Dissertations / Theses on the topic 'Service-based applications'

To see the other types of publications on this topic, follow the link: Service-based applications.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Service-based applications.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kalyanasundaram, Anand Kumar. "Service based marketplace for applications." Master's thesis, Mississippi State : Mississippi State University, 2003. http://library.msstate.edu/etd/show.asp?etd=etd-11072003-110358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yangui, Sami. "Service-based applications provisioning in the cloud." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0024/document.

Full text
Abstract:
Le Cloud Computing ou "informatique en nuage" est un nouveau paradigme émergeant pour l’exploitation des services informatiques distribuées à large échelle s’exécutant à des emplacements géographiques répartis. Ce paradigme est de plus en plus utilisé pour le déploiement et l’exécution des applications en général et des applications à base de services en particulier. Les applications à base de services sont décrites à l’aide du standard Service Component Architecture (SOA) et consistent à inter-lier un ensemble de services élémentaires et hétérogènes en utilisant des spécifications de composition de services appropriées telles que Service Component Architecture (SCA) ou encore Business Process Execution Language (BPEL). Provisionner une application dans le Cloud consiste à : (1) allouer les ressources dont elle a besoin pour s’exécuter, (2) déployer ses sources sur les ressources allouées et (3) démarrer l’application. Cependant, les solutions Cloud existantes sont limitées en termes de plateformes d’exécution. Ils ne peuvent pas toujours satisfaire la forte hétérogénéité des composants des applications à base de services. Pour remédier à ces problèmes, les mécanismes de provisioning des applications dans le Cloud doivent être reconsidérés. Ces mécanismes doivent être assez flexibles pour supporter la forte hétérogénéité des composants sans imposer de modifications et/ou d’adaptations du côté du fournisseur Cloud. Elles doivent également permettre le déploiement automatique des composants dans le Cloud. Si l’application à déployer est mono-composant, le déploiement est fait automatiquement et de la même manière, et ce quelque soit le fournisseur Cloud choisi. Si l’application est à base de services hétérogènes, des fonctionnalités appropriées doivent être mises à la disposition des développeurs pour qu’ils puissent définir et créer les ressources nécessaires aux composants avant de déployer l’application. Dans ce travail, nous proposons une approche appelée SPD permettant le provisioning des applications à base de services dans le Cloud. L’approche SPD est constituée de 3 étapes : (1) découper des applications à base de services en un ensemble de services élémentaires et autonomes, (2) encapsuler les services dans des micro-conteneurs spécifiques et (3) déployer les micro-conteneurs dans le Cloud. Pour le découpage, nous avons élaboré un ensemble d’algorithmes formels assurant la préservation de la sémantique des applications une fois découpées. Pour l’encapsulation, nous avons réalisé des prototypes de conteneurs de services permettant l’hébergement et l’exécution des services avec seulement le minimum des fonctionnalités nécessaires. Pour le déploiement, deux cas sont traités i.e. déploiement sur une infrastructure Cloud (IaaS) et déploiement sur une plateforme Cloud (PaaS). Pour automatiser le processus de déploiement, nous avons défini : (i) un modèle de description des ressources unifié basé sur le standard Open Cloud Computing Interface (OCCI) permettant de décrire l’application et ses ressources d’une manière générique quelque soit la plateforme de déploiement cible et (ii) une API appelée COAPS implémentant ce modèle et permettant de l’approvisionnement et la gestion des applications en utilisant des opérations génériques quelque soit la plateforme cible
Cloud Computing is a new supplement, consumption, and delivery model for IT services based on Internet protocols. It is increasingly used for hosting and executing applications in general and service-based applications in particular. Service-based applications are described according to Service Oriented Architecture (SOA) and consist of assembling a set of elementary and heterogeneous services using appropriate service composition specifications like Service Component Architecture (SCA) or Business Process Execution Language (BPEL). Provision an application in the Cloud consists of allocates its required resources from a Cloud provider, upload source codes over their resources before starting the application. However, existing Cloud solutions are limited to static programming frameworks and runtimes. They cannot always meet with the application requirements especially when their components are heterogeneous as service-based applications. To address these issues, application provisioning mechanisms in the Cloud must be reconsidered. The deployment mechanisms must be flexible enough to support the strong application components heterogeneity and requires no modification and/or adaptation on the Cloud provider side. They also should support automatic provisioning procedures. If the application to deploy is mono-block (e.g. one-tier applications), the provisioning is performed automatically and in a unified way whatever is the target Cloud provider through generic operations. If the application is service-based, appropriate features must be provided to developers in order to create themselves dynamically the required resources before the deployment in the target provider using generic operations. In this work, we propose an approach (called SPD) to provision service-based applications in the Cloud. The SPD approach consists of 3 steps: (1) Slicing the service-based application into a set of elementary and autonomous services, (2) Packaging the services in micro-containers and (3) Deploying the micro-containers in the Cloud. Slicing the applications is carried out by formal algorithms that we have defined. For the slicing, proofs of preservation of application semantics are established. For the packaging, we performed prototype of service containers which provide the minimal functionalities to manage hosted services life cycle. For the deployment, both cases are treated i.e. deployment in Cloud infrastructure (IaaS) and deployment in Cloud platforms (PaaS). To automate the deployment, we defined: (i) a unified description model based on the Open Cloud Computing Interface (OCCI) standard that allows the representation of applications and its required resources independently of the targeted PaaS and (ii) a generic PaaS application provisioning and management API (called COAPS API) that implements this model
APA, Harvard, Vancouver, ISO, and other styles
3

Endo, André Takeshi. "Model based testing of service oriented applications." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-20062013-140259/.

Full text
Abstract:
SERVICE oriented architecture (SOA) is an architectural style to structure software systems, fostering loose coupling and dynamic integration among the applications. The use of SOA and Web services to develop complex and large business processes demands more formal and systematic testing. In addition, characteristics of this type of software limit the straightforward application of traditional testing techniques. Model-based testing (MBT) is a promising approach to deal with these problems. This dissertation investigates how two modeling techniques, namely Finite State Machine (FSM) and Event Sequence Graph (ESG), can be used to support MBT of service-oriented applications. Both techniques model different aspects and can be applied in a complementary way. Initially, we define an MBT process for service-oriented applications that employs FSMs. Based on previous experience, we propose a model-based approach to test composite services using ESGs. This approach is holistic, once test suites are generated to cover both desired situations (positive testing) and unexpected behaviors (negative testing). Three experimental studies evaluate the proposed approach: (i) a case study, (ii) a cost analysis, and (iii) a study in industry. Testing tools are also presented to support its practical use
A Arquitetura orientada a serviço (SOA) é um estilo arquitetural para estruturar sistemas de software de modo que exista um baixo grau de acoplamento entre as aplicações e essas possam ser facilmente integradas de forma dinâmica. A incorporação de SOA e serviços Web em sistemas que modelam processos de negócios grandes e complexos contribui para a necessidade de testes mais formais e sistemáticos. Além disso, características próprias dessa nova classe de software fazem com que técnicas de teste tradicionais não possam ser diretamente aplicadas. O teste baseado em modelo (TBM) apresenta-se como uma abordagem promissora que busca a resolução desses problemas. Esta tese investiga como duas técnicas de modelagem, Máquina de Estados Finitos (MEF) e Grafo de Sequência de Eventos (GSE), podem ser utilizadas para apoiar o TBM de aplicações orientadas a serviço. Essas técnicas modelam diferentes aspectos e podem ser aplicadas de forma complementar. Inicialmente, é definido um processo de TBM para aplicações orientadas a serviço que emprega MEFs. Com base na experiência adquirida, é proposta uma abordagem baseada em modelo para o teste de serviços compostos usando GSEs. Essa abordagem é holística uma vez que conjuntos de teste são gerados para cobrir tanto situações desejadas (teste positivo) quanto comportamentos inesperados (teste negativo). Três estudos experimentais avaliam a abordagem proposta: (i) um estudo de caso, (ii) uma análise de custo e (ii) um estudo na indústria. Ferramentas de teste também são apresentadas para apoiar o uso prático da abordagem proposta
APA, Harvard, Vancouver, ISO, and other styles
4

Belhaj, Nabila. "Generic autonomic service management for component-based applications." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLL004/document.

Full text
Abstract:
Au cours de la dernière décennie, la complexité des applications a considérablement évolué afin de répondre aux besoins métiers émergeants. Leur conception implique une composition distribuée de composants logiciels. Ces applications fournissent des services à travers les interactions métiers maintenues par leurs composants. De telles applications sont intrinsèquement en évolution dynamique en raison de la dynamicité de leurs contextes. En effet, elles évoluent dans des environnements qui changent tout en présentant des conditions très dynamiques durant leur cycle de vie d’exécution. De tels contextes représentent une lourde charge pour les développeurs aussi bien pour leurs tâches de conception que de gestion. Cela a motivé́ le besoin de renforcer l’autonomie de gestion des applications pour les rendre moins dépendantes de l’intervention humaine en utilisant les principes de l’Informatique Autonomique. Les Systèmes Informatiques Autonomes (SIA) impliquent l’utilisation des boucles autonomiques, dédiées aux systèmes afin de les aider à accomplir leurs tâches de gestion. Ces boucles ont pour objectif d’adapter leurs systèmes à la dynamicité de leurs contextes, en se basant sur une logique d’adaptation intégrée. Cette logique est souvent donnée par des règles statiques codées manuellement. La construction de ces règles demande beaucoup de temps tout en exigeant une bonne expertise. En fait, elles nécessitent une compréhension approfondie de la dynamicité du système afin de prédire les adaptations précises à apporter à celui-ci. Par ailleurs, une telle logique ne peut envisager tous les scénarios d’adaptation possibles, donc, ne sera pas en mesure de prendre en compte des adaptations pour des situations précédemment inconnues. Les SIA devraient donc être assez sophistiqués afin de pouvoir faire face à la nature dynamique de leurs contextes et de pouvoir apprendre par eux-mêmes afin d’agir correctement dans des situations inconnues. Les SIA devraient également être capables d’apprendre de leur propre expérience passée afin de modifier leur logique d’adaptation en fonction de la dynamicité de leurs contextes. Dans ce manuscrit, nous abordons les lacunes décrites en utilisant les techniques d’Apprentissage par Renforcement (AR) afin de construire notre logique d’adaptation. Cependant, les approches fondées sur l’AR sont connues pour leur mauvaise performance lors des premières phases d’apprentissage. Cette mauvaise performance entrave leur utilisation dans le monde réel des systèmes déployés. Par conséquent, nous avons amélioré cette logique d’adaptation avec des capacités d’apprentissage plus performantes avec une approche AR en multi-pas. Notre objectif est d’optimiser la performance de l’apprentissage et de le rendre plus efficace et plus rapide, en particulier durant les premières phases d’apprentissage. Nous avons aussi proposé́ un cadriciel générique visant à aider les développeurs dans la construction d’applications auto-adaptatives. Nous avons donc proposé de transformer des applications existantes en ajoutant des capacités d’autonomie et d’apprentissage à leurs composants. La transformation consiste en l’encapsulation des composants dans des conteneurs autonomiques pour les doter du comportement auto-adaptatif nécessaire. Notre objectif est d’alléger la charge des tâches de gestion des développeurs et de leur permettre de se concentrer plus sur la logique métier de leurs applications. Les solutions proposées sont destinées à être génériques, granulaires et basées sur un standard connu, à savoir l’Architecture de Composant de Service. Enfin, nos propositions ont été évaluées et validées avec des résultats expérimentaux. Ils ont démontré leur efficacité en montrant un ajustement dynamique des applications transformées face aux dynamicités de leurs contextes en un temps beaucoup plus court comparé aux approches existantes
During the past decade, the complexity of applications has significantly scaled to satisfy the emerging business needs. Their design entails a composition of distributed and interacting software components. They provide services by means of the business interactions maintained by their components. Such applications are inherently in a dynamic evolution due to their context dynamics. Indeed, they evolve in changing environments while exhibiting highly dynamic conditions during their execution life-cycle (e.g., their load, availability, performance, etc.). Such contexts have burdened the applications developers with their design and management tasks. Subsequently, motivated the need to enforce the autonomy of their management to be less dependent on human interventions with the Autonomic Computing principles. Autonomic Computing Systems (ACS) implies the usage of autonomic loops, dedicated to help the system to achieve its management tasks. These loops main role is to adapt their associated systems to the dynamic of their contexts by acting upon an embedded adaptation logic. Most of time, this logic is given by static hand-coded rules, often concern-specific and potentially error-prone. It is undoubtedly time and effort-consuming while demanding a costly expertise. Actually, it requires a thorough understanding of the system design and dynamics to predict the accurate adaptations to bring to the system. Furthermore, such logic cannot envisage all the possible adaptation scenarios, hence, not able to take appropriate adaptations for previously unknown situations. ACS should be sophisticated enough to cope with the dynamic nature of their contexts and be able to learn on their own to properly act in unknown situations. They should also be able to learn from their past experiences and modify their adaptation logic according to their context dynamics. In this thesis manuscript, we address the described shortcomings by using Reinforcement Learning (RL) techniques to build our adaptation logic. Nevertheless, RL-based approaches are known for their poor performance during the early stages of learning. This poor performance hinders their usage in real-world deployed systems. Accordingly, we enhanced the adaptation logic with sophisticated and better-performing learning abilities with a multi-step RL approach. Our main objective is to optimize the learning performance and render it timely-efficient which considerably improves the ACS performance even during the beginning of learning phase. Thereafter, we pushed further our work by proposing a generic framework aimed to support the application developers in building self-adaptive applications. We proposed to transform existing applications by dynamically adding autonomic and learning abilities to their components. The transformation entails the encapsulation of components into autonomic containers to provide them with the needed self-adaptive behavior. The objective is to alleviate the burden of management tasks on the developers and let them focus on the business logic of their applications. The proposed solutions are intended to be generic, granular and based on a well known standard (i.e., Service Component Architecture). Finally, our proposals were evaluated and validated with experimental results. They demonstrated their effectiveness by showing a dynamic adjustment to the transformed application to its context changes in a shorter time as compared to existing approaches
APA, Harvard, Vancouver, ISO, and other styles
5

Benze, Jörg. "Location Based Service Portale auf Basis von Network Integrated Applications." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-140932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Benze, Jörg. "Location Based Service Portale auf Basis von Network Integrated Applications." Technische Universität Dresden, 2008. https://tud.qucosa.de/id/qucosa%3A27925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Araz, Bora. "Priorty Based Multi-constraint Qualty Of Service Routing In Military Applications." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12606404/index.pdf.

Full text
Abstract:
This thesis proposes a new algorithm for multi-constrained Quality of Service Optimal Path Routing in the context of military applications. The objective of our routing algorithm is to manage network traffic according to quality of service requirements of connection requests using military metrics. The algorithm is mainly based on communication priority. The QoS metrics such as bandwidth, delay and packet loss ratio are considered as basic metrics on path finding. If there is no suitable path for the request, some existing connections with lower priorities may be broken to make space for a higher priority level connection request. In this case, priority and bandwidth are used as decisive metrics in cost computation
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Chen. "A chemistry-inspired middleware for flexible execution of service based applications." Phd thesis, INSA de Rennes, 2013. http://tel.archives-ouvertes.fr/tel-00982804.

Full text
Abstract:
With the advent of cloud computing and Software-as-a-Service, Service-Based Application (SBA) represents a new paradigm to build rapid, low-cost, interoperable and evolvable distributed applications. A new application is created by defining a workflow that coordinates a set of third-party Web services accessible over the Internet. In such distributed and loose coupling environment, the execution of SBA requires a high degree of flexibility. For example, suitable constituent services can be selected and integrated at runtime based on their Quality of Service (QoS); furthermore, the composition of service is required to be dynamically modified in response to unexpected runtime failures. In this context, the main objective of this dissertation is to design, to develop and to evaluate a service middleware for flexible execution of SBA by using chemical programming model. Using chemical metaphor, the service-based systems are modeled as distributed, selforganized and self-adaptive biochemical systems. Service discovery, selection, coordination and adaptation are expressed as a series of pervasive chemical reactions in the middleware, which are performed in a distributed, concurrent and autonomous way. Additionally, on the way to build flexible service based systems, we do not restrict our research only in investigating chemical-based solutions. In this context, the second objective of this thesis is to find out generic solutions, such as models and algorithms, to respond to some of the most challenging problems in flexible execution of SBAs. I have proposed a two-phase online prediction approach that is able to accurately make decisions to proactively execute adaptation plan before the failures actually occur.
APA, Harvard, Vancouver, ISO, and other styles
9

Mohamed, Mohamed. "Generic monitoring and reconfiguration for service-based applications in the cloud." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0025/document.

Full text
Abstract:
Le Cloud Computing est un paradigme émergent dans les technologies de l'information. L'un de ses atouts majeurs étant la mise à disposition des ressources fondée sur le modèle pay-as-you-go. Les ressources Cloud se situent dans un environnement très dynamique. Cependant, chaque ressource provisionnée offre des services fonctionnels et peut ne pas offrir des services non fonctionnels tels que la supervision, la reconfiguration, la sécurité, etc. Dans un tel environnement dynamique, les services non fonctionnels ont une importance critique pour le maintien du niveau de service des ressources ainsi que le respect des contrats entre les fournisseurs et les consommateurs. Dans notre travail, nous nous intéressons à la supervision, la reconfiguration et la gestion autonomique des ressources Cloud. En particulier, nous mettons l'accent sur les applications à base de services. Ensuite, nous poussons plus loin notre travail pour traiter les ressources Cloud d'une manière générale. Par conséquent, cette thèse contient deux contributions majeures. Dans la première contribution, nous étendons le standard SCA (Service Component Architecture) afin de permettre l'ajout de besoins en supervision et reconfiguration à la description des composants. Dans ce contexte, nous proposons une liste de transformations qui permet d'ajouter automatiquement aux composants des facilités de supervision et de reconfiguration, et ce, même si ces facilités n'ont pas été prévues dans la conception des composants. Ceci facilite la tâche au développeur en lui permettant de se concentrer sur les services fonctionnels de ses composants. Pour être en conformité avec la scalabilité des environnements Cloud, nous utilisons une approche basée sur des micro-conteneurs pour le déploiement de composants. Dans la deuxième contribution, nous étendons le standard OCCI (Open Cloud Computing Interface) pour ajouter dynamiquement des facilités de supervision et de reconfiguration aux ressources Cloud, indépendamment de leurs niveaux de service. Cette extension implique la définition de nouvelles Ressources, Links et Mixins OCCI pour permettre d'ajouter dynamiquement des facilités de supervision et de reconfiguration à n'importe quelle ressource Cloud. Nous étendons par la suite nos deux contributions de supervision et reconfiguration afin d'ajouter des capacités de gestion autonomique aux applications SCA et ressources Cloud. Les solutions que nous proposons sont génériques, granulaires et basées sur les standards de facto (i.e., SCA et OCCI). Dans ce manuscrit de thèse, nous décrivons les détails de nos implémentations ainsi que les expérimentations que nous avons menées pour l'évaluation de nos propositions
Cloud Computing is an emerging paradigm in Information Technologies (IT). One of its major assets is the provisioning of resources based on pay-as-you-go model. Cloud resources are situated in a highly dynamic environment. However, each provisioned resource comes with functional properties and may not offer non functional properties like monitoring, reconfiguration, security, accountability, etc. In such dynamic environment, non functional properties have a critical importance to maintain the service level of resources and to make them respect the contracts between providers and consumers. In our work, we are interested in monitoring, reconfiguration and autonomic management of Cloud resources. Particularly, we put the focus on Service-based applications. Afterwards, we push further our work to treat Cloud resources. Consequently, this thesis contains two major contributions. On the first hand, we extend Service Component Architecture (SCA) in order to add monitoring and reconfiguration requirements description to components. In this context, we propose a list of transformations that dynamically adds monitoring and reconfiguration facilities to components even if they were designed without them. That alleviates the task of the developer and lets him focus just on the business of his components. To be in line with scalability of Cloud environments, we use a micro-container based approach for the deployment of components. On the second hand, we extend Open Cloud Computing Interface standards to dynamically add monitoring and reconfiguration facilities to Cloud resources while remaining agnostic to their level. This extension entails the definition of new Resources, Links and Mixins to dynamically add monitoring and reconfiguration facilities to resources. We extend the two contributions to couple monitoring and reconfiguration in order to add self management capabilities to SCA-based applications and Cloud resource. The solutions that we propose are generic, granular and are based on the de facto standards (i.e., SCA and OCCI). In this thesis manuscript, we give implementation details as well as experiments that we realized to evaluate our proposals
APA, Harvard, Vancouver, ISO, and other styles
10

Nallur, Vivek. "A decentralized self-adaptation mechanism for service-based applications in the cloud." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3383/.

Full text
Abstract:
This thesis presents a Cloud-based-Multi-Agent System (Clobmas) that uses multiple double auctions, to enable applications to self-adapt, based on their QoS requirements and budgetary constraints. We design a marketplace that allows applications to select services, in a decentralized manner. We marry the marketplace with a decentralized service evaluation and- selection mechanism, and a price adjustment technique to allow for QoS constraint satisfaction. Applications in the cloud using the Software-As-A-Service paradigm will soon be commonplace. In this context, long-lived applications will need to adapt their QoS, based on various parameters. Current service-selection mechanisms fall short on the dimensions that service based applications vary on. Clobmas is shown to be an effective mechanism, to allow both applications (service consumers) and clouds (service providers) to self-adapt to dynamically changing QoS requirements. Furthermore, we identify the various axes on which service applications vary, and the median values on those axes. We measure Clobmas on all of these axes, and then stress-test it to show that it meets all of our goals for scalability.
APA, Harvard, Vancouver, ISO, and other styles
11

Guo, Jia. "Trust-based Service Management of Internet of Things Systems and Its Applications." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/82854.

Full text
Abstract:
A future Internet of Things (IoT) system will consist of a huge quantity of heterogeneous IoT devices, each capable of providing services upon request. It is of utmost importance for an IoT device to know if another IoT service is trustworthy when requesting it to provide a service. In this dissertation research, we develop trust-based service management techniques applicable to distributed, centralized, and hybrid IoT environments. For distributed IoT systems, we develop a trust protocol called Adaptive IoT Trust. The novelty lies in the use of distributed collaborating filtering to select trust feedback from owners of IoT nodes sharing similar social interests. We develop a novel adaptive filtering technique to adjust trust protocol parameters dynamically to minimize trust estimation bias and maximize application performance. Our adaptive IoT trust protocol is scalable to large IoT systems in terms of storage and computational costs. We perform a comparative analysis of our adaptive IoT trust protocol against contemporary IoT trust protocols to demonstrate the effectiveness of our adaptive IoT trust protocol. For centralized or hybrid cloud-based IoT systems, we propose the notion of Trust as a Service (TaaS), allowing an IoT device to query the service trustworthiness of another IoT device and also report its service experiences to the cloud. TaaS preserves the notion that trust is subjective despite the fact that trust computation is performed by the cloud. We use social similarity for filtering recommendations and dynamic weighted sum to combine self-observations and recommendations to minimize trust bias and convergence time against opportunistic service and false recommendation attacks. For large-scale IoT cloud systems, we develop a scalable trust management protocol called IoT-TaaS to realize TaaS. For hybrid IoT systems, we develop a new 3-layer hierarchical cloud structure for integrated mobility, service, and trust management. This architecture supports scalability, reconfigurability, fault tolerance, and resiliency against cloud node failure and network disconnection. We develop a trust protocol called IoT-HiTrust leveraging this 3-layer hierarchical structure to realize TaaS. We validate our trust-based IoT service management techniques developed with real-world IoT applications, including smart city air pollution detection, augmented map travel assistance, and travel planning, and demonstrate that our trust-based IoT service management techniques outperform contemporary non-trusted and trust-based IoT service management solutions.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
12

Gonidis, Fotios. "A framework enabling the cross-platform development of service-based cloud applications." Thesis, University of Sheffield, 2015. http://etheses.whiterose.ac.uk/13333/.

Full text
Abstract:
Among all the different kinds of service offering available in the cloud, ranging from compute, storage and networking infrastructure to integrated platforms and software services, one of the more interesting is the cloud application platform, a kind of platform as a service (PaaS) which integrates cloud applications with a collection of platform basic services. This kind of platform is neither so open that it requires every application to be developed from scratch, nor so closed that it only offers services from a pre-designed toolbox. Instead, it supports the creation of novel service-based applications, consisting of micro-services supplied by multiple third-party providers. Software service development at this granularity has the greatest prospect for bringing about the future software service ecosystem envisaged for the cloud. Cloud application developers face several challenges when seeking to integrate the different micro-service offerings from third-party providers. There are many alternative offerings for each kind of service, such as mail, payment or image processing services, and each assumes a slightly different business model. We characterise these differences in terms of (i) workflow, (ii) exposed APIs and (iii) configuration settings. Furthermore, developers need to access the platform basic services in a consistent way. To address this, we present a novel design methodology for creating service-based applications. The methodology is exemplified in a Java framework, which (i) integrates platform basic services in a seamless way and (ii) alleviates the heterogeneity of third-party services. The benefit is that designers of complete service-based applications are no longer locked into the vendor-specific vagaries of third-party micro-services and may design applications in a vendor-agnostic way, leaving open the possibility of future micro-service substitution. The framework architecture is presented in three phases. The first describes the abstraction of platform basic services and third-party micro-service workflows,. The second describes the method for extending the framework for each alternative micro-service implementation, with examples. The third describes how the framework executes each workflow and generates suitable client adaptors for the web APIs of each micro-service.
APA, Harvard, Vancouver, ISO, and other styles
13

Lafranchise, Paul Andrew. "Migrating Department of Defense (DoD) Web Service Based Applications to Mobile Computing Platforms." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6820.

Full text
Abstract:
This thesis explores techniques for extending Department of Defense (DoD) Information Technology (IT) capability from web-based desktop clients to mobile platforms. Specifically, we examine how existing data services can be consumed by native and web-based mobile clients without modification to the services. We consider the data access layer, the User Interface (UI) design, and the Total Cost of Ownership (TCO) as areas to compare and contrast each implementation. We develop a web-based application and implement comparable capability on native and web-based mobile clients. We determined that native applications and mobile aware web applications are capable of consuming an existing web service without modifying the service. In general, we find no clear advantage between our mobile implementations when consuming existing web services and maintaining a consistent UI. We found that, while developing a data access module, it is difficult to share code between an existing web application and a native mobile application. We find that in some cases, a mobile aware web application excels at rapidly deploying on multiple devices and because it maintains a single code baseline lowering the TCO.
APA, Harvard, Vancouver, ISO, and other styles
14

Rodríguez, Loya Salvador. "A standards-based ICT framework to enable a service-oriented approach to clinical decision support." Thesis, University of Sussex, 2015. http://sro.sussex.ac.uk/id/eprint/53243/.

Full text
Abstract:
This research provides evidence that standards based Clinical Decision Support (CDS) at the point of care is an essential ingredient of electronic healthcare service delivery. A Service Oriented Architecture (SOA) based solution is explored, that serves as a task management system to coordinate complex distributed and disparate IT systems, processes and resources (human and computer) to provide standards based CDS. This research offers a solution to the challenges in implementing computerised CDS such as integration with heterogeneous legacy systems. Reuse of components and services to reduce costs and save time. The benefits of a sharable CDS service that can be reused by different healthcare practitioners to provide collaborative patient care is demonstrated. This solution provides orchestration among different services by extracting data from sources like patient databases, clinical knowledge bases and evidence-based clinical guidelines (CGs) in order to facilitate multiple CDS requests coming from different healthcare settings. This architecture aims to aid users at different levels of Healthcare Delivery Organizations (HCOs) to maintain a CDS repository, along with monitoring and managing services, thus enabling transparency. The research employs the Design Science research methodology (DSRM) combined with The Open Group Architecture Framework (TOGAF), an open source group initiative for Enterprise Architecture Framework (EAF). DSRM's iterative capability addresses the rapidly evolving nature of workflows in healthcare. This SOA based solution uses standards-based open source technologies and platforms, the latest healthcare standards by HL7 and OMG, Decision Support Service (DSS) and Retrieve, Update Locate Service (RLUS) standard. Combining business process management (BPM) technologies, business rules with SOA ensures the HCO's capability to manage its processes. This architectural solution is evaluated by successfully implementing evidence based CGs at the point of care in areas such as; a) Diagnostics (Chronic Obstructive Disease), b) Urgent Referral (Lung Cancer), c) Genome testing and integration with CDS in screening (Lynch's syndrome). In addition to medical care, the CDS solution can benefit organizational processes for collaborative care delivery by connecting patients, physicians and other associated members. This framework facilitates integration of different types of CDS ideal for the different healthcare processes, enabling sharable CDS capabilities within and across organizations.
APA, Harvard, Vancouver, ISO, and other styles
15

de, Siqueira Teles Fabrício. "Towards Model-Driven Engineering Constraint-Based Scheduling Applications." Universidade Federal de Pernambuco, 2008. https://repositorio.ufpe.br/handle/123456789/2348.

Full text
Abstract:
Made available in DSpace on 2014-06-12T15:57:08Z (GMT). No. of bitstreams: 2 arquivo3142_1.pdf: 2136149 bytes, checksum: 9584d05181d7f6e862c757ce418c8701 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2008
de Siqueira Teles, Fabrício; Pierre Louis Robin, Jacques. Towards Model-Driven Engineering Constraint-Based Scheduling Applications. 2008. Dissertação (Mestrado). Programa de Pós-Graduação em Ciência da Computação, Universidade Federal de Pernambuco, Recife, 2008.
APA, Harvard, Vancouver, ISO, and other styles
16

Zhai, Ke, and 翟可. "Budget-sensitive testing and analysis strategies and their applications to concurrent and service-based systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hdl.handle.net/10722/210386.

Full text
Abstract:
Software testing is the most widely practiced approach to assure the correctness of programs. Despite decades of research progress, software testing is still considered very resource-demanding and time-consuming. In the recent decade, the wide adoption of multithreaded programs and the service-based architecture has further aggravated the problem that we are facing. In this thesis, we study issues in software testing where resource constraints (such as time spent and memory space allocated) are important considerations, and we look for testing techniques that are significantly advanced in effectiveness and efficiency given limited quotas of resources, which we refer to as budget. Our main focus is on two types of systems: concurrent systems and service-based systems. The concurrent system is a class of computing system where programs are designed as collections of interacting and parallel computational processes. Unfortunately, concurrent programs are well known to be difficult to write and test: various concurrency bugs still exist in heavily-tested programs. To make it worse, detecting concurrency bugs is expensive, which is, for example, notorious for dynamic detection techniques that target high precision. This thesis proposes a dynamic sampling framework, CARISMA, to reduce the overhead dramatically while still largely preserving the bug detection capability. To achieve its goal, CARISMA intelligently allocates the limited budget on the computation resource through sampling. The core of CARISMA is a budget estimation and allocation framework whose correctness has been proven mathematically. Another source of cost comes from the nondeterministic nature of concurrent systems. A common practice to test concurrent system is through stress testing where a system is executed with a large number of test cases to achieve a high coverage of the execution space. Stress testing is inherently costly. To this end, it is critical that the bug detection for each execution is effective, which demands a powerful test oracle. This thesis proposes such a test oracle, OLIN, which reports anomalies in the concurrent executions of programs. OLIN finds concurrency bugs that are consistently missed by previous techniques and incurs low overhead. OLIN can achieve a higher effectiveness within given time and computational budgets. Service-based systems are composed of loosely coupled and unassociated units of functional units and are often highly concurrent and distributed. We have witnessed their prosperity in recent decades. Service-based systems are highly dynamic and regression testing techniques are applied to ensure their previously established functionality and correctness are not adversely affected by subsequent evolutions. However, regression testing is expensive and our thesis focuses on the prioritization of regression test cases to improve the effectiveness of testing within predefined constraints. This thesis proposes a family of prioritization metrics for regression testing of location-based services and presents a case study to evaluate their performance. In conclusion, this thesis makes the following contributions to software testing and analysis: (1) a dynamic sampling framework for concurrency bug detection, (2) a test oracle for concurrent testing, and (3) a family of test case prioritization techniques for service-based systems. These contributions significantly improve the effectiveness and efficiency of resource utilization in software testing.
published_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
17

Letswamotse, Babedi Betty. "Software defined networking based resource management and quality of service support in wireless sensor network applications." Thesis, University of Pretoria, 2018. http://hdl.handle.net/2263/67319.

Full text
Abstract:
To achieve greater performance in computing networks, a setup of critical computing aspects that ensures efficient network operation, needs to be implemented. One of these computing aspects is, Quality of Service (QoS). Its main functionality is to manage traffic queues by means of prioritizing sensitive network traffic. QoS capable networking allows efficient control of traffic especially for network critical data. However, to achieve this in Wireless Sensor Networks (WSN) is a serious challenge, since these technologies have a lot of computing limitations. It is even difficult to manage networking resources with ease in these types of technologies, due to their communication, processing and memory limitations. Even though this is the case with WSNs, they have been largely used in monitoring/detection systems, and by this proving their application importance. Realizing efficient network control requires intelligent methods of network management, especially for sensitive network data. Different network types implement diverse methods to control and administer network traffic as well as effectively manage network resources. As with WSNs, communication traffic and network resource control are mostly performed depending on independently employed mechanisms to deal with networking events occurring on different levels. It is therefore challenging to realize efficient network performance with guaranteed QoS in WSNs, given their computing limitations. Software defined networking (SDN) is advocated as a potential paradigm to improve and evolve WSNs in terms of capacity and application. A means to apply SDN strategies to these compute-limited WSNs, formulates software defined wireless sensor networks (SDWSN). In this work, a resource-aware OpenFlow-based Active Network Management (OF-ANM) QoS scheme that uses SDN strategies is proposed and implemented to apply QoS requirements for managing traffic congestion in WSNs. This scheme uses SDN programmability strategies to apply network QoS requirements and perform traffic load balancing to ensure congestion control in SDWSN. Our experimental results show that the developed scheme is able to provide congestion avoidance within the network. It also allows opportunities to implement flexible QoS requirements based on the system’s traffic state. Moreover, a QoS Path Selection and Resource-associating (Q-PSR) scheme for adaptive load balancing and intelligent resource control for optimal network performance is proposed and implemented. Our experimental results indicate better performance in terms of computation with load balancing and efficient resource alignment for different networking tasks when compared with other competing schemes.
Thesis (PhD)--University of Pretoria, 2019.
National Research Foundation
University of Pretoria
Electrical, Electronic and Computer Engineering
PhD
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
18

Aryal, Ishwor. "Integrating Oracle PeopleSoft Campus Solution to External Applications." ScholarWorks@UNO, 2012. http://scholarworks.uno.edu/td/1508.

Full text
Abstract:
An integration solution must sustain multiple PeopleSoft upgrades, which is necessary to preserve investment in system integrations. Since the underlying structures and connection technologies of PeopleSoft have been and can be migrated from version to version in order to enhance features and performance, it is critical for any external component of integration to be built based on publicly visible interfaces of the PeopleSoft component. We have developed a standard-based solution to integrate “PeopleSoft Campus Solution” into “Microsoft SharePoint” using Web services generated by PeopleSoft’s Pure Internet Architecture. We have illustrated such kind of integration in two examples that emulate some of the imminent problems in the University’s current information systems between the PeopleSoft Campus and SharePoint Workflow. The methodology used in this is applicable to integrations of general COTS software systems into modern enterprise information systems.
APA, Harvard, Vancouver, ISO, and other styles
19

Sinclair, J. G. "An approach to compliance conformance for cloud-based business applications leveraging service level agreements and continuous auditing." Thesis, Queen's University Belfast, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.676738.

Full text
Abstract:
Organisations increasingly use flexible, adaptable and scalable IT infrastructures, such as cloud computing resources, for hosting business applications and storing customer data. To prevent the misuse of personal data, auditors can assess businesses for legal compliance conformance. For data privacy compliance there are many applicable pieces of legislation as well as regulations and standards. Businesses operate globally and typically have systems that are dynamic and mobile; in contrast current data privacy laws often have geographical jurisdictions and so conflicts can arise between the law and the technological framework of cloud computing. Traditional auditing approaches are unsuitable for cloud-based environments because of the complexity of potentially short-lived, migratory and scalable real-time virtual systems. My research goal is to address the problem of auditing cloud-based services for data privacy compliance by devising an appropriate machine-readable Service Level Agreement (SLA) framework for specifying applicable legal conditions. This allows the development of a scalable Continuous Compliance Auditing Service (CCAS) for monitoring data privacy in cloud-based environments. The CCAS architecture utilises agreed SLA conditions to process service events for compliance conformance. The CCAS architecture has been implemented and customised for a real world Electronic Health Record (EHR) scenario in order to demonstrate geo-location compliance monitoring using data privacy restrictions. Finally, the automated audit process of CCAS has been compared and evaluated against traditional auditing approaches and found to have the potential for providing audit capabilities in complex IT environments.
APA, Harvard, Vancouver, ISO, and other styles
20

Blagodárný, David. "Do Privacy Concerns Matter in Adoption of Location-based Smartphone Applications for Entertainment Purposes : A Study Among University Students in Sweden." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-67092.

Full text
Abstract:
Adoption of location-based services (LBS) was for a long time below expectations, and most of the studies attribute it to privacy concerns of users. However, many new LBS applications are currently among the most downloaded application for smartphones, particularly entertainment applications. Therefore, this research aims to find out whether privacy concerns still matter to users and to explore the role of the privacy in the adoption of LBS entertaining applications. The adopted methodology is qualitative research and data are collected through interviews and additional information from the smartphones ofparticipants. Ten individuals among university students at Linnaeus University in Sweden are selected for this research, and this sample choice is per their experience with two selected LBS entertaining applications, Pokémon Go and Tinder. As a result, six themes have been recognized to answer the research questions. Low privacy concerns about location information, especially in entertainment applications with negligible effect on adoption have been identified. However, author of this research suggests, that developers of LBS entertaining applications should care for retaining their credibility because it can have an impact on the adoption of their LBS services.
APA, Harvard, Vancouver, ISO, and other styles
21

Alghamdi, Turki A. "Novel localised quality of service routing algorithms : performance evaluation of some new localised quality of service routing algorithms based on bandwidth and delay as the metrics for candidate path selection." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5420.

Full text
Abstract:
The growing demand on the variety of internet applications requires management of large scale networks by efficient Quality of Service (QoS) routing, which considerably contributes to the QoS architecture. The biggest contemporary drawback in the maintenance and distribution of the global state is the increase in communication overheads. Unbalancing in the network, due to the frequent use of the links assigned to the shortest path retaining most of the network loads is regarded as a major problem for best effort service. Localised QoS routing, where the source nodes use statistics collected locally, is already described in contemporary sources as more advantageous. Scalability, however, is still one of the main concerns of existing localised QoS routing algorithms. The main aim of this thesis is to present and validate new localised algorithms in order to develop the scalability of QoS routing. Existing localised routing, Credit Based Routing (CBR) and Proportional Sticky Routing (PSR), use the blocking probability as a factor in selecting the routing paths and work with either credit or flow proportion respectively, which makes impossible having up-to-date information. Therefore our proposed Highest Minimum Bandwidth (HMB) and Highest Average Bottleneck Bandwidth History (HABBH) algorithms utilise bandwidth as the direct QoS criterion to select routing paths. We introduce an Integrated Delay Based Routing and Admission Control mechanism. Using this technique Minimum Total Delay (MTD), Low Fraction Failure (LFF) and Low Path Failure (LPF) were compared against the global QoS routing scheme, Dijkstra, and localised High Path Credit (HPC) scheme and showed superior performance. The simulation with the non-uniformly distributed traffic reduced blocking probability of the proposed algorithms. Therefore, we advocate the algorithms presented in the thesis, as a scalable approach to control large networks. We strongly suggest that bandwidth and mean delay are feasible QoS constraints to select optimal paths by locally collected information. We have demonstrated that a few good candidate paths can be selected to balance the load in the network and minimise communication overhead by applying the disjoint paths method, recalculation of candidate paths set and dynamic paths selection method. Thus, localised QoS routing can be used as a load balancing tool in order to improve the network resource utilization. A delay and bandwidth combination is one of the future prospects of our work, and the positive results presented in the thesis suggest that further development of a distributed approach in candidate paths selection may enhance the proposed localised algorithms.
APA, Harvard, Vancouver, ISO, and other styles
22

Ait, Lahcen Ayoub. "Developing component-based applications with a data-centric approach and within a service-oriented P2P architecture : specification, analysis and middleware." Nice, 2012. http://www.theses.fr/2012NICE4084.

Full text
Abstract:
Le développement d’applications avec une architecture Pair-à-Pair (P2P) est devenu de plus en plus important en ingénierie du logiciel. Aujourd’hui, un grand nombre d’organisations de tailles et secteurs différents compte d’une manière croissante sur la collaboration entre multiples acteurs (individus, groupes, communautés, etc. ) pour accomplir des tâches essentielles. Ces applications P2P ont généralement un comportement récursif que plusieurs approches de modélisation ne peuvent pas décrire et analyser (exemple : les approches basées sur les automates à états finis). Un autre challenge qui concerne le développement d’applications P2P est le couplage fort entre la spécification d’une part, et les technologies et protocoles sous-jacents d’autre part. Cela force les développeurs à faire des efforts considérables pour trouver puis comprendre des informations sur les détails de ces couches casses du P2P. De plus, ce couplage fort oblige les applications à s’exécuter dans des environnements figés. Par conséquent, choisir par exemple un autre protocole pour répondre à un nouveau besoin à l’exécution devient une tâche très difficile. Outre ces points, les applications P2P sont souvent spécifiées avec une faible capacité à déléguer des traitements entre les pairs, et se focalisent surtout sur le partage et le stockage de données. Ainsi, elles ne profitent pas pleinement de la puissance de calcul et de traitement offerte par le réseau P3P sous-jacent. Dans cette thèse, nous présentons une approche qui combine les principes du développement orienté composants et services avec des techniques issues des Grammaires Attribuées et d’Analyses de flot de données (techniques utilisées surtout dans la construction de compilateurs) afin de faciliter la spécification, l’analyse et le déploiement d’applications dans des architectures P2P. Cette approche incorpore : i) Un langage formel nommé DDF (de l’anglais Data-Dependency Formalism) pour spécifier les applications et construire leurs graphes de dépendances de données. Un graphe de dépendances de données est nommé DDG (de l’anglais Data Dependency Graph) et est défini pour être une représentation abstraite de l’application spécifiée. Ii) Une méthode d’analyse qui utilise le graphe de dépendances de données pour inférer et calculer diverses propriétés, y compris certaines propriétés que les models-checkers ne peuvent pas calculer si le système présente un comportement récursif. Iii) Un intergiciel nommé SON (de l’anglais Shared Data Overlay Network) afin de développer et d’exécuter des applications dans une architecture P2P sans faire face à la complexité des couches sous-jacentes. Cela grâce essentiellement au couplage faible (par une approche orientée services) et à la fonctionnalité de génération de code automatique
Developing Peer-to-Peer (P2P) applications became increasingly important in software development. Nowadays, a large number of organizations from many different sectors and sizes depend more and more on collaboration between actors (individuals, groups, communities, etc. ) to perform their tacks. These P2P applications usually have a recursive behaviour that many modeling approaches cannot describe and analyze (e. G. Finite-state approaches). Another challenging issue in P2P application development is the tight coupling between application specification and the underlying P2P technologies and protocols. This forces software developers to make tedious efforts in finding and understanding detailed knowledge about P2P low level concerns. Moreover, this tight coupling constraints applications to run in a changeless runtime environment. Consequently, choosing (for example) another protocol at runtime to meet a new requirement becomes very difficult. Besides these previous issues, P2P applications are usually specified with a weak ability to delegate computing activities between peers, and especially focus on data sharing and storage. Thus, it is not able to take full advantages of the computing power of the underlying P2P network. In this thesis, we present an approach that combines component – and service-oriented development with well-understood methods and techniques from the fields of Attribute Grammars and Data-Flow Analysis (commonly used in compiler construction) in order to offer greater ease in the specification, analysis and deployment of applications ion P2P architecture. This approach embodies : i) A formal language called DDF (Data-Dependency Formalism) to specify applications and construct their Data-Dependency Graphs (DDGs). A DDG has been defined to be an abstract representation of applications. Ii) An analysis method that uses DDG to infer and compute various properties, including some properties that model checkers cannot compute if the system presents recursive behaviour. Iii) A component-based service middleware called SON (Shared-data Overlay Network) to develop and execute applications within P2P architecture without the stress of dealing with P2P low level complexity. Thanks to SON’s automatic generation
APA, Harvard, Vancouver, ISO, and other styles
23

García, Moral Daniel Jesús. "Remote File Access System for Generic Ericsson Processor Boards : File transfer service, Random Access Memory-based file system and secure file transfer solution research." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-53448.

Full text
Abstract:
Generic Ericsson Processor boards are general purpose hardware platforms which provide generic processing services. They support the Unified Extensible Firmware Interface Specification. They have several network interfaces available and they are connected to Ericsson’s laboratory network. Several servers are also connected to this network. These boards require periodic firmware upgrades. They also require acquiring new firmware components and data files. Currently, an application to download or upload files from and to Ericsson’s laboratory servers when an Operating System has not already been booted does not exist. Therefore, the files have to be transferred to USB drives which are connected later to the boards in order to transfer the files. This is a time consuming operation which decreases Ericsson’s productivity. In addition, although Generic Ericsson Processor boards have an optional solid-state drive as secondary storage, Ericsson wants to be able to operate without it. This is because this secondary storage is not always available and Ericsson does not want to use it when the Generic Ericsson Processor boards are operating before an Operating System has been loaded. They prefer to use Random Access Memory storage. This project is focused on studying possible solutions for those two problems. Several file transfer protocols are analyzed. Several file system solutions mounted on Random Access Memory are also explored. A Trivial File Transfer Protocol client application and a Random Access Memory Disk driver prototype are designed, implemented and tested. They are tailored to work on a pre-boot environment, when the boards have not booted an Operating System yet, in Ericsson’s laboratory network. Finally, a secure file transfer protocols’ study is developed. This study will be used to assess Ericsson on the optimal secure file transfer protocol choice in order to implement possible secure future versions of the system.
APA, Harvard, Vancouver, ISO, and other styles
24

Núñez, Benjamin. "Applying a router-based-distributed bandwidth allocation algorithm to dynamically implement traffic engineering over MPLS-based networks in order to increase the quality of service for non-elastic applications." Diss., Connect to online resource, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1435226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

CARMO, ANNIBAL JOSE RORIS RODRIGUEZ SCAVARDA DO. "EVOCATIVE METHODOLOGY FOR CAUSAL MAPPING AND ITS PERSPECTIVE IN THE OPERATIONS MANAGEMENT WITH INTERNET-BASED APPLICATIONS FOR SUPPLY CHAIN MANAGEMENT AND SERVICE MANAGEMENT." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2004. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=5331@1.

Full text
Abstract:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
A compreensão dos atuais processos produtivos é essencial neste momento em que o conhecimento tornou-se um importante gerador de valor. Uma visão holística dos conhecimentos que estão disseminados, de forma dispersa, entre profissionais, consultores e acadêmicos é necessária para a síntese de novas teorias da produção. Pesquisadores de gerência de operações freqüentemente usam mapeamento causal como um mecanismo para construir e comunicar teorias, particularmente em suporte à pesquisa empírica. As abordagens mais usuais para capturar dados cognitivos para um mapa causal são brainstorming e entrevistas, os quais exigem muito tempo e apresentam um significativo custo em sua implementação. Esta tese visa gerar uma metodologia (Metodologia Evocativa para Mapeamento Causal - ECMM) voltada para aplicação em pesquisa sobre gerência de operações para coletar e estruturar dados disseminados de forma desagregada, como conhecimento e experiência profissional e acadêmica, contidos nas opiniões de um grande número de especialistas dispersos demograficamente e geograficamente. Isto é alcançado evocando opiniões, codificando-as em variáveis e reduzindo o grupo em conceitos e relações. Tem-se uma especial preocupação em conseguir este objetivo em tempo factível e com baixo custo. A coleta de dados é assíncrona, via Internet, possui dois ou três turnos (à semelhança do método Delfos). A análise de dados usa codificação, técnica de grupamento hierárquica e escalamento multidimensional para identificar conceitos na forma de mapas cognitivos. A ECMM foi ilustrada com aplicações que demonstram sua viabilidade. Aplicou-se nas áreas de gestão da cadeia de suprimento (SCM) e administração de serviços (SM) com a participação de aproximadamente 1.300 respondentes de empresas e universidades de quase 100 países. Dentre os desdobramentos para pesquisas futuras propõe-se aplicar nas áreas de ECMM em SCM e SM visando a uni-las em um tema: gestão da cadeia de suprimento de serviços.
The understanding of the present productive processes is essential at this moment when knowledge became an important value creator. A holistic vision of the pieces of knowledge that are spread out and dispersed among practitioners, consultants and academics is necessary for the synthesis of new theories of production. Operations management researchers often use causal mapping as a key tool for building and communicating theory, particularly in support of empirical research. The widely accepted approaches for capturing cognitive data for a causal map are informal brainstorming and interviews, which require a time- consuming and significant cost of implementation. This dissertation aims at creating a methodology (Evocative Causal Mapping Methodology - ECMM) intended for use in operations management research for collecting and structuring dispersed data spread out as practical and research knowledge, and experience contained in the opinions of a large number of specialists demographically and geographically scattered. This is accomplished by evoking opinions, encoding them into variables and reducing the resulting set to concepts and relationships. A special concern is to achieve this goal in a feasible time and cost- efficient way. ECMM consists of two or three round, Delphi- like, Internet-based asynchronous data collection, and a data analysis that uses a coding panel of experts, hierarchical cluster analysis and multidimensional scaling for identifying concepts on cognitive map formats. Applications illustrate ECMM and demonstrate its feasibility. They were developed on supply chain management (SCM) and service management (SM) involving about 1,300 respondents of companies and universities of about 100 countries. Among possible unfolding future studies, this dissertation proposes to apply ECMM in SCM and SM aiming at unifying them into a single topic: service supply chain management.
APA, Harvard, Vancouver, ISO, and other styles
26

Schmidt, Thomas Rudolf. "Adaptionsalgorithmen zur Erhöhung der Dienstgüte verteilter interaktiver Multimedia-Anwendungen in IP-basierten Netzen = Adaptation algorithms for quality of service improvement of distributed interactive multimedia applications in IP-based networks /." Stuttgart : Inst. für Kommunikationsnetze und Rechnersysteme, 2004. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=012853721&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Imtiaz, Jahanzaib. "Route transmission & control applications and Java web services route transmission and control using a Java EE5 web service and a vehicle based mobile device (cellular phone or a PDA with GPS)." Saarbrücken VDM Verlag Dr. Müller, 2007. http://d-nb.info/988696614/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Movahedi, Zahra. "A business process approach for application development in wireless sensor and actuator networks." Thesis, Université Paris-Saclay (ComUE), 2015. http://www.theses.fr/2015SACLL002.

Full text
Abstract:
Les réseaux de capteurs-actuateurs sans fils (WSANs) sont une technologie émergente dans divers domaines d'application tels que la surveillance, le contrôle du trafic, la domotique, etc. La conception et le développement d'applications utilisant ces technologies restent, cependant, une tâche difficile. En effet, la découverte des capteurs et actuateurs pertinents, et leur combinaison de manière appropriée pour atteindre un objectif spécifique n'est pas une tâche facile et nécessite plusieurs compétences détenues par différents acteurs. De plus, les environnements de capteurs/actuateurs sont par nature très dynamiques. En outre, les applications actuelles sont en général étroitement couplées à l'infrastructure sous-jacente, ce qui entrave leur réutilisation et la flexibilité aux changements.Dans cette thèse, nous présentons une approche orientée processus métier et services afin de permettre le développement des applications adaptables. Notre approche découple la logique de l'application et sa mise en œuvre : Un modèle est d'abord spécifié dans la phase de conception, comme un flux d'activités, et est ensuite déployé dans un environnement particulier. Découpler la logique d'une application et sa mise en œuvre permet d'une part d'apporter la réutilisation au niveau d'application et d'autre part d'adapter la même application à différents environnements et situations. Pour aider les concepteurs à spécifier des nouvelles applications WSANs, nous proposons deux méthodes: 1) la réutilisation d'activité et d'orchestration par le biais des flux de données, et 2) la recommandation d'activité par le biais des flux de contrôle. En outre, la même technique de recommandation fournit la tolérance de panne permettant à une application WSAN de s'adapter aux changements dus aux défaillances des capteurs ou/et actuateurs ou à des violations des contraintes. Notre approche a été validée par des cas d'utilisation réalistes mis en œuvre dans le cadre de la plateforme européenne de VITRO et la plate-forme ZODIANET
Wireless Sensor and Actuator Networks (WSANs) is an emergent technology for various application areas such as security and surveillance applications, traffic control, energy control, etc. Designing and developing applications using these technologies remain, however, a challenging task. Indeed, finding the relevant sensors and actuators, and combining them in a proper way in order to achieve a specific goal is not an easy task and requires several skills detained by different stakeholders. Moreover, sensor/actuator environments are inherently highly dynamic. Furthermore, current applications are in general tightly coupled to the underlying infrastructure which hampers their reuse and flexibility to changes.In this thesis, we present a process-oriented and service-based approach for supporting the development of adaptive WSAN applications. Our approach decouples between the application logic and its implementation. A design-time model is first specified, as a flow of activities, which is then deployed in a particular environment. Decoupling the application logic from its implementation enables on one hand to foster the reuse at the application level and on the other hand to adapt the same application to different environments and situations. To assist designers in specifying new WSAN applications, we propose two methods: 1)activity and orchestration reuse through data flows, and 2)activity recommendation through control flows. Moreover, the same recommendation technique enables providing fault-tolerant mechanism enabling a WSAN application to adapt to changes due to sensor failures or constraints violation. Our approach has been validated by realistic use cases that have been implemented in the context of the European project VITRO platform and the Zodianet platform
APA, Harvard, Vancouver, ISO, and other styles
29

Anjum, Maria. "Design models for service-based software application." Thesis, Durham University, 2013. http://etheses.dur.ac.uk/7343/.

Full text
Abstract:
Context: The use of a Service Oriented Architecture (SOA) offers a new and distinct approach to creating software based applications (SBAs) around the idea of integrating distributed autonomous computing resources. A widely available realisation of an SOA exists in the form of web services. However, to date no standard techniques have emerged for developing SBAs. There is also a lack of consistency in describing the concept itself, and the published literature offers little evidence derived from the experience of developing `real world examples. Aims: The objective of the work described in this thesis was to conduct a series of studies to explore systematically the concept of what constitutes an SOA by using the published literature, to employ this to construct a proof of concept SOA design model based on a real world problem, and in doing so, to investigate how well existing design notations are able to support this architectural style. Method: The research described in this thesis has been conducted in an evolutionary manner by employing a range of empirical methods. A mapping study was performed to investigate how the concept of SOA is interpreted by the research community. Based upon this model of SOA, a participant-observer case study was employed to construct an SOA design model and a use case model for an energy engineering application to demonstrate use for a real world problem. Finally, expert knowledge was employed for evaluation of the case study through the use of walkthroughs. Results: From the mapping study we created an integrated model of what constitutes an SOA for the use with the case study. The case study outcomes include a design for a renewable energy control system together with codified experience of constructing and recording the SOA design model. The experience of employing the walkthrough method for evaluation, and the outcomes of the evaluation are also discussed. Conclusion: From this research we conclude that the SOA research community needs to develop a clearer shared understanding and agreement on the model of what constitutes an SOA and the vocabulary used to describe the SOA concept. This will aid designers to communicate their mental models more effectively and will provide the semantics needed for devising the new notations that this study implies are needed for SBA design. Further, some lessons about SBA design have been derived from the case study experiences.
APA, Harvard, Vancouver, ISO, and other styles
30

Shi, Shengkai, and 石晟恺. "Cost-aware online VM purchasing for cloud-based application service providers with arbitrary demands." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/208014.

Full text
Abstract:
Recent years witness the proliferation of Infrastructure-as-a-Service (IaaS) cloud services, which provide on-demand resources (CPU, RAM, disk, etc.) in the form of virtual machines (VMs) for hosting services of third parties. As such, the way of enabling scalable and dynamic Internet applications has been remarkably revolutionized. More and more Application Service Providers (ASPs) are launching their applications in clouds, eliminating the need to construct and operate their owned IT hardware and software. Given the state-of-the-art IaaS offerings, it is still a problem of fundamental importance how the ASPs should rent VMs from the clouds to serve their application needs, in order to minimize the cost while meeting their job demands over a long run. Cloud providers offer different pricing options to meet computing requirements of a variety of applications. The commonly adopted cloud pricing schemes are (1) reserved instance pricing, (2) on-demand instance pricing, and (3) spot instance pricing. However, the challenge facing an ASP is how these pricing schemes can be blended to accommodate arbitrary demands at the optimal cost. In this thesis, we seek to integrate all available pricing options and design effective online algorithms for the long-term operation of ASPs. We formulate the long-term-averaged VM cost minimization problem of an ASP with time-varying and delay-tolerant workloads in a stochastic optimization model. An efficient online VM purchasing algorithm is designed to guide the VM purchasing decisions of the ASP based on the Lyapunov optimization technique. In stark contrast with the existing studies, our online VM purchasing algorithm does not require any a priori knowledge of the workload or any future information. Moreover, it addresses the possible job interruption due to uncertain availability of spot instances. Rigorous analysis shows that our algorithm can achieve a time-averaged VM purchasing cost with a constant gap from its offline minimum. Trace-driven simulations further verify the efficacy of our algorithm.
published_or_final_version
Computer Science
Master
Master of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
31

Metin, Mehmet Ozer. "Creating Application Security Layer Based On Resource Access Decision Service." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/12608827/index.pdf.

Full text
Abstract:
Different solutions have been used for each security aspects (access control, application security) to secure enterprise web applications. However combining "
enterprise-level"
and "
application-level"
security aspects in one layer could give great benefits such as reusability, manageability, and scalability. In this thesis, adding a new layer to n-tier web application architectures to provide a common evaluation and enforcement environment for both enterprise-level and application level policies to bring together access controlling with application-level security. Removing discrimination between enterprise-level and application-level security policies improves manageability, reusability and scalability of whole system. Resource Access Decision (RAD) specification has been implemented and used as authentication mechanism for this layer. RAD service not only provides encapsulating domain specific factors to give access decisions but also can form a solid base to apply positive and negative security model to secure enterprise web applications. Proposed solution has been used in a real life system and test results have been presented.
APA, Harvard, Vancouver, ISO, and other styles
32

Kongdenfha, Woralak Computer Science &amp Engineering Faculty of Engineering UNSW. "Pattern-based data and application integration in service oriented architectures." Awarded By:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/42600.

Full text
Abstract:
The success of Web services comes from the benefits that it brings in reducing the cost and the time needed to develop data and applications by reusing them, and simplifying their integrations through standardization. However, standardization in Web services does not remove the need for adapters due to possible heterogeneity among service interface and protocol definitions. Moreover, the current service APIs are targeted toward professional programmers, but not accessible to a wider class of users without programming expertise, but would never the less like to build their own integrated applications. In this dissertation, we propose methods and tools to support both service developers and non-expert users in their data and application integration tasks. To support service developers, we propose a framework that enables rapid development of Web service adapters. We investigate particularly the problem of service adaptation focusing on business interface and protocol layers. Our study shows that many differences between business interfaces and protocols are recurring. We introduce mismatch patterns to capture these recurring differences and provide solutions to resolve them. We present the notion of adaptation aspects, which is based on the aspect-oriented programming paradigm, to enable rapid development and deployment of service adapters. We also present a comparative study between standalone and aspect-oriented adapters development. The study shows that the aspect-oriented approach is preferable in many cases, especially when adapters need to access internal states of services. The proposed approach is implemented in a prototype tool, which is used to illustrate how it simplifies adapters development through a case study. To support users without programming expertise, we propose a spreadsheet-based Web mashups development framework, which enables users to develop mashups in the popular spreadsheet environment. First, we provide a mechanism that makes structured data first class values of spreadsheet cells. Second, we propose a new component model that can be used to develop fairly sophisticated mashups, involving joining data sources and keeping spreadsheet data up to date. Third, to simplify mashup development, we provide a collection of spreadsheet-based mashup patterns that captures common Web data access and spreadsheet presentation functionalities. Users can reuse and customize these patterns to build spreadsheet-based Web mashups instead of developing them from scratch. Fourth, we enable users to manipulate structured data presented on spreadsheet in a drag-and-drop fashion. Finally, we have developed and tested a prototype tool to demonstrate the utility of the proposed framework.
APA, Harvard, Vancouver, ISO, and other styles
33

Danciu, Vitalian. "Application of policy-based techniques to process-oriented IT Service Management." Diss., lmu, 2007. http://nbn-resolving.de/urn:nbn:de:bvb:19-78161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Singaravelu, Lenin. "End-to-End Security of Information Flow in Web-based Applications." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16142.

Full text
Abstract:
Web-based applications and services are increasingly being used in security-sensitive tasks. Current security protocols rely on two crucial assumptions to protect the confidentiality and integrity of information: First, they assume that end-point software used to handle security-sensitive information is free from vulnerabilities. Secondly, these protocols assume point-to-point communication between a client and a service provider. However, these assumptions do not hold true with large and complex vulnerable end point software such as the Internet browser or web services middleware or in web service compositions where there can be multiple value-adding service providers interposed between a client and the original service provider. To address the problem of large and complex end-point software, we present the AppCore approach which uses manual analysis of information flow, as opposed to purely automated approaches, to split existing software into two parts: a simplified trusted part that handles security-sensitive information and a legacy, untrusted part that handles non-sensitive information without access to sensitive information. Not only does this approach avoid many common and well-known vulnerabilities in the legacy software that compromised sensitive information, it also greatly reduces the size and complexity of the trusted code, thereby making exhaustive testing or formal analysis more feasible. We demonstrate the feasibility of the AppCore approach by constructing AppCores for two real-world applications: a client-side AppCore for https-based applications and an AppCore for web service platforms. Our evaluation shows that security improvements and complexity reductions (over a factor of five) can be attained with minimal modifications to existing software (a few tens of lines of code, and proxy settings of a browser) and an acceptable performance overhead (a few percent). To protect the communication of sensitive information between the clients and service providers in web service compositions, we present an end-to-end security framework called WS-FESec that provides end-to-end security properties even in the presence of misbehaving intermediate services. We show that WS-FESec is flexible enough to support the lattice model of secure information flow and it guarantees precise security properties for each component service at a modest cost of a few milliseconds per signature or encrypted field.
APA, Harvard, Vancouver, ISO, and other styles
35

Jawad, Dina, and Felicia Rosell. "Speak-up as a Resource Based Defence against Application Layer Distributed Denial-of-Service Attacks." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166597.

Full text
Abstract:
Under de senaste åren har antalet DDoS-attacker i Internets applikationsskikt ökat. Detta problem behöver adresseras. Den här rapporten presenterar ett antal existerande metoder för att upptäcka och skydda mot DDoS-attacker i applikationsskiktet. En metod för detta ändamål är att hitta avvikelser av olika typer hos de attackerande klienterna, för att urskilja mellan attackerande och vanliga klienter. Detta är ett brett utforskatförsvarsområde med många positiva resultat, men dessa metoder har ett antal brister, som att de kan resultera i både falska positiva och negativa resultat. En metod som ännu inte har undersökts tillräckligt är resurs-baserat försvar. Det är en metod med mycket potential, eftersom den tydligare kan skilja på goda och onda klienter under en DDoS-attack. Speak-up är en sådan metod och är huvudfokus i denna rapport. För- och nackdelarna med Speak-up har undersökts och resultaten visar på att Speak-up har potential till att bli ett kraftfullt verktyg mot DDoS-attacker. Speak-up har dock sina begränsningar och är därför inte det bästa alternativet under vissa typer av dessa DDoS-attacker.
In recent years, the internet has endured an increase in application layer DDoS attacks. It is a growing problem that needs to be addressed. This paper presents a number of existing detection and protection methods that are used to mitigate application layer DDoS attacks. Anomaly detection is a widely explored area for defence and there have been many findings that show positive results in mitigating attacks. However, anomaly detection possesses a number of flaws, such as causing false positives and negatives. Another method that has yet to become thoroughly examined is resource based defence. This defence method has great potential as it addresses clear differences between legitimate users and attackers during a DDoS attack. One such defence method is called Speak-up and is the center of this paper. The advantages and limitations of Speak-up have been explored and the findings suggest that Speak-up has the potential to become a strong tool in defending against DDoS attacks. However, Speak-up has its limitations and may not be the best alternative during certain types of application layer DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
36

Foekens, Eijte Willem. "Scanner data based marketing modelling : empirical applications /." Capelle a/d IJssel : Labyrint Publ, 1995. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=007021048&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Lee, Chi-ching Kathy. "Application of the concept of performance-based pay in Hong Kong civil service." Click to view the E-thesis via HKUTO, 2003. http://sunzi.lib.hku.hk/hkuto/record/B31967243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Solari, Jaime 1973. "An application service provider infrastructure for shared workspaces in Internet-based collaborative design." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9036.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Architecture; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2000.
Includes bibliographical references (leaves 103-107).
For architectural, engineering and construction projects involving transient 'virtual organizations' composed of non-collocated team-members, the adoption of concurrent design principles is seen as vital. An important aspect of concurrent design is the need for an effective communications infrastructure between team members. Traditionally, such communication has been handled through person-to-person meetings, however the complexity of modern projects has grown and as a result, reliance on new information and communications technologies is becoming increasingly necessary. Hence, within a concurrent design setting, there is the need for an integrated information and collaboration environment that will create a persistent shared workspace to support interaction between project personnel throughout all phases of the project. This research explores computer-supported mechanisms for enhancing distributed design collaboration. The goal of this thesis is to develop a set of requirements, system architecture and an early system prototype to facilitate computer-supported collaboration among distributed teams. The prototype will consist of a persistent shared workspace system built from the integration of complementary collaborative applications. These applications are the CAIRO system, developed at the Massachusetts Institute of Technology and the VNC system developed at the Olivetti Research Laboratory.
by Jaime Solari.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
39

Khan, Imran. "Cloud-based cost-efficient application and service provisioning in virtualized wireless sensor networks." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0019/document.

Full text
Abstract:
Des Réseaux de Capteurs Sans Fil (RdCSF) deviennent omniprésents et sont utilisés dans diverses applications domaines. Ils sont les pierres angulaires de l'émergence de l'Internet des Objets (IdO) paradigme. Déploiements traditionnels de réseaux de capteurs sont spécifiques à un domaine, avec des applications généralement incrustés dans le RdCSF, excluant la ré-utilisation de l'infrastructure par d'autres applications. Maintenant, avec l'avènement de l'IdO, cette approche est de moins en moins viable. Une solution possible réside dans le partage d'une même RdCSF par de plusieurs applications et services, y compris même les applications et services qui ne sont pas envisagées lors du déploiement de RdCSF. Deux principaux développements majeurs ont conduit à cette solution potentielle. Premièrement, comme les nœuds de RdCSF sont de plus en plus puissants, il devient de plus en plus pertinent de rechercher comment pourrait plusieurs applications partager les mêmes déploiements WSN. La deuxième évolution est le Cloud Computing paradigme qui promeut des ressources et de la rentabilité en appliquant le concept de virtualisation les ressources physiques disponibles. Grâce à ces développements de cette thèse fait les contributions suivantes. Tout d'abord, un vaste état de la revue d'art est présenté qui présente les principes de base de RdCSF la virtualisation et sa pertinence avec précaution motive les scénarios sélectionnés. Les travaux existants sont présentés en détail et évaluées de manière critique en utilisant un ensemble d'exigences provenant du scénario. Cette contribution améliore sensiblement les critiques actuelles sur l'état de l'art en termes de portée, de la motivation, de détails, et les questions de recherche futures. La deuxième contribution se compose de deux parties: la première partie est une nouvelle architecture de virtualization RdCSF multicouche permet l'approvisionnement de plusieurs applications et services au cours du même déploiement de RdCSF. Il est mis en œuvre et évaluée en utilisant un prototype basé sur un scénario de preuve de concept en utilisant le kit Java SunSpot. La deuxième partie de cette contribution est l'architecture étendue qui permet à l’infrastructure virtualisée RdCSF d'interagir avec un RdCSF Platform-as-a-Service (PaaS) à un niveau d'abstraction plus élevé. Grâce à ces améliorations RdCSF PaaS peut provisionner des applications et des services RdCSF aux utilisateurs finaux que Software-as-a-Service (SaaS). Les premiers résultats sont présentés sur la base de l'implantation de l'architecture améliorée en utilisant le kit Java SunSpot. La troisième contribution est une nouvelle architecture d'annotation de données pour les applications sémantiques dans les environnements virtualisés les RdCSF. Il permet en réseau annotation de données et utilise des superpositions étant la pierre angulaire. Nous utilisons la base ontologie de domaine indépendant d'annoter les données du capteur. Un prototype de preuve de concept, basé sur un scénario, est développé et mis en œuvre en utilisant Java SunSpot, Kits AdvanticSys et Google App Engine. La quatrième et dernière contribution est l'amélioration à l'annotation de données proposée l'architecture sur deux fronts. L'un est l'extension à l'architecture proposée pour soutenir la création d'ontologie, de la distribution et la gestion. Le deuxième front est une heuristique génétique basée algorithme utilisé pour la sélection de noeuds capables de stocker l'ontologie de base. L'extension de la gestion d'ontologie est mise en oeuvre et évaluée à l'aide d'un prototype de validation de principe à l'aide de Java kit SunSpot, tandis que les résultats de la simulation de l'algorithme sont présentés
Wireless Sensor Networks (WSNs) are becoming ubiquitous and are used in diverse applications domains. Traditional deployments of WSNs are domain-specific, with applications usually embedded in the WSN, precluding the re-use of the infrastructure by other applications. This can lead to redundant deployments. Now with the advent of IoT, this approach is less and less viable. A potential solution lies in the sharing of a same WSN by multiple applications and services, to allow resource- and cost-efficiency. In this dissertation, three architectural solutions are proposed for this purpose. The first solution consists of two parts: the first part is a novel multilayer WSN virtualization architecture that allows the provisioning of multiple applications and services over the same WSN deployment. The second part of this contribution is the extended architecture that allows virtualized WSN infrastructure to interact with a WSN Platform-as-a-Service (PaaS) at a higher level of abstraction. Both these solutions are implemented and evaluated using two scenario-based proof-of-concept prototypes using Java SunSpot kit. The second architectural solution is a novel data annotation architecture for the provisioning of semantic applications in virtualized WSNs. It is capable of providing in-network, distributed, real-time annotation of raw sensor data and uses overlays as the cornerstone. This architecture is implemented and evaluated using Java SunSpot, AdvanticSys kits and Google App Engine. The third architectural solution is the enhancement to the data annotation architecture on two fronts. One is a heuristic-based genetic algorithm used for the selection of capable nodes for storing the base ontology. The second front is the extension to the proposed architecture to support ontology creation, distribution and management. The simulation results of the algorithm are presented and the ontology management extension is implemented and evaluated using a proof-of-concept prototype using Java SunSpot kit. As another contribution, an extensive state-of-the-art review is presented that introduces the basics of WSN virtualization and motivates its pertinence with carefully selected scenarios. This contribution substantially improves current state-of-the-art reviews in terms of the scope, motivation, details, and future research issues
APA, Harvard, Vancouver, ISO, and other styles
40

Amziani, Mourad. "Modeling, evaluation and provisioning of elastic service-based business processes in the cloud." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0016/document.

Full text
Abstract:
Le Cloud Computing est de plus en plus utilisé pour le déploiement et l'exécution des applications métiers et plus particulièrement des applications à base de services (AbSs). L'élasticité à différents niveaux est l'une des propriétés fournies par le Cloud. Son principe est de garantir la fourniture des ressources nécessaires et suffisantes pour la continuité de l'exécution optimale des services Cloud. La fourniture des ressources doit considérer la variation de la demande pour éviter la sous-utilisation et la surutilisation de ces dernières. Il est évident que la fourniture d'infrastructures et/ou de plateformes élastiques n'est pas suffisante pour assurer l'élasticité des applications métiers déployées. En effet, il est aussi nécessaire de considérer l'élasticité au niveau des applications. Ceci permet l'adaptation dynamique des applications déployées selon la variation des demandes. Par conséquent, les applications métiers doivent être fournies avec des mécanismes d'élasticité permettant leur adaptation tout en assurant les propriétés fonctionnelles et non-fonctionnelles désirées. Dans nos travaux, nous nous sommes intéressés à la fourniture d'une approche holistique pour la modélisation, l'évaluation et la mise en oeuvre des mécanismes d'élasticité des AbSs dans le Cloud. En premier lieu, nous avons proposé un modèle formel pour l'élasticité des AbSs. Pour cela, nous avons modélisé les AbSs en utilisant les réseaux de Petri et défini deux opérations d'élasticité (la duplication et la consolidation). En outre, nous avons proposé de coupler ces deux opérations avec un contrôleur d'élasticité. Pour assurer l'élasticité des AbSs, le contrôleur analyse l'exécution des AbSs et prend des décisions sur les opérations d'élasticité (duplication/consolidation). Après la définition de notre modèle pour l'élasticité des AbSs, nous nous sommes intéressés à l'évaluation de l'élasticité avant de l'implémenter dans des environnements Cloud réels. Pour cela, nous avons proposé d'utiliser notre contrôleur d'élasticité comme un Framework pour la validation et l'évaluation de l'élasticité en utilisant des techniques de vérification et de simulation. Enfin, nous avons mis en oeuvre l'élasticité des AbSs dans des environnements Cloud réels. Pour cela, nous avons proposé deux approches. La première approche encapsule les AbSs non-élastiques dans des micro-conteneurs, étendus avec nos mécanismes d'élasticité, avant de les déployer sur des infrastructures Cloud. La seconde approche intègre notre contrôleur d'élasticité dans une infrastructure autonomique afin de permettre l'ajout dynamique des fonctionnalités d'élasticité aux AbSs déployées sur des plateformes Cloud
Cloud computing is being increasingly used for deploying and executing business processes and particularly Service-based Business Processes (SBPs). Among other properties, Cloud environments provide elasticity at different scopes. The principle of elasticity is to ensure the provisioning of necessary and sufficient resources such that a Cloud service continues running smoothly even when the number or quantity of its utilization scales up or down, thereby avoiding under-utilization and over-utilization of resources. It is obvious that provisioning of elastic infrastructures and/or platforms is not sufficient to provide elasticity of deployed business processes. In fact, it is also necessary to consider the elasticity at the application scope. This allows the adaptation of deployed applications during their execution according to demands variation. Therefore, business processes should be provided with elasticity mechanisms allowing their adaptation to the workload changes while ensuring the desired functional and non-functional properties. In our work, we were interested in providing a holistic approach for modeling, evaluating and provisioning of elastic SBPs in the Cloud. We started by proposing a formal model for SBPs elasticity. To do this, we modeled SBPs using Petri nets and defined two elasticity operations (duplication / consolidation). In addition, we proposed to intertwine these elasticity operations with an elasticity controller that monitors SBPs execution, analyzes monitoring information and executes the appropriate elasticity operation (duplication/consolidation) in order to enforce the elasticity of SBPs. After facing the challenge of defining a model and mechanisms for SBPs elasticity, we were interested in the evaluation of elasticity before implementing it in real environments. To this end, we proposed to use our elasticity controller as a framework for the validation and evaluation of elasticity using verification and simulation techniques. Finally, we were interested in the provisioning of elasticity mechanisms for SBPs in real Cloud environments. For this aim, we proposed two approaches. The first approach packages non-elastic SBPs in micro-containers, extended with our elasticity mechanisms, before deploying them in Cloud infrastructures. The second approach integrates our elasticity controller in an autonomic infrastructure to dynamically add elasticity facilities to SBPs deployed on Cloud platforms
APA, Harvard, Vancouver, ISO, and other styles
41

Simons, A. J. H., and Raluca Lefticaru. "A verified and optimized Stream X-Machine testing method, with application to cloud service certification." Wiley, 2019. http://hdl.handle.net/10454/17608.

Full text
Abstract:
Yes
The Stream X-Machine (SXM) testing method provides strong and repeatable guarantees of functional correctness, up to a specification. These qualities make the method attractive for software certification, especially in the domain of brokered cloud services, where arbitrage seeks to substitute functionally equivalent services from alternative providers. However, practical obstacles include: the difficulty in providing a correct specification, the translation of abstract paths into feasible concrete tests, and the large size of generated test suites. We describe a novel SXM verification and testing method, which automatically checks specifications for completeness and determinism, prior to generating complete test suites with full grounding information. Three optimisation steps achieve up to a ten-fold reduction in the size of the test suite, removing infeasible and redundant tests. The method is backed by a set of tools to validate and verify the SXM specification, generate technology-agnostic test suites and ground these in SOAP, REST or rich-client service implementations. The method was initially validated using seven specifications, three cloud platforms and five grounding strategies.
European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement no. 328392, the Broker@Cloud project [11].
APA, Harvard, Vancouver, ISO, and other styles
42

Quaresmini, Jimmy. "Location based sports/fitness app : Android app for smartphones." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-160260.

Full text
Abstract:
The City of Stockholm’s budget for sports is 1.6% of the total city budget in 2014. About 60,000, licensed (age 15 and up, about 50%) and younger actively played soccer in Stockholm in 2005. That is roughly 24% of the total number of participants in sports activities in Stockholm’s district. There is a need for a location-based application (commonly abbreviated "app") to help people spontaneously meet for different sports activities. The app developed and analyzed in this thesis will address this need and assist potential participants in organizing sports activities, deciding to participate in these activities, make friends, etc. Not only large team sports will be considered, but sports done in pairs such as tennis and other sports as well that you do with others. Consider a person who has moved to a new city and wants to play football (soccer), but does not know people in this city. This app can help this person find others who would like to play in a quick and easy way by looking at a map and seeing where others would like to participate in this sport, for example at a particular soccer field, using location information concerning the potential participants and this specific field. Apps that use location information have become very common with the widespread use of smartphones. Such an app provides a location-based service. This thesis describes the design and implementation of an Android app with a location-based service and how to set up this app, what technology is needed to get the needed location information, and the programming language used. In addition, the thesis considers users’ needs and how the app caters to those needs. An analysis will be done of how well this app communicates with a database server as the number of users increases, scales. Performance and load on both the server and app will be considered. The performance will be analyzed to see how well it matches the users’ expectations. The app developed in this thesis will be for the Android platform and Apple's iOS (but the focus in the thesis is on the Android-version). This app will communicate with a database server running a Linux OS, an Apache HTTP server, a MySQL database, and using a PHP programming web infrastructure (such a setup of services is commonly called by the acronym LAMP). The app will connect to Facebook and Twitter to exchange information (however, that is outside the scope of this thesis).
Stockholms stads budget för sport är 1,6% av den totala budgeten 2014. Ungefär 60 000 licensierade (15 år och uppåt, 50 %) och yngre aktiva fotbollsspelare fanns i Stockholm år 2005. Det motsvarar ungefär 24 % av dem som utövade sport det året i Stockholms distrikt. Det finns ett behov av en platsbaserad applikation (vanligen förkortat ”app”) som hjälper människor att spontant träffas för att utöva olika sporter man utför tillsammans. Appen som utvecklas och analyseras i detta examensarbete försöker tillgodose detta behov och hjälper potentiella deltagare att organisera sportaktiviteter, besluta att delta i dessa aktiviteter, skaffa nya vänner m.m. Inte bara stora lagsporter, men också sporter man utför i par som tennis och andra sporter man utför tillsammans med andra kommer beaktas. Betänk en person som nyss har flyttat till en ny stad och vill spela fotboll, men inte känner några i denna stad. Denna app kan hjälpa den här personen hitta andra som vill sporta på ett enkelt och snabbt sätt genom att titta på en karta och se var andra vill utöva denna sport, t.ex. på en viss fotbollsplan, med användning av platsinformation om potentiella deltagare och denna specifika plan. Appar som använder platsinformation har blivit väldigt vanliga med det utbredda användandet av smarta mobiltelefoner. En sådan här app erbjuder en platsbaserad tjänst. Denna rapport beskriver designen och implementationen av en Android app med en platsbaserad tjänst och hur man sätter upp en sådan här app, vilka teknologier som behövs för att få den platsinformation som behövs och det programmeringsspråk som används. Därutöver kommer rapporten överväga användares behov och hur appen tillgodoser dessa behov. En analys kommer genomföras av hur denna app kommunicerar med en databas server när antalet användare ökar, när den skalar. Prestanda och belastning av både appen och servern kommer tas med i beräkningen. Prestandan kommer analyseras för att se hur väl det motsvarar användares förväntningar. Appen som utvecklas i detta examensarbete kommer vara för Android och Apples iOS (men fokuset i detta examensarbete kommer vara på Android versionen). Denna app kommer kommunicera med en databas server som kör ett Linux OS, har en Apache http (webb) server, en MySQL databas och som använder en PHP programmerings-infrastrutur (en sådan uppsättning tjänster kallas vanligen LAMP, en akronym). Appen kommer ansluta till Facebook och Twitter för att utbyta information (men det ligger dock utanför ramen för detta examensarbete).
APA, Harvard, Vancouver, ISO, and other styles
43

Pham, Andrew Minh-Quan. "An Implementation of Utility-Based Traffic Shaping on Android Devices." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/49670.

Full text
Abstract:
Long Term Evolution (LTE) was designed to provide fast data rates to replace 3G service for mobile devices. As LTE networks and the user base for those networks grow, it becomes necessary for the resources used for those networks to be used as efficiently as possible. This thesis presents an implementation which utilizes an algorithm extended upon the Frank Kelly algorithm to determine resource allocation for UEs and shapes traffic for each UE to meet those allocation limits. The implementation's network represents what an LTE network would do to manage data rates for a UE through a distributed algorithm for rate allocation. The main focus of the implementation is on the UE, where traffic shaping limits application rates by an elastic or inelastic classification through the use of Hierarchical Token Bucket (HTB) queuing disciplines.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
44

Gopinath, Sunil. "An Application Layer Framework for Location- based Service Discovery and Provisioning for Mobile Devices." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32248.

Full text
Abstract:
There has been a tremendous rise in the use of Wireless Application Protocol (WAP) services for cellular telephones. Such services include electronic mail, printing, fax delivery, and weather reports. But, current services are limited both in type and nature. Today, mobile telephone users need access to more dynamic, location-based, distributed services that include both hardware resources, like printers and computers, and software services, like application software. Problems due to mobility include clients disconnecting from the network, services leaving the network, and communication problems. This research proposes and demonstrates the feasibility of a framework for a system to meet such a need. More specifically, this work develops and demonstrates a distributed environment where mobile telephone users have access to services dynamically as they enter and leave different service areas. It also provides a framework to support mobility in the application layer context. This work utilizes Sun Microsystemâ s JINI connection technology to provide distributed services to mobile telephones over WAP. It provides a prototype system to provide Java based software services to mobile telephones. The work also provides several optimizations with respect to client communication by harnessing key features of WAP. This provides a robust, dynamic environment for service provisioning.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
45

Lagerman, Rikard. "An empirical study of the transformation of a Node.js based web application, Entize Planning, into a cloud service." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-32318.

Full text
Abstract:
The Node.js based web application Entize Planning needs to evolve and become distributable, and the logical transformation is into a SaaS cloud service that can compete in a pressured economic climate concerning resources. The aim is to provide an insight into the challenges in mitigating a web service to the cloud. By utilising the edge concerning low-cost and rapid development associated with Open Source use, a NoSQL supported and Node.js with related technologies, cloud service prototype development process and environment is proposed. Keeping guidelines such as: security, maintenance, complexity, scalability and mobility; emphasised, in order to carefully utilise existing architecture will result in an flexible solution that preserves aforementioned attributes, making the project as a whole a success towards its endusers. Key remarks that surfaced was the distinct separation between Entize Planning - the product - and the delivery mechanism - the cloud service plattform - and also the explicit need to investigate any utilisation of preexisting cloud architecture pertaining limitations in their delivery, before adoptation.
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Yating. "Trust-Based Service Management for Service-Oriented Mobile Ad Hoc Networks and Its Application to Service Composition and Task Assignment with Multi-Objective Optimization Goals." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/70965.

Full text
Abstract:
With the proliferation of fairly powerful mobile devices and ubiquitous wireless technology, traditional mobile ad hoc networks (MANETs) now migrate into a new era of service-oriented MANETs wherein a node can provide and receive service from other nodes it encounters and interacts with. This dissertation research concerns trust management and its applications for service-oriented MANETs to answer the challenges of MANET environments, including no centralized authority, dynamically changing topology, limited bandwidth and battery power, limited observations, unreliable communication, and the presence of malicious nodes who act to break the system functionality as well as selfish nodes who act to maximize their own gain. We propose a context-aware trust management model called CATrust for service-oriented ad hoc networks. The novelty of our design lies in the use of logit regression to dynamically estimate trustworthiness of a service provider based on its service behavior patterns in a context environment, treating channel conditions, node status, service payoff, and social disposition as 'context' information. We develop a recommendation filtering mechanism to effectively screen out false recommendations even in extremely hostile environments in which the majority recommenders are malicious. We demonstrate desirable convergence, accuracy, and resiliency properties of CATrust. We also demonstrate that CATrust outperforms contemporary peer-to-peer and Internet of Things trust models in terms of service trust prediction accuracy against collusion recommendation attacks. We validate the design of trust-based service management based on CATrust with a node-to-service composition and binding MANET application and a node-to-task assignment MANET application with multi-objective optimization (MOO) requirements. For either application, we propose a trust-based algorithm to effectively filter out malicious nodes exhibiting various attack behaviors by penalizing them with trust loss, which ultimately leads to high user satisfaction. Our trust-based algorithm is efficient with polynomial runtime complexity while achieving a close-to-optimal solution. We demonstrate that our trust-based algorithm built on CATrust outperforms a non-trust-based counterpart using blacklisting techniques and trust-based counterparts built on contemporary peer-to-peer trust protocols. We also develop a dynamic table-lookup method to apply the best trust model parameter settings upon detection of rapid MANET environment changes to maximize MOO performance.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
47

Adjoyan, Seza. "Describing Dynamic and Variable Software Architecture Based on Identified Services From Object-Oriented Legacy Applications." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTS022/document.

Full text
Abstract:
L'Orienté Service (SOA) est un paradigme de conception qui facilite la construction d’applications extensibles et reconfigurables basées sur des artefacts réutilisables qui sont les services. Ceux-ci sont structurés via des interfaces bien définies et publiables et qui peuvent être dynamiquement découvertes.Beaucoup d’approches ont été proposées dans la littérature pour la réingénierie d’applications existantes développées dans des paradigmes pré-services, principalement l’orienté objet, vers SOA. L’objectif est de permettre de sauvegarder la valeur métier de ces d’applications tout en leur permettant de bénéficier des avantages de SOA. Le problème est que ces approches s'appuient sur des critères ad-hoc pour identifier correctement des services dans le code source des applications existantes.Par ailleurs, l'une des caractéristiques les plus distinctives d'une application orientée service est sa capacité de se reconfigurer dynamiquement et d'adapter son comportement en fonction de son contexte d'exécution. Cependant, dans les langages de description d'architecture (ADL) existants dont l’aspect de reconfiguration et pris en compte, les règles de reconfiguration sont représentées d'une manière ad-hoc; en général, elles ne sont pas modélisées d'une manière explicite mais enfouillées dans la description de l'architecture. D'une part, ceci engendre une difficulté de la gestion de la reconfiguration dynamique au niveau de l'architecture et d’autre part, la traçabilité de la description de la reconfiguration dynamique à travers les différents niveaux d'abstraction est difficile à représenter et à gérer.Afin de surmonter les problèmes précédents, nous proposons dans le cadre de cette thèse deux contributions. D'abord, nous proposons une approche d'identification de services basée sur un modèle de qualité où les caractéristiques des services sont étudiées, raffinées et réifiées en une fonction que nous utilisons pour mesurer la validité sémantique de ces services. La deuxième contribution consiste en une proposition d'un langage de description d'architecture orientée service (ADL) qui intègre la description de la variabilité architecturale. Dans cette ADL les services qui peuvent constituer l’architecture, les éléments de contexte dont les changements d’état sont à l’origine des changements architecturaux, les variantes des éléments architecturaux sélectionnées en fonction des états des éléments de contexte et le comportement architectural dynamique sont ainsi spécifiés de façon modulaire
Service Oriented Architecture (SOA) is an architectural design paradigm which facilitates building and composing flexible, extensible and reusable service-oriented assets. These latter are encapsulated behind well-defined and published interfaces that can be dynamically discovered by third-party services. Before the advent of SOA, several software systems were developed using older technologies. Many of these systems still afford a business value, however they suffer from evolution and maintenance problems. It is advantageous to modernize those software systems towards service-based ones. In this sense, several re-engineering techniques propose migrating object-oriented applications towards SOA. Nonetheless, these approaches rely on ad-hoc criteria to correctly identify services in object-oriented legacy source code.Besides, one of the most distinguishing features of a service-oriented application is the ability to dynamically reconfigure and adjust its behavior to cope with changing environment during execution. However, in existing architecture description languages handling this aspect, reconfiguration rules are represented in an ad-hoc manner; reconfiguration scenarios are often implicit. This fact hinders a full management of dynamic reconfiguration at architecture level. Moreover, it constitutes a challenge to trace dynamic reconfiguration description/management at different levels of abstraction.In order to overcome the aforementioned problems, our contributions are presented in two axes: First, in the context of migrating legacy software towards SOA, we propose a service identification approach based on a quality measurement model, where service characteristics are considered, refined to measurable metrics in order to measure the semantic correctness of identified services. The second axis is dedicated to an Architecture Description Language (ADL) proposition that describes a variant-rich service-based architecture. In this modular ADL, dynamic reconfigurations are specified at architecture level. Moreover, the description is enriched with context and variability information, in order to enable a variability-based self-reconfiguration of architecture in response to context changes at runtime
APA, Harvard, Vancouver, ISO, and other styles
48

Ferrel, Tyrone H. "Rapid, value-based, evolutionary acquisition and its application to a USMC tactical service orientated architecture." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Jun/09Jun%5FFerrel.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, June 2009.
Thesis Advisor(s): Hayes-Roth, Rick. "June 2009." Description based on title screen as viewed on July 13, 2009. DTIC Identifiers: Defense acquisition, RVEA (Rapid Value-based Evolutionary Acquisition), rapid acquisition. Author(s) subject terms: Acquisition, Defense Acquisition, Rapid Acquisition, Project Management, Program Management, Service Oriented Architecture, Tactical Service Oriented Architecture. Includes bibliographical references (p. 75-79). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
49

Jianzhao, Huang. "A SERVICE-ORIENTED FRAMEWORK FOR SENSOR-BASED APPLICATIONS." Master's thesis, 2009. http://hdl.handle.net/10048/695.

Full text
Abstract:
Sensor technologies are improving fast: sensors are being developed to record more types of phe- nomena in improving precisions, and they are becoming less expensive. The vision is that sensor networks deployed across large spaces, attached to important infrastructure, and embedded in our everyday environments, will become an ubiquitous element of the worlds information infrastruc- ture. The apparent bottleneck in reaching this vision efciently and cost effectively is software development. In this thesis, we discuss an integrated service-oriented architecture for collecting, archiving, analyzing and visualizing sensor network data. The framework has been deployed and evaluated in two applications: SensorGIS and SmartCondo, designed for sensor networks deployed in outdoor and indoor spaces.
APA, Harvard, Vancouver, ISO, and other styles
50

CHANG, YAO-WEN, and 張耀文. "A Push-based RESTful Web Service for Industrial Applications." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/26488710511974296734.

Full text
Abstract:
碩士
國立臺北大學
資通科技產業碩士專班
102
Due to the web development technologies is growing fast in recent years, either the application development of Industrial or Business, we now have the better choices. RESTful is the software architecture style of web development, the concept of data manipulation in RESTful is more lightweight than compared with SOAP. It can access the resources purely by using HTTP method. RESTful is considered as main architecture of web development. In terms of server push, the practice of enabling servers to push data is sending a request periodically from browser that requires servers to respond update data, this approach not only consume bandwidth and inefficiency but also quite inconvenient to use. For the server push issue, there are many open source protocol and framework like Pub/Sub protocol, Ajax Push Model, however, it has relative complexity on system development when adopting the above protocols and frameworks, so, the solution that we adopted is using the feature of event-driven of JavaScript to design a mechanism that can receive event on the server side and did asynchronous response for different event. On the browser side, it can establish a connection to the server through HTML5 technology and send a query or an event request once. It can make RESTful service achieve instant notification when a message updated or satisfied specific criteria, this service is suitable for applying to remote monitoring applications of data resources that needs to be monitored. This thesis proposed a RESTful web service that enables servers to push data to browser for industrial applications. This system reduced the number of request to servers, the design of system architecture is not only lightweight and also have impressive performance. In the future, if the system can be integrated with hardware resources, it will likely to replace the industrial automation solutions as a more complete service.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography