In order to improve the effectiveness of the artificial intelligence (AI) planning based web service composition problem, a business domain oriented AI planning algorithm for web service composition is introduced. T...In order to improve the effectiveness of the artificial intelligence (AI) planning based web service composition problem, a business domain oriented AI planning algorithm for web service composition is introduced. The algorithm uses the proposed business relation model to minimize the searching space and uses the proposed goal distance as a heuristic rule. Compared with other algorithms tackling web service composition such as AI planning, the proposed algorithm focuses not only on how to convert the web service composition problem to the AI planning problem, but also exerts its effort on how to apply the business feature of web service composition into planning in order to improve the effectiveness. The experiment shows the better performance of the proposed algorithm.展开更多
In order to formally reason and verify web services composition described by web services choreography specification WS-CDL,a typed formal model named typed Abstract WS-CDL(web services choreography description langu...In order to formally reason and verify web services composition described by web services choreography specification WS-CDL,a typed formal model named typed Abstract WS-CDL(web services choreography description language)for WS-CDL specifications is proposed.In typed Abstract WS-CDL,the syntax of type and session,typing rules and operational semantics are formalized;the collaborations of web services are formally described by sessions;the operational semantics of a session can help to formally reason the execution of the choreography;the typing rules can help to formally check the data type consistency of exchanged information between web services and capture run-time errors due to type mismatches.Particularly,the concepts of type assumption set extension and type assumption set compatibility are proposed,and the merging algorithm of type assumption sets is defined so as to eliminate type assumption conflict.Based on the formal model,typed mapping rules for mapping web services choreography to orchestration is also defined.With the typed mapping rules,orchestration stubs and their type assumption sets can be generated from a given choreography; thus, web services composition can be verified at choreography and orchestration levels,respectively.The model is proved to have properties of type safety,and how the model can help to reason and verify web services composition is illustrated through a case study.展开更多
The goal of web service composition is to choose an optimal scheme according to Quantity of Service (QoS) which selects instances in a distributed network. The networks are clustered with some web services such as o...The goal of web service composition is to choose an optimal scheme according to Quantity of Service (QoS) which selects instances in a distributed network. The networks are clustered with some web services such as ontologies, algorithms and rule engines with similar function and interfaces. In this scheme, web services acted as candidate service construct a distributed model which can't obtain the global services' information. The model is utilized to choose instances according to local QoS information in the progress of service composition. Some QoS matrixes are used to record and compare the instance paths and then choose a better one. Simulation result has proven that our ~pproach has a tradeoff between efficiency and ~quality.展开更多
The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model ...The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model will monitor the Web server host resources, and finally discusses in detail the design and implementation of resource monitoring system. Intrusion detection model proposed can effectively regulate the behavior of users in this paper, allowing users follow a pre-standard service to call service providers, largely to protect the security of Web services.展开更多
基金The National Key Technologies R & D Program of China during the 10th Five-Year Plan Period(No2004BA721A05)
文摘In order to improve the effectiveness of the artificial intelligence (AI) planning based web service composition problem, a business domain oriented AI planning algorithm for web service composition is introduced. The algorithm uses the proposed business relation model to minimize the searching space and uses the proposed goal distance as a heuristic rule. Compared with other algorithms tackling web service composition such as AI planning, the proposed algorithm focuses not only on how to convert the web service composition problem to the AI planning problem, but also exerts its effort on how to apply the business feature of web service composition into planning in order to improve the effectiveness. The experiment shows the better performance of the proposed algorithm.
基金The National Natural Science Foundation of China(No.60403027,60773191,70771043)the National High Technology Research and Development Program of China(863 Program)(No.2007AA01Z403)
文摘In order to formally reason and verify web services composition described by web services choreography specification WS-CDL,a typed formal model named typed Abstract WS-CDL(web services choreography description language)for WS-CDL specifications is proposed.In typed Abstract WS-CDL,the syntax of type and session,typing rules and operational semantics are formalized;the collaborations of web services are formally described by sessions;the operational semantics of a session can help to formally reason the execution of the choreography;the typing rules can help to formally check the data type consistency of exchanged information between web services and capture run-time errors due to type mismatches.Particularly,the concepts of type assumption set extension and type assumption set compatibility are proposed,and the merging algorithm of type assumption sets is defined so as to eliminate type assumption conflict.Based on the formal model,typed mapping rules for mapping web services choreography to orchestration is also defined.With the typed mapping rules,orchestration stubs and their type assumption sets can be generated from a given choreography; thus, web services composition can be verified at choreography and orchestration levels,respectively.The model is proved to have properties of type safety,and how the model can help to reason and verify web services composition is illustrated through a case study.
基金National Natural Science Foundation of China,Major National Science and Technology Projects of New Generation Broadband Wireless Mobile Communication Network,the National High Technology Research and Development Program of China (863 Program)
文摘The goal of web service composition is to choose an optimal scheme according to Quantity of Service (QoS) which selects instances in a distributed network. The networks are clustered with some web services such as ontologies, algorithms and rule engines with similar function and interfaces. In this scheme, web services acted as candidate service construct a distributed model which can't obtain the global services' information. The model is utilized to choose instances according to local QoS information in the progress of service composition. Some QoS matrixes are used to record and compare the instance paths and then choose a better one. Simulation result has proven that our ~pproach has a tradeoff between efficiency and ~quality.
文摘The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model will monitor the Web server host resources, and finally discusses in detail the design and implementation of resource monitoring system. Intrusion detection model proposed can effectively regulate the behavior of users in this paper, allowing users follow a pre-standard service to call service providers, largely to protect the security of Web services.