{"id":"https://openalex.org/W2514597675","doi":"https://doi.org/10.1145/2905055.2905228","title":"Collusive User Removal and Trusted Composite Web Service Selection based on QoS attributes","display_name":"Collusive User Removal and Trusted Composite Web Service Selection based on QoS attributes","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2514597675","doi":"https://doi.org/10.1145/2905055.2905228","mag":"2514597675"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905228","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073488367","display_name":"Abdul Muqusit Alam","orcid":null},"institutions":[{"id":"https://openalex.org/I343503978","display_name":"Central University of South Bihar","ror":"https://ror.org/01t1agx36","country_code":"IN","type":"education","lineage":["https://openalex.org/I343503978"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Abdul Muqusit Alam","raw_affiliation_strings":["Central University of South Bihar, Patna, India"],"affiliations":[{"raw_affiliation_string":"Central University of South Bihar, Patna, India","institution_ids":["https://openalex.org/I343503978"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012102762","display_name":"Smita Roy","orcid":null},"institutions":[{"id":"https://openalex.org/I343503978","display_name":"Central University of South Bihar","ror":"https://ror.org/01t1agx36","country_code":"IN","type":"education","lineage":["https://openalex.org/I343503978"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Smita Roy","raw_affiliation_strings":["Central University of South Bihar, Patna, India"],"affiliations":[{"raw_affiliation_string":"Central University of South Bihar, Patna, India","institution_ids":["https://openalex.org/I343503978"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073488367"],"corresponding_institution_ids":["https://openalex.org/I343503978"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11231715,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.7834221720695496},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7307432293891907},{"id":"https://openalex.org/keywords/knapsack-problem","display_name":"Knapsack problem","score":0.7277835607528687},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.6527934670448303},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.6348409056663513},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5782346725463867},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5757527351379395},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.5539886355400085},{"id":"https://openalex.org/keywords/service-level-objective","display_name":"Service level objective","score":0.5127056837081909},{"id":"https://openalex.org/keywords/mobile-qos","display_name":"Mobile QoS","score":0.47501763701438904},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4147490859031677},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.41336730122566223},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34437090158462524},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.34150230884552},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3338123857975006},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33253180980682373},{"id":"https://openalex.org/keywords/service-design","display_name":"Service design","score":0.26272547245025635},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.21011599898338318},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17564254999160767},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.14722716808319092},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11765044927597046}],"concepts":[{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.7834221720695496},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7307432293891907},{"id":"https://openalex.org/C113138325","wikidata":"https://www.wikidata.org/wiki/Q864457","display_name":"Knapsack problem","level":2,"score":0.7277835607528687},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.6527934670448303},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.6348409056663513},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5782346725463867},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5757527351379395},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.5539886355400085},{"id":"https://openalex.org/C16151460","wikidata":"https://www.wikidata.org/wiki/Q3480069","display_name":"Service level objective","level":5,"score":0.5127056837081909},{"id":"https://openalex.org/C169761439","wikidata":"https://www.wikidata.org/wiki/Q6886951","display_name":"Mobile QoS","level":4,"score":0.47501763701438904},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4147490859031677},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.41336730122566223},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34437090158462524},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.34150230884552},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3338123857975006},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33253180980682373},{"id":"https://openalex.org/C61063171","wikidata":"https://www.wikidata.org/wiki/Q532781","display_name":"Service design","level":4,"score":0.26272547245025635},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.21011599898338318},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17564254999160767},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.14722716808319092},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11765044927597046},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905228","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905228","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1657043559","https://openalex.org/W1850858936","https://openalex.org/W1967868690","https://openalex.org/W1969396734","https://openalex.org/W2007582072","https://openalex.org/W2097571405","https://openalex.org/W2110407609","https://openalex.org/W2126212520","https://openalex.org/W2140190241","https://openalex.org/W2141880113","https://openalex.org/W2146013510","https://openalex.org/W2148837283"],"related_works":["https://openalex.org/W241127407","https://openalex.org/W2112258407","https://openalex.org/W1990357417","https://openalex.org/W2167109536","https://openalex.org/W2084784690","https://openalex.org/W1577320633","https://openalex.org/W2248315212","https://openalex.org/W2165598051","https://openalex.org/W2393433200","https://openalex.org/W2077598835"],"abstract_inverted_index":{"Generally":[0],"web":[1,129],"service":[2,30,45,51,119,130,158],"selection":[3,131],"is":[4,52,105,113,132,146],"performed":[5,106],"based":[6],"on":[7],"nonfunctional":[8],"(Quality":[9],"of":[10,15,41,49],"Service)":[11],"attributes.":[12],"But":[13,135],"Quality":[14],"Service":[16,103],"(QoS)":[17],"attribute":[18],"values":[19,27],"may":[20,59],"not":[21],"be":[22,60,82,138],"equal":[23],"to":[24,36,92,114,153],"the":[25,29,33,39,42,55,61,66,155],"published":[26],"by":[28,54],"providers.":[31,46],"Therefore,":[32,148],"users":[34,63,73,79],"want":[35],"concern":[37],"about":[38],"trustworthiness":[40,48],"services":[43],"or":[44,77],"The":[47,111,126],"a":[50],"measured":[53],"users'":[56,123],"ratings.":[57],"There":[58],"dishonest":[62],"who":[64],"provide":[65],"fake":[67],"ratings":[68],"for":[69],"commercial":[70],"benefit.":[71],"These":[72],"are":[74],"called":[75],"malicious":[76],"collusive":[78],"and":[80],"can":[81,137],"treated":[83],"like":[84],"outliers.":[85],"Now,":[86],"we":[87,149],"have":[88],"proposed":[89],"an":[90,116],"approach":[91],"identify":[93],"these":[94],"outliers":[95],"using":[96,107],"data":[97],"mining":[98],"approach.":[99],"Then":[100],"Composite":[101],"Web":[102],"Selection":[104],"Genetic":[108,151],"Algorithms":[109],"(GA).":[110],"problem":[112],"find":[115,154],"optimal":[117],"concrete":[118],"composition":[120],"plan":[121,159],"under":[122],"QoS":[124,161],"constraints.":[125,162],"QoS-aware":[127],"composite":[128,157],"NP-hard":[133],"problem.":[134],"it":[136],"mapped":[139],"with":[140,160],"Multi-dimensional":[141],"Multi-choice":[142],"Knapsack":[143],"Problem(MMKP),":[144],"which":[145],"NP-complete[6].":[147],"use":[150],"Algorithm(GA)":[152],"near-optimal":[156]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
