• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Rao Dongning, Jiang Zhihua, Jiang Yunfei, Wu Kangheng. Learning Non-Deterministic Action Models for Web Services from WSBPEL Programs[J]. Journal of Computer Research and Development, 2010, 47(3): 445-454.
Citation: Rao Dongning, Jiang Zhihua, Jiang Yunfei, Wu Kangheng. Learning Non-Deterministic Action Models for Web Services from WSBPEL Programs[J]. Journal of Computer Research and Development, 2010, 47(3): 445-454.

Learning Non-Deterministic Action Models for Web Services from WSBPEL Programs

More Information
  • Published Date: March 14, 2010
  • AI planning is a promising method for Web service composition (WSC). But it encounters knowledge engineering bottleneck for there is no predefined action models for Web services (WS) in planning language under most circumstances. For example, using planning to find WSC solutions needs action models for WS, which is difficult for engineers to write. Considering that most existing WSC solutions are manually written in business process language for Web services (WSBPEL), it is preferred to learn action models from existing WSC solutions. In the mean time, WS may have multiple outcomes. For this non-deterministic nature of WS and the hidden semantic requirements for WS in existing WSC solutions, the corresponding action model for WS should be a non-deterministic action with condition effects and it should embody semantic requirements too. So firstly WSBPEL programs are translated into a labeled transition system (LTS). Then the scope of learning action models is extended into non-deterministic planning (NDP) with condition effects, and non-deterministic action models are learned from LTS. A system called ARMS-WS is implemented, and experimental results show that non-deterministic action models can be learned from WSBPEL programs. This work helps avoid writing planning description for existing Web services, and makes planning tools more applicable for real-world WSC problems.
  • Related Articles

    [1]Han Bing, Wang Hao, Fang Min, Zhang Yongchao, Zhou Lu, Ge Chunpeng. Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios[J]. Journal of Computer Research and Development, 2024, 61(10): 2467-2481. DOI: 10.7544/issn1000-1239.202440489
    [2]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [3]Xu Guangwei, Bai Yanke, Yan Cairong, Yang Yanbin, Huang Yongfeng. Check Algorithm of Data Integrity Verification Results in Big Data Storage[J]. Journal of Computer Research and Development, 2017, 54(11): 2487-2496. DOI: 10.7544/issn1000-1239.2017.20160825
    [4]Wang Huifeng, Li Zhanhuai, Zhang Xiao, Sun Jian, Zhao Xiaonan. A Self-Adaptive Audit Method of Data Integrity in the Cloud Storage[J]. Journal of Computer Research and Development, 2017, 54(1): 172-183. DOI: 10.7544/issn1000-1239.2017.20150900
    [5]Qin Zhiguang, Wang Shiyu, Zhao Yang, Xiong Hu, Wu Songyang. An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics[J]. Journal of Computer Research and Development, 2015, 52(10): 2192-2199. DOI: 10.7544/issn1000-1239.2015.20150509
    [6]Tan Shuang, He Li, Chen Zhikun, Jia Yan. A Method of Provable Data Integrity Based on Lattice in Cloud Storage[J]. Journal of Computer Research and Development, 2015, 52(8): 1862-1872. DOI: 10.7544/issn1000-1239.2015.20140610
    [7]Li Hui, Sun Wenhai, Li Fenghua, Wang Boyang. Secure and Privacy-Preserving Data Storage Service in Public Cloud[J]. Journal of Computer Research and Development, 2014, 51(7): 1397-1409.
    [8]Fu Yingxun, Luo Shengmei, Shu Jiwu. Survey of Secure Cloud Storage System and Key Technologies[J]. Journal of Computer Research and Development, 2013, 50(1): 136-145.
    [9]Xiao Da, Shu Jiwu, Chen Kang, Zheng Weimin. A Practical Data Possession Checking Scheme for Networked Archival Storage[J]. Journal of Computer Research and Development, 2009, 46(10): 1660-1668.
    [10]Wang Dan, Feng Dengguo, and Xu Zhen. An Approach to Data Sealing Based on Trusted Virtualization Platform[J]. Journal of Computer Research and Development, 2009, 46(8): 1325-1333.

Catalog

    Article views (743) PDF downloads (678) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return