenancy and Sub-tenancy Architecture in Software-as-a-Service (SaaS). 128-139 - Hailong Sun, Tao Zhao, Yu Tang, Xudong Liu:

A QoS-Aware Load Balancing Policy in Multi-tenancy Environment. 140-147 - Basel Yousef, Hong Zhu, Muhammad Younas:

Tenant Level Checkpointing of Meta-data for Multi-tenancy SaaS. 148-153 - Jihad Kheireddine Itani, Eric Gouardères, Philippe Aniorté:

Online Community Evolution Using Mediation System in SOA. 154-155 - Yingchao Zhang, Zhiping Jiang, Xiaohao Yu, Xiaoqiang Song:

Mapping Services to Activities in Service Oriented Architecture (SOA) Design: A Simulation-Driven Optimizing Method Based on DODAF2.0. 156-157 - David Webster, Paul Townend, Jie Xu:

Restructuring Web Service Interfaces to Support Evolution. 158-159 - Badis Djamaa

, Mark A. Richardson
, Nabil Aouf
, Bob Walters:
Service Discovery in 6LoWPANs: Classification and Challenges. 160-161 - Jia Zhang, Chris Lee, Sean Xiao, Petr Votava, Tsengdar J. Lee, Ramakrishna R. Nemani, Ian T. Foster:

A Community-Driven Workflow Recommendations and Reuse Infrastructure. 162-172 - Xinyi Liu, Hailong Sun, Hanxiong Wu, Richong Zhang, Xudong Liu:

Using Sequential Pattern Mining and Interactive Recommendation to Assist Pipe-like Mashup Development. 173-180 - Richard K. Lomotey, Ralph Deters

:
Towards Knowledge Discovery in Big Data. 181-191 - Naushin Nower, Yasuo Tan, Azman Osman Lim:

Efficient Temporal and Spatial Data Recovery Scheme for Stochastic and Incomplete Feedback Data of Cyber-physical Systems. 192-197 - Pierre De Vettor, Michael Mrissa

, Djamal Benslimane, Salim Berbar:
A Service Oriented Architecture for Linked Data Integration. 198-203 - Mazedur Rahman, Samira Iqbal, Jerry Gao:

Load Balancer as a Service in Cloud Computing. 204-211 - Yuan-Hsin Tung, Chen-Chiu Lin, Hwai-Ling Shan:

Test as a Service: A Framework for Web Security TaaS Service in Cloud Environment. 212-217 - Stefan Kolb

, Guido Wirtz
:
Towards Application Portability in Platform as a Service. 218-229 - Dong Sun, Rong Peng, Wei-Tek Tsai:

Understanding Requirements Driven Architecture Evolution in Social Networking SaaS: An Industrial Case Study. 230-236 - Davide Brugali, Andrea Fernandes da Fonseca, Andrea Luzzana, Yamuna Maccarana:

Developing Service Oriented Robot Control System. 237-242 - Yan Li, Jinhua Xiong, Xinran Liu, Hong Zhang, Peng Zhang:

Folksonomy-Based In-Depth Annotation of Web Services. 243-249 - Zhen Zhang, Zhiyong Feng, Shizhan Chen:

Domain-Oriented Evaluation and Prediction for Documentation Quality of Web Services. 250-257 - Jonas Keppeler, Philipp Brune, Heiko Gewald:

A Description and Retrieval Model for Web Services Including Extended Semantic and Commercial Attributes. 258-265 - Jingwen Zhou, Zhenbang Chen, Haibo Mi, Ji Wang:

MTracer: A Trace-Oriented Monitoring Framework for Medium-Scale Distributed Systems. 266-271 - Li Zhao, Ge Fu, Qian Liu, Xinran Liu, Wei Cao:

A PCA-Based Traffic Monitoring Approach for Distributed Computing Systems. 272-277 - Hanglong Zhan, Lianghuan Kang, Donggang Cao:

DETS: A Dynamic and Elastic Task Scheduler Supporting Multiple Parallel Schemes. 278-283 - Zheng Han, Rui Chu, Haibo Mi, Huaimin Wang:

Elastic Allocator: An Adaptive Task Scheduler for Streaming Query in the Cloud. 284-289 - Pinjia He, Jieming Zhu, Jianlong Xu, Michael R. Lyu:

A Hierarchical Matrix Factorization Approach for Location-Based Web Service QoS Prediction. 290-295 - Ziyang Li, Zhaoning Zhang, Huiba Li, Yuxing Peng:

CoCache: Multi-layer Multi-path Cooperative Cache Accelerating the Deployment of Large Scale Virtual Machines. 296-301 - Haibo Mi, Huaimin Wang, Zhenbang Chen, Yangfan Zhou:

Automatic Detecting Performance Bugs in Cloud Computing Systems via Learning Latency Specification Model. 302-307 - Weidong Sun, Yijie Wang, Yongquan Fu

, Xiaoqiang Pei:
A Discrete Data Dividing Approach for Erasure-Code-Based Storage Applications. 308-313 - Yumei Huang, Renyu Yang, Lei Cui, Tianyu Wo, Chunming Hu, Bo Li:

VMCSnap: Taking Snapshots of Virtual Machine Cluster with Memory Deduplication. 314-319 - Waraporn Leesakul, Paul Townend, Jie Xu:

Dynamic Data Deduplication in Cloud Storage. 320-325 - Yan Ding, Huaimin Wang, Songzheng Chen, Xiaodong Tang, Hongyi Fu, Peichang Shi:

PIIM: Method of Identifying Malicious Workers in the MapReduce System with an Open Environment. 326-331 - Ge Hu, Ting Li, Hang Dong, Hewei Yu, Miao Zhang:

Malicious Code Detection for Android Using Instruction Signatures. 332-337 - Yonggang Wang, Shan Yao, Jing Li, Zhongfei Xia, Hanbing Yan, Junfeng Xu:

ReSpam: A Novel Reputation Based Mechanism of Defending against Tag Spam in Social Computing. 338-343 - Hussain Aljahdali, Abdulaziz Albatli, Peter Garraghan

, Paul Townend, Lydia Lau, Jie Xu:
Multi-tenancy in Cloud Computing. 344-351 - Yingpu Zhu, Lu Liu

, John Panneerselvam
, Liangmin Wang, Zhiyuan Li:
Credit-Based Incentives in Vehicular Ad Hoc Networks. 352-357 - Wenjun Wu, Chao Jin:

Customizing Scientific Data Analytic Platforms via SaaS Approach. 358-364 - Wenbo Su, Chuang Lin, Kun Meng, Qu Liu:

Modeling and Analysis of Availability for SaaS Multi-tenant Architecture. 365-369 - Ning Wang, Yang Yang, Zhenqiang Mi, Qing Ji, Kun Meng:

A Fault-Tolerant Strategy of Redeploying the Lost Replicas in Cloud. 370-375 - Wei Xiong, Wei-Tek Tsai:

HLA-Based SaaS-Oriented Simulation Frameworks. 376-383 - Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato:

Malicious Behavior Patterns. 384-389 - Parth Bhatt, Edgar Toshiro Yano, Per M. Gustavsson

:
Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks. 390-395 - John S. Atkinson, John E. Mitchell, Miguel Rio, George Matich:

Your WiFi Is Leaking: Building a Low-Cost Device to Infer User Activities. 396-397 - Peter T. Breuer

, Jonathan P. Bowen
:
Empirical Patterns in Google Scholar Citation Counts. 398-403 - Abdullah A. H. Alzahrani, Amnon H. Eden, Majd Zohri Yafi:

Structural Analysis of the Check Point Pattern. 404-408 - Aniket Kulkarni, Ravindra Metta:

A New Code Obfuscation Scheme for Software Protection. 409-414 - Paul Smith

, Alberto E. Schaeffer Filho
:
Management Patterns for Smart Grid Resilience. 415-416 - Andrew Blyth:

Understanding Security Patterns for Socio-technical Systems via Responsibility Modelling. 417-421 - Benjamin Aziz

, Clive Blackwell:
Using Security Patterns for Modelling Security Capabilities in Grid Systems. 422-427 - Ishbel Duncan

, Jan de Muijnck-Hughes
:
Security Pattern Evaluation. 428-429 - Chih-Han Chu, Menghsi Wan, Yufan Yang, Jerry Gao, Lei Deng:

Building On-demand Marketing SaaS for Crowdsourcing. 430-438 - Gianmario Motta, Linlin You

, Daniele Sacco, Tianyi Ma:
CITY FEED: A Crowdsourcing System for City Governance. 439-445 - Zhenghui Hu, Wenjun Wu:

A Game Theoretic Model of Software Crowdsourcing. 446-453 - Wei-Tek Tsai, Guanqiu Qi

:
A Cloud-Based Platform for Crowdsourcing and Self-Organizing Learning. 454-458 - Andrew Hugill

:
Creative Computing Processes: Musical Composition. 459-464 - Jerry Fishenden:

Interactive Palimpsests. 465-469 - Runjie Liu, Hongji Yang:

Chaos and Fractal for Creative Computing. 470-473 - R. Madhusudhan

, Rohith Kumar S.:
Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards. 474-477 - Suaad S. Alarifi

, Stephen D. Wolthusen:
Mitigation of Cloud-Internal Denial of Service Attacks. 478-483 - Glenford E. Mapp, Mahdi Aiash, Brian Ondiege

, Malcolm Clarke
:
Exploring a New Security Framework for Cloud Storage Using Capabilities. 484-489 - Euijin Choo, Younghee Park, Huzefa Siyamwala:

Identifying Malicious Metering Data in Advanced Metering Infrastructure. 490-495 - Hongjun Dai, Qian Li, Meikang Qiu, Zhilou Yu, Zhiping Jia:

A Cloud Trust Authority Framework for Mobile Enterprise Information System. 496-501

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














