Collusive User Removal and Trusted Composite Web Service Selection based on QoS attributes
Abstract
References
- Collusive User Removal and Trusted Composite Web Service Selection based on QoS attributes
Recommendations
QoS-based Web Service Composition Applying an Improved Genetic Algorithm (IGA) Method
In recent years, it has been made possible to compose exiting services when a user's request cannot be satisfied by a single web service. Web service composition is faced with several challenges among which is the rapid growth in the number of ...
A Penalty-Based Genetic Algorithm for QoS-Aware Web Service Composition with Inter-service Dependencies and Conflicts
CIMCA '08: Proceedings of the 2008 International Conference on Computational Intelligence for Modelling Control & AutomationIn Web service based systems, new value-added Web services can be constructed by integrating existing Web services. A Web service may have many implementations, which are functionally identical, but have different Quality of Service (QoS) attributes, ...
A dynamic web service composite platform based on qos of services
APWeb'06: Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and ApplicationsIn this paper, a web service composite platform is introduced which aims to compose the services dynamically. And more importantly, in order to get a most qualified composite service, a selection task needs to be done. And after carefully study on the ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 32Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in