Ci-Wei Lan’s research while affiliated with IBM and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (16)


Small Clues Tell: a Collaborative Expansion Approach for Effective Content-Based Recommendations
  • Article

February 2020

·

64 Reads

·

9 Citations

Journal of Organizational Computing and Electronic Commerce

·

Chih-Ping Wei

·

Paul Jen-Hwa Hu

·

[...]

·

Ci-Wei Lan

Content-based recommendation techniques usually require a large number of training examples for model construction, which however may not always be available in many real-world scenarios. To address the training data availability constraint common to the content-based approach, we develop a collaborative expansion-based approach to expand the size of training examples, which could lead to improved content-based recommendations. We use a book rating data set collected from Amazon to evaluate our proposed method and compare its performance against those of two salient benchmark techniques. The results show that our method outperforms the benchmark techniques consistently and significantly. Our method expands the size of training examples for a focal customer by leveraging the available preferences of his or her referent group, and thereby better supports personalized recommendations than existing techniques that solely follow content-based or collaborative filtering, without incurring costs to identify, collect, and analyze additional information. This study reveals the value and feasibility of collaborative expansion as a viable means to increase training size for the focal customer and thus address the training data availability constraint that seriously hinders the performance of content-based recommender systems.


Graph-based and scenario-driven microservice analysis, retrieval, and testing

November 2019

·

316 Reads

·

58 Citations

Future Generation Computer Systems

The microservice architecture (MSA) differs fundamentally from the monolithic, layered architecture. The use of microservices provides a high degree of autonomy, composability, scalability, and fault-tolerance. MSA is regarded by many as a promising architecture for smart-city applications; however, a number of issues remain, including (1) the management of complex call relationships among microservices; (2) ensuring the quality of the overall software system even as new microservices are added and existing ones are modified, and (3) locating existing microservices that satisfy new requirements. In this paper, we propose a novel approach to the development of microservice-based systems, referred to as GSMART (Graph-based and Scenario-driven Microservice Analysis, Retrieval and Testing). GSMART enables the automatic generation of a “Service Dependency Graph (SDG)” by which to visualize and analyze dependency relationships between microservices as well as between services and scenarios. It also enables the automatic retrieval of test cases required for system changes to reduce the time and costs associated with regression testing. A microservice retrieval method using VSM and word2vec accelerates the development of new microservices tailored specifically to the needs of users based on user-provided scenarios. Experiment results demonstrate the feasibility, effectiveness, and efficiency of all of the main features of GSMART.




QoS-Aware Selection of Web APIs Based on ε-Pareto Genetic Algorithm

December 2016

·

14 Reads

·

8 Citations

Web API is the lightweight version to the SOAP (Simple Object Access Protocol) service and usually applies REST (Representational State Transfer) as the architectural style. Nowadays, the service-oriented computing paradigm is shifting from the SOAP services to the Web APIs, i.e., RESTful services. Rather than hard coding from scratch, the methodology of service-oriented computing emphasizes identifying the granularity services and composing services into executable applications. Quality of Service (QoS) is always an important concern in the selection of services. The QoS driven service selection problem for service composition has been proven as NP-Complete since there are nm combinations for a given composite service involving m tasks with n candidate services for each task. To address this issue, this study proposes a methodology based on Genetic Algorithms for the selection of Web APIs. The proposed approach in this research provide several features: 1) e-Pareto dominance relations are introduced to help the discrimination of composite QoS, 2) the e value for each dimension is determined by the AHP-based method (AHP: Analytic Hierarchy Process), and 3) the Genetic Algorithm is employed to find out the optimal combinations of Web APIs. Experimental results demonstrate that the proposed approach can effectively locate the combination of Web APIs based on the user-preferred QoS indicators without sacrificing other kinds of service quality.



Method and system for preserving privacy of a dataset

August 2014

·

14 Reads

A method and a system for preserving privacy of a dataset are provided. In the method, a k-anonymity value with respect to a sensitive data field is determined according to at least one first quasi-identifier. Data entries in each group have the same value in the one or more fields of the first quasi-identifier and data entries in different groups have different values in the one or more fields of the first quasi-identifier. A first group and a second group among the plurality of groups are determined according to the reference number Kr, where the first group and the second group are merged into a merging group. The number of data entries in the merging group is not less than a reference number Kr. One or more fields of at least one first quasi-identifier is masked for the merging group.


Web Service Discovery Using Lexical and Semantic Query Expansion

September 2013

·

37 Reads

·

10 Citations

Web service discovery is the process of locating web services to satisfy the requirements of service requesters, and as such, plays an important role to realize business-to-business interoperability. Today, many service discovery mechanisms are available, roughly classified into two categories: text-based service retrieval and ontology-based service matching. However, both kinds of service discovery approaches have their limitations in finding out suitable web services for users. Text-based approaches cannot reflect the semantics of the service capability. Ontology-based approaches are likely infeasible and non-scalable since service providers need to spend considerable efforts to annotate the service descriptions. This study proposes an approach to searching for web services, called LS3 (Lexical and Semantic Service Search) architecture. This proposed approach includes two main sub processes: query expansion and service ranking to enable the retrieval of relevant web services during the discovery process by considering lexical similarity and semantic similarity.


A Design of Smart Enterprise Asset Management

September 2013

·

77 Reads

Enterprise asset management is a system which manages all kinds of reusable resources in an enterprise no matter what departments or business units produce. The efficiency and effectiveness of asset management will significantly impact on development cost and enterprise competiveness. In this paper, we address several challenges including lacking of asset description model, non-solution reuse pattern and isolated assets. By identifying key issues, we propose solution ideas to provide a robust asset description framework so that a lot of asset types have their corresponding attributes. Furthermore, we also propose a graph match solution to take topological structures in user query into consideration for solution asset matchmaking.


A Self-Authentication Mechanism for a (3, 3)-threshold Secret Sharing Scheme

September 2012

·

14 Reads

Secret sharing is widely used in secret image protection since 1979. Image secret sharing schemes are used to encrypt the secret image into several meaningless share images. Later on, the secret image can be reconstructed while collecting the share images. The authentication mechanism is a way to verify whether the reconstructed secret image is authentic. The general authentication might increase the cost of key maintenance. To reduce the cost, this paper proposed a self-authentication mechanism for image secret sharing scheme. In addition, the reconstructed image can be completely reconstructed. The experiments give the positive data to show the feasibility of the proposed scheme.


Citations (11)


... GNNs' dual capability makes them especially suitable for capturing complex, evolving relationships in microservices, where dependencies shift in response to changing operational demands. While GNNs have seen success in other domains, such as recommendation systems and biology, they are relatively underutilized in microservice monitoring, leaving an opportunity to apply GNN-based link prediction to improve system resilience [16]. ...

Reference:

Utilizing Graph Neural Networks for Effective Link Prediction in Microservice Architectures
Graph-based and scenario-driven microservice analysis, retrieval, and testing
  • Citing Article
  • November 2019

Future Generation Computer Systems

... However, its drawback is that it is highly dependent on feature engineering and prone to overspecialization [12]. In general, although simple to implement, traditional course recommendation methods have limited analysis of learners and course content and can only predict learners' shallow preferences [13][14][15]. e model-based recommendations are gradually favored by researchers to deeply explore the intrinsic association between learners and courses and improve recommendation satisfaction. In particular, matrix decomposition re-represents learners and resources in a lowdimensional space, which effectively compensates for the problem of low accuracy of traditional collaborative filtering recommendations [16]. ...

Small Clues Tell: a Collaborative Expansion Approach for Effective Content-Based Recommendations
  • Citing Article
  • February 2020

Journal of Organizational Computing and Electronic Commerce

... a critical task, yet often proves elusive. Various techniques have emerged to assist in this process, analyzing features, dependencies, and execution patterns to potentially carve out well-defined microservices [4], [5], [6], [7], [8]. Despite these advancements, a comprehensive understanding of the strengths, weaknesses, and ongoing challenges of existing decomposition strategies remains elusive. ...

Scenario-Based Microservice Retrieval Using Word2Vec
  • Citing Conference Paper
  • October 2018

... SOA has an open, flexible and independent architecture that functions autonomously and is able to be reused in the form of WSs (Abidi et al., 2019). The increase in WS popularity and adaption is because of their flexibility in offering software services over the internet (Alshraiedeh and Katuk, 2016;Ma et al., 2017). WS appears in two architectural styles: Simple Object Access Protocol (SOAP) and REpresentational State Transfer (RESTful). ...

Real-World RESTful Service Composition: A Transformation-Annotation-Discovery Approach
  • Citing Conference Paper
  • November 2017

... Article found in Syntax-based [1], [13], [11], [27], [23], [16], [17], [18], [28], [29], [30], [37], [40] Semantic annotation-based [3], [4], [5], [10], [12], [22], [25], [26] [39], [36], [14], [9], [15], [31], [8], [32], [33], [34], [35], [24], [2], [20], [19], [21], [38] 2 https://www.openapis.org 3 https://swagger.io/specification/ ...

Contextual service discovery using term expansion and binding coverage analysis
  • Citing Article
  • July 2015

Future Generation Computer Systems

... Despite the provided simplicity, keyword-based solutions are insufficient to discover all the relevant web services because users are assumed to not use the best keywords (in here best means the keywords already used in the web service description) to formulate the queries. To address this limitation several query expansion approaches have been proposed (Zhang et al., 2018, Ma et al., 2013. The goal of query expansion is to enhance the original query with the relevant concepts to increase the recall. ...

Web Service Discovery Using Lexical and Semantic Query Expansion
  • Citing Conference Paper
  • September 2013

... In ML and DL, small data problems are notoriously hard and are usually solved with a number of well-studied techniques [29]: (1) data augmentation, where synthetic samples are generated from the training set [27,44,51]; (2) transfer learning, where models learn from a related task and transfer the knowledge [25,50]; (3) self supervision, where models learns from pseudo or weak labels [37,49]; (4) few-shot learning, i.e., (meta-)learning from many related tasks with the aim of improving the performance on the problem of interest [35,39,40]; (5) exploiting prior knowledge manually encoded, for example external side information and Knowledge Graphs (KGs) [3,47]. However, except for hand-coded knowledge, the above approaches still require a considerable amount of initial data or access to a different, but similar domain, where plenty of data is available. ...

Overcoming small-size training set problem in content-based recommendation: A collaboration-based training set expansion approach
  • Citing Article
  • August 2009

... Alternative study designs for the classical RCT should be explored, which meet the criteria for testing patient tailored treatment in a timely and affordable manner [4]. Guideline development should become a dynamic process that appropriately deals with other ways of gaining scientific evidence for treatment recommendations, supported by sophisticated information technology [5]. ...

From Clinical Requirement to Personalized Wellness Decision Support: A Data-driven Framework for Computer-Supported Guideline Refinement
  • Citing Article
  • August 2012

Studies in Health Technology and Informatics

... through the use of by a reputation system (Wang et al., 2019). Reputation, serving as a summary of past service behavior, acts as a vital source of information in online service systems, reflecting the overall trustworthiness of a service in the eyes of the users (Huang et al., 2009). Establishing a reputation system within the online service environment not only assist susers in making decisions but also plays a crucial role in enhancing service quality, facilitating user matching, and maintaining user loyalty (Dellarocas, 2010;Yang et al., 2022). ...

An optimal QoS-based Web service selection scheme
  • Citing Article
  • September 2009

Information Sciences