Preference and Similaritybased Behavioral Discovery of Services

Similar documents
Parametric Attack Graph Construction and Analysis

Summary. Operations on Fuzzy Sets. Zadeh s Definitions. Zadeh s Operations T-Norms S-Norms. Properties of Fuzzy Sets Fuzzy Measures

Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming

How To Solve Factoring Problems

Towards a Tight Finite Key Analysis for BB84

Satisfiability Checking

MARTINGALES AND GAMBLING Louis H. Y. Chen Department of Mathematics National University of Singapore

Observability and Controllability Issues in Conformance Testing of Web Service Compositions

Dynamic workflow. Adam Belloum Systems and Networking Engineering research group Institute of Informatics University of Amsterdam

Using the ac Method to Factor

Dynamic Process/Service Composition/Combination

Matrix Algebra. Some Basic Matrix Laws. Before reading the text or the following notes glance at the following list of basic matrix algebra laws.

December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS

Mathematics Review for MS Finance Students

CS MidTerm Exam 4/1/2004 Name: KEY. Page Max Score Total 139

The Degrees of Freedom of Compute-and-Forward


The confidence-probability semiring Günther J. Wirsching Markus Huber Christian Kölbl

3. The Junction Tree Algorithms

Cloud and Big Data Summer School, Stockholm, Aug., 2015 Jeffrey D. Ullman

6 Commutators and the derived series. [x,y] = xyx 1 y 1.

1 Introduction to Matrices

Relational Databases

Solving WCSP by Extraction of Minimal Unsatisfiable Cores

On the Algebraic Structures of Soft Sets in Logic

Equilibrium computation: Part 1

Informatique Fondamentale IMA S8

So let us begin our quest to find the holy grail of real analysis.

TELEIOS FP Deliverable D10.2. TELEIOS Web Site. Kostis Kyzirakos, Michael Sioutis, Stavros Vassos, Manolis Koubarakis.

CSE140: Midterm 1 Solution and Rubric

6.3 FACTORING ax 2 bx c WITH a 1

Boolean Algebra Part 1

Towards Visualising Security with Arguments

FUNDAMENTALS OF ENGINEERING (FE) EXAMINATION REVIEW

KLMLean 2.0: A Theorem Prover for KLM Logics of Nonmonotonic Reasoning

Lights and Darks of the Star-Free Star

A Workbench for Prototyping XML Data Exchange (extended abstract)

SSL Enablement of the DB2 Web Query for System i Server

Automating Software Development Process Using Fuzzy Logic

Application Note RMF Magic 5.1.0: EMC Array Group and EMC SRDF/A Reporting. July 2009

Rigorous Software Development CSCI-GA

Diagnosis of Large Software Systems Based on Colored Petri Nets

Towards an Automated Deployment Planner for Composition of Web Services as Software Components

How to Implement Transport Layer Security in PowerCenter Web Services

Borne inférieure de circuit : une application des expanders

Line and Polygon Clipping. Foley & Van Dam, Chapter 3

1. True or False? A voltage level in the range 0 to 2 volts is interpreted as a binary 1.

Algebraic Recognizability of Languages

15-381: Artificial Intelligence. Probabilistic Reasoning and Inference

Semantic Description of Distributed Business Processes

Application Note 83 Fundamentals of RS 232 Serial Communications

Omega Automata: Minimization and Learning 1

Using Microsoft Active Directory for Checkpoint NG AI SecureClient

Calculation of Valu-Trac Statuses

Uncertainty evaluations in EMC measurements

Fabio Patrizi DIS Sapienza - University of Rome

Pattern Co. Monkey Trouble Wall Quilt. Size: 48" x 58"

Some Special Artex Spaces Over Bi-monoids

INF5140: Specification and Verification of Parallel Systems

Interactive Timetabling

From Factorial Designs to Hilbert Schemes

INFINEA TAB USER MANUAL. INFINEA ipad TAB

exclusive-or and Binary Adder R eouven Elbaz reouven@uwaterloo.ca Office room: DC3576

Optimal Planning with ACO

The Model Checker SPIN

Neighborhood Data and Database Security

Digital circuits make up all computers and computer systems. The operation of digital circuits is based on

Treebank Search with Tree Automata MonaSearch Querying Linguistic Treebanks with Monadic Second Order Logic

Factoring (pp. 1 of 4)

Lecture 2: Universality

BOOLEAN CONSENSUS FOR SOCIETIES OF ROBOTS

CH3 Boolean Algebra (cont d)

Using EXCEL Solver October, 2000

A Bayesian Approach for on-line max auditing of Dynamic Statistical Databases

LiTH, Tekniska högskolan vid Linköpings universitet 1(7) IDA, Institutionen för datavetenskap Juha Takkinen

STIC-AMSUD project meeting, Recife, Brazil, July Quality Management. Current work and perspectives at InCo

Class XII (Theory) C++

simplicity hides complexity

LMS is a simple but powerful algorithm and can be implemented to take advantage of the Lattice FPGA architecture.

setup information for most domains hosted with InfoRailway.

TL074 TL074A - TL074B

Fundamentele Informatica II

FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME AND BUDGET CONSTRAINTS

Chapter 1. Computation theory

The Halting Problem is Undecidable

3 1. Note that all cubes solve it; therefore, there are no more

Adding Semantics to Business Intelligence

For supervised classification we have a variety of measures to evaluate how good our model is Accuracy, precision, recall

Attachment "A" - List of HP Inkjet Printers

CIS 631 Database Management Systems Sample Final Exam

CAs and Turing Machines. The Basis for Universal Computation

SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova

Optimization under fuzzy if-then rules

Tutorial on Using Excel Solver to Analyze Spin-Lattice Relaxation Time Data

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

A Tutorial on Data Integration

2D Geometrical Transformations. Foley & Van Dam, Chapter 5

Teaching Scheme. Theory Practical Course Code L T P Credits Max. Min. Max. Min. ISE MA201 Linear Algebra 3 1-4

2D Geometric Transformations

The Entity-Relationship Model

Transcription:

Preference and Similaritybased Behavioral Discovery of Services Farhad Arbab 1 and Francesco Santini 1,2 1 Centrum Wiskunde & Informatica, Amsterdam, Netherlands 2 Dipartimento di Matematica e Informatica, University of Perugia, Italy

Intro and Motivations è We focus on the discovery process of Web Services (WSs) " Satisfactory alternatives for the user " Over-constrained queries è A formal tool to model queries " Constraint Automata (CA) to represent the desired behavior " Soft Constraints to represent user s preferences è Classical CA operators to reason on queries è Practical advantages " Expressivity of (soft) constraints " A parametric computational framework where to solve the problem " Techniques from AI to tackle the complexity

In a glimpse Soft constraints Soft constraint automata constraints Constraint automata preferences automata services A preference/similarity-based behavioral query language for services

Outline è Semirings è Semiring-based Soft Constraints è Soft Constraint Automata (SCA) è SCA as preference-based queries è SCA as similarity-based queries è SCA operators (Join/Hide) è A sketch of an implementation è Future Work / Conclusion

C-semirings (for preferences) è A c-semiring is a tuple " A is the (possibly infinite) set of preference values " 0 and 1 represent the bottom and top preference values " + defines a partial order ( S ) over A such that a S b iff a+b = a " + is commutative, associative, and idempotent, it is closed, 0 is its unit element and 1 is its absorbing element " closed, associative, commutative, and distributes over +, 1 is its unit element and 0 is its absorbing element ha, apple S i " is a complete lattice ha, +,, 0, 1i to compose the preferences and + to find the best one

Classical instantiations è Weighted è Fuzzy è Probabilistic è Boolean hr + [{+1}, min, ˆ+, 1, 0i h[0..1], max, min, 0, 1i h[0..1], max, ˆ, 0, 1i h{false, true}, _, ^, false, truei è Boolean semirings can be used to represent classical crisp problems è The Cartesian product is still a semiring h[0..1], R + [{+1}i, hmax, mini, hmin, ˆ i, h0, +1i, h1, 0ii

Soft Constraints è A constraint where each instantiation of its variables has an associated preference " Assignment : V! D C :! A " Constraint è Example of a binary soft constraint è Sum: (c 1 c 2 ) = c 1 + c 2 è Combination: (c 1 c 2 ) = c 1 c 2 è Projection: è Entailment: c x,y : V! D! A c + (V\{v}) c 0 = P d2d c [v := d] c 1 v S c 2 () c 1 apple S c 2 ( )

Examples c 1 :({x}!n)! R + s.t. c(x) = 2x + 8 c 2 :({x}!n)! R + s.t. c(x) = x + 5 c 3 :({x}!n)! R + s.t. c(x) = x + 3 c 4 :({x, y}!n)! R + s.t. c(x, y) = x + y + 5 c 2 c 3 = c 1 c 4 + {x} = c 2 c 1 v c 2 v c 3

Example of a SCSP <a,a> 11 <a,b> 7 <b,a> 16 <b,b> 16 The best level of consistency is 7

Soft Constraint Automata

Timed Weighted Data Streams è They represent the languages recognized by our SCA " Data stream λ " Time stream l " Preference stream a ha, +,, 0, 1i h, l, ai 2Data! R! + A! such that, 8k 0:l(k) < l(k + 1) and lim k!+1 l(k) =+1 A is a I/O port name {A} c yes/no preference! q o q 1

Simple Reo Circuit Writer A B Reader = 1-FIFO channel {A} c 1 q o s q 1 {B} c 2

Soft Data Constraints è Soft constraints used by SCA (labels of the transitions) c {dn n2n} = 0 1 c 1 c 2 c 1 c 2 c è d n are the variables corresponding to names in N è A soft constraint is a function defined as c :({d n n 2 N}!Data)! A

Soft Constraint Automata Query: i) States represent the states of our stateful service, ii) Transitions represent the operations that can be invoked on the service iii) Names are operation names, data elements are operation parameters

Preference-based query (Ex.) DB 0.2 1 1 0.8 0.3

A more complex example

Similarity-based query Variables now represent operations names!

Join and Hide Join T 1 S./ T 2 S = (Q 1 Q 2, N 1 [N 2,!, Q 0,1 Q 0,2, S) q 1 N 1,c 1! 1 p 1, q 2 N 2,c 2! 2 p 2, N 1 \N 2 = N 2 \N 1 hq 1, q 2 i N 1[N 2,c 1 c 2! hp1, p 2 i q 1 N,c! 1 p 1, N \N 2 = ; hq 1, q 2 i N,c! h p 1, q 2 i Hide 9O[T S ] = (Q, N\O,! O, Q 0,O, S) q p, p N,c! r, N 0 = N\O, ;, c 0 = c + {dn n2n 0 } q N0,c 0! O r

Practical applications

Implementation Automaton-structure constraints: q a N l! qb q a, q b 2Q DB c xi,y i (x i = q a, y i = q b ) = 1, and 0 otherwise Name preference constraints: q a N l! qb 2 DB c xi,y i,z i (x i = q a, y i = q b, z i = N l ) = a Ex. c x1,y 1,z 1 (x 1 = q a, y 1 = q b, z 1 = {Login}) = 0.8

Solving the SCSP DB = {T 1, T 2,...,T h } Q 1 [Q 2 [ [Q h = Q DB P = hs, V, D, Ci [ V = {x i, y i, z i }

Conclusion and FW è An evolution of classical Constraint Automata " Returning a preference value for the data used in the service operations " Returning a similarity value for the service operation-names (I/O) è A natural application of it as a " Preference/similarity based, " and behavioral query language for services è An implementation with standard (soft) solvers è A full implementation of the framework (on the way) è Further study on Simulation/Bisimulation, Join/Hide

Thank you for your time! Contacts: F.Santini@cwi.nl