Abductive planning approach for automated web service composition using only user specified inputs and outputs

Download
2009
Kuban, Esat Kaan
In recent years, web services have become an emerging technology for communication and integration between applications in many areas such as business to business (B2B) or business to commerce (B2C). In this growing technology, it is hard to compose web services manually because of the increasing number and compexity of web services. Therefore, automation of this composition process has gained a considerable amount of popularity. Automated web service composition can be achieved either by generating the composition plan dynamically using given inputs and outputs, or by locating the correct services if an abstract process model is given. This thesis investigates the former method which is dynamicly generating the composition by using the abductive lanning capabilities of the Event Calculus. Event calculus axioms in Prolog language, are generated using the available OWL-S web service descriptions in the service repository, values given to selected inputs from ontologies used by those semantic web services and desired output types selected again from the ontologies. Abductive Theorem Prover which is the AI planner used in this thesis, generates composition plans and execution results according to the generated event calculus axioms. In this thesis, it is shown that abductive event calculus can be used for generating web services composition plans automatically, and returning the results of the generated plans by executing the necessary web services.

Suggestions

Un/cefact ccts based e-business document design and customization environment for achivieng data interoperability
Tunçer, Fulya; Doğaç, Asuman; Department of Computer Engineering (2009)
The leading effort for creating a standard semantic basis for business documents to solve the electronic business document interoperability problem came from the UN/CEFACT (United Nations Centre for Trade Facilitation and Electronic Business) Core Components Technical Specification (CCTS) through a conceptual document modeling methodology. Currently, the main challenge in using UN/CEFACT CCTS based approaches is that the document artifacts are stored in spreadsheets and this makes it very difficult to disco...
EPICS: A Framework for Enforcing Security Policies in Composite Web Services
Ranchal, Rohit; Bhargava, Bharat; Angın, Pelin; ben Othmane, Lotfi (Institute of Electrical and Electronics Engineers (IEEE), 2019-05-01)
With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of...
Using ontology based web usage mining and object clustering for recommendation
Yılmaz, Hakan; Karagöz, Pınar; Department of Computer Engineering (2010)
Many e-commerce web sites such as online book retailers or specialized information hubs such as online movie databases make use of recommendation systems where users are directed to items of interests based on past user interactions. Keyword-based approaches, collaborative and content filtering techniques have been tried and used over the years each having their own shortcomings. While keyword based approaches are naive and do not take content or context into account collaborative and content filtering tech...
Energy efficient wireless unicast routing alternatives for machine-to-machine networks
Tekbiyik, Neyre; Uysal, Elif (Elsevier BV, 2011-09-01)
Machine-to-machine (M2M) communications is a new and rapidly developing technology for large-scale networking of devices without dependence on human interaction. Energy efficiency is one of the important design objectives for machine-to-machine network architectures that often contain multihop wireless subnetworks. Constructing energy-efficient routes for sending data through such networks is important not only for the longevity of the nodes which typically depend on battery energy, but also for achieving a...
A conformance and interoperability test suite for Turkey’s National Health Information System (NHIS) and an interactive test control and monitoring environment
Sınacı, Ali Anıl; Doğaç, Asuman; Department of Computer Engineering (2009)
Conformance to standards and interoperability is a major challenge of today`s applications in all domains. Several standards have been developed and some are still under development to address the various layers in the interoperability stack. Conformance and interoperability testing involves checking whether the applications conform to the standards so that they can interoperate with other conformant systems. Only through testing, correct information exchange among applications can be guaranteed. National H...
Citation Formats
E. K. Kuban, “Abductive planning approach for automated web service composition using only user specified inputs and outputs,” M.S. - Master of Science, Middle East Technical University, 2009.