• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Adaptor Reconfiguration Analysis in Web Services Composition

    2015-08-07 10:54:14FANDajuan范大娟HUANGZhiqiu黃志球XIAOFangxiong肖芳雄PENGHuanfeng彭煥峰
    關(guān)鍵詞:馬俊

    FAN Da-juan(范大娟),HUANG Zhi-qiu(黃志球),XIAO Fang-xiong(肖芳雄),PENG Huan-feng(彭煥峰)1,

    1 School of Computer Engineering,Nanjing Institue of Technology,Nanjing 211167,China

    2 College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China

    3 School of Software Engineering,Southern China University of Technology,Guangzhou 510006,China

    Adaptor Reconfiguration Analysis in Web Services Composition

    FAN Da-juan(范大娟)1,2*,HUANG Zhi-qiu(黃志球)2,XIAO Fang-xiong(肖芳雄)3,PENG Huan-feng(彭煥峰)1,2

    1 School of Computer Engineering,Nanjing Institue of Technology,Nanjing 211167,China

    2 College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China

    3 School of Software Engineering,Southern China University of Technology,Guangzhou 510006,China

    Most of the existing approaches focus on identifying m ismatches and synthesizing adaptors at design-time or recently at run-time.However,few works have been proposed to support adaptor reconfiguration when services in the composition evolve due to changes in business needs.To address the deficiencies,the problem of adaptor reconfiguration is targeted in the context of service composition.Firstly,the formal models for describing services and adaptors are presented.Then,under this formalization,the notion of reconfiguration com pliance is proposed to determ ine the validity of an adaptor instance with respect to its history executions and future executions.Based on the notion,the algorithm for reconfiguration analysis of adaptors is presented and it can be used for determ ining them igratability of an adaptor instance and the corresponding target state of reconfiguration if m igratable.Finally,feasibility of the proposed approach is validated on a realistic case study.The proposed approach im proves the flexibility of adaptor-based service composition by equipping adaptors with reconfiguration capabilities.

    web services;adaptor;reconfiguration;trace compliance

    Introduction

    In service-oriented architectures[1],Web services are loosely coupled and black-box software components that are published,discovered,and invoked across theweb through their interfaces.The composition of Web services wiring together multiple Web services often fails because services developed by different third-parties are offered through incompatible interfaces,including both signature and behavioral interfaces[2-3].The typical approach to resolve incompatibilities in such a heterogeneous setting is through developing adaptors thatmediates the interactions among services with incompatible interfaces so that interoperability at signature and behavioral levels can occur[4].A service composition with the aid of an adaptor can be called an adaptor-based service composition.

    In the last few years,mostadaptation proposals focused on solving mismatches between software components or recently Web services.In Ref.[5],the authors first defined the minimum receive distance and the m inimum send distance.Then,they proposed a m inimal adaptor construction algorithm for two incompatible services based on the two kinds of distances.Theminimaladaptor only tackled themessageswhich caused incompatibilities and could therefore effectively reduce communication overhead between incompatible services.In Ref.[6],the authors defined several adaptation templates based on BPEL codes.For each adaptation template there corresponds a m ismatch pattern input.Developers can utilize adaptation templates to generate BPEL codes of adaptors according to themismatches between twoWeb services.In Ref.[7],the authors identified m ismatches at signature and behavioral levels by using schema matching and generated a m ismatch tree to help developers in generating adaptor specification in presence of deadlock.The above approaches assume that the services to be composed have been fixed in advance and only focus on m ismatch analysis and adaptor generation at design-time.

    Due to the dynamic characteristics in Web services environments,servicesmay evolve at run-time for adapting to changes in business needs[89].Thus,several run-time adaptation approaches have recently been presented to complement the approaches for design-time adaptation[10].In Ref.[11],each mismatch pattern corresponded to an adaptation logic.The authors leveraged aspect-oriented programming paradigm and weaved the adaptation logics as adaptation aspects into the runtime service instances instead of introducing an independent adaptor.In Ref.[12],the authors also classified incompatibilities into m ismatch patterns and designed the corresponding adaptations to solve each kind of incompatibility.They relied on an event-based technology and would trigger a specific adaptation action when catching an incompatibility event.In Ref.[13],the authors proposed a runtime adaptation approach by exploring a service adaptation machine.The machine acted as an adaptor between incompatible services at runtime,by selecting and chaining mapping rules to resolve mismatches as they arised.Besides,some researchers focused on how to re-generate or re-adjust the adaptor while dynamically evolving services.In Ref.[14],they presented an example in which possible changes were successively applied and sketched some solutions to adaptor readjustment issues on this example.In Ref.[15],the authors presented the incremental adaptation supporting evolving component-based systems.The incremental integration process could be viewed as several re-generations.To do so,they proposed some techniques to deal with two cases:(1) generated an adaptor for the added component,(2)suppressed the adaptor for the removed component and upgraded all the adaptors interacting with the suppressed one.However,no solution is proposed in these approaches to equip the adaptor with reconfiguration capabilities when service evolution occurs in the running adaptor-based service composition.

    When some service evolves in the execution process of a certain adaptor-based service composition,the original adaptor will be replaced by a new one for the evolved service accordingly.Thus,automated techniques are needed in order to reconfigure adaptors without stopping their execution.The adaptors reconfiguration refers to how to determ ine whether a certain running adaptor instance ismigratable from the original adaptor-based service composition to the new one,in which both a service and the adaptor are evolved into a new service and adaptor.To address the deficiencies,in this paper the adaptor reconfiguration problem is targeted in the context of a service composition involving incompatible services for which an adaptor is executed.Firstly,formal models that describe services and the adaptor are presented.Then,with thisframework the notion of reconfiguration compliance(combining the notion of backward trace compliance and the notion of forward trace compliance)is proposed and then utilized to decide if the reconfiguration scenario that allows the running adaptor instancemigrates from the former adaptor-based service composition to the new one is correct.The proposed approach equips adaptors with reconfiguration capabilities to ensure the flexibility of adaptor-based service composition at run-time.

    1 Prelim inaries

    1.1 Services

    Services are often described by signature and behavior interfaces.They may include non-functional(i.e.,Qos) apsect.In the paper,wemainly focus on the functional aspect of services described by signature and behavior interfaces.The signature declares both the operations that the service provides,and those it requires from other services.Each operation in WSDL specifications of services receives a message(oneway),receives and sends amessage(request-response),sends and receives amessage(solicit-response),or sends amessage (notification).Thus,a signature is often represented by a set of actions,relative to the emission and reception of messages corresponding to operation calls.Moreover,the behavior represents the order in which the operations in the signature are performed.

    A service is modeled by means of a finite state machine (FSM)model.The reason for using FSM model is that this formalism is intuitive,simple,and fairly easy to understand for users.

    Definition 1(FSM)An FSM model is a quintuple M=(S,L,T,I,F(xiàn)),where S is a setof states,L isa setof labels,T?S×L×S is a setof transitions,I∈S is the initial state,and F?S is a setof final states.The transition t=(s,l,s')can also be denoted as

    In the FSMs,transtions are labelled with operations(i.e.,actions in the set L that indicate messages to be sent or received).When amessage is sentor received by a service,the corresponding transition is fired.Actions in the FSMs represent the signature interfaces of services,and transitions in the FSMs depict the behavior interfacesof services.Thus,using the FSMs is a simple yeteffective approach tomodel service signature and behavior interfaces.

    Definition 2(Trace)Let M=(S,L,T,I,F(xiàn))be an FSM model.A trace of M is aσ∈(L*∪{ε})defined in such a way thatσ=ε∨(?s0,s1,…,sN∈S:σ=l1l2…lN∧s0whereεdenotes the empty trace.The set of traces of M is denoted as Tr(M).A traceσwhich is the concatenation of two tracesσ1andσ2isw ritten asσ=σ1σ2.Definition 3(Backward trace and forward trace)Let M be an FSM model andσa trace of M.The traceσis a backward trace of M if and only if?s0,s1,…,sN∈S,s0=I:σ=The set of backward traces of M is denoted as BTr(M).The traceσis a forward trace of M if and only if?s0,s1,…,sN∈S,sN∈F:σ=The setof forward traces of M is denoted as FTr(M).

    The traces of an FSM model are the sequences of labels that can be observed according to its transitions.Backward and forward traces are the special cases which start from its initial state and end at its final state respectively.The symbols EN(σ) and ST(σ)are used to respectively denote the stateswhich the traceσstarts from and ends at.

    Based on the above definitions,we will represent services just by FSM models that describe their signature and behavior interfaces.

    Definition 4(Service)A service can be described by an FSM model c=(S,L,T,I,F(xiàn)),where S is a setof service states,I∈S is the initial state,F(xiàn)?S is the set of final states,L?{!,is a setof service actions,and T?S×L×S is a set of transitions triggered by service actions.

    1.2 M essagemappings and adaptors

    While composing existing services,they do not always fit one another,and m ismatches arise because of differentmessage names,a message without counterpart or with several ones in the partner service,etc.The presence of mismatch results in a deadlocking execution for these incompatible services and thus needs adaptors to reconcile incompatibilites.Adaptors are often automatically generated from an abstract adaptation description[16],called message mapping,expressing the correspondences betweenmessagesand indicating how m ismatch situations can be solved.Themessagemapping is composed of a finite set ofmapping rules and eachmapping rule in itgives a correspondence between receive actions and send actions involved in the adaptation.

    From a set of incompatible services and a message mapping,an adaptor is automatically generated according to adaptor generation algorithms[17- 18]to orchestrate deadlock-free interactions among incompatible services.

    Definition 6(Adaptor)Let a setof services be ci=(Si,Li,Ti,Ii,F(xiàn)i),i∈{1,2,…,N}.The adaptor can be described by an FSM model A=(S,L,T,I,F(xiàn)),where

    The states in the adaptor correspond to combinations of states of N services,i.e.,the adaptor is in its state(s1,s2,…,sN),if and only if each service i is in its state si.The formula Lmeans that every action in the adaptor has the corresponding complementary action in a certain service.Specially,for each action?m in the adaptor,there exists the send action!m in a certain service,and for each action!m in the adaptor,there also exists the receive action?m in a certain service.Therefore,the tracereflects the interaction of N services involving in the adaptor-based service composition,whereσis the trace of the adaptor.

    The actions of each of the N services performing incan be derived by projecting the traceover the action set Li.

    Definition 7(Projection)Letσbe a trace,the projection of σover an action set L(w rittenσ↓L)is defined as:

    Analogously,an operator over a trace that hides the particular actions is defined,leaving the rest of the actions in the trace.

    Definition 8(Hiding)Letσbe a trace,and the hiding ofσ over an action set L(w rittenσL)is defined as:

    (187)瓦鱗苔 Trocholejeunea sandojcensis(Gottsche)Mizt.馬俊改(2006)

    2 Reconfiguration Analysis of Adaptors

    2.1 Problem of adaptor reconfiguration

    When the evolution of one or more services which participate in an adaptor-based service composition occurs,it will lead to modification of the old adaptor into a new adaptor by utilizing the adaptor generation algorithm.Therefore,such a service evolution raises a critical issue is how to handle instances running under the old adaptor when it has been changed.

    Simple solutions,such as aborting them or allow ing them to continue to run according to the old adaptor are inapplicable formany reasons(e.g.,the loss of work already done or the consequence of error execution).How to reconfiguration of adaptor,i.e.,dynam ically m igrate ongoing instances that have already executed under old adaptor to the new adaptor is a critical issue,especially for long running business processes.

    In the field of traditional workflow,Ref.[19]proposed inheritance-preserving transformation rules for instance migration.The transformation rules can be used to restrict changes in workflow process definitions and ensurem igration of workflow instances without introduing errors.The approach in Ref.[20]introduced the concept of change region(i.e.,the part of the workflow that was affected by changes).If workflow instances are in the change region,the migration of them is postponed until they exit the region.For the cases in which workflows before and after evolution do not meet the inheritance relationship or workfow instances are in the change region,the instances under orginal workflow are considered to be non-migrated in Refs.[19- 20].In the web services area,Ref.[21]aimed at dynam ic management for adaptor-based service composition,and proposed the execution model of adaptor to realize the dynamic adjustment of adaptors at runtime.The approachmainly focused on correctness check which was suitable for themediator instance aftermigration and did not consider the aspect on determining whether an adaptor instance wasmigratable.

    In order to determine whether an instance can be correctly migrated to the new adaptor,two notions of reconfiguration compliance are proposed in the paper,corresponding to different requirements that may impose on the reconfiguration process: backward trace compliance and forward trace compliance.

    In this paper,for simplicity,we just consider simple scenarios where only one service in a certain adaptor-based service composition evolves at run-time.This is nota lim itation becausemultiple services evolution can be viewed as one service evolution happen several times.

    Service evolution can take place anytime in the execution,so the problem of reconfiguration includes two aspects:(1)for a given source reconfiguration statewhere the evolution occurs,analyzing if the instance under the old adaptor ism igratable or non-migratable;(2)whenever the instance ismigratable in the given source reconfiguration state,it should also be defined the target reconfiguration state under the new adaptor from which the instance will resume.

    A source reconfiguration state defines when a reconfiguration is allowed.Moreover,a target reconfiguration state indicates that the starting state in the new adaptor to resume the execution.We will show how to determ ine whether the instance at a given source reconfiguration state ismigratable or not and how to obtain the target reconfiguration state if migratable.

    Let C and C'be a set of services before and after evolution,M and M'be themessagemappings for the services in C and in C',respectively.Assum ing thata certain service ckevolved into another service c'ksuch that?ck∈C,?c'k∈C': ck≠c'k∧C/{ck}=C'/{c'k},the adaptor AC,Mgenerated according to the message mapping M for services in C is replaced by the adaptor AC',M'generated according to M'for services in C',where k∈{1,2,…,N}.

    2.2 Reconfiguration analysis based on the trace com pliance

    The notion of backward trace compliancemeans that after migration to the new adaptor,the backward trace of an instance (i.e.,the action sequence performed by the instance so far) must be compliance in the context of the new adaptor.This reconfiguration compliance is aware of the past interactions,up to the time of evolution,corresponding to a valid interaction as defined in the new version of adaptor.

    We assume that the sequence of actions an instance has been performed under the old adaptor AC,Mis the backward trace σC,M.For each service cisuch that ci∈C∩C',i.e.,ci≠ck,ci≠c'kwhere i∈{1,2,…,k-1,k+1,…,N},it is not affected by the reconfiguration from the old adaptor AC,Mto the new adaptor AC',M'since it remains unchanged after evolution.If service ciis not obliged to abort nor rollback its current execution andon running under the new adaptor,the backward tracerepresenting the sequence of actions already performed by the service ciis valid in the new adaptor AC',M',where Lidenotes the action set of service ci.

    Therefore,for reconfiguration compliance under the notion of backward trace compliance,we have to ensureeach service cisuch that ci∈C∩C',the backward tracealready performed by service ciis also contained in the backward traces of the new adaptor AC',M'.

    Let us formalize this notion of backward trace compliance with the follow ing definition.

    Definition 9(Backward trace compliance)LetσC,Mbe a backward trace executed by an instance under an adaptor AC,M.The adaptor AC',M'is the backward trace compliance to the adaptor AC,MgivenσC,Miff there exists a backward traceσC',M'in the tracessuch that?ci∈C∩C',and we have thatwhere i∈{1,2,…,k- 1,k+1,…,N}.

    Let s be the state of the adaptor AC,Mafter performing the backward traceσC,Mand it is called the source reconfiguration state where the instance under the adaptor AC,Mneeds to be migrated to the new adaptor AC',M'due to service evolution.For the traceσC,M,assumeσC',M'is the backward trace of the adaptor AC',M'satisfyingDefinition 9.Let s'be the state of the adaptor AC',M'after perform ing the backward traceσC',M',and it is exactly the target reconfiguration state from which the instance will resume under the new adaptor AC',M'.

    Therefore,based onDefinition 9,we can not only determine if the instance under the old adaptor ismigratable or not for a given source reconfiguration state where the evolution occurs,but also define the corresponding target reconfiguration state ifmigratable.

    The backward traceσC',M'satisfyingDefinition 9can alsobe used for initializingservice c'k.As the actions of the services are disjoint,gives us the trace for initializing the service c'k.

    Definition9establishes the conditions for the adaptor AC',M'being the backward trace compliance to the adaptor AC,MgivenσC,M.However,it does not give us how to find the backward traceσC',M'that satisfies the conditions ofDefinition 9.

    The algorithm below gives us a way to compute the backward traceσC',M'for the new adaptor AC',M'that fulfills the conditions ofDefinition9.

    Algorithm1The algorithm for computing the backward trace σC',M'that fulfills the conditions ofDefinition9.

    Input:the new service c'k=(S'k,L'k,T'k,I'k,F(xiàn)'k),the new adaptor AC',M'=(S',L',T',I',F(xiàn)')and the backward traceσC,Mof the old adaptor AC,Mperformed by the instance.

    Output:the backward traceσC',M'.

    while(?σi∈BTr∶σi≠ε)do

    σC',M'=

    elseif(then

    σc',m'=

    else

    return(ε);

    endif

    endwhile

    return(σC',M').

    According toDefinition9,the backward traceσC',M'to be computed is the interleaving of the backward traces in BTr already performed by services in the set C∩C'under the old adaptor AC,Mand the backward trace of the new service c'k.Hence,the algorithm tries to make new adaptor AC',M'advance w ith the complementary actionfrom a certain traceσin BTrj(initiallyw ith its first action l1.If this is not possible,it checks if an complementary action in L'kcan make the adaptor AC',M'advance.If neither of the two conditions above holds,the algorithm returns an empty traceεwhich indicates the backward trace that fulfills the conditions ofDefinition9does not exist.The algorithm stops when all traces in BTr are empty(success)and it returns the backward traceσC',M'.According to the conditions of the if statement,the time complexity of the while loop body is O (N).Supposing that the transition numbers of the traceσC,Mis |T|,we can conclude that the execution times of thewhile loop body is|T|.Hence the time complexity ofAlgorithm1is deduced to be O(N|T|).

    Backward trace compliance focuses on the backward trace (also called history)of the instance.In such a way,the services not involved in the evolution are able to continue working on from their current states.However,backward trace compliance says nothing about forward trace(also called future)of the instance to bemigrated.Therefore,wewill deals w ith the future actions of an instance by introducing the notion of forward trace compliance.

    The notion of forward trace compliance refers to the ability for all the services unchanged to continue interacting under the new adaptor as itwould have done under the old version of the adaptor.

    Let us consider again the serviceswhich remain unchanged after evolution(i.e.,services in the setof C∩C').Unlike the notion of backward trace compliance presented above,the future actions which can be performed by these services are focused on.

    Again,we assume that the sequence of actions an instance has been performed under the old adaptor AC,Mis the backward traceσC,M.In order to determine if the adaptor AC',M'is the forward trace compliance to the adaptor AC,Mgiven the trace σC,M,we shall check if any possible forward trace that continuesσC,Mis possible in the forward traces of the adaptor AC',M',by hiding the traces over actions performed by the services ckand c'k,where services ckand c'kare the original and new versions of the service involved in the evolution.Let us formalize the notion of forward trace compliance by the follow ing definition.

    Definition10(Forwardtracecompliance)LetσC,Mbe a backward trace executed by an instance under the old adaptor AC,M.The adaptor AC',M'is the forward trace compliance to the adaptor AC,MgivenσC,Miff there exists a backward traceσC',M'in the traces of the adaptor AC',M'such that?∈ FTr(AC,M):?∈FTr(AC',M'):= EN(σC,M))∧(ST(=EN(σC',M'))∧(Lk=,where L and L'are the sets of actions for serviceskkckand c'k,respectively.

    Based onDefinition10,the target reconfiguration state under the notion of forward trace compliance can also be decided.Assume there exists a traceσC',M'which satisfies the conditions ofDefinition10.Let s be the state of the adaptor AC,Mafter performingσC,Mand s'the state of the adaptor AC',M'after performingσC',M'.This state s'is the target reconfiguration state to which the instance is allowed to reconfigure from the source reconfiguration state s.

    Similar to the case under the notion of the backward trace compliance,the tracecan be used for initializing the new service c'k.

    These two kinds of reconfiguration compliance are important in managing the adaptor reconfiguration.Backward trace compliance is required if we need the past interaction of the instance under the old adaptor to be a valid interaction under the new adaptor to which it is migrated,while forward trace compliance is necessary in order to guarantee the future interaction of the instance under the old adaptor to be valid in the context of the new version of the adaptor.

    Definition11(Correctreconfiguration)The reconfiguration from adaptor AC,Mto adaptor AC',M'is correct given the backward trace executed by an instance under the old adaptor AC,Miff there exists a backward traceσC',M'in the traces of the adaptor AC',M'satisfying the two notions of reconfiguration compliance,i.e.,the backward trace compliance inDefinition9 and the forward trace compliance inDefinition10.

    Therefore,in order to check the reconfiguration from adaptor AC,Mto adaptor AC',M'is correct,we need first find whether there is a backward traceσC',M'of adaptor AC',M'making the condition ofDefinition9hold.In that case,wewill then check if that trace also satisfies the condition ofDefinition 10.If some reconfiguration scenario is incorrect for a given source state,we will rollback or resume the execution of the instance into a state from which it can be correctly reconfigured.

    3 Case Study

    This section presents an online shopping case study to illustrate the proposed approach.There are three services: Client service(w ritten S1),Store_A service(w ritten S2),andStore_B service(w ritten S3).The Client service plays the role of buyer while the two services Store_A and Store_B play the role of seller.

    The Client service can buy goods and query the order as shown in Fig.1(a).The two services Store_A and Store_B are depicted in Figs.1(b)and(c),respectively.Store_A can only sell goods,while Store_B can sell goods and provide order query.

    Fig.1 Services in the online shopping example

    Initially,the Client service interactswith Store_A service.During the period that a client service interacts with Store_A service,Store_A service evolves into Store_B service.Several changes take place in the new service Store_B.For instance,operations query and qresult are added and operations login and logout are renamed in the signature of Store_B service.Possible modifications of the behavior aremore important.For instance,the addition of several interactions(three new successive transitions(s3,?query,s4),(s4,!qresult,s5),(s5,? logout,s6))are modifications of pieces of behavior in the model of Store_B service.

    Let C be the setof services composed of Client service and Store_A service,and C'be the set of services composed of Client service and Store_B service.Themessagemapping M for the services in C is as follows:!id→?user,!pwd→? passwd.

    The message mapping M'for the services in C'is as follows:!id→?login,!pwd→?passwd and!disconnect→?logout.By utilizing the existing adaptation approaches,the adaptor AC,Mfor the services in C and the adaptor AC',M'for the services in C'are automatically generated respectively based on themessagemappings M and M',(see adaptors AC,Mand AC',M'in Figs.2(a)and(b)).

    For instance,let us suppose that the backward trace performed so far by an instance under the adaptor AC,Mis:σC,M=?S1.id!S2.user?S1.pwd!S2.passwd.

    Hence,the trace performed by the Client service is:=!S1.id!S1.pwd.

    In order to keep the Client service unaware of the reconfiguration,itmustnotabort its ongoing execution.Only if the traceis valid in the new adaptor AC',M',Client service could continue its execution as if it has been interacting with Store_B service from the very beginning.

    Fig.2 Adaptors AC,Mand AC',M'in the onlineshopping example

    Using the proposedAlgorithm 1,the traceσC',M'=?S1.id!S3.login?S1.pwd can be obtained.

    According to the traceσC',M',the formulaS1.id!S1.pwd holds and this indicates the traceperformed by the Client service is valid in the new adaptor AC',M'.The traceσC',M'makes the new adaptor AC',M'be backward trace compliance to the original adaptor AC,MgivenσC,Mbased onDefinition 9.

    In the follow ing,we will check if that traceσC',M'also satisfies the conditions ofDefinition 10.

    The forward traces continuing the backward traceσC,Mare:

    and

    So we can decide that the reconfiguration from adaptor AC,Mto adaptor AC',M'is correct given the backward traceσC,Min the example.Furthermore,for the source reconfiguration state s5in the adaptor AC,M,the target reconfiguration state is s4which is the state of the adaptor AC',M'after performingσC',M'.

    4 Conclusions

    This paper has presented a novel approach that supports adaptor reconfiguration when services in the composition have evolved due to changes in business needs.Firstly,formal models that describe services and the adaptor are presented.Then,with this framework,the notion of backward trace compliance and the notion of forward trace compliance are proposed respectively.The former focuses on the history actions of the instance,while the latter deals with the future actions of an instance.Based on the two notions of reconfiguration compliance,the algorithm is given to decide if the reconfiguration scenario that allow the running instancem igrate from the former adaptor-based service composition to the new one is correct.If it is correct for a given source reconfiguration state,it also defines the target reconfiguration state from which the instance will resume.

    The reconfiguration problem presented in this paper assumes the adaptor is a centralized one.So in the future,we will plan to deal with the reconfiguration problem when the adaptor is distributed across different locations in a distributed setting.Moreover,in the case where a service is evolved into a more restricted functionality one,preserving certain temporal properties may be sufficient for the reconfiguration of the adaptor.Hence,the approach to deal with these situations will be another perspective of our future work.

    [1]Wei Y,Blake M B.Service-Oriented Computing and Cloud Computing:Challenges and Opportunities[J].IEEE Internet Computing,2010,14(6):72-75.

    [2]Li X T,F(xiàn)an Y S,Sheng Q Z,et al.A Petri Net Approach to Analyzing Behavioral Compatibility and Sim ilarity ofWeb Service[J].IEEE Transactions on Systems,Man,and Cybernetics—Part A:Systems and Humans,2011,41(3):510-521.

    [3]Durána F,OuederniM,Salaün G.A Generic Framework for nprotocol Compatibility Checking[J].Science of Computer Programming,2012,77(7/8):870-886.

    [4]Eslam ichalandar M,Barkaoui K,Motahari-Nezhad H R.Service Composition Adaptation:an Overview[C].Proceedings of the 2nd InternationalWorkshop on Advanced Information Systems for Enterprises(IWAISE'12),Constantine,Algeria,2012:20-27.

    [5]Kumar A,Shan Z.Algorithms Based on Pattern Analysis for Verification and Adapter Creation for Business Process Composition[J].Lecture Notes in Computer Science,2008,5331:120-138.

    [6]Benatallah B,Casati F,Grigori D,et al.Developing Adapters forWeb Services Integration[C].Proceedings of the International Conference on Advanced Information Systems Engineering (CAiSE'05),Porto,Portugal,2005:415-429.

    [7]Motahari-Nezhad H R,Benatallah B,Martens A,et al.Semiautomated Adaptation of Service Interactions[C].Proceedings of the 16th International Conference on World W ide Web(WWW '07),Banff,Canada,2007:993-1002.

    [8]Andrikopoulos V,Benbernou S,Papazoglou M P.Managing the Evolution of Service Specifications[C].Proceedings of the 20th International Conference Advanced Information Systems Engineering(CAiSE'08),Montpellier,F(xiàn)rance,2008:359-374.

    [9]Wang Y.A Survey of Change Management in Service-Based Environments[J].Service Oriented Computing and Applications,2013,7(4):259-273.

    [10]La H J,Kim S D.Static and Dynam ic Adaptations for Service-Based Systems[J].Information and Software Technology,2011,53(12):1275-1296.

    [11]Kongdenfha W,Motahari-Nezhad H R,Benatallah B,et al.M ismatch Patterns and Adaptation Aspects:a Foundation for Rapid Development of Web Service Adapter[J].IEEE Transactions on Services Computing,2009,2(2):94-107.

    [12]Taher Y,Ait-Bachir A,F(xiàn)auvet M C,et al.Diagnosing Incompatibilities in Web Service Interactions for Automatic Generation of Adapters[C].Proceedings of the 23rd International Conference on Advanced Networking and Applications (AINA'09),Bradford,UK,2009:652-659.

    [13]Wang K,Dumas M,Ouyang C,et al.The Service Adaptation Machine[C].Proceedings of the 6th European Conference on Web Services(ECOWS'08),Dublin,Ireland,2008:145-154.

    [14]Poizat P,Salaün G,Tivoli M.On Dynam ic Reconfiguration of Behavioural Adaptation[C].Proceedings of the3rd International Workshop on Coordination and Adaptation Techniques for Software Entities(WCAT'06),Nantes,F(xiàn)rance,2006:61-69.

    [15]Poizat P,Salaün G,TivoliM.An Adaptation-Based Approach to Incrementally Build Component Systems[J].Electronic Notes in Theoretical Computer Science(ENTCS)Series,2007,182:39-55.

    [16]Cámara J,Salaün G,Canal C,etal.Interactive Specification and Verification of Behavioral Adaptation Contracts[J].Information and Software Technology,2012,54(7):701-723.

    [17]Cámara J,Martín JA,Salaün G,etal.A Case Study in Model-Based Adaptation of Web Services[C].Proceedings of the 4th International Symposium on Leveraging Applications (ISoLA'10),Heraklion,Greece,2010:112-126.

    [18]Mateescu R,Poizat P,Salaün G.Adaptation of Service Protocols Using Process Algebra and On-the-Fly Reduction Techniques[J].IEEE Transactions Software Engineering,2012,38(4):755-777.

    [19]van der Aalst W M P,Basten T.Inheritance of Workflows:an Approach to Tackling Problems Related to Change[J].Theoretical Computer Science,2002,270(1):125-203.

    [20]van der AalstW M P.Exterm inating the Dynam ic Change Bug:a Concrete Approach to SupportWorkflow Change[J].Information Systems Frontiers,2001,3(3):297-317.

    [21]Qiao X Q,Chen W,Wei J.Implementing Dynamic Management for Mediated Service Interactions[C].Proceedings of the 9th International Conference on Services Computing(SCC'12),Hawaii,USA,2012:234-241.

    TP311

    A

    1672-5220(2015)04-0648-06

    date:2014-02-13

    s:National Natural Science Foundationsof China(Nos.61272083,61262002,61170043);China Postdoctoral Science Foundation (Nos.20110491411,2014M 562177);The Science Foundations of Nanjing Institute of Technology,China(Nos.QKJB201304,YKJ201420)

    *Correspondence should be addressed to FAN Da-juan,E-mail:fanbingjie523@126.com

    猜你喜歡
    馬俊
    Coercivity mechanism of La–Nd–Fe–B lms with Y spacer layer
    情牽桑梓報(bào)鄉(xiāng)鄰
    一條寵物狗引發(fā)婚姻悲劇
    金秋(2021年22期)2021-12-02 03:26:33
    兩人一鬼
    江南(2021年2期)2021-03-15 05:59:55
    空巢之家尷尬離婚事:我的情敵是一條狗
    分手多情
    測 量
    長江叢刊(2018年16期)2018-11-14 19:04:05
    魚肚中的U盤
    Multiscale Modeling of Collagen Fibril in Bone at Various Crosslink Densities:An Insight into Its Deformation Mechanisms
    填字游戲
    联通29元200g的流量卡| 你懂的网址亚洲精品在线观看 | 成人毛片60女人毛片免费| 国产精品.久久久| 网址你懂的国产日韩在线| 国产黄片美女视频| 久久精品人妻少妇| 丰满的人妻完整版| 噜噜噜噜噜久久久久久91| 免费看美女性在线毛片视频| 国产精华一区二区三区| 婷婷色av中文字幕| 亚洲欧美日韩高清在线视频| 熟妇人妻久久中文字幕3abv| 不卡一级毛片| 男女做爰动态图高潮gif福利片| 黑人高潮一二区| 亚洲精品国产成人久久av| 高清午夜精品一区二区三区 | 亚洲乱码一区二区免费版| 蜜臀久久99精品久久宅男| eeuss影院久久| 亚洲一级一片aⅴ在线观看| 成年女人永久免费观看视频| 亚洲婷婷狠狠爱综合网| 久久99热6这里只有精品| 欧美丝袜亚洲另类| 日本三级黄在线观看| 18禁裸乳无遮挡免费网站照片| 午夜福利视频1000在线观看| 啦啦啦啦在线视频资源| 一边摸一边抽搐一进一小说| 亚洲成人久久爱视频| 国产成人影院久久av| 狂野欧美白嫩少妇大欣赏| 嘟嘟电影网在线观看| 精品久久久久久久久久久久久| 欧美最黄视频在线播放免费| 免费人成在线观看视频色| 欧美+日韩+精品| 久久精品国产亚洲av涩爱 | 蜜桃久久精品国产亚洲av| 看片在线看免费视频| 成年版毛片免费区| 国内少妇人妻偷人精品xxx网站| 国产在视频线在精品| 一级毛片aaaaaa免费看小| 亚洲av不卡在线观看| 国产久久久一区二区三区| 国产精品野战在线观看| 国产精品国产高清国产av| 永久网站在线| avwww免费| 麻豆国产97在线/欧美| 国产高清不卡午夜福利| 好男人在线观看高清免费视频| 91久久精品国产一区二区成人| 男女啪啪激烈高潮av片| 精品一区二区三区人妻视频| 国内久久婷婷六月综合欲色啪| 日韩 亚洲 欧美在线| 久久欧美精品欧美久久欧美| 高清毛片免费观看视频网站| 免费观看在线日韩| 99精品在免费线老司机午夜| 午夜福利成人在线免费观看| 国产高清视频在线观看网站| 美女黄网站色视频| 在线观看一区二区三区| 波多野结衣高清无吗| 91久久精品电影网| 精品熟女少妇av免费看| 国产精品人妻久久久久久| 国产色婷婷99| 又爽又黄a免费视频| 国产精品久久久久久av不卡| 亚洲久久久久久中文字幕| 国产精品野战在线观看| 国产极品精品免费视频能看的| 日韩欧美精品v在线| 变态另类丝袜制服| 一个人免费在线观看电影| 禁无遮挡网站| 国产v大片淫在线免费观看| av专区在线播放| 国产成人freesex在线| 成年女人看的毛片在线观看| 黄片无遮挡物在线观看| 高清日韩中文字幕在线| 乱人视频在线观看| 99久久精品国产国产毛片| 色视频www国产| 又爽又黄a免费视频| 久久久久国产网址| 此物有八面人人有两片| 99久久精品热视频| 欧美一区二区亚洲| 热99re8久久精品国产| 国产色爽女视频免费观看| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲成人久久性| 亚洲av男天堂| 免费搜索国产男女视频| 一级黄片播放器| 国产高清三级在线| 国产老妇女一区| 黄片无遮挡物在线观看| 综合色av麻豆| 午夜激情福利司机影院| 日韩大尺度精品在线看网址| 色哟哟哟哟哟哟| 草草在线视频免费看| 少妇裸体淫交视频免费看高清| 亚洲国产色片| 国产久久久一区二区三区| 国产免费男女视频| 久久欧美精品欧美久久欧美| a级毛片a级免费在线| 欧美日韩乱码在线| 如何舔出高潮| 久久精品国产99精品国产亚洲性色| 天堂av国产一区二区熟女人妻| 亚洲欧美精品自产自拍| 亚洲av.av天堂| 少妇猛男粗大的猛烈进出视频 | 欧美xxxx黑人xx丫x性爽| 久久久精品94久久精品| 99riav亚洲国产免费| 99热这里只有精品一区| 久久久精品大字幕| 国产精品1区2区在线观看.| 国产精品无大码| 哪里可以看免费的av片| 亚洲欧美中文字幕日韩二区| 国产精品人妻久久久久久| 亚洲成人久久性| 黑人高潮一二区| 中国美女看黄片| 麻豆乱淫一区二区| 午夜视频国产福利| 国产高潮美女av| 久久99热这里只有精品18| 国产一区二区激情短视频| 亚洲欧美清纯卡通| 日韩欧美国产在线观看| 小说图片视频综合网站| 爱豆传媒免费全集在线观看| 美女内射精品一级片tv| 老司机福利观看| 国产伦理片在线播放av一区 | 久久精品影院6| 日韩高清综合在线| 高清毛片免费观看视频网站| 成人一区二区视频在线观看| 日韩欧美 国产精品| 久久中文看片网| 欧美xxxx黑人xx丫x性爽| 99热这里只有精品一区| 看十八女毛片水多多多| 久久久成人免费电影| av视频在线观看入口| 日日摸夜夜添夜夜添av毛片| 亚洲自拍偷在线| 免费观看人在逋| 狂野欧美白嫩少妇大欣赏| a级一级毛片免费在线观看| 欧美精品一区二区大全| 成人漫画全彩无遮挡| 成人av在线播放网站| 在线播放国产精品三级| 国产黄片美女视频| 一区福利在线观看| 99riav亚洲国产免费| 中文在线观看免费www的网站| 亚洲中文字幕一区二区三区有码在线看| 美女黄网站色视频| 国产精品久久久久久精品电影小说 | 赤兔流量卡办理| 天堂av国产一区二区熟女人妻| 日本免费一区二区三区高清不卡| 免费观看a级毛片全部| 中国国产av一级| 有码 亚洲区| 在线免费十八禁| 国产视频内射| 亚洲无线观看免费| 久久欧美精品欧美久久欧美| 99国产精品一区二区蜜桃av| 99久久人妻综合| 久久久久国产网址| 在线观看一区二区三区| 亚洲欧美清纯卡通| 国产精品野战在线观看| 中文欧美无线码| 观看美女的网站| 女的被弄到高潮叫床怎么办| 亚洲人成网站在线观看播放| 国产真实伦视频高清在线观看| 精品免费久久久久久久清纯| 亚洲第一电影网av| 一级黄色大片毛片| 爱豆传媒免费全集在线观看| 成人av在线播放网站| 成人一区二区视频在线观看| av天堂在线播放| 国产精品精品国产色婷婷| 国产精品一二三区在线看| 免费看av在线观看网站| 成人亚洲欧美一区二区av| 免费av毛片视频| 亚洲国产欧美人成| 国产真实乱freesex| 精品无人区乱码1区二区| 午夜精品国产一区二区电影 | 成人性生交大片免费视频hd| 看片在线看免费视频| 男人舔奶头视频| av在线天堂中文字幕| 精品无人区乱码1区二区| 亚洲精华国产精华液的使用体验 | 成人国产麻豆网| 一区二区三区四区激情视频 | 91aial.com中文字幕在线观看| 一级二级三级毛片免费看| 国产黄色视频一区二区在线观看 | 99在线人妻在线中文字幕| 可以在线观看的亚洲视频| 亚洲人成网站在线观看播放| 亚洲激情五月婷婷啪啪| 99九九线精品视频在线观看视频| 18禁在线播放成人免费| 久久久久性生活片| 国内精品一区二区在线观看| 国产成人午夜福利电影在线观看| 男人舔奶头视频| 99热只有精品国产| 99热这里只有是精品在线观看| 久久久久免费精品人妻一区二区| 美女大奶头视频| 亚洲婷婷狠狠爱综合网| 免费一级毛片在线播放高清视频| 变态另类成人亚洲欧美熟女| 日韩制服骚丝袜av| 亚洲国产精品成人久久小说 | 伦精品一区二区三区| 国产精品福利在线免费观看| 69av精品久久久久久| 蜜桃久久精品国产亚洲av| 欧美区成人在线视频| 中文精品一卡2卡3卡4更新| 最近2019中文字幕mv第一页| 久久久久久久久久成人| av免费在线看不卡| 欧美xxxx性猛交bbbb| 青春草视频在线免费观看| 大型黄色视频在线免费观看| 欧美一区二区亚洲| 亚洲久久久久久中文字幕| 国产精品一区二区在线观看99 | 国产精品久久久久久av不卡| 老女人水多毛片| 99久久久亚洲精品蜜臀av| 哪里可以看免费的av片| 久99久视频精品免费| 日韩大尺度精品在线看网址| 国产乱人视频| 校园人妻丝袜中文字幕| 国产在视频线在精品| 天堂中文最新版在线下载 | 日韩制服骚丝袜av| 日本欧美国产在线视频| 国产伦一二天堂av在线观看| 美女国产视频在线观看| 国产极品天堂在线| 少妇猛男粗大的猛烈进出视频 | 性欧美人与动物交配| 少妇熟女aⅴ在线视频| 热99在线观看视频| 好男人在线观看高清免费视频| 在线国产一区二区在线| 久久99蜜桃精品久久| 一个人观看的视频www高清免费观看| 国产在视频线在精品| 麻豆久久精品国产亚洲av| 日韩欧美 国产精品| 在线免费观看的www视频| 1024手机看黄色片| 亚洲精品影视一区二区三区av| 国产v大片淫在线免费观看| 69av精品久久久久久| 免费av毛片视频| 欧美日韩精品成人综合77777| 亚洲欧美日韩卡通动漫| 午夜精品一区二区三区免费看| 亚洲精品日韩在线中文字幕 | 久久精品国产亚洲av天美| 日本黄色视频三级网站网址| 国产精品精品国产色婷婷| 亚洲国产精品国产精品| 蜜臀久久99精品久久宅男| 午夜福利在线观看吧| 可以在线观看毛片的网站| 免费看a级黄色片| 嫩草影院入口| 天堂网av新在线| 欧美日韩国产亚洲二区| 我的女老师完整版在线观看| 国产高清有码在线观看视频| 啦啦啦观看免费观看视频高清| 你懂的网址亚洲精品在线观看 | 韩国av在线不卡| 联通29元200g的流量卡| 成人三级黄色视频| 男人的好看免费观看在线视频| 欧美潮喷喷水| 精品人妻视频免费看| 好男人视频免费观看在线| 国产乱人偷精品视频| 高清午夜精品一区二区三区 | 黄色视频,在线免费观看| 精品99又大又爽又粗少妇毛片| 夫妻性生交免费视频一级片| a级毛片免费高清观看在线播放| 激情 狠狠 欧美| 国产淫片久久久久久久久| 免费av观看视频| 免费电影在线观看免费观看| 欧美丝袜亚洲另类| 变态另类成人亚洲欧美熟女| 99九九线精品视频在线观看视频| 小蜜桃在线观看免费完整版高清| 国产精品久久久久久精品电影| 三级毛片av免费| 国产老妇伦熟女老妇高清| 少妇熟女aⅴ在线视频| 永久网站在线| 69人妻影院| 亚洲久久久久久中文字幕| 亚洲精品乱码久久久久久按摩| 天美传媒精品一区二区| 国产在线男女| 搡女人真爽免费视频火全软件| 在现免费观看毛片| 美女高潮的动态| 精品久久久久久久人妻蜜臀av| av在线观看视频网站免费| 18禁在线无遮挡免费观看视频| 久久久久久久亚洲中文字幕| 欧美日韩在线观看h| 午夜免费激情av| 国产伦精品一区二区三区四那| 色噜噜av男人的天堂激情| 可以在线观看的亚洲视频| 老熟妇乱子伦视频在线观看| 色综合站精品国产| 亚洲不卡免费看| 一区二区三区高清视频在线| 免费人成视频x8x8入口观看| 看黄色毛片网站| 国产高清激情床上av| 欧美xxxx性猛交bbbb| 搞女人的毛片| 亚洲国产精品成人综合色| 99久久精品一区二区三区| 久久人人爽人人爽人人片va| 国产精品麻豆人妻色哟哟久久 | 99久久精品一区二区三区| 哪里可以看免费的av片| 国产av一区在线观看免费| 精品一区二区免费观看| 99久久成人亚洲精品观看| 国产精品福利在线免费观看| 亚洲成人久久爱视频| 国产乱人视频| 老司机影院成人| 永久网站在线| 毛片一级片免费看久久久久| 国产精品.久久久| 国国产精品蜜臀av免费| 在线国产一区二区在线| 伦理电影大哥的女人| 97在线视频观看| 好男人在线观看高清免费视频| 国产午夜精品论理片| 久久精品国产清高在天天线| 91精品国产九色| 亚洲经典国产精华液单| 免费看美女性在线毛片视频| 成人综合一区亚洲| 五月伊人婷婷丁香| 久久人人爽人人片av| 精品99又大又爽又粗少妇毛片| 国内少妇人妻偷人精品xxx网站| 不卡一级毛片| 偷拍熟女少妇极品色| 国产中年淑女户外野战色| 亚洲av电影不卡..在线观看| 欧美成人精品欧美一级黄| 久久精品国产亚洲av天美| 99视频精品全部免费 在线| 日日撸夜夜添| 好男人视频免费观看在线| 秋霞在线观看毛片| 久久草成人影院| 亚洲国产欧洲综合997久久,| 免费av毛片视频| 性色avwww在线观看| 国产日韩欧美在线精品| 久久99热6这里只有精品| 97超碰精品成人国产| 波多野结衣高清无吗| 在线观看美女被高潮喷水网站| 久久韩国三级中文字幕| 成人无遮挡网站| 99国产精品一区二区蜜桃av| 成人亚洲精品av一区二区| 欧美人与善性xxx| 久久人人精品亚洲av| 婷婷六月久久综合丁香| av在线播放精品| 精品日产1卡2卡| 日韩欧美国产在线观看| 欧美三级亚洲精品| 亚洲精品国产成人久久av| 免费看av在线观看网站| 18+在线观看网站| 国产精品人妻久久久影院| 成人亚洲精品av一区二区| 午夜福利在线在线| 亚洲va在线va天堂va国产| 精品少妇黑人巨大在线播放 | 在线播放国产精品三级| 亚洲真实伦在线观看| 一本一本综合久久| 欧美日韩综合久久久久久| 黄色视频,在线免费观看| 成人一区二区视频在线观看| 少妇被粗大猛烈的视频| 成年免费大片在线观看| 在线观看免费视频日本深夜| 欧美在线一区亚洲| 伦精品一区二区三区| 国产男人的电影天堂91| 久久精品国产鲁丝片午夜精品| 欧美+亚洲+日韩+国产| 一本久久精品| 国产精品1区2区在线观看.| av卡一久久| 国产亚洲精品久久久com| 一级黄色大片毛片| 欧美激情在线99| 国产成人一区二区在线| 日本黄色视频三级网站网址| 能在线免费看毛片的网站| 国产激情偷乱视频一区二区| 亚洲欧洲日产国产| 亚洲人成网站高清观看| 国产一级毛片七仙女欲春2| 波多野结衣高清作品| 狂野欧美激情性xxxx在线观看| 国内久久婷婷六月综合欲色啪| 五月伊人婷婷丁香| 亚洲aⅴ乱码一区二区在线播放| 国产精品乱码一区二三区的特点| 一级毛片久久久久久久久女| 国产亚洲精品久久久com| 亚洲人成网站高清观看| 久久久久久伊人网av| 亚洲va在线va天堂va国产| 日本熟妇午夜| 听说在线观看完整版免费高清| 天堂av国产一区二区熟女人妻| 欧美精品国产亚洲| 久久人妻av系列| 亚洲欧洲国产日韩| 午夜福利在线观看吧| 亚洲在线自拍视频| 久久99热这里只有精品18| 色视频www国产| 特级一级黄色大片| 免费大片18禁| 啦啦啦啦在线视频资源| 亚洲欧美日韩无卡精品| 麻豆乱淫一区二区| 12—13女人毛片做爰片一| 欧美色视频一区免费| 可以在线观看毛片的网站| 中文精品一卡2卡3卡4更新| 99热6这里只有精品| 午夜福利在线在线| 日本三级黄在线观看| 神马国产精品三级电影在线观看| 蜜桃亚洲精品一区二区三区| 久久国产乱子免费精品| 国产 一区 欧美 日韩| 淫秽高清视频在线观看| 国产亚洲精品av在线| 亚洲五月天丁香| 一进一出抽搐gif免费好疼| 人妻少妇偷人精品九色| 精品久久久久久久久亚洲| 国产又黄又爽又无遮挡在线| 久久人人爽人人爽人人片va| 不卡视频在线观看欧美| 免费观看的影片在线观看| av在线蜜桃| 国产精品伦人一区二区| 黄片无遮挡物在线观看| av在线老鸭窝| 乱人视频在线观看| 尾随美女入室| 中国美女看黄片| 日韩精品青青久久久久久| 少妇人妻精品综合一区二区 | 亚洲综合色惰| 国产伦精品一区二区三区四那| 一区二区三区四区激情视频 | 午夜免费激情av| 蜜臀久久99精品久久宅男| 久久精品夜色国产| 久久亚洲精品不卡| 波多野结衣巨乳人妻| 中国国产av一级| 国产老妇女一区| 韩国av在线不卡| 日韩欧美精品v在线| av在线老鸭窝| 观看美女的网站| 亚洲国产精品合色在线| 男人和女人高潮做爰伦理| 深夜a级毛片| 精品99又大又爽又粗少妇毛片| 99在线人妻在线中文字幕| 黄色配什么色好看| 成人无遮挡网站| 久久99精品国语久久久| 久久人妻av系列| 男女边吃奶边做爰视频| 亚洲av二区三区四区| 人妻少妇偷人精品九色| 2022亚洲国产成人精品| 国产大屁股一区二区在线视频| 欧美性猛交╳xxx乱大交人| 黄色一级大片看看| 一区二区三区免费毛片| 欧美三级亚洲精品| 麻豆精品久久久久久蜜桃| 日韩中字成人| 人妻久久中文字幕网| 国产一区二区在线av高清观看| 国产精品.久久久| 99riav亚洲国产免费| 日本与韩国留学比较| 99热这里只有是精品50| 国国产精品蜜臀av免费| 国产高清不卡午夜福利| 国产亚洲欧美98| 韩国av在线不卡| 日韩欧美一区二区三区在线观看| 大又大粗又爽又黄少妇毛片口| 日本爱情动作片www.在线观看| 美女脱内裤让男人舔精品视频 | av在线亚洲专区| 国产黄片视频在线免费观看| 男的添女的下面高潮视频| 亚洲不卡免费看| 日韩三级伦理在线观看| 国内精品一区二区在线观看| 日韩 亚洲 欧美在线| av天堂在线播放| 日本一本二区三区精品| av视频在线观看入口| 成人欧美大片| 国产成人a∨麻豆精品| 亚洲精品日韩在线中文字幕 | 黄片无遮挡物在线观看| 日韩视频在线欧美| 亚洲精品国产成人久久av| 熟女电影av网| 极品教师在线视频| 男人舔奶头视频| 又爽又黄无遮挡网站| 国产三级在线视频| 亚洲图色成人| 欧美日韩精品成人综合77777| 免费黄网站久久成人精品| 日韩制服骚丝袜av| 桃色一区二区三区在线观看| 久久精品国产亚洲av香蕉五月| 看非洲黑人一级黄片| 欧美丝袜亚洲另类| 91麻豆精品激情在线观看国产| 午夜精品国产一区二区电影 | 中文字幕熟女人妻在线| 一级黄色大片毛片| 亚洲精品456在线播放app| 久久99精品国语久久久| 国产在线精品亚洲第一网站| 欧美激情在线99| 亚洲国产精品合色在线| 最近手机中文字幕大全| 色噜噜av男人的天堂激情| 小蜜桃在线观看免费完整版高清| av视频在线观看入口| 欧美又色又爽又黄视频| 国产成人精品一,二区 | 久久久久久久久久成人| 欧美色视频一区免费| 欧美日本亚洲视频在线播放| 成人一区二区视频在线观看| a级毛片a级免费在线| 日韩国内少妇激情av| 久99久视频精品免费| 99久久九九国产精品国产免费| a级毛色黄片|