Table of Contents Author Guidelines Submit a Manuscript
Scientific Programming
Volume 2017 (2017), Article ID 4358536, 9 pages
https://doi.org/10.1155/2017/4358536
Research Article

An Invocation Cost Optimization Method for Web Services in Cloud Environment

1School of Information Science and Engineering, Qufu Normal University, Rizhao 276826, China
2School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China

Correspondence should be addressed to Lianyong Qi; moc.liamg@iqgnoynail

Received 2 January 2017; Revised 27 February 2017; Accepted 19 April 2017; Published 9 May 2017

Academic Editor: Basilio B. Fraguela

Copyright © 2017 Lianyong Qi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. Habak, M. Ammar, K. A. Harras, and E. Zegura, “Femto clouds: leveraging mobile devices to provide cloud service at the edge,” in Proceedings of the 8th IEEE International Conference on Cloud Computing (CLOUD '15), pp. 9–16, July 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. Z. Xia, X. Wang, X. Sun, Q. Liu, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340–352, 2015. View at Publisher · View at Google Scholar
  3. Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. E98B, no. 1, pp. 190–200, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. Y. Kong, M. Zhang, and D. Ye, “A belief propagation-based method for task allocation in open and dynamic cloud environments,” Knowledge-Based Systems, vol. 115, pp. 123–132, 2016. View at Publisher · View at Google Scholar
  5. Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren, “A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2594–2608, 2016. View at Google Scholar
  6. L. Qi, W. Dou, and J. Chen, “Weighted principal component analysis-based service selection method for multimedia services in cloud,” Computing, vol. 98, no. 1-2, pp. 195–214, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  7. D. M. Divakaran and M. Gurusamy, “Towards flexible guarantees in clouds: adaptive bandwidth allocation and pricing,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 6, pp. 1754–1764, 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2546–2559, 2016. View at Publisher · View at Google Scholar
  9. Z. Pan, Y. Zhang, and S. Kwong, “Efficient motion and disparity estimation optimization for low complexity multiview video coding,” IEEE Transactions on Broadcasting, vol. 61, no. 2, pp. 166–176, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. Z. Pan, J. Lei, Y. Zhang, X. Sun, and S. Kwong, “Fast motion estimation based on content property for low-complexity H.265/HEVC encoder,” IEEE Transactions on Broadcasting, vol. 62, no. 3, pp. 675–684, 2016. View at Publisher · View at Google Scholar
  11. A. K. Talukder and L. Zimmerman, “Cloud economics: principles, costs, and benefits,” in Cloud Computing, pp. 343–360, Springer, London, UK, 2010. View at Google Scholar
  12. E. Deelman, G. Singh, M. Livny, B. Berriman, and J. Good, “The cost of doing science on the cloud: the montage example,” in Proceedings of the ACM/IEEE Conference on Supercomputing, pp. 1–12, IEEE Press, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. F. de Rose, and R. Buyya, “CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms,” Software: Practice and Experience, vol. 41, no. 1, pp. 23–50, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Chawla and I. Chana, “Optimal time dependent pricing model for smart cloud with cost based scheduling,” in Proceedings of the 3rd International Symposium on Women in Computing and Informatics (WCI '15), pp. 522–526, August 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. M. Li, D. Subhraveti, A. R. Butt, A. Khasymski, and P. Sarkar, “CAM: a topology aware minimum cost flow based resource manager for MapReduce applications in the cloud,” in Proceedings of the 21st ACM Symposium on High-Performance Parallel and Distributed Computing (HPDC '12), pp. 211–222, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. Q. Liu, W. Cai, J. Shen, Z. Fu, X. Liu, and N. Linge, “A speculative approach to spatial‐temporal efficiency with multi‐objective optimization in a heterogeneous cloud environment,” Security and Communication Networks, vol. 9, no. 17, pp. 4002–4012, 2016. View at Publisher · View at Google Scholar
  17. W.-H. Choi and K.-S. Kang, “A Study on deciding optimal price of bioinformatics services,” Journal of the Korea Safety Management and Science, vol. 18, no. 1, pp. 203–208, 2016. View at Publisher · View at Google Scholar
  18. Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, “Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2706–2716, 2016. View at Publisher · View at Google Scholar
  19. Z. Pan, P. Jin, J. Lei, Y. Zhang, X. Sun, and S. Kwong, “Fast reference frame selection based on content similarity for low complexity HEVC encoder,” Journal of Visual Communication and Image Representation, vol. 40, part B, pp. 516–524, 2016. View at Publisher · View at Google Scholar
  20. Y. Xue, J. Jiang, B. Zhao, and T. Ma, “A self-adaptive articial bee colony algorithm based on global best for global optimization,” Soft Computing, 2017. View at Publisher · View at Google Scholar
  21. Y. Zhang, X. Sun, and W. Baowei, “Efficient algorithm for k-barrier coverage based on integer linear programming,” China Communications, vol. 13, no. 7, pp. 16–23, 2016. View at Publisher · View at Google Scholar
  22. X. Chen, S. Chen, and Y. Wu, “Coverless information hiding method based on the Chinese character encoding,” Journal of Internet Technology, vol. 18, no. 2, pp. 91–98, 2017. View at Google Scholar
  23. C. Yuan, Z. Xia, and X. Sun, “Coverless image steganography based on SIFT and BOF,” Journal of Internet Technology, vol. 18, no. 2, pp. 209–216, 2017. View at Google Scholar
  24. Z. Xia, X. Wang, X. Sun, and B. Wang, “Steganalysis of least significant bit matching using multi-order differences,” Security and Communication Networks, vol. 7, no. 8, pp. 1283–1291, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. J. Li, X. Li, B. Yang, and X. Sun, “Segmentation-based image copy-move forgery detection scheme,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507–518, 2015. View at Publisher · View at Google Scholar · View at Scopus
  26. Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, “Steganalysis of LSB matching using differences between nonadjacent pixels,” Multimedia Tools and Applications, vol. 75, no. 4, pp. 1947–1962, 2016. View at Publisher · View at Google Scholar · View at Scopus
  27. J. Wang, T. Li, Y.-Q. Shi, S. Lian, and J. Ye, “Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics,” Multimedia Tools and Applications, 2016. View at Publisher · View at Google Scholar
  28. Z. Zhou, C.-N. Yang, B. Chen, X. Sun, Q. Liu, and Q. M. Jonathan Wu, “Effective and efficient image copy detection with resistance to arbitrary rotation,” IEICE Transactions on Information and Systems, vol. E99-D, no. 6, pp. 1531–1540, 2016. View at Google Scholar
  29. C. Yuan, X. Sun, and R. Lv, “Fingerprint liveness detection based on multi-scale LPQ and PCA,” China Communications, vol. 13, no. 7, pp. 60–65, 2016. View at Publisher · View at Google Scholar
  30. Y. Chen, C. Hao, W. Wu, and E. Wu, “Robust dense reconstruction by range merging based on confidence estimation,” Science China Information Sciences, vol. 59, no. 9, Article ID 092103, pp. 1–11, 2016. View at Publisher · View at Google Scholar
  31. Z. Zhou, Y. Wang, Q. M. J. Wu, C.-N. Yang, and X. Sun, “Effective and effcient global context verifcation for image copy detection,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 1, pp. 48–63, 2017. View at Publisher · View at Google Scholar
  32. Z. Fu, F. Huang, X. Sun, A. V. Vasilakos, and C.-N. Yang, “Enabling semantic search based on conceptual graphs over encrypted outsourced data,” IEEE Transactions on Services Computing, 2016. View at Publisher · View at Google Scholar
  33. B. Gu and V. S. Sheng, “A robust regularization path algorithm for ν-support vector classification,” IEEE Transactions on Neural Networks and Learning Systems, vol. 28, no. 5, pp. 1241–1248, 2016. View at Publisher · View at Google Scholar
  34. B. Gu, X. Sun, and V. S. Sheng, “Structural minimax probability machine,” IEEE Transactions on Neural Networks and Learning Systems, 2016. View at Publisher · View at Google Scholar
  35. B. Gu, V. S. Sheng, K. Y. Tay, W. Romano, and S. Li, “Incremental support vector learning for ordinal regression,” IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 7, pp. 1403–1416, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  36. B. Gu, V. S. Sheng, Z. Wang, D. Ho, S. Osman, and S. Li, “Incremental learning for ν-support vector regression,” Neural Networks, vol. 67, pp. 140–150, 2015. View at Publisher · View at Google Scholar
  37. Q. Tian and S. Chen, “Cross-heterogeneous-database age estimation through correlation representation learning,” Neurocomputing, vol. 238, pp. 286–295, 2017. View at Publisher · View at Google Scholar
  38. Z. Qu, J. Keeney, S. Robitzsch, F. Zaman, and X. Wang, “Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks,” China Communications, vol. 13, no. 7, pp. 108–116, 2016. View at Publisher · View at Google Scholar
  39. N. Zhang, J. Wang, and Y. Ma, “Mining Domain Knowledge on Service Goals From Textual Service Descriptions,” IEEE Transactions on Services Computing, 2017. View at Publisher · View at Google Scholar
  40. J. Wang, Z. Zhu, J. Liu, C. Wang, and Y. Xu, “An Approach of Role Updating in Context-Aware Role Mining,” International Journal of Web Services Research, vol. 14, no. 2, pp. 24–44, 2017. View at Publisher · View at Google Scholar