Computer Science ›› 2020, Vol. 47 ›› Issue (1): 270-275.doi: 10.11896/jsjkx.181102228
• Computer Network • Previous Articles Next Articles
FAN Guo-dong,ZHU Ming,LI Jing,CUI Xiao-liu
CLC Number:
[1]LI J,YAN Y H,LEMIRE D.Scaling up web service composition with the skyline operator[C]∥IEEE International Conference on Web Services.USA:ICWS,2016:147-154. [2]YAN Y H,CHEN M.Anytime QoS-aware service composition over the graphplan[J].Service Oriented Computing and Applications,2015,9(1):1-19. [3]ZHU M,FAN G D,LI J,et al.An Approach for QoS-aware Service Composition with GraphPlan and Fuzzy Logic[C]∥ International Conference on Emerging Ubiquitous Systems and Pervasive Networks.Procedia Computer Science,2018:56-63. [4]LI J,YAN Y H,LEMIRE D.Full Solution Indexing for top-K Web Service Composition[J].IEEE Transactions on Services Computing,2016,11(3):521-533. [5]LI J,YAN Y H,LEMIRE D.A Web Service Composition Method Based on Compact K2-Trees[C]∥ IEEE International Conference on Services Computing.IEEE Computer Society,2015. [6]HUANG L T,DENG S G,DAI K,et al.Automatic Service Composition in Parallel with MapReduce[J].Chinese Journal of Electronics,2012,40(7):1397-1403. [7]ZHU M,LI J,FAN G D,et al.Modeling and Verification of Response Time of QoS-aware Web Service Composition by Timed CSP[C]∥ International Conference on Emerging Ubiquitous Systems and Pervasive Networks.Procedia Computer Science,2018:48-55. [8]CUI Y,WU J P,XU K,et al.A Survey of Research on Internet Service Quality Routing Algorithms[J].Journal of Software,2002(11):2065-2075. [9]ZADEH L A .The Concept of a Linguistic Variable and Its Application to Approximate Reasoning—III[J].Information Scien-ces,1975,9(1):43-80. [10]DARKO B,DRAGAN P,BOBAN D.Modification of analytic hierarchy process (AHP) method and its application in the defense decision-making[J].Scientific Research and Essays,2012,7(1):24-37. [11]BOZANIC D,DRAGAN P,DRAGAN B.Modification of the analytic hierarchy process (AHP) method using fuzzy logic:Fuzzy AHP approach as a support to the decision making process concerning engagement of the group for additional hindering[J].Serbian Journal of Management,2015,10(2):151-171. [12]CHARILAS D,MARKAKI O,PSARRAS J,et al.Application of Fuzzy AHP and ELECTRE to Network Selection[M]// Mobile Lightweight Wireless Systems.Springer Berlin Heidelberg,2009:63-73. [13]WS-Challenge.Testsetgenerator2009[OL].https://code.google.com/p/wsc-pku-tcs/downloads/list. [14]MANOLA F,MILLER E.Rdf primer [OL].http://www.w3.org/tr/rdfschema/. [15]BECHHOFER S,HARMELEN F,HENDLER J,et al.OWL Web Ontology Language Reference[OL].https://www.w3.org/TR/owl-ref/. [16]DOU D,MCDERMOTT D,QI P .Ontology Translation on the Semantic Web[M]∥Journal on Data Semantics II.Springer-Verlag,2004:35-57. [17]LEE J K,SOHN M .eXtensible Rule Markup Language[J].Communications of the Acm,2003,46(5):59-64. [18]ZHANG Y F,WANG J N,YAN Y H.Context-Aware Generic Service Discovery and Service Composition[C]∥ IEEE International Conference on Mobile Services.IEEE Computer Society,2014. [19]SORA I,TODINCA D .Dealing with fuzzy QoS properties in service composition[C]∥ IEEE Jubilee International Sympo-sium on Applied Computational Intelligence & Informatics.Institute of Electrical and Electronics Engineers (IEEE).2015:197-202. [20]AVILA S D,DJEMAME K.Fuzzy Logic Based QoS Optimization Mechanism for Service Composition[C]∥ IEEE International Symposium on Service Oriented System Engineering.Ins-titute of Electrical and Electronics Engineers ( IEEE),2013:182-191. [21]ZHAO X,SHEN L,PENG X,et al.Toward SLA-constrained service composition:An approach based on a fuzzy linguistic preference model and an evolutionary algorithm[J].Information Sciences,2015,316:370-396. [22]MA Y,WANG S G,SUN Q B,et al.Web Service Quality Metric Algorithm Employing Objective and Subjective Weight[J].Journal of Software,2014(11):2473-2485. [23]ALMULLA M,ALMATORI K,YAHYAOUI H .A QoS-Based Fuzzy Model for Ranking Real World Web Services[C]∥ IEEE International Conference on Web Services.IEEE Computer So-ciety,2011:203-210. [24]SUN X T,NIU J,GONG Q B,et al.services selection strategy based on combination weighting approach[J].Application Research of Computer,2017,34(8):2408-2411. |
[1] | LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267. |
[2] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[3] | HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332. |
[4] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[5] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[6] | WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9. |
[7] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[8] | FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349. |
[9] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[10] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[11] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[12] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[13] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[14] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[15] | GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522. |
|