The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Provides an abstract for each of the keynote presentations and may include a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
Existing Web API search engines allow for only category-based browsing and keyword or tag-based searches for RESTful services without offering the capability of discovering and composing real-world RESTful services from the viewpoint of application developers. Therefore, we propose a novel approach, referred to as TAD (Transformation-Annotation-Discovery), to address the above issue. TAD firstly transforms...
Industrie 4.0 aims at flexible production networks that require horizontal integration across companies. Evidently, any production related information exchanged in the network must be vertically forwarded to the corresponding service endpoints of the local production system. Accordingly, there is a need to align information that flows between companies and within each company. The Resource-Event-Agent...
Verification is a costly task, sometimes burdensome and tedious, requiring strong formal background. To reduce the effort and cost invested in verification, we developed a modeldriven approach for automatic verification of service properties, done in the early service design phase. Our approach is based on SEAM, a service modeling method, and it incorporates a verification system called Leon. With...
With increasing evidence on the breadth and potency of side-channel attacks based on resource sharing, virtual machine (VM) placement in infrastructure cloud services, such as Amazon EC2, has become an important security problem. In this paper, we present a new approach to this problem by letting users specify their own trust profiles, and then incorporating such information into VM placement decisions...
Large scale graph processing represents an interesting challenge due to the characteristics of the graph structure. Generally, a distributed graph processing framework is a better choice for large graphs with billions of edges. However, traditional iterative computation models like BSP under-perform due to large communication overheads and slow iterative convergence in a distributed environment. Here,...
Today, workflows are executed in heterogeneous environments, such as the Internet, to automate interactions with services of business partners and other third parties. In such heterogeneous environments, device and communication failures occur frequently. These failures might delay or even stop the workflow executions rendering the workflow unavailable. For ensuring availability, workflow executions...
Multi-GPUs nodes are becoming the platform of choice for graph processing. However, in the multiple GPUs environment, there are two main challenges in designing a graph processing system. First, the system suffers from huge communication overhead. GPUs and CPUs are connected through PCIe, whose bandwidth is far smaller than that of GPU memory. Second, the system is developed based on BSP (Bulk Synchronous...
The proliferation of web services and the wide choice of Web technologies has resulted in the increasing use of web browsers by service-oriented applications. To decrease the overloading of websites and thus make them more attractive for SOA applications, various solutions to deliver content and resources through web browsers are considered. Among existing approaches, WebRTC is used for the P2P content...
The main objective of this paper is to show that large-scale sensor data collection is feasible while relying on vehicles to collect and deliver data to a relatively small number of static nodes on the roadside infrastructure. The proposed technology is based on simple 802.11 beacons (as opposed to 802.15 WAVE and 802.11p and others) which are accessible on common smartphones and are comparatively...
We present a compilation tool SBVR2Alloy which is used to automatically generate as well as validate service choreographies specified in structured natural language. The proposed approach builds on a model transformation between Semantics of Business Vocabulary and Rules (SBVR), an OMG standard for specifying business models in structured English, and the Alloy Analyzer which is a SAT based constraint...
Modern software applications are increasingly deployed and distributed on infrastructures in the Cloud, and then offered as a service. Before the deployment process happens, these applications are being manually - or with some predefined scripts - composed from various smaller interdependent components. With the increase in demand for, and complexity of applications, the composition process becomes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.