scispace - formally typeset
Search or ask a question
Conference

IEEE International Conference on Services Computing 

About: IEEE International Conference on Services Computing is an academic conference. The conference publishes majorly in the area(s): Web service & Service (business). Over the lifetime, 1727 publications have been published by the conference receiving 23941 citations.


Papers
More filters
Proceedings ArticleDOI
21 Sep 2009
TL;DR: Some security issues that have to be included in service level agreements (SLA) are put forward to help some of the enterprises to look forward in using the cloud services.
Abstract: In past three decades, the world of computation has changed from centralized (client-server not web-based) to distributed systems and now we are getting back to the virtual centralization (Cloud Computing). Location of data and processes makes the difference in the realm of computation. On one hand, an individual has full control on data and processes in his/her computer. On the other hand, we have the cloud computing wherein, the service and data maintenance is provided by some vendor which leaves the client/customer unaware of where the processes are running or where the data is stored. So, logically speaking, the client has no control over it. The cloud computing uses the internet as the communication media. When we look at the security of data in the cloud computing, the vendor has to provide some assurance in service level agreements (SLA) to convince the customer on security issues. Organizations use cloud computing as a service infrastructure, critically like to examine the security and confidentiality issues for their business critical insensitive applications. Yet, guaranteeing the security of corporate data in the "cloud" is difficult, if not impossible, as they provide different services like Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). Each service has their own security issues. So the SLA has to describe different levels of security and their complexity based on the services to make the customer understand the security policies that are being implemented. There has to be a standardized way to prepare the SLA irrespective to the providers. This can help some of the enterprises to look forward in using the cloud services. In this paper, we put forward some security issues that have to be included in SLA.

707 citations

Proceedings ArticleDOI
27 Jun 2015
TL;DR: The availability of data at hitherto unimagined scales and temporal longitudes coupled with a new generation of intelligent processing algorithms can facilitate an evolution in the practice of medicine and help reduce the cost of health care while simultaneously improving outcomes.
Abstract: Among the panoply of applications enabled by the Internet of Things (IoT), smart and connected health care is a particularly important one. Networked sensors, either worn on the body or embedded in our living environments, make possible the gathering of rich information indicative of our physical and mental health. Captured on a continual basis, aggregated, and effectively mined, such information can bring about a positive transformative change in the health care landscape. In particular, the availability of data at hitherto unimagined scales and temporal longitudes coupled with a new generation of intelligent processing algorithms can: (a) facilitate an evolution in the practice of medicine, from the current post facto diagnose-and-treat reactive paradigm, to a proactive framework for prognosis of diseases at an incipient stage, coupled with prevention, cure, and overall management of health instead of disease, (b) enable personalization of treatment and management options targeted particularly to the specific circumstances and needs of the individual, and (c) help reduce the cost of health care while simultaneously improving outcomes. In this paper, we highlight the opportunities and challenges for IoT in realizing this vision of the future of health care.

620 citations

Proceedings ArticleDOI
15 Sep 2004
TL;DR: This work presents a constraint driven Web service composition tool in METEOR-S, which allows the process designers to bind Web services to an abstract process, based on business and process constraints and generate an executable process.
Abstract: Creating Web processes using Web service technology gives us the opportunity for selecting new services, which best suit our need at the moment. Doing this automatically requires us to quantify our criteria for selection. In addition, there are challenging issues of correctness and optimality. We present a constraint driven Web service composition tool in METEOR-S, which allows the process designers to bind Web services to an abstract process, based on business and process constraints and generate an executable process. Our approach is to reduce much of the service composition problem to a constraint satisfaction problem. It uses a multiphase approach for constraint analysis. This work was done as part of the METEORS framework, which aims to support the complete lifecycle of semantic Web processes.

486 citations

Proceedings ArticleDOI
09 Jul 2007
TL;DR: iOJO is proposed, a service-oriented component to implement services that does not only manage dynamic service interactions; it also provides an extensibility mechanism.
Abstract: Nowadays, application needs loose-coupling approach allowing asynchronous evolution. Service-oriented computing is a paradigm that utilizes services as fundamental elements for application design, and fulfills loose-coupling requirement. However, services themselves are typically only used to abstract remote functionality; the service-oriented approach proffered by web services does not promote an implementation model managing service dynamism. This paper proposes iPOJO, a service-oriented component to implement services. However, this component model does not only manage dynamic service interactions; it also provides an extensibility mechanism. IPOJO Components can manage other non-functional properties as persistency, security, autonomic management, eventing... To illustrate the approach, the paper presents a usage of iPOJO on a residential gateway.

216 citations

Proceedings ArticleDOI
01 Jun 2016
TL;DR: Simulation results confirm that QAR outperforms the existing learning solution and provides fast convergence with QoS provisioning, facilitating the practical implementations in large-scale software service-defined networks.
Abstract: Software-defined networks (SDNs) have been recognized as the next-generation networking paradigm that decouples the data forwarding from the centralized control. To realize the merits of dedicated QoS provisioning and fast route (re-)configuration services over the decoupled SDNs, various QoS requirements in packet delay, loss, and throughput should be supported by an efficient transportation with respect to each specific application. In this paper, a QoS-aware adaptive routing (QAR) is proposed in the designed multi-layer hierarchical SDNs. Specifically, the distributed hierarchical control plane architecture is employed to minimize signaling delay in large SDNs via three-levels design of controllers, i.e., the super, domain (or master), and slave controllers. Furthermore, QAR algorithm is proposed with the aid of reinforcement learning and QoS-aware reward function, achieving a time-efficient, adaptive, QoS-provisioning packet forwarding. Simulation results confirm that QAR outperforms the existing learning solution and provides fast convergence with QoS provisioning, facilitating the practical implementations in large-scale software service-defined networks.

200 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
202262
202147
202066
201936
201846
201769