Service Discovery in Mobile Ad hoc Networks Using Association Rules Mining

Similar documents
Exploiting Correlation Among Data Items for Cache Replacement in Ad-hoc Networks

Extended ZRP: a Routing Layer Based Service Discovery Protocol for Mobile Ad Hoc Networks *

Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks*

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Routing Protocols in MANETs

Distributed Systems 26. Mobile Ad Hoc Mesh Networks

Service Discovery and Invocation for Mobile Ad Hoc Networked Appliances

Investigation on OLSR Routing Protocol Efficiency

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Performance Analysis of MANET Routing Protocols OLSR and AODV

2013, IJARCSSE All Rights Reserved Page 85

CS551 Ad-hoc Routing

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Figure 1: Ad-Hoc routing protocols.

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Advanced Network Approaches for Wireless Environment

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH VOLUME 5, ISSUE 3, MARCH-2014 ISSN

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

An Intelligent Mesh Based Multicast Routing Algorithm for MANETs using Particle Swarm Optimization

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

IJMIE Volume 2, Issue 6 ISSN:

QoS Based Evaluation of Multipath Routing Protocols in Manets

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Aanchal Walia #1, Pushparaj Pal *2

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Performance Evaluation of Various Routing Protocols in MANET

Signal Strength based Service Discovery (S3D) in Mobile Ad Hoc Networks

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Webpage: Volume 4, Issue VI, June 2016 ISSN

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Routing Protocols in Mobile Ad-Hoc Network

Ad-Hoc routing taxonomy and Resource Discovery

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

UPnP-Based Telematics Service Discovery for Local Hot-Spots

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Service Discovery and Name Resolution Architectures for On-Demand MANETs

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

Analyzing Routing Protocols Performance in VANET Using p and g

Local Recovery of Routes for Reliability using Backup Nodes in MANETs

Routing protocols in WSN

Power aware Multi-path Routing Protocol for MANETS

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

A Study on Issues Associated with Mobile Network

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Adding Unusual Transports to The Serval Project

Efficient Message Caching Scheme for MANET

A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Routing Protocols in MANET: Comparative Study

Sharing Location Dependent Experiences in MANET

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Introduction to Mobile Ad hoc Networks (MANETs)

Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs

Service Discovery and Provision for Autonomic Mobile Computing *

Maharishi Markandeshwar University

SUMMERY, CONCLUSIONS AND FUTURE WORK

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

LOCATION-AIDED ROUTING PROTOCOL IN HYBRID WIRED-WIRELESS NETWORKS. WU MINTAO (B.Eng.(Hons.), NTU)

AODV-PA: AODV with Path Accumulation

Transcription:

Service Discovery in Mobile Ad hoc Networks Using Association Rules Mining Noman Islam, Zubair A. Shaikh Center of Research in Ubiquitous Computing National University of Computer & Emerging Sciences Karachi, Pakistan Abstract- Service Discovery in Mobile Ad hoc Networks (MANET) is a difficult task because of the dynamic nature of such networks. The availability of the services in MANET varies with respect to time and location. However, the service discovery requests issued by a consumer in one session are correlated, in most of the cases. If we can find out the correlation among the services and piggyback one service response with others in advance, we can gain improvement in performance. By utilizing this correlation property among service discovery requests, we have proposed a novel approach to Service Discovery in Mobile Ad hoc Networks. We have simulated the proposed approach in JIST/SWANS simulator and the results have shown significant performance improvement. Key Words - MANET, Service Discovery, Association Rules Mining, ItemSet Mining I. INTRODUCTION Mobile Ad hoc Networks are infrastructure less networks that are formed among a number of mobile nodes[1]. Due to the dynamic nature of these types of networks, algorithms that were designed for traditional networks (e.g. routing, transport protocols, security and QoS) don t show good performance for MANET. As a result active research work is going on to propose new algorithms and protocols for MANET. Service Discovery in MANET is one such issue that has gained considerable attention during recent years. A service is any tangible or non-tangible resource that one can invoke to gain some utility. Service Discovery can be defined as the process of discovering some service on behalf of its user based on the preferences (e.g. QoS) specified by the user and constraints (e.g. cost) specified by the provider. Service Discovery in MANET is a very challenging task due to a number of issues. One of the issues is to decide where to place the directory or list of the services available on the network. Because there is no prior infrastructure in MANET, we can t dedicate any node or set of nodes as directory server, in advance. Usually, the directory is distributed among the nodes in MANET. Another important issue is the actual discovery of the service in the network. If there are few dedicated nodes, they can be queried for the service. Otherwise, broadcasting or their variations could be used for service discovery. Since the nodes are mobile and the changes (like link failure, node failure etc.) are quite common in such networks, maintaining a consistent view of the service availability in such networks is also an important task. Service Discovery in MANET provides a number of useful benefits to the end user. For example: if you are traveling on a car and assuming an Ad hoc network is formed between vehicles around you. You can utilize a number of location based services while roaming along the road. This includes road safety services (e.g. weather warning, accident information, alternate route assistance) or non safety services (e.g. M-Banking, locating a restaurant/parking/fuel station). In most of these cases, a number of service discovery requests are issued simultaneously. We can call such simultaneous requests as belonging to one service session. Naturally, the service discovery requests that are issued in one session are correlated. For example, if the user intention is shopping, his requests will be to find out the shopping malls around it, the shopping items available at the mall, the cost of individual items etc. Our motivation is that if we can some how find out correlation among the services of one session, we can predict future discovery requests based on current service discovery request. In our research, we have used the Association Rules mining algorithm to achieve this objective. Using the correlation among the services and piggybacking future service request answers along with current service requests, we have proved significant gain in performance. Rest of the sections of this paper has been organized as follows: First we will review the literature on service discovery requests. Then we will discuss the proposed approach and its implementation details along with results. Finally, we will conclude the paper with discussions on future work. II. LITERATURE REVIEW Work on Service Discovery in Ad hoc Networks have been reported from various perspectives in literature. Most of the classical algorithms for Service Discovery can be classified as directory-less and directory-based approaches. Among the first type, we have Allia[2], Konark[3], GSD[4], IBM DEAPSpace [5] and Microsoft UPnP [6] algorithm. The basic concept in Allia and GSD is the formation of alliance and groups respectively to reduce service discovery overhead. Konark represents the services in WSDL format and is based on broadcasting of service advertisement and then caching of these advertisements by peer nodes. IBM DEAPSpace algorithm, targeted for short range devices is based on intelligent broadcasting of services information to single hop devices. UPnP is a P2P protocol that uses broadcasting for service discovery and is based on SOAP for service invocation. Among the directory based approaches we have JINI[7], DReggie[8] and Mallah[9]. JINI is proposed for distributed environment, is based on Java RMI mechanism and uses Java Interfaces as service identifiers. DReggie is an extension of JINI that adds semantics to it by representing services through an ontology language called DAML. SLP[10] proposed by IETF represents the services in the form of URL and attributes and can work in directory-based or directory-less fashion. The work by Mallah[9] is based on a number of directory servers called virtual backbone. The author formulated a number of metrics like battery power, node's average velocity, effective degree, stability constraint and based on these parameters selected a number of virtual backbone nodes that are responsible for maintaining the directory of services. There are a number of other directions in which research on Service Discovery in MANET has been pursued. Lenders[11] forms

Association Rules Mining FP-Tree Mining Service Discovery Component Service Table Mining Results OOOO OO OO Service Discovery Algorithm Log Database Ticket Fares, Shopping Mall Weather, Alternate Route Fuel Station. Fig 1 Service Discovery based on Association Rules Mining an analogy of MANET with electrostatic field and service as a point charge. Using this model, they formulated a service discovery algorithm and defined the required protocols and methods needed for service discovery. Torres[12] worked on service discovery at network layer and extended AODV routing protocol for service discovery in MANET. Noman[13] extended this approach further by adding a proactive component to improve latency. Hong [14] proposed service discovery based on ZeroConf. Services are advertised and browsed only in the network during topology changes or initiation of ZeroConf algorithm. Talwar[15] has proposed a service discovery algorithm based on routing intelligent mobile nodes that indexes resources and services information periodically and is queried during the discovery phase. Using data mining for solving MANET issues (like service discovery) is a relatively new concept and we see only a small amount of work in this direction. Hu [16] applied the mining technique for composite web service discovery but this work was not applied to Mobile Ad hoc Network. Jabas[17] applies the mining technique to MANET traffic to find interesting relations ships among MANET nodes. Their research was motivated by the fact that these relationships can assist routing, MAC and other protocols of MANET. Our work in this paper has been done from another dimension i.e. using the association rule mining to improve the performance of Service Discovery algorithm. We use Association Rules mining technique to predict future service discovery requests based on current service discovery request. There are a two popular Association Rules mining algorithms i.e. Apriori[18] and FP- Tree[19]. Apriori algorithm is computationally too expensive. FP- Tree uses a tree like structure to reduce computational cost and is usually the recommended choice. III. USING ASSOCIATION RULES MINING FOR SERVICE DISCOVERY IN MANET Fig 1 shows the proposed Service Discovery Module that is running on every node. The module comprises of a Service Discovery Component that contains a service table maintaining all the services the node knows of. The component runs a service discovery algorithm that is described in Fig 2. The details of this service [Logging Component] public void loggingcomponent() { Message m = listenformessage(); if(m is SREQ) { Database d = openlogdatabase (); if(d is full) { deleteoldestrecord(d); Fig 2: Pseudo Code of proposed approach write(servicerecord(d)); [Mining Component] S public void MiningComponent() { readlogdatabase(); genrateitemsetsusingfpgrowth(); [Service Discovery Component] public void ServiceDiscoveryComponent() { Message m = listenformessage(); if(m is SREQ) { if(desiredserviceavailable) { RS = getrelatedservicesiknow(); generatesrepwithrs(); else{ broadcastsreqahead(); if(m is SREP) { if(m destination is Me) { s = extractserviceinfo(m); storeinservicetable(s); RS = getrelatedservicefrom(m); storeinservicetable (RS); else{ broadcastsrepahead(); s = extractserviceinfo(m); storeinservicetable(rs); RS = getrelatedservicefrom(m); storeinservicetable(rs); Fig 2 Pseudo Code describing the proposed approach discovery algorithm are discussed in next paragraph. Every service discovery request that is generated by the service consumer will be logged in a log database. We define a service session as an interval in which a number of service discovery requests are issued by a service consumer such that these requests are related. A log database consists of a collection of session records. Each session record comprises of a number of fields and each field represents a single service discovery request issued by consumer. The Association Rules mining component uses the records stored in log database and applies FP- Tree mining algorithm on the these records to determine the correlation among the service requests. The algorithm determines what service requests are issued together i.e. frequent item sets. We have not utilized association rules since we assumed that service requests in a session can be issued in different order. The frequent item sets thus discovered can be used to predict future service discovery requests based on the current service discovery requests. Fig 2 describes the proposed approach in pseudo code format running

Field Length (bits) Description ServiceID 24 The unique identifier of the service to be requested Originator 32 The node who has initiated the service discovery request TTL 8 Time to Live value to minimize network overhead Sender 32 The address of the previous hop who has forwarded the SREQ RequestID 48 The unique identifier for the service request SessionID 48 The unique identifier of the session (a) SREQ Packet format Field Length (bits) Description + ServiceID 24 The unique identifier of the service to be requested Provider 32 The address of the node who is has the requested service Requestor 32 The address of the node whose SREQ is being responded TTL 8 Time to Live value to minimize network overhead RequestID 48 The unique identifier for the service request SessionID 48 The unique identifier of the session (b) SREP Packet format + appeared together one or more time in the packet Fig 3 Format of SREQ and SREP packets on every node. The logging component listens for all incoming service discovery requests and records this in log database. The log database is a circular list of records. So, when the log database becomes full, it deletes starting records to log new service sessions. These logged items will then be mined using FP-Tree algorithm. The mining component reads the log database and using this information, it determines the correlation among the service discovery requests. It will determine what service requests are issued together. If the number of transactions in which some services are issued together crosses a threshold value (i.e. support), these services forms frequent item set and can be used for predicting future service requests based on current service request. In our approach, we have applied the mining technique on broadcast approach to service discovery. The service discovery component listens for incoming message. If the incoming message M is a service discovery request i.e. SREQ, the method extracts the requested service from the packet and looks for this service in its local service table. If the service table contains the desired service, then all the services related to this service are also picked (from the mined results) and they are also returned along with the service in SREP message. If no service is found in service table, then SREQ is propagated ahead. If the incoming message is SREP, the node sees if this is the reply of its own SREQ, then it inserts this information in its service table along with other related service information. If SREP doesn t belong to node, it propagates the SREP message along with recording service and related information in its local service table. IV. SIMULATION DETAILS AND RESULTS The proposed approach has been implemented in JIST/SWANS network simulator[20, 21]. The simulation has been done in a field of 500 500 with random placement of nodes. Unless otherwise mentioned, we have used the default configuration parameters of JIST/SWANS for simulation. In order to test our algorithm, we need to generate service discovery requests in a session such that they are correlated. For that purpose, we developed a Correlated Data Generator (CDG) module that issues service discovery requests based on a correlation matrix CM of n n, where n is the number of services in the network. The correlation matrix is built programmatically using Java Random Number Generator that follows a Uniform Distribution. An n n matrix of random numbers R is generated and based on this matrix, the correlation matrix CM, is built in the following way: Requests Locally Satisfied 60 50 40 30 20 10 0-1 0 0 5 10 15 20 25 Node a) Sim ulation Time: 9000s Nodes: 20 Services: 10 Requests Locally Satisfied 60 50 40 30 20 10 0 Node b) Sim ulation Time: 5000s Nodes: 50 Services: 10 Le gend : Fig 4: Results of proposed approach with AODV as routing protocol

0 CM ( i, j) = 1 R(i, j) < 0.5 R(i, j) 0.5 where, 0 i < n and 0 j < n and 0 < R(i, j) 1 Using this correlation matrix CM, CDG decides what service discovery requests are to be issued in one session. First, we pick a service s randomly. This service will be part of current session. For the sake of simplicity, by a service s means the index/position of the service in a sorted list of all the services available in the network. After picking a random service s, we select all the services related to s based on CM. These services are possible candidates for inclusion in current session. We define Candidate Service Requests set C as: { i i = s CM ( i, ) = 1 C = s To generate a session, we pick services from candidate service request and based on certain threshold, they are probabilistically issued on the network. We generate a random number 0 p i <1, i C. A service session S is then defined as: S = C( i) p i <η where, η is the threshold value that determines the likelihood of a candidate service request to be issued to the network. We use η =0.8. The support value for FP Tree mining in our experiments was set to 80%. To test our approach, we have simulated the proposed scheme in an Ad hoc network with various configurations. The size of the service table or service cache was kept to 5 entries with FIFO strategy as the replacement algorithm. The routing algorithm used is Ad hoc On-Demand Distance Vector Routing. Fig 4a shows the simulated results with a network of 20 nodes with 10 services. The parameter we measured is the number of service discovery requests that are locally satisfied. As we can see, when we utilize data mining information, the number of service discovery requests locally satisfied increased. Fig 4b shows the results with the number of nodes increased to 50. In both of the cases, there are some minor instances where results without mining gives better results. This is because the prediction of service requests failed i.e. a node predicts a service discovery request which is not actually used in future. This caused network and processing overhead and results in degradation of performance V. CONCLUSION We have proposed a novel approach to improve service discovery in MANET using Association Rules mining. The proposed approach has been applied to broadcast approach and found to give significant improvement in results. The future work in this direction is the testing and extension of the proposed approach for other parameters (e.g. latency, bandwidth) and large scale MANET. In the current approach, we have not considered the computational cost of FP-Tree mining for MANET. Future work in this direction is the development of approximate FP-Tree mining algorithm for low-powered devices. Another extension is the application of mining approach to other Service Discovery algorithms. ACKNOWLEDGMENT This research work is supported by Center of Research in Ubiquitous Computing, National University of Computer and Emerging Sciences, Karachi, Pakistan and Higher Education Commission, Pakistan. REFERENCES [1] IETF MANET Working Group. [cited 2009 August 28]; Available from: http://www.ietf.org/html.charters/manet-charter.html. [2] Olga Ratsimor, D.C., Anupam Joshi, and and T. Finin. "Allia: alliance-based service discovery for adhoc environments", in WMC '02: Proceedings of the 2nd international workshop on Mobile commerce. 2002: ACM Press. [3] S. Helal, N.D., V. Verma, and C. Lee. Konark - "A Service Discovery and Delivery Protocol for Ad hoc Networks", in 3rd IEEE Conference on Wireless Communication Networks (WCNC). 2003. [4] Chakraborty, A.J. "GSD: A Novel Group-based Service Discovery Protocol for MANETS", in 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN 2002). 2002. Stockholm. Sweden. [5] M. Nidd, "Service Discovery in DEAPspace", in IEEE Personal Communications. 2001. p. 39-45. [6] Understanding Universal Plug and Play. 2000, Microsoft UPnP forum (http://www.upnp.org). [7] Jini technology core platform specification, v. 2. 0. 2003, Sun Microsystems. [8] Dipanjan Chakraborty, F.P., Sasikanth Avancha, and Anupam Joshi. DReggie: "Semantic Service Discovery for M-Commerce Applications. in Reliable and Secure Applications in Mobile Environment", In Conjunction with 20th Symposium on Reliable Distributed Systems (SRDS). 2001. [9] Mallah, R.A. and A. Quintero, "A Light-Weight Service Discovery Protocol for Ad Hoc Networks". Journal of Computer Science 2009: p. 330-337. [10] E. Guttman, C.P., J. Veizades, and M. Day, "Service Location Protocol, Version 2", 1999, IETF RFC 2608. [11] Vincent Lenders, M.M., Bernhard Plattner. "Service discovery in mobile ad hoc networks: a field theoretic approach", in IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). 2005. [12] Torres, D.A. and J.A. García-Macías. "Service Discovery in Mobile Ad-hoc Networks by Extending the AODV Protocol", in 2nd Mobile Computing Workshop (ENC' 04. 2004. Mexico. [13] Islam, N. and Z.A. Shaikh. "A Novel Approach to Service Discovery in Mobile Ad hoc Network". in International Networking and Communication Conference. 2008. LUMS, Lahore, Pakistan. [14] Se G. Hong, S.S., H. Schulzrinne. "Accelerating Service Discovery in Ad-Hoc Zero Configuration

Networking" in IEEE In Global Telecommunications Conference. 2007. [15] BASAVARAJ TALWAR, P.V.a.L.M.P., "A Method for Resource and Service Discovery in MANET". Wireless Personal Communications (2007), 2007. 41: p. 301-323. [16] Hu, J.-Y., "Service Mining for Composite Service Discovery", in Computer Science and Information Engineering. 2006, National Central University. [17] Jabas, A., R.M. Garimella, and S. Ramachandram. "MANET Mining: Mining Temporal Association Rules". in International Symposium on Parallel and Distributed Processing with International Symposium on Parallel and Distributed Processing with Applications. 2008. Sydney, NSW, Australia. [18] Apriori algorithm. [cited 2009 Aug, 09]; Available from: http://en.wikipedia.org/wiki/apriori_algorithm. [19] HAN, J., et al., "Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach". Data Mining and Knowledge Discovery, 2004. 8: p. 53-87. [20] Barr, R., Z.J. Haas, and R.v. Renesse, "JiST: An efficient approach to simulation using virtual machines". Software Practice & Experience, 2005. 35(6): p. 539-576. [21] Barr, R., Z.J. Haas, and R.v. Renesse, "Scalable Wireless Ad hoc Network Simulation", in Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad hoc Wireless, and Peer-to-Peer Networks. 2005. p. 297-311.