An Intermediate Service Composer Architecture for Dynamic Discovery and Invocation of Web Services from Mobile Devices
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 6
Abstract
Web services describe a standardized way of integrating Web-based applications over an Internet protocol backbone. Mobile devices are getting more pervasive and it is becoming increasingly necessary to integrate web services into applications that run on these devices. We introduce a novel approach for dynamically invoking web service methods from mobile devices with minimal user intervention that only involves entering a search phrase and values for the method parameters. The architecture overcomes technical challenges that involve consuming discovered services dynamically by introducing a man-in-the middle (MIM) server that provides a web service whose responsibility is to discover needed services and build the client-side proxies at runtime. The architecture moves to the MIM server energy-consuming tasks. Such tasks involve communication with servers over the Internet, XML-parsing of files, and on-the-fly compilation of source code. The MIM Server programmed with the intelligence to identify a set of services whose collective functionality can serve the user’s request. We perform extensive evaluations of the system performance to measure scalability as it relates to the capacity of the MIM server in handling mobile client requests, and device battery power savings resulting from delegating the service discovery tasks to the server.
Authors and Affiliations
K. Kishoreanthuvan
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is leaked...
Authentication Scheme for Session Password using matrix Colour and Text
The most common method used for authentication is Textual passwords. But textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are ...
A New Multi-Agent Game Solver
Abstract: A new N-person game solver is presented in this work. The new software is an advance in the whole sate of art for the investigation of N-person games. It is now possible to investigate entire classes of games a...
Teneur: A LINUX based offline content management system
Abstract: This technical section provides a brief synopsis about our offline content management system. The main purpose of this system is to manage the resources such as text files, images in a more synchronized m...
“Software Theft Detection for JavaScript programs based ondynamic birthmark extracted from runtime heap graph”
Abstract: Software’s, programs are valuable assets to developer companies. However, the source code ofprograms can be theft and JavaScript programs whose code is easily available which is a serious threat to theind...