Write research paper about web services in cloud elasticity

Assignment Help Computer Engineering
Reference no: EM131433860

Web Services and System Research Paper Assignment

Write a research paper about Web Services in Cloud Elasticity.

The report should have 10-15 pages, double-spaced and not counting the title page, table of contents, bibliography, or any figures. It should include a bibliography that appears as references in the body. Your paper should use headings and sub-headings to reflect its structure. Please proofread your paper carefully to ensure that it contains no spelling or grammatical errors. It should conform to the standards of academic integrity described in our program guide and the course syllabus.

Introduction

In order to show understanding on issues related to web services, each student is expected to complete a review paper on a relevant web services topic of the students choosing and interest.

Topic: Emerging Trends in Web Services

To Start: Read Part X (Emerging Trends)

The textbook mainly focuses on web services and cloud computing. You may or may not follow this direction. The following is a list of options that you can choose your topic from.

• Web Services specifications and enhancements
• Web Services discovery and integration
• Web Services security
• Web Services standard and formalization
• Web Services Modeling
• Web Services-oriented Software Engineering
• Web Services-oriented software testing
• Web Services in Cloud Computing
• Semantic Web Services
• Etc.

Note that any of these topics is still rather broad. To produce a high-quality paper, you need to drill down to a more concrete topic. One such example could be "Review of a new XXX protocol for secure web services".

You are strongly encouraged to explore high-quality academic reference papers using NSU's electronic library (https://www.nova.edu/library/eleclib/databases.html). IEEE, ACM, and Springer databases are good resources that can be accessed in the e-library (Click "Students, Faculty, and Staff"-> Click "Computer and Information Science" (under "Browse by Subject" -> Click "ACM Digital Library", "IEEE/IET Digital Library", or "SpringerLink" -> enter your credentials, then you can search by key words/author/titles/names of journals or conferences. You will have full access to copyrighted articles through these useful resources.)

No trade publications, web references, and book references should be used as references. Keep the majority of your references as current as possible (e.g., less than five years old).

Make sure that you cite all relevant articles that are referenced in your paper. Use the APA format where appropriate. This is a requirement by GSCIS. Failing to do so may lead to the loss of points in your submission. For more information on the APA style please visit https://nova.campusguides.com/apa.

The report should have 10-15 pages, double-spaced and not counting the title page, table of contents, bibliography, or any figures. It should include a bibliography that appears as references in the body. Your paper should use headings and sub-headings to reflect its structure. Please proofread your paper carefully to ensure that it contains no spelling or grammatical errors. It should conform to the standards of academic integrity described in our program guide and the course syllabus.

A common outline for a review paper is as follows. This is for your reference only. Depending on the area you choose and your approach to tackle the problem area, you may choose a different structure.

1. Introduction (what is the problem being addressed? why is it a problem?)

2. Existing solutions in the literature.

Solution 1.
Solution 2.
Solution 3.

3. Review of solutions (what are the advantages/disadvantages for each of them? why?)

4. Your own solution (if any) (what is it? is it good? why? what is the significance/contribution to the field of study?).

5. Summary, conclusion and future work.

Additional Suggestions

1. It is not appropriate to write on a very broad topic such as cloud computing, web services security, etc. Keep in mind that this is just a short term paper that should fit into a limited time period. You can actually find a textbook for most of these topics. Please choose a topic as specific as possible.

2. A review paper usually should include multiple (about 5) references. I would like to see references from referred conference proceedings or journals. IEEE and ACM databases are generally used by the research community. References such as Wikipedia can be used at the early stages when you explore a topic, but you are discouraged from using them since the information are generally considered unreliable for scientific papers. Usually you should summarize different resources instead of reiterating the exact words. It is also important to show your ability of critical thinking - I wish you include as many comments (in your own words) as possible.

3. Please note if you cite the exact words from references, you need to put quotation marks on both sides. The paper may be considered plagiarism for failing to do so. You should also pay attention to the use of enough citations so that a reader can easily separate your work from other researchers. For more information on the integrity policy please refer to the course syllabus and the NSU Student Handbook.

Rule of Thumb: Do not reuse your previous course work. Do not copy & paste from other publications. Don not simply modify the verbatim by changing the order of words, or by removing one or two words/sentences. After reading your references, put them aside and write your paper based on your memory and understanding.

4. If you plan to propose your own solutions on an existing problem, that is great. Try your best and you may end up with a publication based on your course work. I will be happy to assist you during the process.

Articles:

1.Is your Cloud Elastic Enough? Performance Modeling the Elasticity of Infrastructure as a Service (IaaS) Cloud Applications by Paul Brebner..

2. Cloud Elasticity: going beyond demand as user load by Cristian Chilipirea, Alexandru Constantin, Dan Popa, Octavian Crintea and Ciprian Dobre.

Reference no: EM131433860

Questions Cloud

Subgame perfect equilibrium of game : If player 2 rejects the second offer, then player 2 makes the ?nal offer. In other words, player 1 makes the offers in periods 1 and 2, whereas player 2 makes the offer only in period 3. Compute the subgame perfect equilibrium of this game.
What is the break-even point : (a) What is the Break-Even Point (BEP) for each oven? (b) If the owner of this restaurant expects to sell 7,500 pizzas, which oven system are you going to recommend? (Net Profit = Total Revenue (TR) - Total Cost (TC))
Compare and contrast holism versus reductionism : The paper will be five pages: (a) Describe Holism - 2 pages, (b) Describe Reductionism - 2 pages, (c) Compare and contrast Holism versus Reductionism - 1 page.
Market technicians association chartered market technician : Does anyone here have a Market Technicians Association Chartered Market Technician Level one 2016 exam material?
Write research paper about web services in cloud elasticity : TECH 4310- Write a research paper about Web Services in Cloud Elasticity. The report should have 10-15 pages, double-spaced and not counting the title page.
Choose and discuss a topic in mediation : Choose and discuss a topic in Mediation (to be pre-approved by instructor). Explore the issue and discuss current thinking. Offer a considered point of view. I will be looking for your opinion on the matter and your original thinking about the ..
Strategic substitutes or strategic complements : a. Derive the best response function each firm. Do these indicate that prices are strategic substitutes or strategic complements? b. What is the equilibrium set of prices in this market? What profits are earned at those prices?
Feasible investment portfolios for client : What are the characteristics of feasible investment portfolios for your client? (What are the possible risk and return that you can create?) Identify this using a graph. What is this line called?
Explain the basic nature of hydrides in va group elements : Explain the basic nature of hydrides in VA group elements?Explain how basic nature of hydrides of VA group can be increased?

Reviews

Write a Review

Computer Engineering Questions & Answers

  How do the two concepts work together

Within the United States, the States and the Federal Government share soverign power. What does this mean Doesn't this idea conflict with the Supremacy Clause which is found under Article VI of the U.S. Constitution

  Draw the uml diagram for the class and then implement the

draw the uml diagram for the class and then implement the class. write a program that creates two rectangles objects

  Convert the decimal numbers ti bcd

Convert the subsequent decimal numbers ti BCD and then add. Compare the decimal addition to the BCD addition:

  Describe the pros and cons of each camera

Describe the pros and cons of each camera and then indicate the one you would select to purchase. Explain why you selected this particular camera.

  Create the structure for the records in the customer file

Create the "structure" for the records in the customer file. Use given Figure as a general guide to the data elements to be included in the customer records. However, observe the following specific requirements:

  Illustrate the difference between the general control and

internal controls for every organization are different however they may be divided into three major groups preventive

  How big is the minimum value of n0 now

Locate the minimum value of n0 that works and how big is the minimum value of n0 now?

  Windows live id and skydrive account

Suppose there are 1 million books within your campus library. Approximate (to the nearest order of magnitude) how several bytes of the data there are in case all these books were stored online and accessible across the computer network.

  Write down and submit your zipped cs file all along with

write a console application that requests 10 numbers from the user as individual inputs.each number must be between 10

  Describe tracking methodology used in fuzzy logic control

Describe the tracking methodology used in HCC and discuss each method to provide a basis for choosing one of them for a particular application.

  Anomaly and intrusion detection systems

CSC 7210 - Anomaly and Intrusion Detection Systems Executable of your program (runnable in either Windows or Unix) and Output from running your program with the provided data set - You will then evaluate the accuracy of the algorithm on the provided ..

  How to create two arrays of integers

create two arrays of integers, each holding ten elements of data. Create a third array of integers for a result array. Your main program will take the two arrays of integers and pass them to the function subtract().

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd