Default Cover Image

2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE)

April 7 2014 to April 11 2014

Oxford, United Kingdom

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xi
Message from the General ChairsFreely available from IEEE.pp. xii-xii
Message from the Technical Program Committee Co-ChairsFreely available from IEEE.pp. xiii-xiii
Organizing CommitteeFreely available from IEEE.pp. xiv-xiv
Program Committee MembersFreely available from IEEE.pp. xv-xvi
A Provenance Model of Composite Services in Service-Oriented EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Provenance of Feedback in Cloud ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 23-34
Concurrent Test Algebra Execution with Combinatorial TestingFull-text access may be available. Sign in or learn about subscription options.pp. 35-46
Correct-by-Construction Web Service ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 47-58
Test-Algebra Execution in a Cloud EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 59-69
SOFIA: An Algebraic Specification Language for Developing ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 70-75
WS&i*-RGPS: An Approach to Service-Oriented Requirements Engineering Based on RGPS MetamodelsFull-text access may be available. Sign in or learn about subscription options.pp. 76-81
DLSM: Decoupled Live Storage Migration with Distributed Device Mapper StorageFull-text access may be available. Sign in or learn about subscription options.pp. 82-89
A Practical Tool for Automating Service Oriented Software Product Lines DerivationFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
Towards an Organizational Strategic Alignment Driven by Business Level AgreementsFull-text access may be available. Sign in or learn about subscription options.pp. 98-109
A Goal-Directed Modeling Technique towards Business ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 110-121
Customized Infrastructures for Monitoring Business ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 122-127
Multi-tenancy and Sub-tenancy Architecture in Software-as-a-Service (SaaS)Full-text access may be available. Sign in or learn about subscription options.pp. 128-139
A QoS-Aware Load Balancing Policy in Multi-tenancy EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 140-147
Tenant Level Checkpointing of Meta-data for Multi-tenancy SaaSFull-text access may be available. Sign in or learn about subscription options.pp. 148-153
Online Community Evolution Using Mediation System in SOAFull-text access may be available. Sign in or learn about subscription options.pp. 154-155
Restructuring Web Service Interfaces to Support EvolutionFull-text access may be available. Sign in or learn about subscription options.pp. 158-159
Service Discovery in 6LoWPANs: Classification and ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 160-161
A Community-Driven Workflow Recommendations and Reuse InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 162-172
Towards Knowledge Discovery in Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 181-191
A Service Oriented Architecture for Linked Data IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
Load Balancer as a Service in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 204-211
Test as a Service: A Framework for Web Security TaaS Service in Cloud EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 212-217
Towards Application Portability in Platform as a ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 218-229
Understanding Requirements Driven Architecture Evolution in Social Networking SaaS: An Industrial Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 230-236
Developing Service Oriented Robot Control SystemFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
Folksonomy-Based In-Depth Annotation of Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 243-249
Domain-Oriented Evaluation and Prediction for Documentation Quality of Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 250-257
A Description and Retrieval Model for Web Services Including Extended Semantic and Commercial AttributesFull-text access may be available. Sign in or learn about subscription options.pp. 258-265
MTracer: A Trace-Oriented Monitoring Framework for Medium-Scale Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 266-271
A PCA-Based Traffic Monitoring Approach for Distributed Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
DETS: A Dynamic and Elastic Task Scheduler Supporting Multiple Parallel SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 278-283
Elastic Allocator: An Adaptive Task Scheduler for Streaming Query in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 284-289
A Hierarchical Matrix Factorization Approach for Location-Based Web Service QoS PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
A Discrete Data Dividing Approach for Erasure-Code-Based Storage ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 308-313
VMCSnap: Taking Snapshots of Virtual Machine Cluster with Memory DeduplicationFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
Dynamic Data Deduplication in Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
Malicious Code Detection for Android Using Instruction SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
ReSpam: A Novel Reputation Based Mechanism of Defending against Tag Spam in Social ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 338-343
Multi-tenancy in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 344-351
Credit-Based Incentives in Vehicular Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 352-357
Customizing Scientific Data Analytic Platforms via SaaS ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 358-364
Modeling and Analysis of Availability for SaaS Multi-tenant ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 365-369
A Fault-Tolerant Strategy of Redeploying the Lost Replicas in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 370-375
HLA-Based SaaS-Oriented Simulation FrameworksFull-text access may be available. Sign in or learn about subscription options.pp. 376-383
Malicious Behavior PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 384-389
Towards a Framework to Detect Multi-stage Advanced Persistent Threats AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 390-395
Your WiFi Is Leaking: Building a Low-Cost Device to Infer User ActivitiesFull-text access may be available. Sign in or learn about subscription options.pp. 396-397
Empirical Patterns in Google Scholar Citation CountsFull-text access may be available. Sign in or learn about subscription options.pp. 398-403
Structural Analysis of the Check Point PatternFull-text access may be available. Sign in or learn about subscription options.pp. 404-408
A New Code Obfuscation Scheme for Software ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 409-414
Management Patterns for Smart Grid ResilienceFull-text access may be available. Sign in or learn about subscription options.pp. 415-416
Understanding Security Patterns for Socio-technical Systems via Responsibility ModellingFull-text access may be available. Sign in or learn about subscription options.pp. 417-421
Using Security Patterns for Modelling Security Capabilities in Grid SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 422-427
Security Pattern EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 428-429
Building On-demand Marketing SaaS for CrowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 430-438
CITY FEED: A Crowdsourcing System for City GovernanceFull-text access may be available. Sign in or learn about subscription options.pp. 439-445
A Game Theoretic Model of Software CrowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 446-453
A Cloud-Based Platform for Crowdsourcing and Self-Organizing LearningFull-text access may be available. Sign in or learn about subscription options.pp. 454-458
Creative Computing Processes: Musical CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 459-464
Interactive PalimpsestsFull-text access may be available. Sign in or learn about subscription options.pp. 465-469
Chaos and Fractal for Creative ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 470-473
Cryptanalysis of a Remote User Authentication Protocol Using Smart CardsFull-text access may be available. Sign in or learn about subscription options.pp. 474-477
Mitigation of Cloud-Internal Denial of Service AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 478-483
Exploring a New Security Framework for Cloud Storage Using CapabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 484-489
Identifying Malicious Metering Data in Advanced Metering InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 490-495
A Cloud Trust Authority Framework for Mobile Enterprise Information SystemFull-text access may be available. Sign in or learn about subscription options.pp. 496-501
Author indexFreely available from IEEE.pp. 502-504
[Publisher's information]Freely available from IEEE.pp. 506-506
Showing 84 out of 84