2022
DOI: 10.1016/j.cosrev.2022.100498
|View full text |Cite
|
Sign up to set email alerts
|

A systematic literature review on web service clustering approaches to enhance service discovery, selection and recommendation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 62 publications
0
6
0
Order By: Relevance
“…Service clustering is commonly used to efficiently discover interested ones from huge number of existing services. The currently research on service clustering mainly focuses on the semantic information extraction from the service description, vectorization representation, and similarity calculation [10]. The SFV obtained from the service description directly impact the performance of service clustering.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Service clustering is commonly used to efficiently discover interested ones from huge number of existing services. The currently research on service clustering mainly focuses on the semantic information extraction from the service description, vectorization representation, and similarity calculation [10]. The SFV obtained from the service description directly impact the performance of service clustering.…”
Section: Related Workmentioning
confidence: 99%
“…For new nodes, the edge weight between them is set to 1. The adjacency matrix A and node feature matrix VF of graph G are constructed in line (10) to line (14). Then, we use GCN to compute the parameters μ and σ of the Gaussian distribution, and sample in the Gaussian distribution to obtain the parameter ϵ (line (15) to line ( 18)).…”
Section: ( ) (mentioning
confidence: 99%
See 1 more Smart Citation
“…Measures are typically associated with exploiting vulnerabilities in the system that allow intruders to enter the network and distribute personal data, rejection-service attacks with spying sort of works [18]. Machine automation in safety digitization is yet an innovative field, but they are impelling cyber forensic study into a new example of active defense.…”
Section: Introductionmentioning
confidence: 99%
“…A web application makes use of a very diverse set of technologies. PHP [2], XML [3], web services [4], MySQL and databases [5], authentication, encryption, HTTP, security, JavaScript [6], Ajax [7], XHTML [8], and standards are all terms relating to one or more technologies more or less different from each other, and which nevertheless interact with each other. The growing difficulty of designing web applications has given rise to solutions and tools.…”
Section: Introductionmentioning
confidence: 99%