- Service-Oriented Architecture and Web Services
- Caching and Content Delivery
- Semantic Web and Ontologies
- Advanced Database Systems and Queries
- IoT and Edge/Fog Computing
- UAV Applications and Optimization
- Data Management and Algorithms
- Business Process Modeling and Analysis
- Mobile Crowdsensing and Crowdsourcing
- Cloud Computing and Resource Management
- Context-Aware Activity Recognition Systems
- Distributed and Parallel Computing Systems
- Access Control and Trust
- Human Mobility and Location-Based Analysis
- Distributed systems and fault tolerance
- Privacy-Preserving Technologies in Data
- Web Data Mining and Analysis
- Software System Performance and Reliability
- Energy Harvesting in Wireless Networks
- Peer-to-Peer Network Technologies
- Smart Grid Energy Management
- Robotic Path Planning Algorithms
- Vehicle Routing Optimization Methods
- Transportation and Mobility Innovations
- Opportunistic and Delay-Tolerant Networks
The University of Sydney
2016-2025
Centre Giovanni Borelli
2024
Université Paris Cité
2015-2024
Collège Boréal
2024
Sorbonne Paris Cité
2024
RMIT University
2011-2022
University of Colorado Boulder
1993-2022
University of Wollongong
2022
Los Alamitos Medical Center
2022
MIT University
2020-2022
Mapping out the challenges and strategies for widespread adoption of service computing.
Reputation systems rely on past information to establish trust among unknown participants. bootstrapping - that is, assessing the reputations of newly deployed Web services (newcomers) is a major issue in service-oriented environments because historical often isn't present regarding newcomer behaviors. The authors examine different techniques for fairly and accurately newcomers' environment. They also experimental results evaluate proposed techniques.
The performance of a service provider may fluctuate due to the dynamic environment. Thus, quality actually delivered by is inherently uncertain. Existing optimization approaches usually assume that does not change over time. Moreover, most these rely on computing predefined objective function. When multiple criteria are considered, users required express their preference different (and sometimes conflicting) attributes as numeric weights. This rather demanding task and an imprecise...
In recent years, wireless sensor networks have been widely used in healthcare applications, such as hospital and home patient monitoring. Wireless medical are more vulnerable to eavesdropping, modification, impersonation replaying attacks than the wired networks. A lot of work has done secure The existing solutions can protect data during transmission, but cannot stop inside attack where administrator database reveals sensitive data. this paper, we propose a practical approach prevent by...
We propose a cloud service composition framework that selects the optimal based on an end user's long-term Quality of Service (QoS) requirements. In typical environment, existing solutions are not suitable when providers fail to provide QoS provision advertisements. The proposed uses new multivariate analysis predict provisions from providers' historical data and short-term advertisements represented using Time Series. quality prediction is improved by incorporating attributes' intra...
Named Entity Recognition seeks to extract substrings within a text that name real-world objects and determine their type (for example, whether they refer persons or organizations). In this survey, we first present an overview of recent popular approaches, including advancements in Transformer-based methods Large Language Models (LLMs) have not had much coverage other surveys. addition, discuss reinforcement learning graph-based highlighting role enhancing NER performance. Second, focus on...
We propose a composability model to ascertain that Web services can safely be combined, hence avoiding unexpected failures at runtime. Composability is checked through set of rules organized into four levels, syntactic, static semantic, dynamic and qualitative levels. introduce the concepts degree /spl tau/-composability cater for partial total composability. also algorithms checking Finally, we conduct performance study (analytical experimental) proposed algorithms.
In efforts to use information and communication technologies for the civil political conduct of government, many countries have begun supporting e-government initiatives. The ultimate goal is improve government-citizen interactions through an infrastructure built around "life experience" citizens. To facilitate welfare applications expeditiously satisfy citizens' needs, we wrapped these in modular Web services. Adopting services enables government agencies provide value-added by defining a...
For Web services to expand across the Internet, users need be able efficiently access and share services. The authors present a query infrastructure that treats as first-class objects. It evaluates queries through invocations of different service operations. Because efficiency plays central role in such evaluations, propose optimization model based on aggregating quality (QoWS) parameters adjusts QoWS dynamic rating scheme multilevel matching which provides an assessment services' behavior....
Service composition is emerging as an effective vehicle for integrating existing web services to create value-added and personalized composite services. As with similar functionality are expected be provided by competing providers, a key challenge find the "best" participate in composition. When multiple quality aspects (e.g., response time, fee, etc.) considered, weighting mechanism usually adopted most approaches, which requires users specify their preferences numeric values. We propose...
Quality of service (QoS) is a major concern in the design and management composite service. In this paper, systematic approach proposed to calculate QoS for services with complex structures, taking into consideration probability conditions each execution path. Four types basic composition patterns are discussed: sequential, parallel, loop, conditional patterns. particular, solutions provided unstructured loop We also show how QoS-based selection can be conducted based on calculation....
Recently, the paradigm of data mining-as-a-service in cloud computing environment has been attracting interests. In this paradigm, a company (data owner), lacking storage, computational resources and expertise, stores its outsources mining tasks to service provider (server). order protect privacy outsourced database association rules mined, k-anonymity, k-support, k-privacy techniques have proposed perturb before it is uploaded server. These are computationally expensive. If owner use these...
Despite important regulatory and technical efforts aimed at tackling aspects of the problem, privacy violation incidents on Web continue to hit headlines. The authors outline salient issues proposed solutions, focusing generic user's privacy.
We present a query algebra that supports optimized access of Web services through service-oriented queries. The service is defined based on formal model provides high-level abstraction across an application domain. defines set algebraic operators. Algebraic queries can be formulated using these This allows users to their desired both functionality and quality. provide the implementation each operator. enables generation Service Execution Plans (SEPs) used by directly services. optimization...
Classification is a widely used mechanism for facilitating Web service discovery. Existing methods automatic classification only consider the case where category set small. When big, conventional usually require large sample collection, which hardly available in real world settings. This paper presents novel method to conduct with medium or big set. It uses descriptive information of categories large-scale taxonomy as data, so disengage from dependence on documents. A new feature selection...
We propose a model for clustering data with spatiotemporal intervals. This is used to effectively evaluate clusters of interval data. A new energy function measure similarity and balance between in spatial temporal dimensions. employ as case study large collection parking from real CBD area. The proposed applied existing traditional algorithms address problem. Results are compared analysed using the function.