Constraints partition based service process replacement with end-to-end QoS constraints

Chaogang Tang, Qing Li, Yan Xiong, An Liu, Shiting Wen

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

Abstract

How to repair a failed composite service with end-to-end constraints is a big concern for users. Just by replacing a failed atomic service may not solve the problem, due to constraints violation or unavailability of remote services (server crash down, network disconnect, and so on). In this paper we propose an approach for service replacement based on constraints partition in web service composition. We propose to replace a failed service and (several) related services as a whole in the composition by other alternative services. The approach is divided into three steps, namely, decomposing the global constraints, filtering the candidates and replacing the failed service. We evaluate our approach by comparing it with other approaches. The results of experiments show that our approach outperforms the others, especially when the number of candidate services is large.

Original languageEnglish
Title of host publicationProceedings - 6th International Conference on Semantics, Knowledge and Grid, SKG 2010
Pages157-163
Number of pages7
DOIs
Publication statusPublished - 1 Dec 2010
Externally publishedYes
Event6th International Conference on Semantics, Knowledge and Grid, SKG 2010 - Beijing, China
Duration: 1 Nov 20103 Nov 2010

Publication series

NameProceedings - 6th International Conference on Semantics, Knowledge and Grid, SKG 2010

Conference

Conference6th International Conference on Semantics, Knowledge and Grid, SKG 2010
Country/TerritoryChina
CityBeijing
Period1/11/103/11/10

Keywords

  • Constraints
  • End-to-end
  • Repir
  • Replace

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Constraints partition based service process replacement with end-to-end QoS constraints'. Together they form a unique fingerprint.

Cite this