Reference Hub12
Mining and Improving Composite Web Services Recovery Mechanisms

Mining and Improving Composite Web Services Recovery Mechanisms

Sami Bhiri, Walid Gaaloul, Claude Godart
Copyright: © 2008 |Volume: 5 |Issue: 2 |Pages: 26
ISSN: 1545-7362|EISSN: 1546-5004|ISSN: 1545-7362|EISBN13: 9781615204496|EISSN: 1546-5004|DOI: 10.4018/jwsr.2008040102
Cite Article Cite Article

MLA

Bhiri, Sami, et al. "Mining and Improving Composite Web Services Recovery Mechanisms." IJWSR vol.5, no.2 2008: pp.23-48. http://doi.org/10.4018/jwsr.2008040102

APA

Bhiri, S., Gaaloul, W., & Godart, C. (2008). Mining and Improving Composite Web Services Recovery Mechanisms. International Journal of Web Services Research (IJWSR), 5(2), 23-48. http://doi.org/10.4018/jwsr.2008040102

Chicago

Bhiri, Sami, Walid Gaaloul, and Claude Godart. "Mining and Improving Composite Web Services Recovery Mechanisms," International Journal of Web Services Research (IJWSR) 5, no.2: 23-48. http://doi.org/10.4018/jwsr.2008040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Ensuring composite services reliability is a challenging problem. Indeed, due to the inherent autonomy and heterogeneity of Web services, it is difficult to predict and reason about the behavior of the overall composite service (CS). Generally, previous approaches develop, using their modeling formalisms, a set of techniques to analyze the composition model and check “correctness” properties. Although powerful, these approaches may fail in some cases in order to ensure CS-reliable executions, even if they formally validate its composition model. This is because properties specified in the studied composition model remain assumptions that may not coincide with the reality (i.e., effective CS executions). Sharing the same issue, we present a reengineering approach that starts from CS executions log to improve its recovery mechanisms. Basically, we propose a set of mining techniques to discover CS transactional behavior from an event-based log. Then, based on this mining step, we use a set of rules in order to improve its reliability.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.