Meta1

Meta Paper for Papers 1 - 16

Three Critical Questions

Group 1:

Member Name: Vallurupalli Anusha

Paper1:

Best critical questions:

1) In agile process coding and product quality are given high preference than that of the documentation. But in case of attrition, it is the time to the freshers to take up the responsibility. Then how can they understand the project without sufficient documentation?

Justification: Since this question addressed the current scenario of the software organizations, this question is worth to be raised.

2) The paper talks about avoiding deadlines or due date .But how the project is going to complete if there are no deadlines present in the system?

Justification: Time constraint is very important for any project. So the above question is worth to be raised.

3) There will be collaboration of teams. How can the Agile Process give effective results if there are too many slow workers in one team and others have fast workers?

Justification: Since today’s software organizations involve huge number of teams to undertake big projects, the point of how the pace works during collaboration is very important one to be raised.

Worst Critical questions:

1) What can be the pitfall or drawbacks in agile process? The paper doesn't explain anything regarding them.

Justification: Critical questions are meant to criticize about what is mentioned in the paper. When the author did not mention the drawbacks there is no pint to raise a question on that.

2) No examples has been quoted by the author where agile process has been adopted by an organization.

Justification: Critical questions are meant to criticize about what is mentioned in the paper. When the author did not mention the drawbacks there is no pint to raise a question on that.

3) Time is the major factor in an agile process. How can a better time management be achieved with changes in requirements?

Justification: What does he mean by time management here? Where is the concept of time management involved when it comes to changes in requirements? It feel it as an invalid question.

Paper2:

Best critical questions:

1) To what extent is pair programming feasible?

Justification: This is worth to be raised since the feasibility of pair programming in practical is not mentioned in the paper when he stated that it helps in extreme programming.

2) . The paper considers an example where in a study has been conducted in a small company and the statistics of the productivity are listed before and after using the Extreme Programming process in that company. But I question the consistency of the numbers based on such a study, since it could be possible that the productivity might have increased overtime because of the experience gained by the programmers and might not be because of the change in the process.

Justification: This is a valid one since it cannot be claimed that the productivity is increased due to change in the process only. If that is so how it is claimed is not mentioned in the paper.

3) How is ideal engineering time(IET) calculated?

Justification: In the paper it is directly stated that ideal engineering time is calculated from the statistics but how it is calculated is not stated anywhere so it is a valid and good question to be raised.

Worst critical questions:

1) It works best for small teams, but will this be applicable for the larger teams?

Justification: What does it mean here? Invalid Question.

2) In this paper it was suggested that the employers to work for 40 work hours per week. How they are going to cope up with deadlines and critical situations of delivery?

Justification: Does this mean the hours are less or more to meet the deadlines? No clarity.

3) Will this agile software process XP maintain top quality without having any effect on the development process?

Justification: The author did not state this point then there is no point for this question to be raised.

Paper3:

Best critical questions:

1) To implement the requirements of a system at different level of abstractions, a SOC uses tools such it can provide the desired results, because these tools must be applied for different organizations they cannot be platform specific nor vendor specific. How exactly are these modeled to satisfy all the organizations.

Justification: Modeling of the tools is one good point to be noted which the author did not mentioned in the paper though the author claimed it is must. So it is worth to be raised.

2) In Software Engineering all concepts should be logically dependable and reliable. Then how can the concepts of trust, reputation can be introduced in Spirit of Approach method? How can one trust the registry as a perfect one?

Justification: How the registry can be trusted is worth mentioning since the concepts of SOA are dependable on it too. Valid Question.

3) For the Transactional Processing failures he suggested several solutions like use of Java applet or MOM etc. But for a high level infrastructure neither SOAP nor RMI, MOM provides interoperability or extensibility. How to achieve them?

Justification: Addressing transactional processing failures is very very important in the current scenario since every payments is done through online these days. Good Question.

Worst Questions:

1) In the paper the author says "In this way, dynamic selection is exploited to yield application-level fault tolerance." What is the percentage of fault tolerance allowed?

Justification: Percentage of fault tolerance has nothing to do with the point that the author mentioned in the paper. Just to yield allowable tolerance dynamic selection is exploited.

2) Author saying that Composition is main part of engineering. But there are some challenges in that phase. So how can we overcome those problems in designing phase?

Justification: About what challenges are you talking about? Invalid one.

3) What can be the complexity overhead of SOC while implementing it in a big way?

Justification:

What does big way mean here? Invalid one.

Paper4:

Best critical questions:

1) If Problem comes in any one service, Alice needs information about all the details of lower level of hierarchy but he is provided with all the available service at top level of hierarchy how do Alice solves this problem?

Justification: This is worth to be raised since the concept of reliability is one of the main issue so if one service has a problem how the other layer’s information handled and how the integration is done is one of a good issue.

2) Out sourcing expenses is not at all spoken in the discussion.Is out sourcing always the feasible solution in "SOA"?.Some times out sourcing might exceed the budget limit of the project.In that case a in house development of the service might affect the process or architecture of "SOS".

Justification: The concept of budget is very important for every project. So how the outsourcing expenses are dealt is not mentioned in the paper which is worth to be raised.

3) For the problem of "Partial visibility of the supply network" the author said by seeing the whole supply network this can be solved. But some of the providers should restrict to see their service providers. What is the solution for that case?

Justification: If the service provider is hidden then the solution for this is not mentioned which is an important issue . Good Question.

Worst critical questions:

1) What is the maintenance model required by the service oriented software?

Justification: What does maintenance model mean here? No clarity.

2) What is the best way of using a Saas either XML or using Active Objects?

Justification: Invalid Question since it is not a critical question .

3) How can they say that , they have solved the main problem without solving the associated certainty problems in the Service Oriented Software?.

Justification: What are the certainity problems here mean? No Clarity.

Paper5:

Best critical questions:

1) Since in general the SOA environment is loosely coupled how does it support tightly distributed acid transactions if it comes across any, does it have a specification for it.

Justification: Good Question since there is fair chance of coming across tightly coupled transaction then how SOA is supportive in dealing it is an important issue.

2) Why structural composition model be preferred over process oriented model? To what type of service or situation a model should be preferred and what are the pros and cons of each model?

Justification: The author mentioned the choice of structural model to the application but he did not reason it out. So this is a good question.

3) Can the service be automated as soon as it is delivered to the customer?

Justification: Automated service delivery is an important issue to be addressed. Good Question.

Worst critical questions:

1) How is the trust issue solved? The paper does not discuss about solving this issue which is a major problem in "SOA".The paper just specifies the security standard which are implemented .For example digital signatures for message integrity,encryption for confidentiality.

Justification: Using those security services only the trust issue is made strong which is obvious from the paper.

2) The paper discussed about various specifications and protocols of QOS. Whether all the specifications or protocols can be used with other set of protocols for the same system. Won't they contradict each other?

Justification: Invalid Question, since how does the point of contradiction come in this issue?

3) The architecture of SCA proposes to have implementations in different languages.
Is a single service implemented in different languages?

Justification: What does single service implementation mean here? No clarity.

Paper6:

Best critical questions:

1) Any Services of an Enterprise or any commercial Company will be represented by using Internet Service only so that entire world will know it .But what does the author really mean by saying " Boundaries between enterprise services and Internet Services are vanishing" ?

Justification: Its a misconception. Enterprise service is different from internet service manier times. So the author meant to say that boundaries between them are vanishing.
Wrong question.

2) Security is the major issue while dealing with online transactions and transmissions. There are many types of analysts like active hackers, passive hackers, intruders etc. Does transferring data through HTTPS provides security against all of the analysts?

Justification: Good question since security against intruders is a very important issue while transferring data across web.

3) What is the backup solution if the communication fails among the various administrators?

Justification: Good question.

Worst critical questions:

1) Is there any other strong mechanism of authentication which makes it more secure to transmit the data and the requests among the business systems?

Justification: This is not related to the paper.

2) If the customer is not that much efficient with new technologies that are used by service provider. How service provider will solve end user problem?

Justification: Service provider just provides service to the user. What do technologies had to do in this issue?

3) Exposing our work globally, for this we have to maintain one extra team for security reasons. When we are facing some security problems is it necessary?
Justification: It is necessary since globally working is the trend right now like working across web as such.
Paper7:
Best Critical Questions:
1) The system has PTA service in the centralized server and e-payment system in the customer's system. Is the PTA service designed compatible or independent of the language/ platform used to develop e- payment system?
Justification: The concept of platform dependency/ independency is important. Good question.
2) A single Administration web-service (In web-service enable stage) should authenticate every request from the organization it may be burden and result in loss of efficiency. Each and every transaction should be ATOMIC in this case, this creates much more problems. What methodology is followed if a transaction is not done and when it goes to a deadlock situation?
Justification: How deadlock situation is addressed is not mentioned in the paper. Good question.
3) The author supported the technique of upgrading the PTA Web service and redeploying it. It would be nice if a bunch of requests are received. But if a less number of e-payment application are to be added frequently then it would cost a lot to update the server and redeployment. Is it worth to do so in such conditions?
Justification: The cost issue in such applications is important. Good question.
Worst Critical questions:
1) This paper didn't discussion anything regarding the interfaces between the web-services. How can we provide interfaces between web-services?
Justification: Not related to paper.
2) This paper describes about architectural model of service oriented system. How can this be implemented using a web based SOA?
Justification: Not related to paper.
3) How the web services are used as components in developing a new web application?
Justification: The answer to this question is obvious from the paper and also previous papers. This concept needs no attention or importance in this paper.
Paper8:
Best critical questions:
1) Correlation cannot be uniquely determined, it may lead to different interpretations.
Justification: Good question since it is a valid point that correlation cant be determined as said in the paper.
2) There is no concept of components in service composition, so how can two services be combined together or communicated with out the concept of components?
Justification: Without the components as a medium of communication how it is possible is raised here which is an important issue.
3) By providing multiple protocol access to a service, is the model not complicating the service from the user point of view? For example, the set-up part of the service would be more complicated now, because the user would also have to set up that service to the protocol.
Justification: Such an issue leads to more complication. Good Question.
Worst Critical Questions:
1) On what basis is it said that Peer-to-Peer way of communication between the Business Process Execution Language partners is more efficient than the usual way of communication?
Justification: It is obvious from the paper. Invalid question.
2) Why was the process oriented composition chosen and not the structure oriented composition? What are the advantages of choosing a process oriented composition over a structure oriented compostion?
Justification: It is obvious from the paper. Invalid question.
3) While mentioning WS-security and WS-Reliable messaging the author doesn't mention performance and scalability issues.
Justification: Why the issues that the author did not mention need to be criticized. Wrong Question.
Paper9:
Best critical questions:
1) QWS Parameters will change from service to service, that too non-functional requirements will change from platform to platform .Then , how can author standardized QWS parameters for non-functional requirements ?
Justification: Platform independence issue is addressed here. Good question.
2) UDDI will have some specifications to link the web services with clients with the help
of WSDL. If we are changing those rules or extending will they be able to attach services in the same way?
Justification: Good question since issues after modification is addressed here which is important.
3) The paper mentioned that the system searches with the registered web services. Can they provide any methodology for checking the quality and providing the best solution to the user by searching with the un- registered users?
Justification: Quality of service is an important issue so I feel it to be a good question.
Worst critical questions:
1) How far is it acceptable to invoke services by clients after they receive response messages from the service provider by trusting WDB blindly?
Justification: What does acceptability here mean? No clarity.
2) Search engines are used to find the important information within the web pages. But, why these are not used in case of different key structures?
Justification: What do key structures mean here? No Clarity.
3) QWS data set maintains all the information about search engines, UDDI registry etc. Isnt it more expensive to maintain the data set which contains all this information?
Justification: What needs to be criticized from the paper whether it is expensive or non-expensive. Not a valid question.
Paper10:
Best Critical questions:
1) The author said that hierarchial categorization scheme is used. Based on what is the hierarchy categorized?
Justification: Good question since on what basis is the hierarchy categorised is not mentioned in the paper.
2) Use of “RSS feeds” might result in high loads of traffic on the publisher Server as the users want to know the updates. How can this issue be solved?
Justification: Since RSS feeds concept is the trend right now, how that issue when high loads of traffic occur between them is not mentioned in the paper. Good Question.
3) When Provider contacts the consumer through call or email. Without publishing services to consumers how can user know about our specific services?
Justification: Without publishing the services to the consumers user doesnt know them Good Question.
Worst Questions:
1) The author explained that the RSS feeds are written using XML. Why not we implement JSON technology as it provides much faster accuracy than XML?
Justification: There would be many new technologies as JSON but what the author mentioned in the paper needs to be criticized.
2)According to the author the existing web server must be reusable for the web service registry. But, how this can be achieved in a real scenario?
Justification: It is obvious from the paper . Invalid question.
3)Author has mentioned some requirements for creating web service registry. Is that all features are compulsory required to make registry successful?
Justification: It is clear from the paper that the requirements are needed. Invalid Question.
Paper11:
Best critical questions:
1) It is stated that if there is no result generated for the service request then the updating of database takes place. Suppose there are too many such requests then how can the database be maintained and is it practically possible to maintain such a large database?
Justification: How such large database is maintained is an important issue. Good question.
2) What is the security level adopted in the proposed system? As we discussed in the critical points getting the accessibility of the services is not free in all cases. So, the proposed system need to protect the preferences of the web service.
Justification: The security level of such a system is an important issue . Hence it is a good question.
3) The paper explained in such a manner that the service can only be composed by using SOAP, WSDL and UDDI. Does it support other protocols such as TCP/IP that provides more reliability and security or do we need to stick to these protocols and data standards?
Justification: The concept of flexibility is important. Good question.
Worst critical questions:

1) The paper suggests the planner to look up into all policies which impose constraints on the business process. What if the policies make it more difficult to develop the process?

Justification: Invalid issue.

2) The paper did not specify about how do developer get idea about the policies to be imposed while developing the process?
Justification: The policy requirements itself gives idea which are obvious from the paper. Wrong Question.

3) In SOA the paper specifies some problems associated with it. But he does not explain any way to overcome them. It is possible that solving these problems would be easier compares to learn new approaches.
Justification: Invalid one.

Paper12:

Best critical questions:

1) In case of communication between BPEL and CCXML/SCXML if any error occurred how can it be handled and how the root cause can be known like the error is from BPEL or it’s from CCXML/SCXML?
Justification: The concept of error handling as mentioned in such applications needs to be addressed. Good question.

2) How SCXML will get interacted by external objects such as VoiceXML sessions which are explained in presentation tier?

Justification: This interaction is not mentioned in the paper. Good question.

3) When user uses a call connection for logging there is a chance of disconnection due to some signal problems or so. What would be the other way for the user to reconnect and login?
Justification: This is important during system failure or as such failures.
Worst critical questions:
1)Doesn't BPEL processes require a run time environment for execution?
Justification: Not related to paper.
2Why can’t call control be developed in VOICE XML?
Justification: Invalid question.

Paper13:

Best critical questions:

1) With just knowing the System state and progress, how far can user understand the system? What if the system behaves differently because of the complex errors in the system? Such a system state is not acceptable, this might deceive the user.
Justification: It might be deceptible. Good question.
2) The user may have different requirements. How can explainer suggest a best solution with out perfectly knowing the requirements of the user? The solution which seems to be best from the explainer point of view may not be best from user point of view.
Justification: Different views may exist. So how can it be apt for both?
3) It is stated that the goal recommender generates goals based on the inconsistencies of the established policies. How can the goal recommender generate goals when there are inconsistencies in established policies?
Justification: Good question. When there are inconsistencies how the goals can be generated?
Worst critical questions:

1) How the reusability concept and integration of web services is achieved in the policy oriented management.
Justification: Critical questions are meant to criticize on what the author mentioned in the paper. This is not mentioned in the paper.

2) According to market study 80% of large organizations and 50% - 60% small & medium organizations are expected to adopt SOA only by 2010. So, will these organizations be willing to implement yet another new architecture soon?

Justification: It is not a critical question.

3) Author suggested having assistants such as situation analyzer, explainer, guide, goal recommender. Does nt it increase the complexity of the product and also cost?

Justification: Unrelated question.
Paper14:

Best critical questions:
1) What is walled garden approach that the author mentioned in the paper?

Justification: This point is not clearly stated in the paper though the author mentioned it. Good question.
2) How will be the Error handling can be achieved while integrating SOA with telecommunications?
Justification: The concept of error handling is important here since it deals with integrating SOA with telecommunications. Good one.
3) How does the JAIN SLEE architecture provide a mechanism for service orchestration? The question needs a lot of insight as far as the technology goes and the article fails to provide an elaborate workflow of the discovery and composition processes.
Justification: This workflow is very important and need to be known. Good question.
Worst critical questions:
1) Even SOA has an advantage like increasing flexibility and cost, enabling the new products. But the author didn’t mention about the asynchronous processing capabilities.
Justification: Unrelated question.
2) Does web service standards serve the best in distributed transaction environment when compared to CORBA which might be a better option ?
Justification: There might be many better options, but such comparison is not required here since the author did not address that topic.
3) The author considers two research studies to analyze the benefits of SOA. Does Forrester research or IBM research supports more?
Justification: This comparison is not an important one that needs to be criticised. I even feel it not to be a critical question. Invalid one.
Paper15:
Best Critical questions:
1) How the decompression technique causes almost negligible performance loss?
Justification: This relation is not mentioned in the paper which needs to be raised since using such techniques only performance loss is eliminated. So how it is done needs to be raised. Good question.
2) What should the service provider do if the QOS filtering and QOS selection algorithms are ineffective and or not accurate? He is stuck to providing the desired QOS to the users?
Justification: Here the concept of reliability is raised which is important issue. Good one.
3) How security can be handled while integrating web services with mobile devices (wireless)? Since exchanging confidential data on a wireless device is not secured.
Justification: This concept of security is important since the data transfer between system and mobile is prone to attack of intruders and other such attacks. Good question.
Worst critical questions:
1) As mobile devices consists of constrained resources such as it is compatible with X GB RAM (memory), CPU. How the performance of web services varies?
Justification: What does that resources need to do with performance issue? How are they related? Invalid Question.
2) Do the cross layer communications need any type of components to help in efficient communication??? Can any component with particular intelligence level help in this sort????
Justification: Without components the web services communication is not possible which is obvious from previous papers in such applications. Wrong question.
3) As the article discusses about cross layer communication, communication should be made possible among diverse layers. Are the layers interdependent in complying with the QoS supplied by the other layers?
Justification: Is this a critical Question? Invalid question.
Paper16:
Best critical questions:
1) In the management phase the author states that share mapping is the activity that helps in sharing the mapping information with the other systems , but then how is security incorporated , on what basis is authentication done.
Justification: The security is an important issue, hence needs to be questioned for the authentication purpose.
2) Creating a map between different ontologies in the same domain having mutually inconsistent data is not possible, eventually a global ontology cant be created.
Justification: Since the global ontology cant be created, this question is worth to be raised.
3) The paper says few of the techniques also help users in mapping few difficult ontology mappings but what are they and how do they help and how are they different from the rest of the systems?
Justification: This comparison is important to know on what basis the author mentioned those techniques. Good question.
Worst Critical questions:
1) HP Jena toolkit raises problems such as the method is less robust and non-standard. Is there any toolkit that solves these problems?
Justification: This is not related to the paper. There might be different toolkits but only issues regarding hp jena toolkit can be raised.
2) As there is no commonly agreed mapping is present between the roaming users and the system, What if the representation of the user for services is much different to present system?
Justification: No clarity since what the present system here mean?
3) Is it possible to build a coherent representation of ontology mapping?
Justification: Not related to the paper. The author did not mention anywhere about such coherence so how can this question be raised?

Group 2:

Member Name:

Group 3:

Member Name:yogendra Siva Ram,Boppana

Paper 1: Introducing an agile process to an organization [software development]
Good Questions:
1) “Can we introduce agile process to any project? Because certain projects may be time sensitive and it may not be advisable to introduce agile process to these projects”.
Yes, there are many projects which are time sensitive. In such cases this Agile Process may not suite well to those projects.
2) “Is trial and error an apt way to find approaches for successfully introducing agile processes to organizations? Isn’t there any procedural explanation why it is so successful? Trial and error could only lead to misconceptions”.
It’s true that Trial and error method to find approaches for introducing agile processes is not so preferable. It certainly leads to misconceptions.
3) “In agile process coding and product quality are given high preference than that of the documentation. But in case of attrition, it is the time to the fresher to take up the responsibility. Then how can they understand the project without sufficient documentation?”
Yes, it’s hard for a fresher to the project to understand about the project without sufficient formal documentation to completely understand about the project.
Bad Questions:
1) “It would be expensive to train the teams across the organization wide for implementing this new methodology”.
When you are introducing a new methodology or software in to a system, it is done only if it is worth of spending in training the people for it. And this methodology doesn’t have expensive training procedures; it’s just an idea to be given how to follow particular methodology in completing the project.
2) “How can a product without appropriate testing phase meet the requirements of the customer?”
I think the agile processing may not follow a concrete testing phase but it can meet the requirements through thorough discussions with on field customer representative.
3) “There will be collaboration of teams. How can the Agile Process give effective results if there are too many slow workers in one team and others have fast workers?”
This is the problem arises in any project which is divided in to modules. It completely depends on the team leader, how efficiently he manages his groups. There is nothing to do with the agile processing.

Paper 2: Extreme Programming - Rapid development for Web-based applications
Good Questions:
1) “In pair programming technique, who will be given priority for every conflict issue? (Because same problem can be coded in different ways, each one will prefer their own technique)”.
This is a common problem that arises in peer programming. If two people work on same problem, they have their own ways of resolving it. A conflict may occur in discussions like proving their own techniques are better than others.
2) “XP is an apt software process to develop Web-Based Applications. But it’s restricted to the project groups in which only 5-15 people are working. Can we extend this process by relaxing some of the principles of XP? So that, big projects can also follow the Extreme Programming.”
The paper said that XP is a very good process in developing web applications. It must certainly be very helpful and more successful if it can extend its reach to large scale projects.
3) “XP does not have stable requirements. How can a project developed without having stable requirements?”
Yes,How can we measure the quality and success of the project without stable requirements.
Bad Questions:
1) “It was mentioned that it best suits for the development of web applications. Doesn't it suit for other than web applications?”
The author said that it is well suited for web applications because of its features and the processes it follow. That doesn’t mean it will not suit for other than web applications.
2) “In this paper it was suggested that the employers to work for 40 work hours per week. How they are going to cope up with deadlines and critical situations of delivery?”
Author mentioned the time as a general working time of the project. He meant that the employers must not be over whelmed with the project, indeed they will plan to complete by just working by 40hrs a week.
3) “Is there any strong based proof regarding XP’s practices are efficient even in reality?”
Its clear that that the XP’s practices are efficient even in reality, but they are not yet widely used.

Paper 3: Service-Oriented Computing: Key Concepts and Principles
Good Questions:
1) If an Organization which previously used some other development methods other than Service based development wants to implement SOA to upgrade its already developed applications, Can those applications be upgraded using SOA?
Yes its good to think about the up gradation of the previous implemented project with the current advanced methodology.
2) Quick decisions,group meetings ,thorough revising of a software project seemed to be the basic features of an agile process,will not these features effect the organization dynamically?Are these features flexible enough to make an organization dynamically strong?
Yes, this process seems to be dynamic but the organization as a whole with all these features, group meetings and revisions given more importance than official documentation, seems to be flexible but we cant asure that it make organization dynamically strong.
3) It needs several operations to integrate and provide platform independence in this software model. It involves cost and time factors. So, can only some of these functionalities can be included into traditional systems to produce hybrid model for smaller systems?
It’s a good question. The idea of developing a hybrid model using some of the features of this system for smaller systems is appreciated.
Bad Questions:
1) It is said that the agile process is still not widely used among all the software development teams ,if at all the process comes out with so many advantages why isn't still not used widely around?Why is that people are still thinking over selecting this process.
This is an upcoming process. So, almost all companies will be running using the present process and the project will be long period once. So, it is very difficult to suddenly shift from one process to other process.
2) How the handling of certain aspects of SOC such as matching, planning and discovering are done? It requires a lot of research.
Matching, planning and discovering doesn’t need research, it needs organization approach to the project.
3) How can service composition play a key role if too many challenges are involved?
What ever the situation is every model is designed handle any number of challenges.

Paper 4: Understanding service-oriented software
Good Questions:
1) The proposed architecture claims to have code which belongs to different versions that can co-exist but I question the readability of such an application, which involves different versions of code.
Yes, the complexity and readability of the code increases as the number of versions used to design the code increases.
2) The example mentioned in the paper only illustrates a small model of an application. Is the SOA feasible for small scale, medium scale as well as for large scale applications?
The scalability of Architecture is very important as we should know where and when can we implement them to use their features effectively in our project.
3) Construction or re-construction of model at integration time is a good idea, but how far is this successful in large scale systems? The complexity increases for the Developer as the modeling at integration time increases.
I think its obvious that the complexity increases as the integration time modeling increases due to its increased complexity.
Bad Questions:
1) Automated broker- technically provides the services of choosing the services to the user, is this some other software or a service that uses SaaS?
It need not be that a single software uses the Saas. There may be many instances of it.
2) Most information is hidden and unavailable in service context. How an engineer would be able to understand the software easily if the information remains hidden and does not available while in a service stage?
This is not an issue of understandability. This might be the same concept as the abstract class in which the code is not visible but the functionality of a class is clearly explained which is the only concern the engineer or end user.
3) What are the low level technical software details required to know when a software engineer follows a traditional approach?
This is not a question concerned to the present context. This is completely a different issue.

Paper 5: Component Contracts in Service-Oriented Architectures
Good Questions:
1) The ability to attach policies to specific messages is advantageous in many aspects, but what if there is an overlap, or if there is a necessity of applying two policies, how are precedence issued solved.
There is always an issue of overlapping in attaching policies. So, solving the the overlapped policies and using the preferred one among them is very difficult.
2) The architecture of SCA proposes to have implementations in different languages.
Is a single service implemented in different languages?
Or is it that each component of the service is implemented in a different language?
How would the service be resolved and understood if each component is implemented in a different language?
It’s a very good question as it concentrates on implementation in different languages because it’s a very advanced concept we can have wide variety of doubts in it.
3) The policies on wires between components by associating QoS properties with the binding attached to the wire are specified by the component assemblers. Are there any specific standards that define how these policies are framed? If yes, they are not mentioned clearly in the paper.
The paper didn’t mention the standards for the QoS properties. So, binding concept is questionable.
Bad Questions:
1) What is the strength of security implementation done in "QoS" specification like the use of digital signatures,encryption mechanism ? Is the entire mechanism secure up to the present standards?Security mechanisms have to be off high standard when implementing at such a high level.
2) Can the service be automated as soon as it is delivered to the customer?
Yes of course it would be because how can we use the service unless it is automated.
3) How can the distributed acid transactions be work well in the SOA? Is there any solution that could be designed that handles the recovery well?
SOA satisfies the ACID transactions. There is no question of doubting it.

Paper 6: Service-Oriented Computing: Bringing Business Systems to the Web
Good Questions:
1) Some browsers which the end user uses might not be able to support the “REST” and other technologies. How can these kinds of problems be solved? Will there be any intermediate technology that does allow the browser and REST work together?
Its important to resolve the issues like the end technologies like REST and the intermediate involving technology.
2) The author explains that the DMZ is provided only to the reverse proxy. As DMZ is a third party security system and it’s a difficult task in holding that system. How far our information system is secured?
Security is the main issue when a third party is entering in to our model.
3) To safeguard the information system from various common threats a system known as DMZ has been proposed. But the consequences of setting up a DMZ haven't been discussed as hosting such a system might be a difficult task.
It is always important to discuss about the security and troubles involved in introducing new system like DMZ.

Bad Questions:
1) How can service providers choose between asynchronous interaction and asynchronous interaction of services? How does QoS metrics can change based on the Web Service Agreement Specification?

2) Any Services of an Enterprise or any commercial Company will be represented by using Internet Service only so that entire world will know it .But what does the author really mean by saying " Boundaries between enterprise services and Internet Services are vanishing" ?
Doesn’t relate to the context we are discussing.
3) Exposing our work globally, for this we have to maintain one extra team for security reasons. When we are facing some security problems is it necessary?
Yes it is necessary to maintain an extra team for security reasons. There is no question of doubting it.

Paper 7: Toward a Service-Oriented Development Through a Case Study
Good Questions:
1) Does nt it lead to data and identity collision among organizations if PTA facilities are hosted as ASP model with central server for different organizations?
Yes I think there is a chance of collision among organization in the case specified above.
2) As the web service is accessed through the internet, there is a problem of availability at peak traffic situations. Even if an additional band width is provided it may be redundant during low- traffic times. What sort of effective methodologies are used to provide more bands during high traffic intensity, to lower the band during low request loads?
The traffic problems in internet are always an issue. It greatly effects the data transmission. So , some methodologies must be implemented in order to nullify the transport loss.
3) In this paper the author talks about devoloping a Pass through Authentication service in E-payment web service implementation.When PTA service component system receives a request from client for web based e-payment system,PTA should directly allocate the list available webservices.But when new e-payment webservice is built,it should be first publish and register under the PTA.But how a new e-payment webservice knows the information regarding the PTA under which it has to be registered?
This is a very good question discussing about the reverse communication from PTA to webservices.

Bad Questions:
1) How the concept of business logic is implemented?
The Question is not complete and not specific.
2) The system has PTA service in the centralized server and e-payment system in the customer's system. Is the PTA service designed compatible or independent of the language/ platform used to develop e- payment system?
Most probably the platform we will be working on will be XML, so there must not be any compatibility issues whether it is an e-payment system or any other.
3) The ASP model allows the users to view the web pages of the e-payment systems which are not necessary for them. In this case, how security can be achieved?
Displaying the information that is not necessary is a bad practice and discussing the security in it is waste of time. If we want we can rise that the security is lost by displaying unnecessary data to the users.

Paper 8: The next step in Web services
Good Questions:
1) Is the message correlation part of the model automated or implemented manually? What kinds of tools are used in order to identify the key fields among the interacting data messages? Are the keywords being identified syntactically or semantically?
This is a good question raising the how the model is implemented and the tools and ways we used in it.
2) By providing multiple protocol access to a service, is the model not complicating the service from the user point of view? For example, the set-up part of the service would be more complicated now, because the user would also have to set up that service to the protocol.
Yes the multiple protocol is complicating the service.
3) How far is it efficient to use implicit instance identifier in BPEL than traditional explicit instance identifier or factory instances? Implicitly way of correlating fields doesn’t seems to be effective for me.

Bad Questions:
1) Correlation cannot be uniquely determined, it may lead to different interpretations
Question is not specific and clear.
2) Can the peer-to-peer fashion of communication between BPEL partners is more efficient (even secure) than general way of communication?
Yes ofcourse the peer-to-peer fashion is more efficient. And also every way has its own advantage and disadvantage.
3) The BPEL process involves more than a set of correlation fields. Is it conceivable to create more sets of correlation fields rather than to use interfaces to access services?
The author seems to be correct in implementing the correlation fields rather than using the interfaces to access services.

Paper 9 : Toward Quality-Driven Web Service Discovery
Good Questions:
1) Apart from matching the quality standards, the web services should also match some technical requirements like complexity, loose coupling, visibility etc and also the price requirements. So, keeping in mind all these different kinds of constraints, how far is this WSB model feasible?
2) Many web services are not free to access. In such case how will the system dynamically monitor its behavior? The service provider can change his service properties other than he specified at the time of registering.
3) In order to monitor the behavior of web service each and every operation of the service must be executed when client searches for the web service. Some web services may not give permission without subscription to the service. How the metrics can be calculated in this situation?
Bad Questions:
1) The quality standards of the webservice are provided by the service provider itself so there is a chance to be manipulated. How to check whether the quality standards provided are trustworthy?
We always use a trusted third party broker inorder to use the webservice and also we will have a complete idea of the webserivce, so we don’t needt question the quality standards.
2) A client searching for a webservice may not a software professional. In such case he need not have complete knowledge of XML schemas and namespaces. So this method makes it more complex for the client to search for the required webservice.
What will a common man do with the XML schemas? So, searching the required webservice is not at all a problem for people who want webservices.
3) Search engines are used to find the important information within the web pages. But, why these are not used in case of different key structures?
As we know that general search engines search and the webservcie search is completely different and we cannot integrate them.

Paper 10: Active Web Service Registries
Good Questions:
1) Use of “RSS feeds” might result in high loads of traffic on the publisher Server as the users want to know the updates. How can this issue be solved?
2) The author explained that the RSS feeds are written using XML. Why not we implement JSON technology as it provides much faster accuracy than XML?
3) Implements new version of Web Services based on the requirement changes and provides test cases to check for all the requirements. Will this process eliminate the complexity and cost effectiveness?

Bad Questions:
1) How to locate and integrate the existing web services from a model or in fact from anywhere else?
The question is not clear.
2) Why the developers prefer to use UDDI registry usage even it is difficult to find the information about the web service?
Because it’s the basic registry to search for our modern webbrowsers.
3) In the paper the author mentioned that there are Aggregators which can access the AWSR to get the information. How an aggregator can access it?

Paper 11 : A Business Model for Dynamic Composition of Telecommunication Web Services
Good Questions:
1) Are the composed web services saved in the registry? Or thrown away after dynamically composing them at runtime? Because each application would demand different kind of specifications from a particular web service, are these saved composed web services reused by the applications?
2) The concept of dynamic composition works fine only the Web service definition language uses primitive schema types, in case where the WSDL has more primitive types only static composition would work fine, this point has not been discussed as for those kind static stubs are recommended.
3) In the standard web service of that to the CPXe ,catalog has been introduces along with the service provider, how is the catalog different from the traditional web service provider,and is it must to include APIs to obtain locators and catalogs,doesn't this intensify and degrade the performance of the system.
Bad Questions:
1) The paper did not specify about how do developer get idea about the policies to be imposed while developing the process?
2) It isn’t mentioned whether it is a dynamic or static compostion of web service. Parlay also doesn’t support the concept of compostion. Why are these two business models mentioned under composition of web services as they donot support the concept of composition?
3) Novel business model was proposed for the composition of the web services dynamically. What is the scope of the implementation of novel business model on the composition of dynamic web services?

Paper 12: Orchestration in Web Services and Real-Time Communications
Good Questions:
1) How can we achieve reliability and fault tolerance in complex work flows using these languages? There will many faults like , failure of already orchestrated services , failure in communication between these orchestrated services and hardware failures .
2) In case of communication between BPEL and CCXML/SCXML if any error occurred how can it be handled and how the root cause can be known like the error is from BPEL or it’s from CCXML/SCXML?
3) What type of mechanism is involved in message passing of BPEL. Is it synchronous or asynchronous? If it is asynchronous lets consider a situation where a <invoke>command is executed and waiting for a response. If it is asynchronous communication if a partner does nt respond then it may have to wait for a long time in waiting. What type of mechanism is implemented to deal with such type of situation to exclude such unnecessary waiting?
Bad Questions:
1) How fault handling is implemented in BPEL?
2) When user uses a call connection for logging there is a chance of disconnection due to some signal problems or so. What would be the other way for the user to reconnect and login?
3) How can communications takes place when parts of incoming message are copied in output message? What exactly happens there?

Paper 13: Toward the Realization of Policy-Oriented Enterprise Management
Good Questions:
1) The author advices of having assistants such as guide, explainer etc. Will this not increase the intricacy of the product?
2) The user may have different requirements. How can explainer suggest a best solution with out perfectly knowing the requirements of the user? The solution which seems to be best from the explainer point of view may not be best from user point of view.
3) How can the “Goal recommender” generate goals to the user? User Perspective is always different, so do you think this as a system that a changes the user perspective in reaching a goal? Is this acceptable?

Bad Questions:
1) It was mentioned in the paper that it the business model is designed using the policies and constraints. Whether these policies and constraints are pre-defined or the user needs to define the policies according to the business scenario?
2) The paper did not specify about how do developer get idea about the policies to be imposed while developing the process?
3) How can the “Goal recommender” generate goals to the user? User Perspective is always different, so do you think this as a system that a changes the user perspective in reaching a goal? Is this acceptable?

Paper 14: A Survey on Web Services in Telecommunications
Good Questions:
1) There are very few network operators in the telecommunications domain when compared to the other technological domains like the information technology. Would this limit the number of web service providers for telecommunication applications?
2) How is the security of the telecommunication applications achieved while using web services? Since the telecommunications networks are more sensitive than other applications in terms of security and network visibility.
3) A third generation networks are used to accomplish the telephony services using high speed data access. But Does the SOA or Event Driven Architecture achieve the goal of 3G networks to its fullest?
Bad Questions:
1) Will there be any performance degradation when Web Services are directly implemented in telecommunications?
2) Even SOA has an advantage like increasing flexibility and cost, enabling the new products. But the author didn’t mention about the asynchronous processing capabilities.
3) In this paper the author mentioned about transport services in the 'electronic service bus architecture' that it is used for routing messages to different destinations . But how far is the security provided within this service isn't mentioned.

Paper 15 : Adaptive QoS for Mobile Web Services through Cross-Layer Communication
Good Questions:
1) Can the systems designed using cross layer architecture support dynamic QOS parameters? The paper completely discusses about static QOS parameters and no dynamic QOS parameter is specified.
2) As mobile devices consists of constrained resources such as it is compatible with X GB RAM (memory), CPU. How the performance of web services varies?
Because limited memory is the main concern in mobile devices it’s a good question.
3) What happens if the client asks for some priorities and the WSB cannot match the
providers with those priorities? Will the WSB wait until the provider gives those priorities
or will generate errors to the clients about the situation?
Bad Questions:
1) Why do they complicate their system , by concentrating on throughput and efficiency of each layer of the system rather than concentrating on simply overall performance of the system?
2) How the decompression technique causes almost negligible performance loss?
3) Very few parameters may have been defined in the system. If the mentioned QoS parameters were not defined, how the system recognizes these new parameters? Or does the system allow the user to define new QoS parameters based on the existing parameters?

Paper 16: Understanding as We Roam
Good Questions:
1) It is said that the terms used in naming and properties of ontology modeling will alter frequently. So, depending on this the next activity is greatly altered. What happens if the properties change after the decision is took in the next step?
2) The ontology mappings requires a pre agreed set of mapping cycles agreed between multiple parties, with so many service providers,
is it not difficult to achieve it? More over the developers should maintain commons standard as mentioned in the above ? is it not difficult to achieve it .
3) We have many tools available in the market today which support ontology mapping and help to convert the Ontologies into XML processes, like HP Jena as mentioned in the paper, but why does the model still limit the organizations to have their processes defined in XML?

Bad Questions:
1) Personal perspectives are derived based on a pre defined set of local and limited knowledge base which may not catch everyone's personal interests.
2) While we are doing mappings selection, which one is better option from user selection and automated selection?
3) While we are doing mappings selection, which one is better option from user selection and automated selection?

Group 4:

Member Name:

Group 5:

Member Name:

Group 6:

Member Name:

Group 7:

Member Name:

Group 8:

Member Name:

Group 9:

Member Name:

Group 10:

Member Name:

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License