Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Introduction 
In order to show understanding on issues related to web services, each student is expected to complete a review paper on a relevant web services topic of the students choosing and interest. 
Topic: Emerging Trends in Web Services 
To Start: Read Part X (Emerging Trends) 
The textbook mainly focuses on web services and cloud computing. You may or may not follow this direction. The following is a list of options that you can choose your topic from. 
• Web Services specifications and enhancements 
• Web Services discovery and integration 
• Web Services security 
• Web Services standard and formalization 
• Web Services Modeling 
• Web Services-oriented Software Engineering 
• Web Services-oriented software testing 
• Web Services in Cloud Computing 
• Semantic Web Services 
• Etc. 

Note that any of these topics is still rather broad. To produce a high-quality paper, you need to drill down to a more concrete topic. One such example could be "Review of a new XXX protocol for secure web services". 

IEEE and ACM databases are two good resources .No trade publications, web references, and book references should be used as references. Keep the majority of your references as current as possible (e.g., less than five years old). 
Make sure that you cite all relevant articles that are referenced in your paper. Use the APA format where appropriate. This is a requirement by GSCIS. Failing to do so may lead to the loss of points in your submission. 
The report should have 12- 15 pages, double-spaced and not counting the title page, table of contents, bibliography, or any figures. It should include a bibliography that appears as references in the body. Your paper should use headings and sub-headings to reflect its structure. Please proofread your paper carefully to ensure that it contains no spelling or grammatical errors. It should conform to the standards of academic integrity described in our program guide and the course syllabus. 
A common outline for a review paper is as follows. This is for your reference only. Depending on the area you choose and your approach to tackle the problem area, you may choose a different structure. 
1. Introduction (what is the problem being addressed? why is it a problem?) 
2. Existing solutions in the literature. 
2.1 Solution 1. 
2.2 Solution 2. 
2.3 Solution 3. 
3. Review of solutions (what are the advantages/disadvantages for each of them? why?) 
4. Your own solution (if any) (what is it? is it good? why? what is the significance/contribution to the field of study?). 
5. Summary, conclusion and future work. 


Additional Suggestions 
1. It is not appropriate to write on a very broad topic such as network security, cryptography, multimedia network protocols, wireless protocols, etc. Keep in mind that this is just a short term paper that should fit into a limited time period. You can actually find a textbook for most of these topics. Please choose a topic as specific as possible. 
2. A review paper usually should include multiple (about 5) references. I would like to see references from referred conference proceedings or journals. IEEE and ACM databases are generally used by the research community. References such as Wikipedia can be used at the early stages when you explore a topic, but you are discouraged from using them since the information are generally considered unreliable for scientific papers. Usually you should summarize different resources instead of reiterating the exact words. It is also important to show your ability of critical thinking - I wish you include as many comments (in your own words) as possible. 
3. Please note if you cite the exact words from references, you need to put quotation marks on both sides. The paper may be considered plagiarism for failing to do so. You should also pay attention to the use of enough citations so that a reader can easily separate your work from other researchers. For more information on the integrity policy please refer to the course syllabus and the Graduate Catalog posted on GSCIS' website. 
4. If you plan to propose your own solutions on an existing problem, that is great. Try your best and you may end up with a publication based on your course work. I will be happy to assist you during the process. 
Evaluation Criteria 
Your paper submission will be evaluated based on the following evaluation criteria. 
1. Relevance to the course. 
2. Technical depth and soundness of your discussion. 
3. Critical thoughts as shown in the discussion. 
4. Citation to relevant references and quality of references. 
5. Conformance to APA. 
6. Formatting of the document.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9417744

Have any Question?


Related Questions in Computer Engineering

In the course of producing its output this firm causes

In the course of producing its output, this firm causes pollution. The government passes a law that requires the firm to stop polluting, and the firm discovers that it can prevent the pollution by hiring 0.2 workers for ...

Question a security system is used to monitor doors and

Question : A security system is used to monitor doors and windows of a residence. This system uses several components, including photodiodes and contact switches to detect intruders. Circuits associated with contact swit ...

Scenario you have been asked to develop a company policy on

Scenario: You have been asked to develop a company policy on what should be done in the event of a data breach, such as unauthorized access to your company's customer database. What sort of process would you use to devel ...

Biodiversity refers to the variety of living organisms

Biodiversity refers to the variety of living organisms found within an ecosystem. In your description, evaluate the role of humans in the current biodiversity loss situation and increased species extinction rate. In addi ...

As part of a bear population study data were gathered on a

As part of a bear population study, data were gathered on a sample of black bears in the western United States to examine the relationship between the Bear's neck girth (distance around the neck) and the weight of the be ...

1 a router operates at which osi layer application

1. A router operates at which OSI layer? Application Presentation Session Transport Network Data Link Phsical 2. Suppose application data of size X bytes is transmitted from system A to system B via the OSI layers and th ...

The gravitational attraction between any two objects in the

The gravitational attraction between any two objects in the universe is given by the following formula: Force of Gravity = (G * m * n) / r 2 Where  m  and  n  are masses of the objects in kilograms,  r  is the distance b ...

Question suppose you arc a board game maker and you want to

Question : Suppose you arc a board game maker, and you want to give players a higher probability of rolling larger numbers. Originally you had them roll three six-sided dice and add their results. The new approach will h ...

Fully explain at least one reason why many developing

Fully explain at least one reason why many developing countries suffered serious debt crisis in the early 1980s. Does this reason you explained in debt support Krueger & Srinivasan's argument? Why or why not? How could t ...

Question research the options for creating a gui on a sun

Question : Research the options for creating a GUI on a Sun Solaris platform that can be duplicated on a Windows platform. Select a tool for creating a dual platform product and specify how much time would be needed for ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As