{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:46:00Z","timestamp":1760708760488,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"2-3","license":[{"start":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T00:00:00Z","timestamp":1414454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007458","name":"Qatar Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007458","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2014,10,28]]},"abstract":"<jats:p>This article considers cloud service composition from a decision analysis perspective. Traditional QoS-aware composition techniques usually consider the qualities available at the time of the composition because compositions are usually immediately consumed. This is fundamentally different in the cloud environment where the cloud service composition typically lasts for a relatively long period of time. The two most important drivers when composing cloud service are the long-term nature of the composition and the economic motivation for outsourcing tasks to the cloud. We propose an economic model, which we represent as a Bayesian network, to select and compose cloud services. We then leverage influence diagrams to model the cloud service composition. We further extend the traditional influence diagram problem to a hybrid one and adopt an extended Shenoy-Shafer architecture to solve such hybrid influence diagrams that include deterministic chance nodes. In addition, analytical and simulation results are presented to show the performance of the proposed composition approach.<\/jats:p>","DOI":"10.1145\/2651420","type":"journal-article","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T12:40:29Z","timestamp":1414500029000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Economic Model-Driven Cloud Service Composition"],"prefix":"10.1145","volume":"14","author":[{"given":"Zhen","family":"Ye","sequence":"first","affiliation":[{"name":"Royal Melbourne Institute of Technology, Australia"}]},{"given":"Athman","family":"Bouguettaya","sequence":"additional","affiliation":[{"name":"Royal Melbourne Institute of Technology, Australia"}]},{"given":"Xiaofang","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Queensland, Australia"}]}],"member":"320","published-online":{"date-parts":[[2014,10,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1011"},{"volume-title":"Stoica et al","year":"2009","author":"Armbrust M.","key":"e_1_2_1_2_1"},{"volume-title":"Economics: Principles and Policy. Cengage Learning.","year":"2011","author":"Baumol W. J.","key":"e_1_2_1_3_1"},{"volume-title":"Lpsolve: Open source (mixed-integer) linear programming system. Tech. rep.","year":"2004","author":"Berkelaar M.","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068189"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-005-1073-9"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2009.02.005"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11518655_4"},{"volume-title":"Proceedings of the 21st Conference on Uncertainty in Artificial Intelligence.","author":"Cobb B. R.","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.143"},{"key":"e_1_2_1_11_1","first-page":"113","article-title":"The physical interpretation of the quantum dynamics","volume":"1927","author":"Dirac P. A. M.","year":"1927","journal-title":"Proc. Royal Soc. London"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2005.007545"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29700-7_17"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.009"},{"volume-title":"An Introduction to Bayesian Networks","author":"Jensen F. V.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.35"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.40.6.760"},{"volume-title":"Proceedings of the 13th International Conference on Uncertainty in Artificial Intelligence (UAI'97)","author":"Kozlov A. V.","key":"e_1_2_1_18_1"},{"volume-title":"Proceedings of the 26th International Conference on Uncertainty in Artificial Intelligence (UAI'10)","author":"Li Y.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"F. Liu J. Tong J. Mao R. Bohn J. Messina L. Badger and D. Leaf. 2011. NIST cloud computing reference architecture. http:\/\/www.cs.cmu.edu\/&sim;garth\/15719\/papers\/nist_cloud_computing_reference.pdf.   F. Liu J. Tong J. Mao R. Bohn J. Messina L. Badger and D. Leaf. 2011. NIST cloud computing reference architecture. http:\/\/www.cs.cmu.edu\/&sim;garth\/15719\/papers\/nist_cloud_computing_reference.pdf.","DOI":"10.6028\/NIST.SP.500-292"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2010.34"},{"volume-title":"Proceedings of the 8th International Conference on Knowledge Representation and Reasoning (KR'02)","author":"Mcilraith S.","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-003-0101-5"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2004.58"},{"volume-title":"Proceedings of the 6th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU'01)","author":"Moral S.","key":"e_1_2_1_25_1"},{"key":"e_1_2_1_26_1","unstructured":"H. R. Motahari-Nezhad B. Stephenson and S. Singhal. 2009. Outsourcing business to cloud computing services: Opportunities and challenges. IEEE Internet Comput. 10.  H. R. Motahari-Nezhad B. Stephenson and S. Singhal. 2009. Outsourcing business to cloud computing services: Opportunities and challenges. IEEE Internet Comput. 10."},{"volume-title":"Proceedings of the 9th International Conference on Uncertainty in Artificial Intelligence (UAI'93)","author":"Poland W. B.","key":"e_1_2_1_27_1"},{"volume-title":"Proceedings of the International Conference on World Wide Web (WWW'02)","author":"Ponnekanti S. R.","key":"e_1_2_1_28_1"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.34.6.871"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.36.4.589"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.5.527"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02906-6_6"},{"volume-title":"Proceedings of the International Workshop on Uncertainty Processing (WUPES'09)","author":"Shenoy P. P.","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2010.09.003"},{"volume-title":"Proceedings of the 3rd International Conference on Parallel and Distributed Information Systems (PDIS'94)","author":"Stonebraker M.","key":"e_1_2_1_35_1"},{"volume-title":"Proceedings of the 2nd International Semantic Web Conference (ISWC'03)","author":"Wu D.","key":"e_1_2_1_36_1"},{"volume-title":"Proceedings of the 16th International Conference on Database Systems for Advanced Applications (DASFAA'11)","author":"Ye Z.","key":"e_1_2_1_37_1"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0020-3"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775211"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.11"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2651420","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2651420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:11:54Z","timestamp":1750227114000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2651420"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,28]]},"references-count":40,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2014,10,28]]}},"alternative-id":["10.1145\/2651420"],"URL":"https:\/\/doi.org\/10.1145\/2651420","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2014,10,28]]},"assertion":[{"value":"2013-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}