28 results on '"Mingxue Wang"'
Search Results
2. A High-Level Ontology Network for ICT Infrastructures
- Author
-
Jhon Toledo, Hu Peng, David Chaves-Fraga, Mingxue Wang, Oscar Corcho, Nicholas Burrett, Puchao Zhang, Julián Arenas-Guerrero, José Mora, and Carlos Badenes-Olmedo
- Subjects
Informática ,Configuration management ,Virtual machine ,Computer science ,Server ,Configuration management database ,Context (language use) ,Microservices ,Ontology (information science) ,computer.software_genre ,Data science ,computer ,Networking hardware - Abstract
The ICT infrastructures of medium and large organisations that offer ICT services (infrastructure, platforms, software, applications, etc.) are becoming increasingly complex. Nowadays, these environments combine all sorts of hardware (e.g., CPUs, GPUs, storage elements, network equipment) and software (e.g., virtual machines, servers, microservices, services, products, AI models). Tracking, understanding and acting upon all the data produced in the context of such environments is hence challenging. Configuration management databases have been so far widely used to store and provide access to relevant information and views on these components and on their relationships. However, different databases are organised according to different schemas. Despite existing efforts in standardising the main entities relevant for configuration management, there is not yet a core set of ontologies that describes these environments homogeneously, and which can be easily extended when new types of items appear. This paper presents an ontology network created with the purpose of serving as an initial step towards an homogeneous representation of this domain, and which has been already used to produce a knowledge graph for a large ICT company.
- Published
- 2021
3. An Automatic Verification Method of Intelligent Substation Operation Order Based on Chinese Semantic Deep Learning
- Author
-
Mingxue Wang, Miao Jiang, Li Lee, Jinyu Chen, and Daming Zhou
- Subjects
Correctness ,business.industry ,Semantics (computer science) ,Computer science ,Deep learning ,computer.software_genre ,Recurrent neural network ,Operations order ,Image tracing ,Artificial intelligence ,Data mining ,business ,computer ,Reliability (statistics) ,Word (computer architecture) - Abstract
Verifying the intelligent substation Chinese operation order is an important step to ensure the accuracy of substation operations. The current manual verification method based on experience has strong subjectivity, low efficiency and low reliability. In view of this, this paper proposes an automatic verification method of operation order based on the Chinese semantic deep learning model: Global vectors for word representation-convolution Recurrent Neural Network (Glove-RCNN). By combining the text vectorization model Glove and text mining model RCNN, this method is feasible in realizing the semantic discrimination and automatic verification of correctness and error of the operation order texts. The experimental result shows that the MicroF score and MacroF score of the operation order verification model is 93.98% and 94.19%, which can accurately judge the correctness of the operation order, so as to effectively improve the verification efficiency.
- Published
- 2021
4. Probabilistic Knowledge-Graph based Workflow Recommender for Network Management Automation
- Author
-
Erik Aumayr, Anne-Marie Bosneag, and MingXue Wang
- Subjects
business.industry ,Computer science ,Knowledge engineering ,020206 networking & telecommunications ,Context (language use) ,02 engineering and technology ,Recommender system ,Network management ,Knowledge-based systems ,Workflow ,Documentation ,Management system ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Software engineering - Abstract
The move towards more complex and dynamic telecommunication networks renders the need for more automation in the management system stringent. This is especially true in the context of 5G networks, where understanding context for providing the right management recommendations is crucial. Our work focuses on gathering context from the current status of the network and correlating it with useful information from existing documents in the network provider and operator's domain. We propose an architecture that, based on collected and interlinked information, can provide automatic recommendations for addressing existing problems in the network. More specifically, our approach is based on creating a knowledge-graph to direct workflow recommendations for network incidents. We implemented this system using the actual OSS product documentation and real network events and we show that our approach adds new value for automated network management, including improved efficiency and customer experience.
- Published
- 2019
5. Performance evaluation of main transformer equipment suppliers for 500kV main transformer equipment
- Author
-
mingxue Wang, Chen Yinghua, jinliang Zhang, Yinghan Jiang, Ge Yanqin, and Dong Litong
- Subjects
Computer science ,Automotive engineering ,Transformer (machine learning model) - Abstract
Scientific evaluation of the main transformer equipment suppliers is the premise to ensure the cost control and safe operation of the power grid. Based on the analysis of various factors affecting the main transformer equipment supplier, the evaluation index of the main transformer equipment supplier is constructed. Considering the fuzziness of the evaluation index, the index weight is determined by AHP, and the evaluation model of main transformer equipment supplier based on fuzzy comprehensive evaluation is established. The example calculation shows that the fuzzy comprehensive evaluation method can fully reveal the evaluation index information and reflect the actual situation of main transformer equipment suppliers scientifically and reasonably.
- Published
- 2021
6. Supplier performance evaluation for 500 kV main transformer
- Author
-
mingxue Wang, Dong Litong, jinliang Zhang, Chen Yinghua, Yinghan Jiang, and Ge Yanqin
- Subjects
Computer science ,Automotive engineering ,Transformer (machine learning model) - Abstract
As an important state-owned energy backbone enterprise related to national energy security and the lifeline of national economy, power grid enterprises are responsible for ensuring the quality and safety of equipment and promoting the development of equipment quality. Therefore, continuously improving the quality evaluation of main transformer equipment is very important to improve the quality of power grid main transformer equipment. This paper first constructs the main transformer equipment quality evaluation index system from equipment procurement, equipment installation, equipment use and equipment decommissioning and scrapping; on this basis, the scoring method of each evaluation index is given, and the final main transformer equipment quality evaluation score is calculated by combining subjective and objective weight determination method; Finally, according to the evaluation of 500kV main transformer equipment of provincial power grid company price score, to evaluate the performance of equipment quality provided by suppliers.
- Published
- 2021
7. A Novel Split-Merge-Evolve k Clustering Algorithm
- Author
-
MingXue Wang, Vincent Huang, and Anne-Marie Cristina Bosneag
- Subjects
Ground truth ,Computer science ,business.industry ,Big data ,k-means clustering ,020206 networking & telecommunications ,02 engineering and technology ,Hierarchical clustering ,Network management ,ComputingMethodologies_PATTERNRECOGNITION ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Algorithm design ,business ,Cluster analysis ,Algorithm - Abstract
Clustering algorithms are used in a large number of big data analytic applications spread across various application domains, including network management. We propose a novel Split-merge-evolve algorithm for clustering data into k number of clusters. The algorithm randomly divides data into k clusters initially, then repeatedly splits bad clusters and merges closest clusters to evolve the final clustering result. A key metric during the clustering process of the Split-merge-evolve algorithm is a user chosen or defined clustering quality metric or internal evaluation. The algorithm evolves the clustering result towards the user expected high quality result, although there is no ground truth or labelled data involved during the clustering process. The algorithm design is flexible in its implementation, with various common techniques, such as centroid and connectivity based measures that can be used in its implementation. The algorithm is easy to implement and effective. With 4 datasets, including 2 real life datasets in our experiments, the Split-merge-evolve algorithm performs better than both most commonly used K-means and Agglomerative hierarchical algorithms.
- Published
- 2018
8. Intelligent network management mechanisms as a step towards SG
- Author
-
Anne-Marie Bosneag and MingXue Wang
- Subjects
Radio access network ,Process management ,business.industry ,Computer science ,Provisioning ,Context (language use) ,Business model ,Virtualization ,computer.software_genre ,Automation ,03 medical and health sciences ,0302 clinical medicine ,Intelligent Network ,business ,Software-defined networking ,computer ,030215 immunology - Abstract
The evolution of telecom networks towards 5G comes with challenges that permeate the entire network structure and its management principles. In this paper, we outline how challenges such as the need to support different types of users and new network business models, the movement towards virtualization, as well as the need for more automation drive the requirement for a holistic and flexible way of managing the networks. We detail the architectural principles that underline such a cognitive management framework and we exemplify its use through a scenario based on software defined networking, where we combine machine learning, control and automation in the context of flexible resource provisioning in the Radio Access Network. Our experiments were conducted in collaboration with a major telecom operator and clearly show the advantages of introducing intelligence and automation into the network.
- Published
- 2017
9. A Streaming Data Anomaly Detection Analytic Engine for Mobile Network Management
- Author
-
MingXue Wang and Sidath Handurukande
- Subjects
Computer science ,business.industry ,Distributed computing ,Real-time computing ,Mobile computing ,020206 networking & telecommunications ,02 engineering and technology ,Networking hardware ,Network management ,Analytics ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Anomaly detection ,Mobile telephony ,Software-defined networking ,business - Abstract
With emerging Network Functions Virtualization (NFV), Software Defined Networking (SDN) paradigms in Network Management (NM), new network devices, features can immediately become available. Available network resources, services can be altered, optimized in real time to gain the maximum benefit. However, this requires real time analytics information sent to SDN controllers rather than traditional manual offline or batch analytics which deliver outputs in hourly or monthly in NM Systems. As a result, real time analytic is becoming a critical element for NM. In this paper, we describe a configuration free (i.e., non-parametric) streaming data anomaly detection analytic engine for automatic NM system development. We describe the design principles, innovative algorithm design, architecture, implementation of the engine in relation to streaming data, mobile NM. Finally, we present use cases, evaluation results.
- Published
- 2016
10. Real-world experiences with CQI-based analyses for dense LTE networks
- Author
-
Anne-Marie Bosneag, Sidath Handurukande, James O'Sullivan, and MingXue Wang
- Subjects
Relation (database) ,business.industry ,Computer science ,media_common.quotation_subject ,Big data ,020206 networking & telecommunications ,020302 automobile design & engineering ,Throughput ,02 engineering and technology ,Data science ,Network element ,0203 mechanical engineering ,Transmission (telecommunications) ,User equipment ,0202 electrical engineering, electronic engineering, information engineering ,Quality (business) ,business ,media_common ,Communication channel - Abstract
Much work has been done in the area of telecommunications transmission parameters and, in particular, Channel Quality Indicators, to analyse the best ways to improve the performance and quality of communications. However, there is a gap in published papers when it comes to real-world experiences with CQI reports and network-side analysis of transmission parameters that can provide information about user equipment and network elements behaviour. In this paper, we present our experiences with a real-world analysis of dense LTE networks, focusing on two main aspects — what information can CQI reports give us about the behaviour of user equipment in the network, and what information do they provide in relation to the individual network elements. We show what insights can be derived from a network wide statistical analysis of CQI reports and how these insights can be further used by operators to understand potential problems in their network.
- Published
- 2016
11. CADMANT: Context Anomaly Detection for MAintenance and Network Troubleshooting
- Author
-
Sheila Fallon, MingXue Wang, Eloy Martinez, and Enda Fallon
- Subjects
SQL ,Computer science ,Data field ,Complex event processing ,Anomaly detection ,Context (language use) ,Troubleshooting ,Data mining ,Data structure ,computer.software_genre ,Telecommunications network ,computer ,computer.programming_language - Abstract
In telecommunications network troubleshooting, analytical applications are widely used. Such applications typically use CEP (Complex Event Processing) and SQL queries for data processing and network analysis. Performance engineers need in-depth knowledge of both the telecommunications domain and telecommunications data structures in order to create the required queries. Moreover valuable information contained in free form text data fields such as “additional_info”, “user_text” or “problem_text” can also be ignored. This work proposes CADMANT: Context Anomaly Detection for MAintenance and Network Troubleshooting. Traditional approaches focus on a specific record type and create specific cause and effect rules. With the CADMANT approach all free form text fields of alarms, logs, etc. are treated as text documents similar to Twitter feeds. CADMANT uses distance based outlier detection within sliding windows to detect abnormal terms at configurable time intervals. The CADMANT approach provides automated analysis without the requirement for SQL/CEP queries and provides distinct network insights in comparison to traditional approaches.
- Published
- 2015
12. A distributed architecture for policy-customisable multi-tenant Processes-as-a-Service
- Author
-
Claus Pahl, Kosala Yapa Bandara, and MingXue Wang
- Subjects
Service (systems architecture) ,Business requirements ,Multitenancy ,Knowledge management ,Software engineering ,Computer Networks and Communications ,Process (engineering) ,Business process ,computer.internet_protocol ,business.industry ,Computer science ,Multi-tenancy ,Services ,Processes ,Policy ,Coordination ,Governance ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Business process modeling ,Business Process Execution Language ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,Software - Abstract
Service-based business processes are often developed and deployed by single organizations. In distributed, shared resource environments like the cloud on the other hand, consumers share resources owned by cloud providers. %Higher levels of resource sharing gives more economy of scale for providers in the software-as-a-service (SaaS) or business process-as-a-service (BPaaS) space. This requires multi-tenancy capability for service processes that provides customized behaviour for on shared process implementations to meet the varying needs of different process consumers as tenants of the process resource. In this paper, we define a distributed multi-tenant architecture for BPEL processes provided as a service. A single-version BPEL process is deployed by a provider and offered for all process consumers, combined with a customization and management functionality to create a unique experience for different consumers (process tenants). We provide two core components: a policy model for consumers to express customization/business requirements of service processes and a coordination framework for policy enforcement between consumers and providers to achieve on-the-fly customization of service processes.
- Published
- 2015
13. Enterprise Search with Development for Network Management System
- Author
-
Mikel Zuzuarregui, Enda Fallon, Jimmy O'Meara, Eloy Martinez, Robin Grindrod, and MingXue Wang
- Subjects
World Wide Web ,Network management ,User experience design ,Computer science ,business.industry ,Search analytics ,Search engine indexing ,Big data ,Semantic search ,Troubleshooting ,Network monitoring ,business - Abstract
Browsing and searching network information for observation, analysis and troubleshooting is an inherent part of using the features and functions of any Network Management System. Enterprise search has capabilities for handling various data types and sources and big data scalability, and is becoming an emerging technology for such network management functions development. In this paper, we give an overview on work done in our research and prototype team regarding an advanced search project. We provide a brief report on search fundamental knowledge and study of Solr search platform stack. It answers common questions from management and development teams regarding adopting search technology for production development, and gives a Solr reference card for developers. We also introduce two advanced search features, user experience based search recommendation and anomaly detection enhanced search ranking from our research work. Two features are developed to make network searches more efficient as it can help user quickly locate the most valuable search results, but the concept can be adopted for search applications in other domains.
- Published
- 2015
14. ADAMANT — An Anomaly Detection Algorithm for MAintenance and Network Troubleshooting
- Author
-
Sheila Fallon, Enda Fallon, Eloy Martinez, and MingXue Wang
- Subjects
SQL ,Computer science ,business.industry ,Big data ,Data field ,Complex event processing ,Troubleshooting ,Data structure ,computer.software_genre ,Anomaly detection ,Data mining ,business ,computer ,Network analysis ,computer.programming_language - Abstract
Network operators are increasingly using analytic applications to improve the performance of their networks. Telecommunications analytical applications typically use SQL and Complex Event Processing (CEP) for data processing, network analysis and troubleshooting. Such approaches are hindered as they require an in-depth knowledge of both the telecommunications domain and telecommunications data structures in order to create the required queries. Valuable information contained in free form text data fields such as “additional_info”, “user_text” or “problem_text” can also be ignored. This work proposes An Anomaly Detection Algorithm for MAintenance and Network Troubleshooting (ADAMANT), a text analytic based network anomaly detection approach. Once telecommunications data records have been indexed, ADAMANT uses distance based outlier detection within sliding windows to detect abnormal terms at configurable time intervals. Traditional approaches focus on a specific type of record and create specific cause and effect rules. With the ADAMANT approach all free form text fields of alarms, logs, etc. are treated as text documents similar to Twitter feeds. All documents within a window represent a snapshot of the network state that is processed by ADAMANT. The ADAMANT approach focuses on text analytics to provide automated analysis without the requirement for SQL/CEP queries. Such an approach provides distinct network insights in comparison to traditional approaches.
- Published
- 2015
15. PRISENIT -- A Probabilistic Search Recommendation Algorithm to Improve Search Efficiency for Network Intelligence and Troubleshooting
- Author
-
John Keeney, MingXue Wang, Paul Jacob, Mikel Zuzuarregui, and Enda Fallon
- Subjects
Information retrieval ,Web search query ,Computer science ,business.industry ,Troubleshooting ,Recommender system ,computer.software_genre ,Query expansion ,Search engine ,Network management ,Collaborative filtering ,Beam search ,Data mining ,business ,computer ,Algorithm - Abstract
When searching for data in a telecommunications network management application, large search result sets are common. In order to refine the results to retrieve useful information existing systems normally require additional user intervention such as appending or removing a search keyword, adding a filter, grouping results, etc. This work proposes a Probabilistic Search Recommendation Algorithm to Improve Search Efficiency for Network Intelligence and Troubleshooting (PRISENIT). PRISENIT is a query-based recommendation algorithm intended to improve search efficiency and usability for telecommunication system management. PRISENIT is an extension of an item-based collaborative filtering algorithm. It uses correlation-based similarity and users' implicit feedback in order to improve search efficiency. It learns from previous experiences in order to optimize decision-making. Currently there exists no known query-based recommender adaptation mechanism for network management. Existing search engines use previous user searches to make a suggestion based on the keyword. PRISENIT not only considers search terms, it also considers the influence of filters and features in order to makes network searches more efficient as it removes the necessity for users to manually choose search features or search filters. Experimental results show that PRISENIT can improve user experience in a telecommunications management environment.
- Published
- 2015
16. An extended ontology-based context model and manipulation calculus for dynamic web service processes
- Author
-
MingXue Wang, Kosala Yapa Bandara, and Claus Pahl
- Subjects
Context model ,Service (systems architecture) ,Software engineering ,business.industry ,Computer science ,Service delivery framework ,Quality of service ,Context (language use) ,Dynamic web page ,Ontology (information science) ,computer.software_genre ,Management Information Systems ,World Wide Web ,Hardware and Architecture ,Web service ,business ,Dynamic aspect ,Context model ontology ,Context constraints ,Context manipulation ,Service process ,computer ,Software ,Information Systems - Abstract
Services are offered in an execution context that is determined by how a provider provisions the service and how the user consumes it. The need for more flexibility requires the provisioning and consumption aspects to be addressed at run-time. We propose an ontology-based context model providing a framework for service provisioning and consumption aspects and techniques for managing context constraints for Web service processes where dynamic context concerns can be monitored and validated at service process run-time. We discuss the contextualisation of dynamically relevant aspects of Web service processes as our main goal, i.e. capture aspects in an extended context model. The technical contributions of this paper are a context model ontology for dynamic service context and an operator calculus for integrated and coherent context manipulation, composition and reasoning. The context model ontology formalises dynamic aspects of Web services and facilitates reasoning. We present the context ontology in terms of four core dimensions--functional, QoS, domain and platform--which are internally interconnected.
- Published
- 2013
17. A Domain-Specific Model for Data Quality Constraints in Service Process Adaptations
- Author
-
Neel Mani, Claus Pahl, and MingXue Wang
- Subjects
Service (systems architecture) ,Software engineering ,Database ,Computer science ,business.industry ,media_common.quotation_subject ,020207 software engineering ,Context (language use) ,02 engineering and technology ,Ontology (information science) ,computer.software_genre ,Data type ,Data governance ,Service Process ,Process Adaptation ,Content Services ,Constraint Monitoring ,Quality and Governance ,Domain-Specific Model ,Provenance ,Data quality ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Quality (business) ,business ,Constraint (mathematics) ,computer ,media_common - Abstract
Service processes are often enacted across different boundaries such as organisations, countries or even languages. Specifically, looking at the quality and governance of data or content processed by services in this context is important to control different constraints in this cross-boundary processing. In order to provide a context-aware solution that takes into account data and data processing requirements, a rule-based constraints specification and adaptation of processes shall be proposed. A domain ontology shall capture the key data/content data types, activities and constraints, which forms the basis of a rule-based policy monitoring solution. A provenance model is at the core of this ontology solution. The key contribution is a domain-specific model and specification template for constraint policy definition, which can be applied to adapt service processes to domain-specific needs.
- Published
- 2013
18. RPig: A scalable framework for machine learning and advanced statistical functionalities
- Author
-
Mohamed Nassar, Sidath Handurukande, and MingXue Wang
- Subjects
Computer science ,business.industry ,Active learning (machine learning) ,Data management ,Big data ,Machine learning ,computer.software_genre ,Support vector machine ,Software ,Computational learning theory ,High-level programming language ,Scalability ,Artificial intelligence ,business ,computer - Abstract
In many domains such as Telecom various scenarios necessitate the processing of large amounts of data using statistical and machine learning algorithms. A noticeable effort has been made to move the data management systems into MapReduce parallel processing environments such as Hadoop and Pig. Nevertheless these systems lack the features of advanced machine learning and statistical analysis. Frame-works such as Mahout on top of Hadoop support machine learning but their implementations are at the preliminary stage. For example Mahout does not provide Support Vector Machine (SVM) algorithms and it is difficult to use. On the other hand traditional statistical software tools such as R containing comprehensive statistical algorithms for advanced analysis are widely used. But such software can only run on a single computer and therefore it is not scalable. In this paper we propose an integrated solution RPig which takes the advantages of R (for machine learning and statistical analysis capabilities) and parallel data processing capabilities of Pig. The RPig framework offers a scalable advanced data analysis solution for machine learning and statistical analysis. Analysis jobs can be easily developed with RPig script in high level languages. We describe the design implementation and an eclipse-based RPigEditor for the RPig framework. Using application scenarios from the Telecom domain we show the usage of RPig and how the framework can significantly reduce the development effort. The results demonstrate the scalability of our framework and the simplicity of deployment for analysis jobs.
- Published
- 2012
19. User-customisable policy monitoring for multi-tenant cloud architectures
- Author
-
MingXue Wang and Claus Pahl
- Subjects
Service (systems architecture) ,Multitenancy ,Software engineering ,business.industry ,Computer science ,Cloud architecture ,Policy customisation ,Monitoring ,Software as a service ,Quality of service ,Cloud computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Computer security ,computer.software_genre ,Personalization ,Cloud testing ,Instrumentation (computer programming) ,business ,computer - Abstract
Cloud computing needs end-user customisation and personalisation of multi-tenant cloud service offerings. Particularly, QoS and governance policy management and monitoring is needed. We propose a user-customisable policy definition solution that can be enforced in multitenant cloud offerings through automated instrumentation and monitoring. Service processes run by cloud and SaaS providers can be made policy-aware in a transparent way.
- Published
- 2012
20. Ontology-Based Composition and Matching for Dynamic Service Coordination
- Author
-
MingXue Wang, Claus Pahl, Kosala Yapa Bandara, and Veronica Gacitua-Decar
- Subjects
Matching (statistics) ,Service (systems architecture) ,Software engineering ,Service delivery framework ,business.industry ,Computer science ,Service design ,020207 software engineering ,02 engineering and technology ,Ontology (information science) ,World Wide Web ,Service coordination ,Tuple space ,Dynamic service composition ,Service Ontology ,Description logic ,Information model ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,business - Abstract
Service engineering needs to address integration problems allowing services to collaborate and coordinate. The need to address dynamic automated changes - caused by on-demand environments and changing requirements - can be addressed through service coordination based on ontology-based composition and matching techniques. Our solution to composition and matching utilises a service coordination space that acts as a passive infrastructure for collaboration. We discuss the information models and the coordination principles of such a collaboration environment in terms of an ontology and its underlying description logics. We provide ontology-based solutions for structural composition of descriptions and matching between requested and provided services.
- Published
- 2011
21. Dynamic architectural constraints monitoring and reconfiguration in service architectures
- Author
-
MingXue Wang, Claus Pahl, Jose John, and SFI
- Subjects
Service (systems architecture) ,Software engineering ,computer.internet_protocol ,Computer science ,Constraint violation ,Distributed computing ,media_common.quotation_subject ,Control reconfiguration ,Service Oriented Architecture ,SOA ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,Service-oriented architecture ,01 natural sciences ,Constraint (information theory) ,Architectural pattern ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,service oriented architecture ,Quality (business) ,Architecture ,computer ,media_common - Abstract
peer-reviewed Service-oriented architecture is an architectural approach that can be applied for building autonomous service systems dynamically to satisfy on-demand business requests. During the execution of service compositions, architectural constraint violations relating to functional and non-fucntional system properties need to be handled intelligently and autonomously, possibly requiring architectural reconfigurations. We propose integrated architectural constraint violation handling to deal with architectural quality problems through dynamic reconfiguration. We concentrate on service replacement selection as a remedial strategy for a possible quality violation requiring architectural remedies.
- Published
- 2010
22. Process as a Service Distributed Multi-tenant Policy-Based Process Runtime Governance
- Author
-
MingXue Wang, Claus Pahl, and Kosala Yapa Bandara
- Subjects
Business Process Model and Notation ,Business process discovery ,Business process management ,Software engineering ,Process modeling ,Process management ,Computer science ,Business process ,Artifact-centric business process model ,business.industry ,Process mining ,Business process modeling ,business - Abstract
With the emergence of Business Process Outsourcing and Cloud Computing, enterprises are looking for available business processes outside of their organizations to quickly adopt to new business requirements and also reduce process development and maintenance costs. The process execution needs to be governed as policy enforcement might differ between different clients. Since a process is deployed outside of the organizations and serves multiple process clients, distribution and multi-tenancy have become two requirements for runtime governance of service processes. We address this problem by introducing a policy-oriented aspectual business process framework. The runtime governance constraints from process clients are integrated as aspects through dynamic weaving into rpcess execution.
- Published
- 2010
23. Context Constraint Integration and Validation
- Author
-
Claus Pahl, MingXue Wang, and Kosala Yapa Bandara
- Subjects
Constraint (information theory) ,Mathematical optimization ,Computer science ,Context (language use) - Published
- 2010
24. Distributed Aspect-Oriented Service Composition for Business Compliance Governance with Public Service Processes
- Author
-
Claus Pahl, Kosala Yapa Bandara, and MingXue Wang
- Subjects
Business Process Model and Notation ,Software engineering ,Process management ,New business development ,Computer science ,Business process ,Artifact-centric business process model ,Business rule ,Business architecture ,Business process reengineering ,Business process modeling - Abstract
Service-Oriented Architecture (SOA) offers a technical foundation for Enterprise Application Integration and business collaboration through service-based business components. With increasing process outsourcing and cloud computing, enterprises need process-level integration and collaboration (process-oriented) to quickly launch new business processes for new customers and products. However, business processes that cross organisations’ compliance regulation boundaries are still unaddressed. We introduce a distributed aspect-oriented service composition approach, which enables multiple process clients hot-plugging their business compliance models (business rules, fault handling policy, and execution monitor) to BPEL business processes.
- Published
- 2010
25. Integrated Constraint Violation Handling for Dynamic Service Composition
- Author
-
Kosala Yapa Bandara, Claus Pahl, and MingXue Wang
- Subjects
Service (business) ,Business requirements ,Software engineering ,computer.internet_protocol ,Computer science ,Distributed computing ,Context (language use) ,computer.software_genre ,Autonomic computing ,Constraint (information theory) ,Business Process Execution Language ,Web service ,Software architecture ,computer - Abstract
Dynamic service composition is suitable for on-demand business requests. For autonomic computing, service composition needs to deal with runtime environment faults, but also with business constraint violations which result from business requirements. We propose an approach for integrated handling of business constraint violations and runtime environment faults for dynamic service composition. We introduce a loosely coupled implementation architecture to maintain the platform-independent nature.
- Published
- 2009
26. Constraint integration and violation handling for BPEL processes
- Author
-
Kosala Yapa Bandara, Claus Pahl, and MingXue Wang
- Subjects
Flexibility (engineering) ,Software engineering ,Database ,Business rule ,business.industry ,computer.internet_protocol ,Computer science ,Context (language use) ,Service-oriented architecture ,computer.software_genre ,Constraint (information theory) ,Business Process Execution Language ,Theory of constraints ,Web service ,business ,computer - Abstract
Autonomic, i.e. dynamic and fault-tolerant Web service composition is a requirement resulting from recent developments such as on-demand services. In the context of planning-based service composition, multi-agent planning and dynamic error handling are still unresolved problems. Recently, business rule and constraint management has been looked at for enterprise SOA to add business flexibility. This paper proposes a constraint integration and violation handling technique for dynamic service composition. Higher degrees of reliability and fault-tolerance, but also performance for autonomously composed WS-BPEL processes are the objectives.
- Published
- 2009
27. An architecture for autonomic web service process planning
- Author
-
Colm Moore, MingXue Wang, Claus Pahl, Binder, Walter, and Dustdar, Schahram
- Subjects
Web standards ,medicine.medical_specialty ,Software engineering ,Web development ,business.industry ,Computer science ,Web Services ,Service composition ,Autonomic composition ,Composition architecture ,computer.software_genre ,web service composition ,autonomic composition ,World Wide Web ,Web design ,medicine ,Mashup ,Web service ,business ,WS-Policy ,computer ,Web modeling ,Data Web - Abstract
Web service composition is a technology that has received considerable attention in the last number of years. Languages and tools to aid in the process of creating composite Web services have been received specific attention. Web service composition is the process of linking single Web services together in order to accomplish more complex tasks. One area of Web service composition that has not received as much attention is the area of dynamic error handling and re-planning, enabling autonomic composition. Given a repository of service descriptions and a task to complete, it is possible for AI planners to automatically create a plan that will achieve this goal. If however a service in the plan is unavailable or erroneous the plan will fail. Motivated by this problem, this paper suggests autonomous re-planning as a means to overcome dynamic problems. Our solution involves automatically recovering from faults and creating a context-dependent alternate plan. We present an architecture that serves as a basis for the central activities autonomous composition, monitoring and fault handling.
- Published
- 2009
28. Ontology-based composition and matching for dynamic cloud service coordination
- Author
-
Kosala Yapa Bandara, Veronica Gacitua-Decar, MingXue Wang, and Claus Pahl
- Subjects
Matching (statistics) ,Service (systems architecture) ,Software engineering ,business.industry ,Computer science ,Cloud computing ,Library and Information Sciences ,Differentiated service ,Ontology (information science) ,Computer Science Applications ,World Wide Web ,Description logic ,Information model ,Tuple space ,Service coordination ,Dynamic service composition ,Service Ontology ,Cloud Service Coordination ,Cloud Mediation ,business ,Information Systems - Abstract
Recent cross-organisational software service offerings, such as cloud computing, create higher integration needs. In particular, services are combined through brokers and mediators, solutions to allow individual services to collaborate and their interaction to be coordinated are required. The need to address dynamic management - caused by cloud and on-demand environments - can be addressed through service coordination based on ontology-based composition and matching techniques. Our solution to composition and matching utilises a service coordination space that acts as a passive infrastructure for collaboration where users submit requests that are then selected and taken on by providers. We discuss the information models and the coordination principles of such a collaboration environment in terms of an ontology and its underlying description logics. We provide ontology-based solutions for structural composition of descriptions and matching between requested and provided services.
- Published
- 2011
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.