Related to web services

Assignment Help Basic Computer Science
Reference no: EM13137559

Introduction 
In order to show understanding on issues related to web services, each student is expected to complete a review paper on a relevant web services topic of the students choosing and interest. 
Topic: Emerging Trends in Web Services 
To Start: Read Part X (Emerging Trends) 
The textbook mainly focuses on web services and cloud computing. You may or may not follow this direction. The following is a list of options that you can choose your topic from. 
• Web Services specifications and enhancements 
• Web Services discovery and integration 
• Web Services security 
• Web Services standard and formalization 
• Web Services Modeling 
• Web Services-oriented Software Engineering 
• Web Services-oriented software testing 
• Web Services in Cloud Computing 
• Semantic Web Services 
• Etc. 

Note that any of these topics is still rather broad. To produce a high-quality paper, you need to drill down to a more concrete topic. One such example could be "Review of a new XXX protocol for secure web services". 

IEEE and ACM databases are two good resources .No trade publications, web references, and book references should be used as references. Keep the majority of your references as current as possible (e.g., less than five years old). 
Make sure that you cite all relevant articles that are referenced in your paper. Use the APA format where appropriate. This is a requirement by GSCIS. Failing to do so may lead to the loss of points in your submission. 
The report should have 12- 15 pages, double-spaced and not counting the title page, table of contents, bibliography, or any figures. It should include a bibliography that appears as references in the body. Your paper should use headings and sub-headings to reflect its structure. Please proofread your paper carefully to ensure that it contains no spelling or grammatical errors. It should conform to the standards of academic integrity described in our program guide and the course syllabus. 
A common outline for a review paper is as follows. This is for your reference only. Depending on the area you choose and your approach to tackle the problem area, you may choose a different structure. 
1. Introduction (what is the problem being addressed? why is it a problem?) 
2. Existing solutions in the literature. 
2.1 Solution 1. 
2.2 Solution 2. 
2.3 Solution 3. 
3. Review of solutions (what are the advantages/disadvantages for each of them? why?) 
4. Your own solution (if any) (what is it? is it good? why? what is the significance/contribution to the field of study?). 
5. Summary, conclusion and future work. 


Additional Suggestions 
1. It is not appropriate to write on a very broad topic such as network security, cryptography, multimedia network protocols, wireless protocols, etc. Keep in mind that this is just a short term paper that should fit into a limited time period. You can actually find a textbook for most of these topics. Please choose a topic as specific as possible. 
2. A review paper usually should include multiple (about 5) references. I would like to see references from referred conference proceedings or journals. IEEE and ACM databases are generally used by the research community. References such as Wikipedia can be used at the early stages when you explore a topic, but you are discouraged from using them since the information are generally considered unreliable for scientific papers. Usually you should summarize different resources instead of reiterating the exact words. It is also important to show your ability of critical thinking - I wish you include as many comments (in your own words) as possible. 
3. Please note if you cite the exact words from references, you need to put quotation marks on both sides. The paper may be considered plagiarism for failing to do so. You should also pay attention to the use of enough citations so that a reader can easily separate your work from other researchers. For more information on the integrity policy please refer to the course syllabus and the Graduate Catalog posted on GSCIS' website. 
4. If you plan to propose your own solutions on an existing problem, that is great. Try your best and you may end up with a publication based on your course work. I will be happy to assist you during the process. 
Evaluation Criteria 
Your paper submission will be evaluated based on the following evaluation criteria. 
1. Relevance to the course. 
2. Technical depth and soundness of your discussion. 
3. Critical thoughts as shown in the discussion. 
4. Citation to relevant references and quality of references. 
5. Conformance to APA. 
6. Formatting of the document.

Reference no: EM13137559

Questions Cloud

Product cost cross subsidization basics : Product-cost cross- subsidization is less likely to occur when: a) a single cost pool is used b) little effort is mae to trace cost objects c) a peanut butter approach is used to allocate overhead d) none of the above
Taxes on alcohol and tobacco : Research Topic: Should taxes on alcohol and tabacco be increased to help pay for rising medical costs?
What it the npv of the proposed acquisition : What it the NPV of the proposed acquisition? Note that you must first calculate the value to Blazer of Laker's equity.
What mass of the nuclide will remain after 98.4 years : The half-life of tritium (31H) is 12.3 years. If 47.0 mg of tritium is released from a nuclear power plant during the course of a mishap, what mass of the nuclide will remain after 24.6 years?What mass of the nuclide will remain after 98.4 years?
Related to web services : A review paper usually should include multiple (about 5) references. I would like to see references from referred conference proceedings or journals.
How loss should lara immediately recognize on this trade : Lara Co. traded its old computer for a new model. The following information is pertinent to this transaction: How much loss should Lara immediately recognize on this trade-in?
Probability that cpu demand of program exceed one minute : Program measured in minutes is found to follow a gamma distribution with parameters a=3 and b=2. what is the probability that CPU demand of a program will exceed 1 minute?
Explain a vapor-compression heat pump system uses : A vapor-compression heat pump system uses R-134a as the working fluid. The refrigerant enters the compressor at 0.24 Mpa, 0 degrees Celsius, with a volumetric flow rate of 0.6m^3/min. The compression process is adiabatic to 0.9 MPa, 60 degrees Cel..
Compute the amount of the bonus payable to the employees : For the year ended December 31, 2011, Winter Company has implemented an employee bonus program equal to 3% of Winter's net income, which employees will share equally. Winter's net income (prebonus) is expected to be $1,000,000, and bonus expense i..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Convert decimal mumbers into bit binary number

Convert the following decimal mumbers into 8-bit binary numbers a required for 2's complement math, and perform the indicated operations.

  Minimum number of edits required to convert string

Given two strings of size m, n and set of operations replace (R), insert (I) and delete (D) all at equal cost. Find minimum number of edits (operations) required to convert one string into another.

  Explain utilitarian theory tells us about the morality

What do you believe utilitarian theory tells us about morality of such questions as abortion, capital punishment, or euthenasia? Is utilitarian theory helpful in deciding these questions?

  Describe how will tsp work

How will TSP work? Transit planners require to ask questions like: First step is to assess requirement for TSP There are a variety of methods for conducting Needs Assessment.

  Describe why are pirates difficult to eliminate

Why does piracy exist in past and present? Describe why are (were) pirates difficult to eliminate? What to you believe about pirates as moder-day Robin Hoods?

  Calculate performance of cache and the average cpi

Assume the instruction cache miss rate is 0.5% and the data cache miss rate is 1%. Calculate the performance of the cache (CPU execution time) and the average CPI.

  Public peering and private peering in net neutrality

What is the difference between "public peering" and "private peering"?

  Explaining costs are classified as opex or capex

The managers of the five business units. They will need to know the following about each option in terms that nontechnical staff can readily understand: Whether the costs are classified as opex or capex.

  Converting binary numbers in decimal

Convert the given binary numbers in decimal: 101110; 1110101; and 110110100. Convert the given decimal numbers to bases indicated.

  How to make components of system user-friendly

How do components of your computer system interact within system? What improvements or additions to your system do you think would benefit you or make system more user-friendly? Why?

  Basic forms of conducting international business

Discuss the basic forms of conducting international business, and basic international business strategies.

  Write statement which outputs num-cost to standard output

Write single statement which outputs num and cost to standard output. Print both values (num first, then cost), separated by a space on a single line.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd