2008
DOI: 10.1016/j.jss.2007.12.792
|View full text |Cite
|
Sign up to set email alerts
|

A framework for QoS-aware binding and re-binding of composite web services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
177
0
6

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 256 publications
(183 citation statements)
references
References 21 publications
0
177
0
6
Order By: Relevance
“…heuristic techniques (e.g. Alrifai et al, 2012; Canfora, Di Penta, Esposito, & Villani, 2008; Lewerenz, 2015) could be developed for our approach to consider IUR and context information in terms of multi-user processes. In addition, we focused on sequential processes.…”
Section: Conclusion Limitations and Further Researchmentioning
confidence: 99%
“…heuristic techniques (e.g. Alrifai et al, 2012; Canfora, Di Penta, Esposito, & Villani, 2008; Lewerenz, 2015) could be developed for our approach to consider IUR and context information in terms of multi-user processes. In addition, we focused on sequential processes.…”
Section: Conclusion Limitations and Further Researchmentioning
confidence: 99%
“…Several existing methodologies only consider implementations consisting of a single service provided by some CBP participant ( [5,10,12,35,46,47]). In this case, the set of possible implementations for a given task corresponds to the set of functionally equivalent services implementing that task, provided by the (candidate) CBP participants.…”
Section: Task Implementationmentioning
confidence: 99%
“…Depending on the considered utilization scenario, we point out that solving this model corresponds to solving an integer programming optimization problem (for the single request scenario), or a linear programming optimization problem (for the flow of requests scenario). This model (or variants of it) underlies most of the proposed methodologies for the selfconfiguration of SOA systems [5,12,15,14,24,46,47,50]. These methodologies differ in the proposed solution techniques (in particular for the single request scenario, where heuristics are often proposed to cope with the NP-hard nature of integer programming), and in the way the model parameters (e.g., Q α and Q β matrices) are calculated, that basically depends on the considered QoS metrics, composition rules for the CBP tasks, and redundancy schemes.…”
Section: Fig 1 Example Of Adaptation Policymentioning
confidence: 99%
See 1 more Smart Citation
“…As we mentioned, the former dimension is typical of modern pervasive scenarios, which involve mobile users, mobile devices, wireless networks, and complex interactions schemas, which change frequently at run-time. It asks for solutions that easily accommodate the need for re-optimization as significant changes occur [9]. The latter dimension allows the choice of two alternative ways of executing a service.…”
mentioning
confidence: 99%