Shang-Pin Ma

Shang-Pin Ma
Verified
Shang-Pin verified their affiliation via an institutional email.
Verified
Shang-Pin verified their affiliation via an institutional email.
  • Doctor of Engineering
  • Professor at National Taiwan Ocean University

About

106
Publications
22,450
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,007
Citations
Introduction
Dr. Shang-Pin Ma is a professor of the Department of Computer Science and Engineering at National Taiwan Ocean University. His research interests include service-oriented computing, software engineering, mobile computing, and chatbot architecture.
Current institution
National Taiwan Ocean University
Current position
  • Professor
Additional affiliations
February 2014 - January 2020
National Taiwan Ocean University
Position
  • Professor (Associate)

Publications

Publications (106)
Article
Full-text available
Developing the means by which to discover RESTful Web APIs/services is crucial to the further development of this technology. Unfortunately, existing search engines for RESTful Web APIs/services provide only keyword-based or tag-based search functions. A failure to take into account the semantics and/or characteristics (e.g., their interface compat...
Article
The microservice architecture (MSA) differs fundamentally from the monolithic, layered architecture. The use of microservices provides a high degree of autonomy, composability, scalability, and fault-tolerance. MSA is regarded by many as a promising architecture for smart-city applications; however, a number of issues remain, including (1) the mana...
Article
Full-text available
The microservice architecture has several advantages over conventional monolithic architectures, such as the ability to develop and deploy services independently and flexibility in dealing with bottlenecks. Most existing works in this field have focused on methodologies by which to divide monolithic systems into microservices, paying little or no a...
Article
Full-text available
Numerous companies create innovative software systems using Web APIs (Application Programming Interfaces). API search engines and API directory services, such as ProgrammableWeb, Rapid API Hub, APIs.guru, and API Harmony, have been developed to facilitate the utilization of various APIs. Unfortunately, most API systems provide only superficial supp...
Chapter
Full-text available
The Chatbot is a new and popular technology in recent years. With Web API technology becoming increasingly mature, how to integrate Web APIs and Chatbots has become an issue of great interest. Based on the concept of Model-Driven Engineering, this research proposes a semi-automatic generation method and its associated tool, called BOTEN, to allow a...
Article
Full-text available
Protein-based studies contribute significantly to gathering functional information about biological systems; therefore, the protein–protein interaction detection task is one of the most researched topics in the biomedical literature. To this end, many state-of-the-art systems using syntactic tree kernels (TK) and deep learning have been developed....
Article
Despite the growing importance of the microservice architecture (MSA), interactions among the various elements (e.g., services, endpoints, and versions) remain difficult to manage. This research devised a system, called version-based microservice analysis, monitoring, and visualization (VMAMV), including multiple proposed methods to facilitate the...
Article
Existing Web API search engines allow only category-based browsing and keyword- or tag-based searches for RESTful services. In other words, they do not enable the discovery or composition of real-world RESTful services by application developers. This paper outlines a novel scheme, called Transformation–Annotation–Discovery (TAD), which transforms O...
Chapter
Nowadays, Web services attract more and more attentions. Many companies expose their data or services by publishing Web APIs (Application Programming Interface) to let users create innovative services or applications. To ease the use of various and complex APIs, multiple API directory services or API search engines, such as Mashape, API Harmony, an...
Book
This book presents the latest trends in scientific methods and enabling technologies to advance e-business. It consists of selected high-quality papers from the 16th International Conference on E-Business Engineering (ICEBE 2019), held in Shanghai, China, on 11–13 October 2019. ICEBE is a leading international forum for researchers, engineers, and...
Chapter
With the evolution of software engineering technology, using cloud services to replace self-built information systems has been proven an economical and reliable way. However, how to help e-commerce service system builders to choose suitable compositions of cloud services that meet their needs is still a challenge. In the past decade, a number of ac...
Article
Background: Although the cancer mortality rate in Taiwan has been declining in recent years, no study has yet reported any regional differences in cancer mortality rates in Taiwan. We hypothesized that regional cancer mortality rates in Taiwan, an ethnically homogeneous society, exhibited no significant variations. Methods: We investigated the t...
Article
Full-text available
Open data is becoming increasingly popular in a wide range of service domains; however, most open datasets in Taiwan remain separate. The lack of linked open data (LOD) makes it difficult to locate and combine open datasets for the creation of innovative applications. In this study, we sought to facilitate the spread of open data in Taiwan using a...
Article
Chatbots are computer programs designed to chat with users via text or voice through the use of techniques of Web services, data analysis, and artificial intelligence (AI). Currently, the use of chatbot is becoming an important trend in the field of data science. An increasing number of chatbots are being built on social platforms, such as Facebook...
Article
To build an effective, efficient, and easy-to-use mobile service composition and delivery approach for ordinary users, in this research, we propose a framework, called CARSB (Composite App with RESTful service and Service Bricks), to create mobile Apps based on Service Bricks and RESTful services. Three main features are offered by the CARSB framew...
Article
In recent years, automated service composition has been a fervid research area in service computing. Within this area, service description plays a crucial role in terms of the development of a diverse number of automation schemes. In this paper, we provide an investigation and classification of the service description approaches that have been used...
Article
Web service discovery plays a crucial role in the development of applications based on service-oriented architecture, due to the importance of identifying services capable of fulfilling the requirements of service requesters. In the field of software engineering, web service discovery can be applied to the problem of software component retrieval in...
Conference Paper
The retrieval and the composition of information from multiple apps, services, or local resources can be time-consuming, costly, and inconvenient. To build an effective, efficient, and easy-to-use mobile service composition and delivery approach, in this research, we propose an approach called CARSB (Composite App with RESTful Services and Bricks)....
Conference Paper
Web API is the lightweight version to the SOAP (Simple Object Access Protocol) service and usually applies REST (Representational State Transfer) as the architectural style. Nowadays, the service-oriented computing paradigm is shifting from the SOAP services to the Web APIs, i.e., RESTful services. Rather than hard coding from scratch, the methodol...
Article
Full-text available
The wireless sensor network represents distributed environment that consists of sensors and actuators to monitor and control real-world objects and devices. Web services and service-oriented architecture are fundamental elements to provide on-demand applications. The integration of business processes with wireless sensor network and service-oriente...
Article
Full-text available
Providing users of mobile devices uninterrupted access to web services in unstable network conditions continues to be a problem. Numerous methods for service caching have been proposed; however, most studies fail to consider two crucial factors: (1) Context of network connectivity: Smartphones are used in a variety of wireless network conditions, s...
Article
With the emergence of the huge number of mobile applications (apps) and their increasing growth rate, how to appropriately search, recommend, and manage apps is becoming a critical challenge to enhance the usage of mobile apps for users. Although existing mobile app search engines provide basic search functionalities to let users find relevant mobi...
Article
Full-text available
The availability of enormous numbers of mobile applications (apps) is driving demand for the means to search for, recommend, and manage apps. Existing search engines provide basic search functionalities that enable users to find apps by issuing query keywords; however, the ranking of search results does not always satisfy the expectations of users....
Conference Paper
A common defect of most current QoS information exposed is that they are static and did not consider some facts (e.g., Different calling time points) that can cause the actual values of some types of QoS to vary. A solution for such issue is to develop a valid forecasting mechanism able to predict future dynamic QoS values. In the past, several suc...
Article
Full-text available
Use-case-driven and architecture-centric approaches have been widely used to develop software systems, which also impose a great demand for a systematic approach to derive software architectures from requirements. As service-oriented computing (SOC) gains wide acceptance, the need to design an architecture that integrates web services becomes inevi...
Article
How to provide continued and smooth access to web services from smartphones under unstable network or during network disconnections is an important issue to be solved. In the past decade, many methods for service caching are proposed, however, a significant concern is commonly overlooked in these methods: a variety of contexts, namely, how to maint...
Article
Full-text available
Techniques for the mashup of services have been attracting considerable attention; however, reusable and reconfigurable models for the construction of mashup applications are still lacking. The REST (Representational State Transfer) software architecture has been widely accepted due to its usability and simplicity. This makes REST an appropriate fo...
Chapter
This chapter provides a snapshot of the current status of our two-phase, eight-year, nationwide effort to improve software engineering education in Taiwan. In the first phase of this program (2004–2008) we identified four dysfunctions and performed a series of corrective actions to address them. At the end of the first phase, the number of universi...
Article
Full-text available
Service selection and binding for building composite services is a critical but difficult to resolve issue in the domain of service-oriented computing. This paper proposes an innovative approach to address this issue, in which every abstract component service in the composition is assigned a weight value to represent its importance according to des...
Conference Paper
In recent years, developing needed software applications via the technique Web Service Composition (WSC) has been more and more popular. Moreover, benefit from the Semantic Web Services (SWSs) technology, it is possible to even automatically conduct WSC, i.e. the Automated Web Service composition (AWSC). Currently the AWSC is a well-studied researc...
Article
For security and privacy considerations, it is important for Android users to understand the behavior and the risk of an application. Although Google claims that new applications available on the official market have passed their security checks, the open design of the Android system still allows a user to install applications for thirdparty vendor...
Article
Full-text available
How to effectively and efficiently monitor, manage, and adapt web services in a composite service or a service-oriented application is becoming a significant issue. In this paper, we argue that it is insufficient to only solve emerging service faults at the deployment time or runtime; instead, we propose that the prediction of service faults is equ...
Chapter
Service-Oriented Computing (SOC), a main trend in software engineering, promotes the construction of applications based on the notion of services. SOC has recently attracted a great deal of attention from researchers, and has been comprehensively adopted by industry. However, service composition enabling the aggregation of existing services into co...
Conference Paper
Nowadays, smart phones have become the most important mobile devices and can access thousands of mobile applications. However, retrieving required information from various resources by the smart phone is still a time-consuming, costly and inconvenient task for users. To address this issue, we introduce the concept of service brick, and propose a se...
Conference Paper
Web service discovery is the process of locating web services to satisfy the requirements of service requesters, and as such, plays an important role to realize business-to-business interoperability. Today, many service discovery mechanisms are available, roughly classified into two categories: text-based service retrieval and ontology-based servic...
Article
RoboCup (Robot world cup tournament) soccer game is a competitive game that has become a popular research domain in recent years since it involves a complex system for the behavior of multiple agents. In this paper, a hybrid approach, case-based reasoning genetic algorithm (CBR-GA) is applied to the soccer game for providing better strategies. By u...
Conference Paper
Web service discovery is the process of locating web services to satisfy the requirements of service requesters. It plays an important role in building loosely coupled service-oriented applications. Nowadays, although many service discovery mechanisms are available, a lot of efforts do not focus on linking actual business services in real world and...
Conference Paper
In this paper, we propose an approach to delivering location-based information (LBI) and location-based web services (LBWS) to users based on users' past behaviors. The service usage patterns mined from the user's historical location visiting records and service utilization records are used to suggest relevant LBI and LBWS. Furthermore, the social...
Article
A flood forecasting system usually needs to integrate many hydraulic modules, which may be legacy programs written in FORTRAN, running in heterogeneous environments, and differing in execution time. Besides, the data required for each module should be provided in real time, and the programs also need to be executed in a correct sequence. In this pa...
Conference Paper
Web service discovery is the process of locating web services to meet requirements of service requesters, and is an important ingredient in building loosely-coupled SOA-based applications. In this paper, we propose a graph-based web service matchmaking approach based on WSDL without additional meta data or annotations. We divide the service matchma...
Conference Paper
The main purpose of this paper is to provide a snapshot of the current status of our two-phase-eight-year nation-wide effort in improving the software engineering education in Taiwan. In the first phase of this program (2004 - 2008), the number of universities that regularly offer software engineering courses grew from 63 to 92 while the number of...
Conference Paper
How to effectively and efficiently monitor, manage, and adapt web services is becoming a significant issue to address. In this paper, we argue that only solving emerging service faults at deployment time or runtime is not enough; on the contrary, we believe that prediction of service faults is equivalently important. We propose a risk-driven servic...
Conference Paper
This study proposed a method to detect the little flame in the early stage of fire combustion. The foreground object was extracted by motion detection and YCb Cr color clues. To avoid the noise of motion detection in different resolution videos, background edge model is used to eliminate noise instead of morphology. Next, with the help of fire char...
Conference Paper
In the past, security personnel were arranged to guard on all important occasions. Missing and unattended objects of detection could help security personnel monitor an important place of safety, and it did not require a large number of security personnel to guard these places. This study proposes a method to detect and mark the target object remove...
Article
This study proposes a method to detect and mark the target object removed from the monitoring scene and the unknown object left in the monitoring scene. The present method uses the timeliness background to extract the foreground object and to mask the part that was unwanted. The foreground object was compared with the current frame, thus, the unrel...
Article
Nowadays, location-based services are widely utilized, including identifying user locations, offering traffic status, providing point of interest (POI) information, and guiding routes. At present, users always make use of location-based services via smart phones, and can obtain information anywhere and anytime. However, users easily receive informa...
Conference Paper
As a promising, low-cost, and agile way to develop software, in recent years automatic service composition has been a popular research topic receiving a lot of attentions. For this topic, upon our long-term study and paper reviewed, we present technical survey and observation in this paper, including indispensable background and preliminary knowled...
Article
Since genetic algorithm was invented, it has been applied to solve lots of difficulties. One kind of the frequently encountered issues by it is problems having plural and conflicting objectives to be achieved simultaneously (i.e. multiobjective problems). However, it is unlikely to find an answer which is optimal or perfect to all conflicting objec...
Article
Phishing is now a serious threat to the security of Internet users' confidential information. Basically, an attacker (phisher) tricks people into divulging sensitive information by sending fake messages to a large number of users at random. Unsuspecting users who follow the instruction in the messages are directed to well-built spoofed web pages an...
Conference Paper
Service-oriented architecture implemented by Web Services is one of the most popular and promising software development paradigm that has brought some challenging research issues today. One of the most important issues is how to automate web service composition at design phase. Currently, there are many researchers concentrating on service composit...
Conference Paper
Nowadays, application and software realized under Service-Oriented Architecture using Web Service technology is SRSXODU�� 7RIXOILOOXVHU∂V� requirements, usually, several web services must be composited as a more complex, value-added service. As more and more web services are available, it is very hard to compose services manually. In our previous w...
Conference Paper
In multi-agent pursuit-evasion game, pursuers need to coordinate the behavior of each other to achieve a common goal: catching the evader. In this paper, a learning mechanism to capture evader in a dynamic environment of pursuit-evasion game is proposed. It deals with the uncertainty in environment using training and, according to whether the agent...
Conference Paper
An important vision of Service-Oriented Computing is to dynamically discover and bind services at run-time. Nowadays, how to identify relevant services which satisfy the desired goal by considering business policies is still a challenge. Although multiple efforts have tried to address this issue, these efforts usually provide solutions based on pri...
Conference Paper
Service Oriented Architecture implemented by Web Services is one of the most popular and promising software development paradigm, however, it still has some challenging issues. One of that is how to automate web services composition at design time. Services composition reuses existing component services to provide composite service with more comple...
Conference Paper
This paper proposes an argumentation and negotiation mechanism for multi-agent systems. Through argumentations and negotiations, agents obtain more information on the topics of common interests or on those they have odds with. At the inception of the negotiation, agents can hardly understand completely the goals and beliefs other agents have toward...
Article
Full-text available
In recent years, mobile devices have become widespread and refined, and they have offered increased convenience in human life. For these reasons, a variety of embedded systems have been designed. Therefore, improving methods for developing of embedded software systematically has become an important issue. Platform-based design is one example of an...
Article
Service-Oriented Computing (SOC), a main trend in software engineering, promotes the construction of applications based on the notion of services. SOC has recently attracted a great deal of attention from researchers, and has been comprehensively adopted by industry. However, service composition enabling the aggregation of existing services into co...
Article
As Service-Oriented Computing (SOC) gains a wider global acceptance, the need for understanding its life cycle becomes inevitable, not only for developers, but also for users. Service Life Cycle Tools and Technologies: Methods, Trends and Advances compiles the latest research on SOC life cycles, detailing methodologies and applications in this emer...
Conference Paper
Full-text available
Phishing is now a serious threat to the security of Internet users' confidential information. Basically, an attacker (phisher) tricks people into divulging sensitive information by sending fake messages to a large number of users at random. Unsuspecting users who follow the instruction in the messages are directed to well-built spoofed web pages an...
Conference Paper
Full-text available
Peer-to-peer networking is a popular topic for network researchers. A fundamental step before digging into understanding peer-to-peer network behavior is to collect a sufficient amount of peer-to-peer traffic traces. However, it is not really easy to obtain traces. Due to privacy concerns, researchers usually have to either sign non-disclosure agre...
Article
Full-text available
In software development, project plans document scope, cost, effort, and schedule, guide project managers, and control project execution. Developing a project plan without incorporating how an organization doing things - i.e., organizational culture - may lead to project failure. To ensure stable process performance and to benefit from organization...
Conference Paper
Optimization of service selection for composition is a critical but difficult issue in the area of service-oriented computing. This paper proposes an innovative approach to solve this issue. In the proposed approach, every abstract component service in the composition will be assigned a weight value to represent its importance through user assignme...
Conference Paper
Nowadays, the Service-Oriented Architecture (SOA) as well as orchestration technology becomes trend of software development. The benefit of SOA is that we will save cost and time extremely due to the services utilized are already exist and reuse those services as well as integrate them. Currently, the main issues of SOA are how to define workflow a...
Conference Paper
Full-text available
Recently, it is one of the most challenging fields in software engineering for embedded software development, since the advancement of embedded technologies has made our life increasingly depend on embedded systems and increased the size and complexity of embedded software. Embedded software developers must pay attention to not only performance and...
Article
Full-text available
Web service technologies are best exploited by composing services, and BPEL (Web Services Business Process Execution Language) is adopted industrial-wide as the de facto service composition standard. However, a BPEL composite service is typically treated as a fully automated service flow that orchestrates multiple web services and in- volves no use...
Conference Paper
Full-text available
Nowadays, the mainstream of Web 2.0 Website services is in the REST style called RESTful Web service. RESTful services have been widely accepted by the public because of the usability and simplicity. Meanwhile, Web service technologies realize service-oriented architecture (SOA) successfully and are exploited in both industry and academia. Notably,...
Conference Paper
Web service technologies are best exploited by composing services, and BPEL (Web Services Business Process Execution Language) is adopted industrial-wide as the defacto service composition standard. However, BPEL is applied mainly in the design of composite services and fully automated processes, and user interaction, that should be included in ser...
Article
Full-text available
Service-Orientated Computing (SOC) has become a main trend in software engineering that promotes the construction of applications based on the notion of services. SOC has recently attracted the researchers' attention and has been adopted industry-wide. However, service composition that enables one to aggregate existing services into a new composite...

Network

Cited By