Athman Bouguettaya

ORCID: 0000-0003-1254-8092
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Service-Oriented Architecture and Web Services
  • Caching and Content Delivery
  • Semantic Web and Ontologies
  • Advanced Database Systems and Queries
  • IoT and Edge/Fog Computing
  • UAV Applications and Optimization
  • Data Management and Algorithms
  • Business Process Modeling and Analysis
  • Mobile Crowdsensing and Crowdsourcing
  • Cloud Computing and Resource Management
  • Context-Aware Activity Recognition Systems
  • Distributed and Parallel Computing Systems
  • Access Control and Trust
  • Human Mobility and Location-Based Analysis
  • Distributed systems and fault tolerance
  • Privacy-Preserving Technologies in Data
  • Web Data Mining and Analysis
  • Software System Performance and Reliability
  • Energy Harvesting in Wireless Networks
  • Peer-to-Peer Network Technologies
  • Smart Grid Energy Management
  • Robotic Path Planning Algorithms
  • Vehicle Routing Optimization Methods
  • Transportation and Mobility Innovations
  • Opportunistic and Delay-Tolerant Networks

The University of Sydney
2016-2025

Centre Giovanni Borelli
2024

Université Paris Cité
2015-2024

Collège Boréal
2024

Sorbonne Paris Cité
2024

RMIT University
2011-2022

University of Colorado Boulder
1993-2022

University of Wollongong
2022

Los Alamitos Medical Center
2022

MIT University
2020-2022

10.1016/j.eswa.2014.09.054 article EN Expert Systems with Applications 2014-10-22

Reputation systems rely on past information to establish trust among unknown participants. bootstrapping - that is, assessing the reputations of newly deployed Web services (newcomers) is a major issue in service-oriented environments because historical often isn't present regarding newcomer behaviors. The authors examine different techniques for fairly and accurately newcomers' environment. They also experimental results evaluate proposed techniques.

10.1109/mic.2009.17 article EN IEEE Internet Computing 2009-01-01

The performance of a service provider may fluctuate due to the dynamic environment. Thus, quality actually delivered by is inherently uncertain. Existing optimization approaches usually assume that does not change over time. Moreover, most these rely on computing predefined objective function. When multiple criteria are considered, users required express their preference different (and sometimes conflicting) attributes as numeric weights. This rather demanding task and an imprecise...

10.1109/tsc.2010.7 article EN IEEE Transactions on Services Computing 2010-01-01

In recent years, wireless sensor networks have been widely used in healthcare applications, such as hospital and home patient monitoring. Wireless medical are more vulnerable to eavesdropping, modification, impersonation replaying attacks than the wired networks. A lot of work has done secure The existing solutions can protect data during transmission, but cannot stop inside attack where administrator database reveals sensitive data. this paper, we propose a practical approach prevent by...

10.1109/tdsc.2015.2406699 article EN IEEE Transactions on Dependable and Secure Computing 2015-02-24

We propose a cloud service composition framework that selects the optimal based on an end user's long-term Quality of Service (QoS) requirements. In typical environment, existing solutions are not suitable when providers fail to provide QoS provision advertisements. The proposed uses new multivariate analysis predict provisions from providers' historical data and short-term advertisements represented using Time Series. quality prediction is improved by incorporating attributes' intra...

10.1109/tsc.2014.2373366 article EN IEEE Transactions on Services Computing 2014-11-21

Named Entity Recognition seeks to extract substrings within a text that name real-world objects and determine their type (for example, whether they refer persons or organizations). In this survey, we first present an overview of recent popular approaches, including advancements in Transformer-based methods Large Language Models (LLMs) have not had much coverage other surveys. addition, discuss reinforcement learning graph-based highlighting role enhancing NER performance. Second, focus on...

10.48550/arxiv.2401.10825 preprint EN cc-by arXiv (Cornell University) 2024-01-01

We propose a composability model to ascertain that Web services can safely be combined, hence avoiding unexpected failures at runtime. Composability is checked through set of rules organized into four levels, syntactic, static semantic, dynamic and qualitative levels. introduce the concepts degree /spl tau/-composability cater for partial total composability. also algorithms checking Finally, we conduct performance study (analytical experimental) proposed algorithms.

10.1109/tkde.2005.101 article EN IEEE Transactions on Knowledge and Data Engineering 2005-05-24

In efforts to use information and communication technologies for the civil political conduct of government, many countries have begun supporting e-government initiatives. The ultimate goal is improve government-citizen interactions through an infrastructure built around "life experience" citizens. To facilitate welfare applications expeditiously satisfy citizens' needs, we wrapped these in modular Web services. Adopting services enables government agencies provide value-added by defining a...

10.1109/mic.2003.1167340 article EN IEEE Internet Computing 2003-01-01

For Web services to expand across the Internet, users need be able efficiently access and share services. The authors present a query infrastructure that treats as first-class objects. It evaluates queries through invocations of different service operations. Because efficiency plays central role in such evaluations, propose optimization model based on aggregating quality (QoWS) parameters adjusts QoWS dynamic rating scheme multilevel matching which provides an assessment services' behavior....

10.1109/mic.2004.1273484 article EN IEEE Internet Computing 2004-03-01

Service composition is emerging as an effective vehicle for integrating existing web services to create value-added and personalized composite services. As with similar functionality are expected be provided by competing providers, a key challenge find the "best" participate in composition. When multiple quality aspects (e.g., response time, fee, etc.) considered, weighting mechanism usually adopted most approaches, which requires users specify their preferences numeric values. We propose...

10.1109/tkde.2011.268 article EN IEEE Transactions on Knowledge and Data Engineering 2011-12-20

Quality of service (QoS) is a major concern in the design and management composite service. In this paper, systematic approach proposed to calculate QoS for services with complex structures, taking into consideration probability conditions each execution path. Four types basic composition patterns are discussed: sequential, parallel, loop, conditional patterns. particular, solutions provided unstructured loop We also show how QoS-based selection can be conducted based on calculation....

10.1109/tsc.2012.7 article EN IEEE Transactions on Services Computing 2012-02-27

Recently, the paradigm of data mining-as-a-service in cloud computing environment has been attracting interests. In this paradigm, a company (data owner), lacking storage, computational resources and expertise, stores its outsources mining tasks to service provider (server). order protect privacy outsourced database association rules mined, k-anonymity, k-support, k-privacy techniques have proposed perturb before it is uploaded server. These are computationally expensive. If owner use these...

10.1145/2714576.2714603 article EN 2015-04-03

Despite important regulatory and technical efforts aimed at tackling aspects of the problem, privacy violation incidents on Web continue to hit headlines. The authors outline salient issues proposed solutions, focusing generic user's privacy.

10.1109/msecp.2003.1253567 article EN IEEE Security & Privacy 2003-11-01

We present a query algebra that supports optimized access of Web services through service-oriented queries. The service is defined based on formal model provides high-level abstraction across an application domain. defines set algebraic operators. Algebraic queries can be formulated using these This allows users to their desired both functionality and quality. provide the implementation each operator. enables generation Service Execution Plans (SEPs) used by directly services. optimization...

10.1145/1326561.1326567 article EN ACM Transactions on the Web 2008-02-01

Classification is a widely used mechanism for facilitating Web service discovery. Existing methods automatic classification only consider the case where category set small. When big, conventional usually require large sample collection, which hardly available in real world settings. This paper presents novel method to conduct with medium or big set. It uses descriptive information of categories large-scale taxonomy as data, so disengage from dependence on documents. A new feature selection...

10.1109/ictai.2010.9 article EN 2010-10-01

We propose a model for clustering data with spatiotemporal intervals. This is used to effectively evaluate clusters of interval data. A new energy function measure similarity and balance between in spatial temporal dimensions. employ as case study large collection parking from real CBD area. The proposed applied existing traditional algorithms address problem. Results are compared analysed using the function.

10.1109/tbdata.2016.2599923 article EN IEEE Transactions on Big Data 2016-08-18
Coming Soon ...