Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SOSE
SOSE 2014
Generate Citations
2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE)
April 7 2014 to April 11 2014
Oxford, United Kingdom
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-xi
Message from the General Chairs
Freely available from IEEE.
pp. xii-xii
Message from the Technical Program Committee Co-Chairs
Freely available from IEEE.
pp. xiii-xiii
Organizing Committee
Freely available from IEEE.
pp. xiv-xiv
Program Committee Members
Freely available from IEEE.
pp. xv-xvi
A Provenance Model of Composite Services in Service-Oriented Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Paraskevi Zerva
,
Steffen Zschaler
,
Simon Miles
MADCAT: A Methodology for Architecture and Deployment of Cloud Application Topologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-22
by
Christian Inzinger
,
Stefan Nastic
,
Sanjin Sehic
,
Michael Vogler
,
Fei Li
,
Schahram Dustdar
Provenance of Feedback in Cloud Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-34
by
Kahina Hamadache
,
Paraskevi Zerva
Concurrent Test Algebra Execution with Combinatorial Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-46
by
Wei-Tek Tsai
,
Jie Luo
,
Guanqiu Qi
,
Wenjun Wu
Correct-by-Construction Web Service Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-58
by
Emmanouela Stachtiari
,
Nikos Vesyropoulos
,
George Kourouleas
,
Christos K. Georgiadis
,
Panagiotis Katsaros
Test-Algebra Execution in a Cloud Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-69
by
Wenjun Wu
,
Wei-Tek Tsai
,
Chao Jin
,
Guanqiu Qi
,
Jie Luo
SOFIA: An Algebraic Specification Language for Developing Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-75
by
Dongmei Liu
,
Hong Zhu
,
Ian Bayley
WS&i*-RGPS: An Approach to Service-Oriented Requirements Engineering Based on RGPS Metamodels
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-81
by
Keith de Souza
,
Marcelo Fantinato
DLSM: Decoupled Live Storage Migration with Distributed Device Mapper Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-89
by
Zhaoning Zhang
,
Ziyang Li
,
Kui Wu
,
Huiba Li
,
Yuxing Peng
,
Xicheng Lu
A Practical Tool for Automating Service Oriented Software Product Lines Derivation
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-97
by
Salwa Mohamed Alzahmi
,
Mohammad Abu-Matar
,
Rabeb Mizouni
Towards an Organizational Strategic Alignment Driven by Business Level Agreements
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-109
by
Carolina Melo
,
Marcelo Fantinato
,
Violeta Sun
,
Edmir P.V. Prado
A Goal-Directed Modeling Technique towards Business Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-121
by
Yuqun Zhang
,
Dewayne E. Perry
Customized Infrastructures for Monitoring Business Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-127
by
Marco Comuzzi
,
Ruben Ivan Rafael Martinez
Multi-tenancy and Sub-tenancy Architecture in Software-as-a-Service (SaaS)
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-139
by
Wei-Tek Tsai
,
Peide Zhong
A QoS-Aware Load Balancing Policy in Multi-tenancy Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-147
by
Hailong Sun
,
Tao Zhao
,
Yu Tang
,
Xudong Liu
Tenant Level Checkpointing of Meta-data for Multi-tenancy SaaS
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-153
by
Basel Yousef
,
Hong Zhu
,
Muhammad Younas
Online Community Evolution Using Mediation System in SOA
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-155
by
Jihad Kheireddine Itani
,
Eric Gouarderes
,
Philippe Aniorte
Mapping Services to Activities in Service Oriented Architecture (SOA) Design: A Simulation-Driven Optimizing Method Based on DODAF2.0
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-157
by
Yingchao Zhang
,
Zhiping Jiang
,
Xiaohao Yu
,
Xiaoqiang Song
Restructuring Web Service Interfaces to Support Evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-159
by
David Webster
,
Paul Townend
,
Jie Xu
Service Discovery in 6LoWPANs: Classification and Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-161
by
Badis Djamaa
,
Mark Richardson
,
Nabil Aouf
,
Bob Walters
A Community-Driven Workflow Recommendations and Reuse Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-172
by
Jia Zhang
,
Chris Lee
,
Sean Xiao
,
Petr Votava
,
Tsengdar J. Lee
,
Ramakrishna Nemani
,
Ian Foster
Using Sequential Pattern Mining and Interactive Recommendation to Assist Pipe-like Mashup Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-180
by
Liu Xinyi
,
Sun Hailong
,
Wu Hanxiong
,
Zhang Richong
,
Liu Xudong
Towards Knowledge Discovery in Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-191
by
Richard K. Lomotey
,
Ralph Deters
Efficient Temporal and Spatial Data Recovery Scheme for Stochastic and Incomplete Feedback Data of Cyber-physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-197
by
Naushin Nower
,
Yasuo Tan
,
Azman Osman Lim
A Service Oriented Architecture for Linked Data Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-203
by
Pierre De Vettor
,
Michael Mrissa
,
Djamal Benslimane
,
Salim Berbar
Load Balancer as a Service in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-211
by
Mazedur Rahman
,
Samira Iqbal
,
Jerry Gao
Test as a Service: A Framework for Web Security TaaS Service in Cloud Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-217
by
Yuan-Hsin Tung
,
Chen-Chiu Lin
,
Hwai-Ling Shan
Towards Application Portability in Platform as a Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-229
by
Stefan Kolb
,
Guido Wirtz
Understanding Requirements Driven Architecture Evolution in Social Networking SaaS: An Industrial Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-236
by
Dong Sun
,
Rong Peng
,
Wei-Tek Tsai
Developing Service Oriented Robot Control System
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-242
by
Davide Brugali
,
Andrea Fernandes da Fonseca
,
Andrea Luzzana
,
Yamuna Maccarana
Folksonomy-Based In-Depth Annotation of Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-249
by
Yan Li
,
Jinhua Xiong
,
Xinran Liu
,
Hong Zhang
,
Peng Zhang
Domain-Oriented Evaluation and Prediction for Documentation Quality of Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-257
by
Zhen Zhang
,
Zhiyong Feng
,
Shizhan Chen
A Description and Retrieval Model for Web Services Including Extended Semantic and Commercial Attributes
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-265
by
Jonas Keppeler
,
Philipp Brune
,
Heiko Gewald
MTracer: A Trace-Oriented Monitoring Framework for Medium-Scale Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-271
by
Jingwen Zhou
,
Zhenbang Chen
,
Haibo Mi
,
Ji Wang
A PCA-Based Traffic Monitoring Approach for Distributed Computing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-277
by
Li Zhao
,
Ge Fu
,
Qian Liu
,
Xinran Liu
,
Wei Cao
DETS: A Dynamic and Elastic Task Scheduler Supporting Multiple Parallel Schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-283
by
Hanglong Zhan
,
Lianghuan Kang
,
Donggang Cao
Elastic Allocator: An Adaptive Task Scheduler for Streaming Query in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 284-289
by
Zheng Han
,
Rui Chu
,
Haibo Mi
,
Huaimin Wang
A Hierarchical Matrix Factorization Approach for Location-Based Web Service QoS Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-295
by
Pinjia He
,
Jieming Zhu
,
Jianlong Xu
,
Michael R. Lyu
CoCache: Multi-layer Multi-path Cooperative Cache Accelerating the Deployment of Large Scale Virtual Machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-301
by
Ziyang Li
,
Zhaoning Zhang
,
Huiba Li
,
Yuxing Peng
Automatic Detecting Performance Bugs in Cloud Computing Systems via Learning Latency Specification Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-307
by
Haibo Mi
,
Huaimin Wang
,
Zhenbang Chen
,
Yangfan Zhou
A Discrete Data Dividing Approach for Erasure-Code-Based Storage Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-313
by
Weidong Sun
,
Yijie Wang
,
Yongquan Fu
,
Xiaoqiang Pei
VMCSnap: Taking Snapshots of Virtual Machine Cluster with Memory Deduplication
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-319
by
Yumei Huang
,
Renyu Yang
,
Lei Cui
,
Tianyu Wo
,
Chunming Hu
,
Bo Li
Dynamic Data Deduplication in Cloud Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-325
by
Waraporn Leesakul
,
Paul Townend
,
Jie Xu
PIIM: Method of Identifying Malicious Workers in the MapReduce System with an Open Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-331
by
Yan Ding
,
Huaimin Wang
,
Songzheng Chen
,
Xiaodong Tang
,
Hongyi Fu
,
Peichang Shi
Malicious Code Detection for Android Using Instruction Signatures
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-337
by
Hu Ge
,
Li Ting
,
Dong Hang
,
Yu Hewei
,
Zhang Miao
ReSpam: A Novel Reputation Based Mechanism of Defending against Tag Spam in Social Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-343
by
Yonggang Wang
,
Shan Yao
,
Jing Li
,
Zhongfei Xia
,
Hanbing Yan
,
Junfeng Xu
Multi-tenancy in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-351
by
Hussain AlJahdali
,
Abdulaziz Albatli
,
Peter Garraghan
,
Paul Townend
,
Lydia Lau
,
Jie Xu
Credit-Based Incentives in Vehicular Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-357
by
Yingpu Zhu
,
Lu Liu
,
John Panneerselvam
,
Liangmin Wang
,
Zhiyuan Li
Customizing Scientific Data Analytic Platforms via SaaS Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-364
by
Wenjun Wu
,
Chao Jin
Modeling and Analysis of Availability for SaaS Multi-tenant Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-369
by
Wenbo Su
,
Chuang Lin
,
Kun Meng
,
Qu Liu
A Fault-Tolerant Strategy of Redeploying the Lost Replicas in Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-375
by
Ning Wang
,
Yang Yang
,
Zhenqiang Mi
,
Qing Ji
,
Kun Meng
HLA-Based SaaS-Oriented Simulation Frameworks
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-383
by
Wei Xiong
,
Wei-Tek Tsai
Malicious Behavior Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-389
by
Hermann Dornhackl
,
Konstantin Kadletz
,
Robert Luh
,
Paul Tavolato
Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-395
by
Parth Bhatt
,
Edgar Toshiro Yano
,
Per Gustavsson
Your WiFi Is Leaking: Building a Low-Cost Device to Infer User Activities
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-397
by
John S. Atkinson
,
John E. Mitchell
,
Miguel Rio
,
George Matich
Empirical Patterns in Google Scholar Citation Counts
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-403
by
Peter T. Breuer
,
Jonathan P. Bowen
Structural Analysis of the Check Point Pattern
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-408
by
Abdullah A.H. Alzahrani
,
Amnon H. Eden
,
Majd Zohri Yafi
A New Code Obfuscation Scheme for Software Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-414
by
Aniket Kulkarni
,
Ravindra Metta
Management Patterns for Smart Grid Resilience
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-416
by
Paul Smith
,
Alberto Schaeffer-Filho
Understanding Security Patterns for Socio-technical Systems via Responsibility Modelling
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-421
by
Andrew Blyth
Using Security Patterns for Modelling Security Capabilities in Grid Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-427
by
Benjamin Aziz
,
Clive Blackwell
Security Pattern Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 428-429
by
Ishbel Duncan
,
Jan de Muijnck-Hughes
Building On-demand Marketing SaaS for Crowdsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-438
by
Chih-Han Chu
,
Menghsi Wan
,
Yufan Yang
,
Jerry Gao
,
Lei Deng
CITY FEED: A Crowdsourcing System for City Governance
Full-text access may be available. Sign in or learn about subscription options.
pp. 439-445
by
Gianmario Motta
,
Linlin You
,
Daniele Sacco
,
Tianyi Ma
A Game Theoretic Model of Software Crowdsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 446-453
by
Zhenghui Hu
,
Wenjun Wu
A Cloud-Based Platform for Crowdsourcing and Self-Organizing Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 454-458
by
Wei-Tek Tsai
,
Guanqiu Qi
Creative Computing Processes: Musical Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-464
by
Andrew Hugill
Interactive Palimpsests
Full-text access may be available. Sign in or learn about subscription options.
pp. 465-469
by
Jerry Fishenden
Chaos and Fractal for Creative Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-473
by
Runjie Liu
,
Hongji Yang
Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards
Full-text access may be available. Sign in or learn about subscription options.
pp. 474-477
by
R. Madhusudhan
,
Rohith Kumar S.
Mitigation of Cloud-Internal Denial of Service Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 478-483
by
Suaad Alarifi
,
Stephen D. Wolthusen
Exploring a New Security Framework for Cloud Storage Using Capabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 484-489
by
Glenford Mapp
,
Mahdi Aiash
,
Brian Ondiege
,
Malcolm Clarke
Identifying Malicious Metering Data in Advanced Metering Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 490-495
by
Euijin Choo
,
Younghee Park
,
Huzefa Siyamwala
A Cloud Trust Authority Framework for Mobile Enterprise Information System
Full-text access may be available. Sign in or learn about subscription options.
pp. 496-501
by
Hongjun Dai
,
Qian Li
,
Meikang Qiu
,
Zhilou Yu
,
Zhiping Jia
Author index
Freely available from IEEE.
pp. 502-504
[Publisher's information]
Freely available from IEEE.
pp. 506-506
Showing 84 out of 84