• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Adaptor Reconfiguration Analysis in Web Services Composition

    2015-08-07 10:54:14FANDajuan范大娟HUANGZhiqiu黃志球XIAOFangxiong肖芳雄PENGHuanfeng彭煥峰
    關(guān)鍵詞:馬俊

    FAN Da-juan(范大娟),HUANG Zhi-qiu(黃志球),XIAO Fang-xiong(肖芳雄),PENG Huan-feng(彭煥峰)1,

    1 School of Computer Engineering,Nanjing Institue of Technology,Nanjing 211167,China

    2 College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China

    3 School of Software Engineering,Southern China University of Technology,Guangzhou 510006,China

    Adaptor Reconfiguration Analysis in Web Services Composition

    FAN Da-juan(范大娟)1,2*,HUANG Zhi-qiu(黃志球)2,XIAO Fang-xiong(肖芳雄)3,PENG Huan-feng(彭煥峰)1,2

    1 School of Computer Engineering,Nanjing Institue of Technology,Nanjing 211167,China

    2 College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China

    3 School of Software Engineering,Southern China University of Technology,Guangzhou 510006,China

    Most of the existing approaches focus on identifying m ismatches and synthesizing adaptors at design-time or recently at run-time.However,few works have been proposed to support adaptor reconfiguration when services in the composition evolve due to changes in business needs.To address the deficiencies,the problem of adaptor reconfiguration is targeted in the context of service composition.Firstly,the formal models for describing services and adaptors are presented.Then,under this formalization,the notion of reconfiguration com pliance is proposed to determ ine the validity of an adaptor instance with respect to its history executions and future executions.Based on the notion,the algorithm for reconfiguration analysis of adaptors is presented and it can be used for determ ining them igratability of an adaptor instance and the corresponding target state of reconfiguration if m igratable.Finally,feasibility of the proposed approach is validated on a realistic case study.The proposed approach im proves the flexibility of adaptor-based service composition by equipping adaptors with reconfiguration capabilities.

    web services;adaptor;reconfiguration;trace compliance

    Introduction

    In service-oriented architectures[1],Web services are loosely coupled and black-box software components that are published,discovered,and invoked across theweb through their interfaces.The composition of Web services wiring together multiple Web services often fails because services developed by different third-parties are offered through incompatible interfaces,including both signature and behavioral interfaces[2-3].The typical approach to resolve incompatibilities in such a heterogeneous setting is through developing adaptors thatmediates the interactions among services with incompatible interfaces so that interoperability at signature and behavioral levels can occur[4].A service composition with the aid of an adaptor can be called an adaptor-based service composition.

    In the last few years,mostadaptation proposals focused on solving mismatches between software components or recently Web services.In Ref.[5],the authors first defined the minimum receive distance and the m inimum send distance.Then,they proposed a m inimal adaptor construction algorithm for two incompatible services based on the two kinds of distances.Theminimaladaptor only tackled themessageswhich caused incompatibilities and could therefore effectively reduce communication overhead between incompatible services.In Ref.[6],the authors defined several adaptation templates based on BPEL codes.For each adaptation template there corresponds a m ismatch pattern input.Developers can utilize adaptation templates to generate BPEL codes of adaptors according to themismatches between twoWeb services.In Ref.[7],the authors identified m ismatches at signature and behavioral levels by using schema matching and generated a m ismatch tree to help developers in generating adaptor specification in presence of deadlock.The above approaches assume that the services to be composed have been fixed in advance and only focus on m ismatch analysis and adaptor generation at design-time.

    Due to the dynamic characteristics in Web services environments,servicesmay evolve at run-time for adapting to changes in business needs[89].Thus,several run-time adaptation approaches have recently been presented to complement the approaches for design-time adaptation[10].In Ref.[11],each mismatch pattern corresponded to an adaptation logic.The authors leveraged aspect-oriented programming paradigm and weaved the adaptation logics as adaptation aspects into the runtime service instances instead of introducing an independent adaptor.In Ref.[12],the authors also classified incompatibilities into m ismatch patterns and designed the corresponding adaptations to solve each kind of incompatibility.They relied on an event-based technology and would trigger a specific adaptation action when catching an incompatibility event.In Ref.[13],the authors proposed a runtime adaptation approach by exploring a service adaptation machine.The machine acted as an adaptor between incompatible services at runtime,by selecting and chaining mapping rules to resolve mismatches as they arised.Besides,some researchers focused on how to re-generate or re-adjust the adaptor while dynamically evolving services.In Ref.[14],they presented an example in which possible changes were successively applied and sketched some solutions to adaptor readjustment issues on this example.In Ref.[15],the authors presented the incremental adaptation supporting evolving component-based systems.The incremental integration process could be viewed as several re-generations.To do so,they proposed some techniques to deal with two cases:(1) generated an adaptor for the added component,(2)suppressed the adaptor for the removed component and upgraded all the adaptors interacting with the suppressed one.However,no solution is proposed in these approaches to equip the adaptor with reconfiguration capabilities when service evolution occurs in the running adaptor-based service composition.

    When some service evolves in the execution process of a certain adaptor-based service composition,the original adaptor will be replaced by a new one for the evolved service accordingly.Thus,automated techniques are needed in order to reconfigure adaptors without stopping their execution.The adaptors reconfiguration refers to how to determ ine whether a certain running adaptor instance ismigratable from the original adaptor-based service composition to the new one,in which both a service and the adaptor are evolved into a new service and adaptor.To address the deficiencies,in this paper the adaptor reconfiguration problem is targeted in the context of a service composition involving incompatible services for which an adaptor is executed.Firstly,formal models that describe services and the adaptor are presented.Then,with thisframework the notion of reconfiguration compliance(combining the notion of backward trace compliance and the notion of forward trace compliance)is proposed and then utilized to decide if the reconfiguration scenario that allows the running adaptor instancemigrates from the former adaptor-based service composition to the new one is correct.The proposed approach equips adaptors with reconfiguration capabilities to ensure the flexibility of adaptor-based service composition at run-time.

    1 Prelim inaries

    1.1 Services

    Services are often described by signature and behavior interfaces.They may include non-functional(i.e.,Qos) apsect.In the paper,wemainly focus on the functional aspect of services described by signature and behavior interfaces.The signature declares both the operations that the service provides,and those it requires from other services.Each operation in WSDL specifications of services receives a message(oneway),receives and sends amessage(request-response),sends and receives amessage(solicit-response),or sends amessage (notification).Thus,a signature is often represented by a set of actions,relative to the emission and reception of messages corresponding to operation calls.Moreover,the behavior represents the order in which the operations in the signature are performed.

    A service is modeled by means of a finite state machine (FSM)model.The reason for using FSM model is that this formalism is intuitive,simple,and fairly easy to understand for users.

    Definition 1(FSM)An FSM model is a quintuple M=(S,L,T,I,F(xiàn)),where S is a setof states,L isa setof labels,T?S×L×S is a setof transitions,I∈S is the initial state,and F?S is a setof final states.The transition t=(s,l,s')can also be denoted as

    In the FSMs,transtions are labelled with operations(i.e.,actions in the set L that indicate messages to be sent or received).When amessage is sentor received by a service,the corresponding transition is fired.Actions in the FSMs represent the signature interfaces of services,and transitions in the FSMs depict the behavior interfacesof services.Thus,using the FSMs is a simple yeteffective approach tomodel service signature and behavior interfaces.

    Definition 2(Trace)Let M=(S,L,T,I,F(xiàn))be an FSM model.A trace of M is aσ∈(L*∪{ε})defined in such a way thatσ=ε∨(?s0,s1,…,sN∈S:σ=l1l2…lN∧s0whereεdenotes the empty trace.The set of traces of M is denoted as Tr(M).A traceσwhich is the concatenation of two tracesσ1andσ2isw ritten asσ=σ1σ2.Definition 3(Backward trace and forward trace)Let M be an FSM model andσa trace of M.The traceσis a backward trace of M if and only if?s0,s1,…,sN∈S,s0=I:σ=The set of backward traces of M is denoted as BTr(M).The traceσis a forward trace of M if and only if?s0,s1,…,sN∈S,sN∈F:σ=The setof forward traces of M is denoted as FTr(M).

    The traces of an FSM model are the sequences of labels that can be observed according to its transitions.Backward and forward traces are the special cases which start from its initial state and end at its final state respectively.The symbols EN(σ) and ST(σ)are used to respectively denote the stateswhich the traceσstarts from and ends at.

    Based on the above definitions,we will represent services just by FSM models that describe their signature and behavior interfaces.

    Definition 4(Service)A service can be described by an FSM model c=(S,L,T,I,F(xiàn)),where S is a setof service states,I∈S is the initial state,F(xiàn)?S is the set of final states,L?{!,is a setof service actions,and T?S×L×S is a set of transitions triggered by service actions.

    1.2 M essagemappings and adaptors

    While composing existing services,they do not always fit one another,and m ismatches arise because of differentmessage names,a message without counterpart or with several ones in the partner service,etc.The presence of mismatch results in a deadlocking execution for these incompatible services and thus needs adaptors to reconcile incompatibilites.Adaptors are often automatically generated from an abstract adaptation description[16],called message mapping,expressing the correspondences betweenmessagesand indicating how m ismatch situations can be solved.Themessagemapping is composed of a finite set ofmapping rules and eachmapping rule in itgives a correspondence between receive actions and send actions involved in the adaptation.

    From a set of incompatible services and a message mapping,an adaptor is automatically generated according to adaptor generation algorithms[17- 18]to orchestrate deadlock-free interactions among incompatible services.

    Definition 6(Adaptor)Let a setof services be ci=(Si,Li,Ti,Ii,F(xiàn)i),i∈{1,2,…,N}.The adaptor can be described by an FSM model A=(S,L,T,I,F(xiàn)),where

    The states in the adaptor correspond to combinations of states of N services,i.e.,the adaptor is in its state(s1,s2,…,sN),if and only if each service i is in its state si.The formula Lmeans that every action in the adaptor has the corresponding complementary action in a certain service.Specially,for each action?m in the adaptor,there exists the send action!m in a certain service,and for each action!m in the adaptor,there also exists the receive action?m in a certain service.Therefore,the tracereflects the interaction of N services involving in the adaptor-based service composition,whereσis the trace of the adaptor.

    The actions of each of the N services performing incan be derived by projecting the traceover the action set Li.

    Definition 7(Projection)Letσbe a trace,the projection of σover an action set L(w rittenσ↓L)is defined as:

    Analogously,an operator over a trace that hides the particular actions is defined,leaving the rest of the actions in the trace.

    Definition 8(Hiding)Letσbe a trace,and the hiding ofσ over an action set L(w rittenσL)is defined as:

    (187)瓦鱗苔 Trocholejeunea sandojcensis(Gottsche)Mizt.馬俊改(2006)

    2 Reconfiguration Analysis of Adaptors

    2.1 Problem of adaptor reconfiguration

    When the evolution of one or more services which participate in an adaptor-based service composition occurs,it will lead to modification of the old adaptor into a new adaptor by utilizing the adaptor generation algorithm.Therefore,such a service evolution raises a critical issue is how to handle instances running under the old adaptor when it has been changed.

    Simple solutions,such as aborting them or allow ing them to continue to run according to the old adaptor are inapplicable formany reasons(e.g.,the loss of work already done or the consequence of error execution).How to reconfiguration of adaptor,i.e.,dynam ically m igrate ongoing instances that have already executed under old adaptor to the new adaptor is a critical issue,especially for long running business processes.

    In the field of traditional workflow,Ref.[19]proposed inheritance-preserving transformation rules for instance migration.The transformation rules can be used to restrict changes in workflow process definitions and ensurem igration of workflow instances without introduing errors.The approach in Ref.[20]introduced the concept of change region(i.e.,the part of the workflow that was affected by changes).If workflow instances are in the change region,the migration of them is postponed until they exit the region.For the cases in which workflows before and after evolution do not meet the inheritance relationship or workfow instances are in the change region,the instances under orginal workflow are considered to be non-migrated in Refs.[19- 20].In the web services area,Ref.[21]aimed at dynam ic management for adaptor-based service composition,and proposed the execution model of adaptor to realize the dynamic adjustment of adaptors at runtime.The approachmainly focused on correctness check which was suitable for themediator instance aftermigration and did not consider the aspect on determining whether an adaptor instance wasmigratable.

    In order to determine whether an instance can be correctly migrated to the new adaptor,two notions of reconfiguration compliance are proposed in the paper,corresponding to different requirements that may impose on the reconfiguration process: backward trace compliance and forward trace compliance.

    In this paper,for simplicity,we just consider simple scenarios where only one service in a certain adaptor-based service composition evolves at run-time.This is nota lim itation becausemultiple services evolution can be viewed as one service evolution happen several times.

    Service evolution can take place anytime in the execution,so the problem of reconfiguration includes two aspects:(1)for a given source reconfiguration statewhere the evolution occurs,analyzing if the instance under the old adaptor ism igratable or non-migratable;(2)whenever the instance ismigratable in the given source reconfiguration state,it should also be defined the target reconfiguration state under the new adaptor from which the instance will resume.

    A source reconfiguration state defines when a reconfiguration is allowed.Moreover,a target reconfiguration state indicates that the starting state in the new adaptor to resume the execution.We will show how to determ ine whether the instance at a given source reconfiguration state ismigratable or not and how to obtain the target reconfiguration state if migratable.

    Let C and C'be a set of services before and after evolution,M and M'be themessagemappings for the services in C and in C',respectively.Assum ing thata certain service ckevolved into another service c'ksuch that?ck∈C,?c'k∈C': ck≠c'k∧C/{ck}=C'/{c'k},the adaptor AC,Mgenerated according to the message mapping M for services in C is replaced by the adaptor AC',M'generated according to M'for services in C',where k∈{1,2,…,N}.

    2.2 Reconfiguration analysis based on the trace com pliance

    The notion of backward trace compliancemeans that after migration to the new adaptor,the backward trace of an instance (i.e.,the action sequence performed by the instance so far) must be compliance in the context of the new adaptor.This reconfiguration compliance is aware of the past interactions,up to the time of evolution,corresponding to a valid interaction as defined in the new version of adaptor.

    We assume that the sequence of actions an instance has been performed under the old adaptor AC,Mis the backward trace σC,M.For each service cisuch that ci∈C∩C',i.e.,ci≠ck,ci≠c'kwhere i∈{1,2,…,k-1,k+1,…,N},it is not affected by the reconfiguration from the old adaptor AC,Mto the new adaptor AC',M'since it remains unchanged after evolution.If service ciis not obliged to abort nor rollback its current execution andon running under the new adaptor,the backward tracerepresenting the sequence of actions already performed by the service ciis valid in the new adaptor AC',M',where Lidenotes the action set of service ci.

    Therefore,for reconfiguration compliance under the notion of backward trace compliance,we have to ensureeach service cisuch that ci∈C∩C',the backward tracealready performed by service ciis also contained in the backward traces of the new adaptor AC',M'.

    Let us formalize this notion of backward trace compliance with the follow ing definition.

    Definition 9(Backward trace compliance)LetσC,Mbe a backward trace executed by an instance under an adaptor AC,M.The adaptor AC',M'is the backward trace compliance to the adaptor AC,MgivenσC,Miff there exists a backward traceσC',M'in the tracessuch that?ci∈C∩C',and we have thatwhere i∈{1,2,…,k- 1,k+1,…,N}.

    Let s be the state of the adaptor AC,Mafter performing the backward traceσC,Mand it is called the source reconfiguration state where the instance under the adaptor AC,Mneeds to be migrated to the new adaptor AC',M'due to service evolution.For the traceσC,M,assumeσC',M'is the backward trace of the adaptor AC',M'satisfyingDefinition 9.Let s'be the state of the adaptor AC',M'after perform ing the backward traceσC',M',and it is exactly the target reconfiguration state from which the instance will resume under the new adaptor AC',M'.

    Therefore,based onDefinition 9,we can not only determine if the instance under the old adaptor ismigratable or not for a given source reconfiguration state where the evolution occurs,but also define the corresponding target reconfiguration state ifmigratable.

    The backward traceσC',M'satisfyingDefinition 9can alsobe used for initializingservice c'k.As the actions of the services are disjoint,gives us the trace for initializing the service c'k.

    Definition9establishes the conditions for the adaptor AC',M'being the backward trace compliance to the adaptor AC,MgivenσC,M.However,it does not give us how to find the backward traceσC',M'that satisfies the conditions ofDefinition 9.

    The algorithm below gives us a way to compute the backward traceσC',M'for the new adaptor AC',M'that fulfills the conditions ofDefinition9.

    Algorithm1The algorithm for computing the backward trace σC',M'that fulfills the conditions ofDefinition9.

    Input:the new service c'k=(S'k,L'k,T'k,I'k,F(xiàn)'k),the new adaptor AC',M'=(S',L',T',I',F(xiàn)')and the backward traceσC,Mof the old adaptor AC,Mperformed by the instance.

    Output:the backward traceσC',M'.

    while(?σi∈BTr∶σi≠ε)do

    σC',M'=

    elseif(then

    σc',m'=

    else

    return(ε);

    endif

    endwhile

    return(σC',M').

    According toDefinition9,the backward traceσC',M'to be computed is the interleaving of the backward traces in BTr already performed by services in the set C∩C'under the old adaptor AC,Mand the backward trace of the new service c'k.Hence,the algorithm tries to make new adaptor AC',M'advance w ith the complementary actionfrom a certain traceσin BTrj(initiallyw ith its first action l1.If this is not possible,it checks if an complementary action in L'kcan make the adaptor AC',M'advance.If neither of the two conditions above holds,the algorithm returns an empty traceεwhich indicates the backward trace that fulfills the conditions ofDefinition9does not exist.The algorithm stops when all traces in BTr are empty(success)and it returns the backward traceσC',M'.According to the conditions of the if statement,the time complexity of the while loop body is O (N).Supposing that the transition numbers of the traceσC,Mis |T|,we can conclude that the execution times of thewhile loop body is|T|.Hence the time complexity ofAlgorithm1is deduced to be O(N|T|).

    Backward trace compliance focuses on the backward trace (also called history)of the instance.In such a way,the services not involved in the evolution are able to continue working on from their current states.However,backward trace compliance says nothing about forward trace(also called future)of the instance to bemigrated.Therefore,wewill deals w ith the future actions of an instance by introducing the notion of forward trace compliance.

    The notion of forward trace compliance refers to the ability for all the services unchanged to continue interacting under the new adaptor as itwould have done under the old version of the adaptor.

    Let us consider again the serviceswhich remain unchanged after evolution(i.e.,services in the setof C∩C').Unlike the notion of backward trace compliance presented above,the future actions which can be performed by these services are focused on.

    Again,we assume that the sequence of actions an instance has been performed under the old adaptor AC,Mis the backward traceσC,M.In order to determine if the adaptor AC',M'is the forward trace compliance to the adaptor AC,Mgiven the trace σC,M,we shall check if any possible forward trace that continuesσC,Mis possible in the forward traces of the adaptor AC',M',by hiding the traces over actions performed by the services ckand c'k,where services ckand c'kare the original and new versions of the service involved in the evolution.Let us formalize the notion of forward trace compliance by the follow ing definition.

    Definition10(Forwardtracecompliance)LetσC,Mbe a backward trace executed by an instance under the old adaptor AC,M.The adaptor AC',M'is the forward trace compliance to the adaptor AC,MgivenσC,Miff there exists a backward traceσC',M'in the traces of the adaptor AC',M'such that?∈ FTr(AC,M):?∈FTr(AC',M'):= EN(σC,M))∧(ST(=EN(σC',M'))∧(Lk=,where L and L'are the sets of actions for serviceskkckand c'k,respectively.

    Based onDefinition10,the target reconfiguration state under the notion of forward trace compliance can also be decided.Assume there exists a traceσC',M'which satisfies the conditions ofDefinition10.Let s be the state of the adaptor AC,Mafter performingσC,Mand s'the state of the adaptor AC',M'after performingσC',M'.This state s'is the target reconfiguration state to which the instance is allowed to reconfigure from the source reconfiguration state s.

    Similar to the case under the notion of the backward trace compliance,the tracecan be used for initializing the new service c'k.

    These two kinds of reconfiguration compliance are important in managing the adaptor reconfiguration.Backward trace compliance is required if we need the past interaction of the instance under the old adaptor to be a valid interaction under the new adaptor to which it is migrated,while forward trace compliance is necessary in order to guarantee the future interaction of the instance under the old adaptor to be valid in the context of the new version of the adaptor.

    Definition11(Correctreconfiguration)The reconfiguration from adaptor AC,Mto adaptor AC',M'is correct given the backward trace executed by an instance under the old adaptor AC,Miff there exists a backward traceσC',M'in the traces of the adaptor AC',M'satisfying the two notions of reconfiguration compliance,i.e.,the backward trace compliance inDefinition9 and the forward trace compliance inDefinition10.

    Therefore,in order to check the reconfiguration from adaptor AC,Mto adaptor AC',M'is correct,we need first find whether there is a backward traceσC',M'of adaptor AC',M'making the condition ofDefinition9hold.In that case,wewill then check if that trace also satisfies the condition ofDefinition 10.If some reconfiguration scenario is incorrect for a given source state,we will rollback or resume the execution of the instance into a state from which it can be correctly reconfigured.

    3 Case Study

    This section presents an online shopping case study to illustrate the proposed approach.There are three services: Client service(w ritten S1),Store_A service(w ritten S2),andStore_B service(w ritten S3).The Client service plays the role of buyer while the two services Store_A and Store_B play the role of seller.

    The Client service can buy goods and query the order as shown in Fig.1(a).The two services Store_A and Store_B are depicted in Figs.1(b)and(c),respectively.Store_A can only sell goods,while Store_B can sell goods and provide order query.

    Fig.1 Services in the online shopping example

    Initially,the Client service interactswith Store_A service.During the period that a client service interacts with Store_A service,Store_A service evolves into Store_B service.Several changes take place in the new service Store_B.For instance,operations query and qresult are added and operations login and logout are renamed in the signature of Store_B service.Possible modifications of the behavior aremore important.For instance,the addition of several interactions(three new successive transitions(s3,?query,s4),(s4,!qresult,s5),(s5,? logout,s6))are modifications of pieces of behavior in the model of Store_B service.

    Let C be the setof services composed of Client service and Store_A service,and C'be the set of services composed of Client service and Store_B service.Themessagemapping M for the services in C is as follows:!id→?user,!pwd→? passwd.

    The message mapping M'for the services in C'is as follows:!id→?login,!pwd→?passwd and!disconnect→?logout.By utilizing the existing adaptation approaches,the adaptor AC,Mfor the services in C and the adaptor AC',M'for the services in C'are automatically generated respectively based on themessagemappings M and M',(see adaptors AC,Mand AC',M'in Figs.2(a)and(b)).

    For instance,let us suppose that the backward trace performed so far by an instance under the adaptor AC,Mis:σC,M=?S1.id!S2.user?S1.pwd!S2.passwd.

    Hence,the trace performed by the Client service is:=!S1.id!S1.pwd.

    In order to keep the Client service unaware of the reconfiguration,itmustnotabort its ongoing execution.Only if the traceis valid in the new adaptor AC',M',Client service could continue its execution as if it has been interacting with Store_B service from the very beginning.

    Fig.2 Adaptors AC,Mand AC',M'in the onlineshopping example

    Using the proposedAlgorithm 1,the traceσC',M'=?S1.id!S3.login?S1.pwd can be obtained.

    According to the traceσC',M',the formulaS1.id!S1.pwd holds and this indicates the traceperformed by the Client service is valid in the new adaptor AC',M'.The traceσC',M'makes the new adaptor AC',M'be backward trace compliance to the original adaptor AC,MgivenσC,Mbased onDefinition 9.

    In the follow ing,we will check if that traceσC',M'also satisfies the conditions ofDefinition 10.

    The forward traces continuing the backward traceσC,Mare:

    and

    So we can decide that the reconfiguration from adaptor AC,Mto adaptor AC',M'is correct given the backward traceσC,Min the example.Furthermore,for the source reconfiguration state s5in the adaptor AC,M,the target reconfiguration state is s4which is the state of the adaptor AC',M'after performingσC',M'.

    4 Conclusions

    This paper has presented a novel approach that supports adaptor reconfiguration when services in the composition have evolved due to changes in business needs.Firstly,formal models that describe services and the adaptor are presented.Then,with this framework,the notion of backward trace compliance and the notion of forward trace compliance are proposed respectively.The former focuses on the history actions of the instance,while the latter deals with the future actions of an instance.Based on the two notions of reconfiguration compliance,the algorithm is given to decide if the reconfiguration scenario that allow the running instancem igrate from the former adaptor-based service composition to the new one is correct.If it is correct for a given source reconfiguration state,it also defines the target reconfiguration state from which the instance will resume.

    The reconfiguration problem presented in this paper assumes the adaptor is a centralized one.So in the future,we will plan to deal with the reconfiguration problem when the adaptor is distributed across different locations in a distributed setting.Moreover,in the case where a service is evolved into a more restricted functionality one,preserving certain temporal properties may be sufficient for the reconfiguration of the adaptor.Hence,the approach to deal with these situations will be another perspective of our future work.

    [1]Wei Y,Blake M B.Service-Oriented Computing and Cloud Computing:Challenges and Opportunities[J].IEEE Internet Computing,2010,14(6):72-75.

    [2]Li X T,F(xiàn)an Y S,Sheng Q Z,et al.A Petri Net Approach to Analyzing Behavioral Compatibility and Sim ilarity ofWeb Service[J].IEEE Transactions on Systems,Man,and Cybernetics—Part A:Systems and Humans,2011,41(3):510-521.

    [3]Durána F,OuederniM,Salaün G.A Generic Framework for nprotocol Compatibility Checking[J].Science of Computer Programming,2012,77(7/8):870-886.

    [4]Eslam ichalandar M,Barkaoui K,Motahari-Nezhad H R.Service Composition Adaptation:an Overview[C].Proceedings of the 2nd InternationalWorkshop on Advanced Information Systems for Enterprises(IWAISE'12),Constantine,Algeria,2012:20-27.

    [5]Kumar A,Shan Z.Algorithms Based on Pattern Analysis for Verification and Adapter Creation for Business Process Composition[J].Lecture Notes in Computer Science,2008,5331:120-138.

    [6]Benatallah B,Casati F,Grigori D,et al.Developing Adapters forWeb Services Integration[C].Proceedings of the International Conference on Advanced Information Systems Engineering (CAiSE'05),Porto,Portugal,2005:415-429.

    [7]Motahari-Nezhad H R,Benatallah B,Martens A,et al.Semiautomated Adaptation of Service Interactions[C].Proceedings of the 16th International Conference on World W ide Web(WWW '07),Banff,Canada,2007:993-1002.

    [8]Andrikopoulos V,Benbernou S,Papazoglou M P.Managing the Evolution of Service Specifications[C].Proceedings of the 20th International Conference Advanced Information Systems Engineering(CAiSE'08),Montpellier,F(xiàn)rance,2008:359-374.

    [9]Wang Y.A Survey of Change Management in Service-Based Environments[J].Service Oriented Computing and Applications,2013,7(4):259-273.

    [10]La H J,Kim S D.Static and Dynam ic Adaptations for Service-Based Systems[J].Information and Software Technology,2011,53(12):1275-1296.

    [11]Kongdenfha W,Motahari-Nezhad H R,Benatallah B,et al.M ismatch Patterns and Adaptation Aspects:a Foundation for Rapid Development of Web Service Adapter[J].IEEE Transactions on Services Computing,2009,2(2):94-107.

    [12]Taher Y,Ait-Bachir A,F(xiàn)auvet M C,et al.Diagnosing Incompatibilities in Web Service Interactions for Automatic Generation of Adapters[C].Proceedings of the 23rd International Conference on Advanced Networking and Applications (AINA'09),Bradford,UK,2009:652-659.

    [13]Wang K,Dumas M,Ouyang C,et al.The Service Adaptation Machine[C].Proceedings of the 6th European Conference on Web Services(ECOWS'08),Dublin,Ireland,2008:145-154.

    [14]Poizat P,Salaün G,Tivoli M.On Dynam ic Reconfiguration of Behavioural Adaptation[C].Proceedings of the3rd International Workshop on Coordination and Adaptation Techniques for Software Entities(WCAT'06),Nantes,F(xiàn)rance,2006:61-69.

    [15]Poizat P,Salaün G,TivoliM.An Adaptation-Based Approach to Incrementally Build Component Systems[J].Electronic Notes in Theoretical Computer Science(ENTCS)Series,2007,182:39-55.

    [16]Cámara J,Salaün G,Canal C,etal.Interactive Specification and Verification of Behavioral Adaptation Contracts[J].Information and Software Technology,2012,54(7):701-723.

    [17]Cámara J,Martín JA,Salaün G,etal.A Case Study in Model-Based Adaptation of Web Services[C].Proceedings of the 4th International Symposium on Leveraging Applications (ISoLA'10),Heraklion,Greece,2010:112-126.

    [18]Mateescu R,Poizat P,Salaün G.Adaptation of Service Protocols Using Process Algebra and On-the-Fly Reduction Techniques[J].IEEE Transactions Software Engineering,2012,38(4):755-777.

    [19]van der Aalst W M P,Basten T.Inheritance of Workflows:an Approach to Tackling Problems Related to Change[J].Theoretical Computer Science,2002,270(1):125-203.

    [20]van der AalstW M P.Exterm inating the Dynam ic Change Bug:a Concrete Approach to SupportWorkflow Change[J].Information Systems Frontiers,2001,3(3):297-317.

    [21]Qiao X Q,Chen W,Wei J.Implementing Dynamic Management for Mediated Service Interactions[C].Proceedings of the 9th International Conference on Services Computing(SCC'12),Hawaii,USA,2012:234-241.

    TP311

    A

    1672-5220(2015)04-0648-06

    date:2014-02-13

    s:National Natural Science Foundationsof China(Nos.61272083,61262002,61170043);China Postdoctoral Science Foundation (Nos.20110491411,2014M 562177);The Science Foundations of Nanjing Institute of Technology,China(Nos.QKJB201304,YKJ201420)

    *Correspondence should be addressed to FAN Da-juan,E-mail:fanbingjie523@126.com

    猜你喜歡
    馬俊
    Coercivity mechanism of La–Nd–Fe–B lms with Y spacer layer
    情牽桑梓報(bào)鄉(xiāng)鄰
    一條寵物狗引發(fā)婚姻悲劇
    金秋(2021年22期)2021-12-02 03:26:33
    兩人一鬼
    江南(2021年2期)2021-03-15 05:59:55
    空巢之家尷尬離婚事:我的情敵是一條狗
    分手多情
    測 量
    長江叢刊(2018年16期)2018-11-14 19:04:05
    魚肚中的U盤
    Multiscale Modeling of Collagen Fibril in Bone at Various Crosslink Densities:An Insight into Its Deformation Mechanisms
    填字游戲
    人妻系列 视频| 亚洲性久久影院| 日韩欧美一区视频在线观看 | 国产美女午夜福利| 狂野欧美白嫩少妇大欣赏| 日韩免费高清中文字幕av| 日韩精品有码人妻一区| 亚洲精品亚洲一区二区| 欧美精品一区二区大全| 国产亚洲av片在线观看秒播厂| 午夜激情福利司机影院| 好男人视频免费观看在线| 舔av片在线| 丰满人妻一区二区三区视频av| 亚洲欧美日韩无卡精品| 国产成人精品久久久久久| 欧美+日韩+精品| 青春草视频在线免费观看| 中文在线观看免费www的网站| 欧美极品一区二区三区四区| 成人综合一区亚洲| 观看免费一级毛片| 日韩电影二区| 久久久久久久久久成人| 日韩一区二区视频免费看| 大又大粗又爽又黄少妇毛片口| 国产黄色视频一区二区在线观看| 中文乱码字字幕精品一区二区三区| 国产片特级美女逼逼视频| 男女国产视频网站| 人人妻人人添人人爽欧美一区卜 | 精品久久久久久电影网| 国产黄色免费在线视频| 亚洲av欧美aⅴ国产| 欧美最新免费一区二区三区| 久久久久久久久久久免费av| 亚洲无线观看免费| 伊人久久精品亚洲午夜| 99精国产麻豆久久婷婷| 插逼视频在线观看| 身体一侧抽搐| 日本-黄色视频高清免费观看| 国产欧美亚洲国产| 国产伦理片在线播放av一区| 蜜桃在线观看..| 99国产精品免费福利视频| 老师上课跳d突然被开到最大视频| 久久久a久久爽久久v久久| 欧美一级a爱片免费观看看| 亚洲av中文字字幕乱码综合| 91狼人影院| 十八禁网站网址无遮挡 | 欧美高清成人免费视频www| 亚洲欧美成人精品一区二区| 亚洲人成网站在线观看播放| 午夜视频国产福利| 日韩在线高清观看一区二区三区| 免费人成在线观看视频色| 80岁老熟妇乱子伦牲交| 午夜免费观看性视频| 久久久久国产网址| 成人亚洲精品一区在线观看 | 26uuu在线亚洲综合色| 久久99精品国语久久久| 日韩不卡一区二区三区视频在线| 精品久久久久久电影网| 又粗又硬又长又爽又黄的视频| 一本—道久久a久久精品蜜桃钙片| 日韩制服骚丝袜av| 久久久国产一区二区| 国国产精品蜜臀av免费| 久久97久久精品| 狂野欧美激情性bbbbbb| 大香蕉97超碰在线| 日韩欧美精品免费久久| 久久6这里有精品| 我要看黄色一级片免费的| 天天躁日日操中文字幕| av不卡在线播放| 国产亚洲精品久久久com| 秋霞在线观看毛片| 欧美 日韩 精品 国产| 晚上一个人看的免费电影| 香蕉精品网在线| 极品教师在线视频| 亚洲精品成人av观看孕妇| 免费黄网站久久成人精品| av在线app专区| 国产在线一区二区三区精| 又黄又爽又刺激的免费视频.| 午夜福利视频精品| 好男人视频免费观看在线| 日韩 亚洲 欧美在线| 亚洲精品456在线播放app| 精品人妻一区二区三区麻豆| 国产欧美日韩精品一区二区| 国产在线视频一区二区| 亚洲成色77777| 午夜日本视频在线| 久久久成人免费电影| 在线观看美女被高潮喷水网站| 久久国内精品自在自线图片| 久久精品国产亚洲网站| 亚洲精品乱码久久久v下载方式| 在线观看人妻少妇| 在线观看一区二区三区激情| 最近最新中文字幕大全电影3| 亚洲国产精品国产精品| 免费看av在线观看网站| 纯流量卡能插随身wifi吗| 99热这里只有是精品50| 亚洲中文av在线| av.在线天堂| 亚洲欧美日韩无卡精品| 日韩大片免费观看网站| 欧美一区二区亚洲| 嫩草影院入口| 亚洲综合精品二区| 国产成人aa在线观看| 天堂俺去俺来也www色官网| 欧美成人午夜免费资源| 国产成人午夜福利电影在线观看| 九草在线视频观看| 看十八女毛片水多多多| 亚洲精品乱码久久久久久按摩| 久久精品国产自在天天线| 国产精品免费大片| videossex国产| 久久精品国产亚洲网站| 国产乱人偷精品视频| 久久久久久久久久成人| 成人毛片a级毛片在线播放| 在线观看免费日韩欧美大片 | 亚洲国产精品国产精品| 久久鲁丝午夜福利片| 婷婷色麻豆天堂久久| 一区二区三区精品91| 日本av免费视频播放| 蜜臀久久99精品久久宅男| 亚洲av.av天堂| 成人影院久久| 少妇猛男粗大的猛烈进出视频| 99久久精品国产国产毛片| 在现免费观看毛片| 色视频www国产| 99久久人妻综合| 午夜免费观看性视频| 国产黄片美女视频| 久久99蜜桃精品久久| 国内揄拍国产精品人妻在线| 精品久久久久久久久av| 大香蕉97超碰在线| 免费看日本二区| 免费人成在线观看视频色| 久久亚洲国产成人精品v| 国产一区二区三区综合在线观看 | 日韩视频在线欧美| h视频一区二区三区| 日韩,欧美,国产一区二区三区| 免费观看av网站的网址| 欧美精品一区二区免费开放| 久久ye,这里只有精品| 麻豆精品久久久久久蜜桃| 97在线人人人人妻| 欧美老熟妇乱子伦牲交| 中文天堂在线官网| 亚洲天堂av无毛| 亚洲国产欧美人成| 能在线免费看毛片的网站| 麻豆乱淫一区二区| 新久久久久国产一级毛片| 九草在线视频观看| 肉色欧美久久久久久久蜜桃| 欧美亚洲 丝袜 人妻 在线| 亚洲熟女精品中文字幕| 最新中文字幕久久久久| 777米奇影视久久| 永久免费av网站大全| 五月开心婷婷网| 国产免费福利视频在线观看| 在线观看免费日韩欧美大片 | 亚洲国产精品999| 亚洲精品自拍成人| 国产成人精品婷婷| 国产av国产精品国产| 亚洲精品第二区| 国产色婷婷99| 亚洲欧美日韩东京热| 午夜福利高清视频| 又粗又硬又长又爽又黄的视频| 亚洲aⅴ乱码一区二区在线播放| 一本一本综合久久| 乱码一卡2卡4卡精品| 久久鲁丝午夜福利片| 自拍偷自拍亚洲精品老妇| 国产精品人妻久久久影院| 18禁在线播放成人免费| 18禁裸乳无遮挡免费网站照片| 亚洲av综合色区一区| 亚洲人成网站在线播| 亚洲人与动物交配视频| av女优亚洲男人天堂| 热99国产精品久久久久久7| 毛片女人毛片| 午夜福利影视在线免费观看| 久久午夜福利片| 国产免费视频播放在线视频| 精品少妇久久久久久888优播| 久久人人爽av亚洲精品天堂 | 欧美成人午夜免费资源| 欧美极品一区二区三区四区| 内地一区二区视频在线| 99热全是精品| 成人无遮挡网站| 能在线免费看毛片的网站| 亚洲婷婷狠狠爱综合网| 欧美xxxx黑人xx丫x性爽| 国产成人免费无遮挡视频| 18禁在线无遮挡免费观看视频| 黑人猛操日本美女一级片| 精品一区在线观看国产| 高清不卡的av网站| 国模一区二区三区四区视频| 久久精品国产亚洲av天美| 99re6热这里在线精品视频| 日产精品乱码卡一卡2卡三| 久久99热这里只有精品18| 亚洲av电影在线观看一区二区三区| 婷婷色综合www| 精品亚洲乱码少妇综合久久| 久久久久久久久久成人| 日本与韩国留学比较| 有码 亚洲区| 99久国产av精品国产电影| 内地一区二区视频在线| 欧美激情国产日韩精品一区| 欧美精品人与动牲交sv欧美| 高清日韩中文字幕在线| 六月丁香七月| 美女高潮的动态| 91精品一卡2卡3卡4卡| 久久热精品热| 午夜激情久久久久久久| 国产精品嫩草影院av在线观看| 久久久久久久亚洲中文字幕| 中文欧美无线码| 日本一二三区视频观看| 国产毛片在线视频| 免费不卡的大黄色大毛片视频在线观看| 日本黄色片子视频| 欧美三级亚洲精品| 欧美成人a在线观看| a级一级毛片免费在线观看| 欧美bdsm另类| 成年免费大片在线观看| 男女啪啪激烈高潮av片| 日本欧美国产在线视频| av天堂中文字幕网| 啦啦啦中文免费视频观看日本| 国产亚洲av片在线观看秒播厂| 欧美亚洲 丝袜 人妻 在线| 插阴视频在线观看视频| 亚洲成色77777| av一本久久久久| 精品亚洲成a人片在线观看 | av线在线观看网站| 汤姆久久久久久久影院中文字幕| 丝袜脚勾引网站| 一个人看的www免费观看视频| 伦理电影免费视频| 亚洲人成网站高清观看| 亚洲怡红院男人天堂| 亚洲欧美日韩另类电影网站 | 精品少妇久久久久久888优播| 欧美97在线视频| 国产 一区精品| 久久久久精品性色| 免费观看av网站的网址| 免费观看无遮挡的男女| 日韩国内少妇激情av| 亚洲内射少妇av| 久久精品国产a三级三级三级| 国产精品国产三级专区第一集| 精品久久久精品久久久| 女人久久www免费人成看片| 国产亚洲午夜精品一区二区久久| 日本欧美视频一区| 99久久中文字幕三级久久日本| 欧美3d第一页| 国产精品偷伦视频观看了| 老司机影院成人| 久久久久久久久久久免费av| 日本爱情动作片www.在线观看| 夜夜爽夜夜爽视频| 亚洲国产av新网站| 欧美极品一区二区三区四区| av国产免费在线观看| 精品人妻熟女av久视频| 日本黄大片高清| 国产成人免费无遮挡视频| 国产精品不卡视频一区二区| 2018国产大陆天天弄谢| 中文在线观看免费www的网站| 欧美日韩视频精品一区| 建设人人有责人人尽责人人享有的 | 国产成人精品福利久久| 最近中文字幕高清免费大全6| 新久久久久国产一级毛片| 最黄视频免费看| 免费在线观看成人毛片| 国产永久视频网站| 老司机影院成人| 国产男女超爽视频在线观看| 国产高清有码在线观看视频| 国产伦在线观看视频一区| 欧美少妇被猛烈插入视频| 新久久久久国产一级毛片| 日本av免费视频播放| 水蜜桃什么品种好| 国产高潮美女av| 日日摸夜夜添夜夜爱| 人人妻人人看人人澡| 亚洲自偷自拍三级| 国产在线一区二区三区精| 国产真实伦视频高清在线观看| 水蜜桃什么品种好| 成人毛片a级毛片在线播放| 成人无遮挡网站| 不卡视频在线观看欧美| 久久影院123| 久久精品熟女亚洲av麻豆精品| 欧美日韩精品成人综合77777| 日韩一区二区三区影片| 日韩av在线免费看完整版不卡| 久久国内精品自在自线图片| 欧美区成人在线视频| 亚洲色图综合在线观看| 日本黄色日本黄色录像| 久久综合国产亚洲精品| 亚洲无线观看免费| 中国国产av一级| 久热这里只有精品99| 日韩三级伦理在线观看| 中文字幕人妻熟人妻熟丝袜美| 美女主播在线视频| 香蕉精品网在线| 只有这里有精品99| a级毛色黄片| 精品人妻偷拍中文字幕| 精品人妻熟女av久视频| 亚洲精品aⅴ在线观看| 性色avwww在线观看| 三级经典国产精品| 午夜福利视频精品| 国产高清不卡午夜福利| 欧美成人a在线观看| 黄色配什么色好看| 欧美zozozo另类| 麻豆成人av视频| 亚洲精品国产色婷婷电影| 联通29元200g的流量卡| 国产欧美另类精品又又久久亚洲欧美| 免费黄频网站在线观看国产| 亚洲国产欧美在线一区| 一级爰片在线观看| 久久久久视频综合| av在线老鸭窝| 五月玫瑰六月丁香| h视频一区二区三区| 自拍欧美九色日韩亚洲蝌蚪91 | 国产精品一区二区在线观看99| 视频中文字幕在线观看| 精品少妇黑人巨大在线播放| 免费观看无遮挡的男女| 99国产精品免费福利视频| 丰满迷人的少妇在线观看| 熟女av电影| 欧美国产精品一级二级三级 | 人妻夜夜爽99麻豆av| 精品久久久精品久久久| 日本免费在线观看一区| 国产精品久久久久成人av| 日本免费在线观看一区| 国产淫片久久久久久久久| 日本-黄色视频高清免费观看| 一区二区三区乱码不卡18| 女性生殖器流出的白浆| 好男人视频免费观看在线| 国产成人freesex在线| 久久久精品94久久精品| 国产成人一区二区在线| 久久6这里有精品| 伦理电影大哥的女人| 美女福利国产在线 | 美女xxoo啪啪120秒动态图| 亚洲欧美成人精品一区二区| 免费大片18禁| 欧美+日韩+精品| 一级毛片久久久久久久久女| 不卡视频在线观看欧美| 嫩草影院入口| 精品国产露脸久久av麻豆| 日韩欧美精品免费久久| 亚洲第一区二区三区不卡| 男人和女人高潮做爰伦理| 国产免费福利视频在线观看| 丝袜脚勾引网站| 久久久久久九九精品二区国产| a 毛片基地| 日韩欧美 国产精品| 狂野欧美激情性bbbbbb| 这个男人来自地球电影免费观看 | 国产成人免费无遮挡视频| 大香蕉久久网| 精品久久久久久久末码| 大陆偷拍与自拍| 能在线免费看毛片的网站| 免费观看av网站的网址| 下体分泌物呈黄色| 久久精品人妻少妇| 性色av一级| 精华霜和精华液先用哪个| 中文字幕制服av| 男女下面进入的视频免费午夜| 中文字幕制服av| 国产 一区精品| 美女视频免费永久观看网站| 国产伦精品一区二区三区视频9| 亚洲不卡免费看| 亚洲国产精品专区欧美| av在线老鸭窝| 黑人猛操日本美女一级片| 国产午夜精品一二区理论片| 欧美一区二区亚洲| 大香蕉久久网| 91精品伊人久久大香线蕉| 久久久欧美国产精品| 黑人高潮一二区| 中文字幕亚洲精品专区| 久久精品人妻少妇| 一区二区三区乱码不卡18| 一个人看视频在线观看www免费| 亚洲一级一片aⅴ在线观看| 亚洲av综合色区一区| 欧美精品一区二区大全| 日本一二三区视频观看| 久久女婷五月综合色啪小说| 久久青草综合色| 久久这里有精品视频免费| 日本vs欧美在线观看视频 | 99热全是精品| 国产精品一区二区性色av| 91精品国产国语对白视频| 欧美变态另类bdsm刘玥| 亚洲av.av天堂| 国产精品蜜桃在线观看| 国产精品偷伦视频观看了| 国产 精品1| 永久网站在线| 一本久久精品| 久久久久久久久久人人人人人人| 久久6这里有精品| 亚洲三级黄色毛片| 国产亚洲最大av| 一个人看视频在线观看www免费| 亚州av有码| 久久精品国产鲁丝片午夜精品| 日韩中文字幕视频在线看片 | 亚洲欧美日韩卡通动漫| 亚洲第一区二区三区不卡| 人妻少妇偷人精品九色| 日本av免费视频播放| 亚洲精品一区蜜桃| 一级a做视频免费观看| 亚洲久久久国产精品| 亚洲成人手机| 三级国产精品欧美在线观看| 国产精品嫩草影院av在线观看| 国产精品一区二区三区四区免费观看| 夜夜骑夜夜射夜夜干| 国产爱豆传媒在线观看| 欧美日韩亚洲高清精品| 黑人高潮一二区| 亚洲人成网站在线观看播放| 91久久精品国产一区二区成人| 亚洲色图av天堂| 亚洲va在线va天堂va国产| 国产高潮美女av| 男人狂女人下面高潮的视频| 18禁裸乳无遮挡动漫免费视频| 人人妻人人看人人澡| 精品少妇久久久久久888优播| 九九在线视频观看精品| 久久久久精品性色| 日韩中字成人| 女性被躁到高潮视频| av.在线天堂| 日韩欧美精品免费久久| 在线天堂最新版资源| 亚洲va在线va天堂va国产| 国产男女超爽视频在线观看| 能在线免费看毛片的网站| 亚洲国产高清在线一区二区三| 毛片女人毛片| 99精国产麻豆久久婷婷| videossex国产| 美女脱内裤让男人舔精品视频| 欧美xxxx黑人xx丫x性爽| 久久久久久久久久人人人人人人| 男男h啪啪无遮挡| 亚洲成人av在线免费| 国内精品宾馆在线| 永久免费av网站大全| 亚洲人与动物交配视频| 日韩一本色道免费dvd| 在线免费观看不下载黄p国产| 国产永久视频网站| 国产黄色视频一区二区在线观看| 边亲边吃奶的免费视频| 午夜激情福利司机影院| 日日啪夜夜撸| 热re99久久精品国产66热6| 99热国产这里只有精品6| 久久久久久久大尺度免费视频| 亚洲熟女精品中文字幕| 香蕉精品网在线| 亚洲成人中文字幕在线播放| 国产69精品久久久久777片| 国内少妇人妻偷人精品xxx网站| 精品少妇久久久久久888优播| av在线app专区| 中文字幕av成人在线电影| 天美传媒精品一区二区| 欧美一级a爱片免费观看看| 国产亚洲5aaaaa淫片| 国内精品宾馆在线| 五月开心婷婷网| 久久影院123| 日韩视频在线欧美| 国产精品av视频在线免费观看| 最近的中文字幕免费完整| 久久久久久久久久久免费av| 久久影院123| 99久久人妻综合| 国产黄色免费在线视频| 97热精品久久久久久| 免费少妇av软件| 国产爱豆传媒在线观看| 这个男人来自地球电影免费观看 | 国产免费一区二区三区四区乱码| 少妇高潮的动态图| 午夜福利视频精品| 国产高清不卡午夜福利| 日韩免费高清中文字幕av| 在线看a的网站| 亚洲国产精品成人久久小说| 日韩一本色道免费dvd| 三级国产精品片| 免费观看a级毛片全部| 午夜精品国产一区二区电影| 久久久成人免费电影| 中文在线观看免费www的网站| 一本—道久久a久久精品蜜桃钙片| 亚洲第一av免费看| 777米奇影视久久| 赤兔流量卡办理| 青青草视频在线视频观看| 欧美激情极品国产一区二区三区 | 亚洲欧美日韩卡通动漫| 看十八女毛片水多多多| 最近手机中文字幕大全| av在线蜜桃| 熟女人妻精品中文字幕| 国产精品偷伦视频观看了| 亚洲精品中文字幕在线视频 | 成人美女网站在线观看视频| 爱豆传媒免费全集在线观看| 精品视频人人做人人爽| 在线亚洲精品国产二区图片欧美 | 午夜福利在线观看免费完整高清在| 日韩亚洲欧美综合| 国产精品99久久久久久久久| 欧美zozozo另类| .国产精品久久| 高清不卡的av网站| av.在线天堂| 狂野欧美激情性bbbbbb| 午夜福利高清视频| 欧美 日韩 精品 国产| 亚洲综合色惰| 国产无遮挡羞羞视频在线观看| 亚洲av成人精品一二三区| 在线观看一区二区三区激情| 五月伊人婷婷丁香| 免费黄频网站在线观看国产| 欧美另类一区| 国产久久久一区二区三区| 高清av免费在线| 麻豆成人av视频| 有码 亚洲区| 看免费成人av毛片| 插阴视频在线观看视频| 成人高潮视频无遮挡免费网站| 日韩欧美精品免费久久| 成人毛片a级毛片在线播放| 日本一二三区视频观看| 国产黄频视频在线观看| 久久精品国产a三级三级三级| 国产真实伦视频高清在线观看| 国产日韩欧美亚洲二区| 亚洲精品色激情综合| 欧美高清性xxxxhd video| 爱豆传媒免费全集在线观看| 91精品一卡2卡3卡4卡| 精品久久久久久电影网|