Compatibility-Aware Web API Recommendation for Mashup Creation via Textual Description Mining

Author(s):  
Lianyong Qi ◽  
Houbing Song ◽  
Xuyun Zhang ◽  
Gautam Srivastava ◽  
Xiaolong Xu ◽  
...  

With the ever-increasing prosperity of web Application Programming Interface (API) sharing platforms, it is becoming an economic and efficient way for software developers to design their interested mashups through web API re-use. Generally, a software developer can browse, evaluate, and select his or her preferred web APIs from the API's sharing platforms to create various mashups with rich functionality. The big volume of candidate APIs places a heavy burden on software developers’ API selection decisions. This, in turn, calls for the support of intelligent API recommender systems. However, existing API recommender systems often face two challenges. First, they focus more on the functional accuracy of APIs while neglecting the APIs’ actual compatibility. This then creates incompatible mashups. Second, they often require software developers to input a set of keywords that can accurately describe the expected functions of the mashup to be developed. This second challenge tests partial developers who have little background knowledge in the fields. To tackle the above-mentioned challenges, in this article we propose a compatibility-aware and text description-driven web API recommendation approach (named WAR text ). WAR text guarantees the compatibility among the recommended APIs by utilizing the APIs’ composition records produced by historical mashup creations. Besides, WAR text entitles a software developer to type a simple text document that describes the expected mashup functions as input. Then through textual description mining, WAR text can precisely capture the developers’ functional requirements and then return a set of APIs with the highest compatibility. Finally, through a real-world mashup dataset ProgrammableWeb, we validate the feasibility of our novel approach.

Transport ◽  
2015 ◽  
Vol 30 (3) ◽  
pp. 320-329 ◽  
Author(s):  
Erik Wilhelm ◽  
Joshua Siegel ◽  
Simon Mayer ◽  
Leyna Sadamori ◽  
Sohan Dsouza ◽  
...  

We present a novel approach to developing a vehicle communication platform consisting of a low-cost, open-source hardware for moving vehicle data to a secure server, a Web Application Programming Interface (API) for the provision of third-party services, and an intuitive user dashboard for access control and service distribution. The CloudThink infrastructure promotes the commoditization of vehicle telematics data by facilitating easier, flexible, and more secure access. It enables drivers to confidently share their vehicle information across multiple applications to improve the transportation experience for all stakeholders, as well as to potentially monetize their data. The foundations for an application ecosystem have been developed which, taken together with the fair value for driving data and low barriers to entry, will drive adoption of CloudThink as the standard method for projecting physical vehicles into the cloud. The application space initially consists of a few fundamental and important applications (vehicle tethering and remote diagnostics, road-safety monitoring, and fuel economy analysis) but as CloudThink begins to gain widespread adoption, the multiplexing of applications on the same data structure and set will accelerate its adoption.


Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 329
Author(s):  
Shen-Tsu Wang ◽  
Meng-Hua Li ◽  
Chun-Chi Lien

Blockchain technology has been applied to logistics tracking, but it is not cost-effective. The development of smart lockers has solved the problem of repeated distribution to improve logistics efficiency, thereby becoming a solution with convenience and privacy compared to the in-store purchase and pickup alternative. This study prioritized the key factors of smart lockers using a simulated annealing–genetic algorithm by fractional factorial design (FFD-SAGA) and grey relational analysis, and investigated the main users of smart lockers by grey multiple attribute decision analysis. The results show that the Web application programming interface (API) concatenation and money flow provider are the key success factors of smart lockers, and office workers are the main users of the lockers. Hence, how to better meet the needs of office workers will be an issue of concern for service providers.


2020 ◽  
pp. 1-1
Author(s):  
Ruixin Guo ◽  
Feng Zhang ◽  
Lizhe Wang ◽  
Wusheng Zhang ◽  
Xinya Lei ◽  
...  

Author(s):  
Flávio Craveiro ◽  
João Meneses de Matos ◽  
Helena Bártolo ◽  
Paulo Bártolo

Traditionally the construction sector is very conservative, risk averse and reluctant to adopt new technologies and ideas. The construction industry faces great challenges to develop more innovative and efficient solutions. In recent years, significant advances in technology and more sustainable urban environments has been creating numerous opportunities for innovation in automation. This paper proposes a new system based on extrusion-based technologies aiming at solving some limitations of current technologies to allow a more efficient building construction with organic forms and geometries, based on sustainable eco principles. This novel approach is described through a control deposition software. Current modeling techniques focus only on capturing the geometric information and cannot satisfy the requirements from modeling the components made of multi-heterogeneous materials. There is a great deal of interest in tailoring structures so the functional requirements can vary with location. The proposed functionally graded material deposition (FGM) system will allow a smooth variation of material properties to build up more efficient buildings regarding thermal, acoustic and structural conditions.


Author(s):  
Di Wu ◽  
Xiao-Yuan Jing ◽  
Haowen Chen ◽  
Xiaohui Kong ◽  
Jifeng Xuan

Application Programming Interface (API) tutorial is an important API learning resource. To help developers learn APIs, an API tutorial is often split into a number of consecutive units that describe the same topic (i.e. tutorial fragment). We regard a tutorial fragment explaining an API as a relevant fragment of the API. Automatically recommending relevant tutorial fragments can help developers learn how to use an API. However, existing approaches often employ supervised or unsupervised manner to recommend relevant fragments, which suffers from much manual annotation effort or inaccurate recommended results. Furthermore, these approaches only support developers to input exact API names. In practice, developers often do not know which APIs to use so that they are more likely to use natural language to describe API-related questions. In this paper, we propose a novel approach, called Tutorial Fragment Recommendation (TuFraRec), to effectively recommend relevant tutorial fragments for API-related natural language questions, without much manual annotation effort. For an API tutorial, we split it into fragments and extract APIs from each fragment to build API-fragment pairs. Given a question, TuFraRec first generates several clarification APIs that are related to the question. We use clarification APIs and API-fragment pairs to construct candidate API-fragment pairs. Then, we design a semi-supervised metric learning (SML)-based model to find relevant API-fragment pairs from the candidate list, which can work well with a few labeled API-fragment pairs and a large number of unlabeled API-fragment pairs. In this way, the manual effort for labeling the relevance of API-fragment pairs can be reduced. Finally, we sort and recommend relevant API-fragment pairs based on the recommended strategy. We evaluate TuFraRec on 200 API-related natural language questions and two public tutorial datasets (Java and Android). The results demonstrate that on average TuFraRec improves NDCG@5 by 0.06 and 0.09, and improves Mean Reciprocal Rank (MRR) by 0.07 and 0.09 on two tutorial datasets as compared with the state-of-the-art approach.


2018 ◽  
Vol 29 (1) ◽  
pp. 653-663 ◽  
Author(s):  
Ritu Meena ◽  
Kamal K. Bharadwaj

Abstract Many recommender systems frequently make suggestions for group consumable items to the individual users. There has been much work done in group recommender systems (GRSs) with full ranking, but partial ranking (PR) where items are partially ranked still remains a challenge. The ultimate objective of this work is to propose rank aggregation technique for effectively handling the PR problem. Additionally, in real applications, most of the studies have focused on PR without ties (PRWOT). However, the rankings may have ties where some items are placed in the same position, but where some items are partially ranked to be aggregated may not be permutations. In this work, in order to handle problem of PR in GRS for PRWOT and PR with ties (PRWT), we propose a novel approach to GRS based on genetic algorithm (GA) where for PRWOT Spearman foot rule distance and for PRWT Kendall tau distance with bucket order are used as fitness functions. Experimental results are presented that clearly demonstrate that our proposed GRS based on GA for PRWOT (GRS-GA-PRWOT) and PRWT (GRS-GA-PRWT) outperforms well-known baseline GRS techniques.


2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Ali M. Alakeel

Program assertions have been recognized as a supporting tool during software development, testing, and maintenance. Therefore, software developers place assertions within their code in positions that are considered to be error prone or that have the potential to lead to a software crash or failure. Similar to any other software, programs with assertions must be maintained. Depending on the type of modification applied to the modified program, assertions also might have to undergo some modifications. New assertions may also be introduced in the new version of the program, while some assertions can be kept the same. This paper presents a novel approach for test case prioritization during regression testing of programs that have assertions using fuzzy logic. The main objective of this approach is to prioritize the test cases according to their estimated potential in violating a given program assertion. To develop the proposed approach, we utilize fuzzy logic techniques to estimate the effectiveness of a given test case in violating an assertion based on the history of the test cases in previous testing operations. We have conducted a case study in which the proposed approach is applied to various programs, and the results are promising compared to untreated and randomly ordered test cases.


2019 ◽  
Vol 8 (4) ◽  
pp. 2827-2833

The SQL injection attack (SQLIA) occurred when the attacker integrating a code of a malicious SQL query into a valid query statement via a non-valid input. As a result the relational database management system will trigger these malicious query that cause to SQL injection attack. After successful execution, it may interrupts the CIA (confidentiality, integrity and availability) of web API. The vulnerability of Web Application Programming Interface (API) is the prior concern for any programming. The Web API is mainly based of Simple Object Access Protocol (SOAP) protocol which provide its own security and Representational State Transfer (REST) is provide the architectural style to security measures form transport layer. Most of the time developers or newly programmers does not follow the standards of safe programming and forget to validate their input fields in the form. This vulnerability in the web API opens the door for the threats and it’s become a cake walk for the attacker to exploit the database associated with the web API. The objective of paper is to automate the detection of SQL injection attack and secure the poorly coded web API access through large network traffic. The Snort and Moloch approaches are used to develop the hybrid model for auto detection as well as analyze the SQL injection attack for the prototype system


2021 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Tinghai Ren ◽  
Nengmin Zeng ◽  
Dafei Wang ◽  
Shuwei Cheng

<p style='text-indent:20px;'>Currently, many upstream software developers not only sell software through downstream service providers, but also directly sell it to clients. However, in the field of IT service supply chain management, there is a lack of research on the channel encroachment of software developers. In this study, we consider an IT service supply chain with a software developer, a service provider and client enterprises. Clients can either purchase the software (developed by the software developer) from the provider with a high price and additional pre-sale services, or directly purchase it from the developer with a low price but without pre-sale service. After purchasing the software, the clients can also purchase the extended warranty service from the developer. The study shows that the market size occupied by the developer and the intensity of competition between the two parties will neither affect the developer's product and service pricing decisions, nor influence the total demand for software products and extended warranty services, and thus will not impact his own profit. However, these factors will impact the provider's decisions for pre-sale service quality and software sales price, thereby affecting the provider's software demand and profit, and thus impact the performance of the supply chain. In addition, as the intensity of competition between both parties increases, the provider will simultaneously choose to reduce the pre-sales service quality and the software sales price to compete with the developer. Different from conclusions of the existing research on competition, we surprisingly observe that as the sensitivity of client enterprises to the extended warranty services price increases, both parties will increase the software price to compete. The encroachment of the developer will reduce the provider's software demand and profit, and thus lead to a decline in the performance of the supply chain. Therefore, the encroachment of the developer is an act of squeezing out partners by decreasing the profit of the provider, but without affecting his own profit.</p>


2016 ◽  
Author(s):  
Stephen G. Gaffney ◽  
Jeffrey P. Townsend

ABSTRACTSummaryPathScore quantifies the level of enrichment of somatic mutations within curated pathways, applying a novel approach that identifies pathways enriched across patients. The application provides several user-friendly, interactive graphic interfaces for data exploration, including tools for comparing pathway effect sizes, significance, gene-set overlap and enrichment differences between projects.Availability and ImplementationWeb application available at pathscore.publichealth.yale.edu. Site implemented in Python and MySQL, with all major browsers supported. Source code available at github.com/sggaffney/pathscore with a GPLv3 [email protected] InformationAdditional documentation can be found at http://pathscore.publichealth.yale.edu/faq.


Sign in / Sign up

Export Citation Format

Share Document