<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards Adaptive Service Development</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Aries Tao Tao supervised by Jian Yang</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>jiang@ics.mq.edi.au</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Computing Department, Macquarie University</institution>
          ,
          <country country="AU">Australia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>ion and Polymorphism in Object Oriented Computing, service adaptation allows an Abstract Business Process class to be con gured by Policy and user required interface, hence dynamically generate multiple business processes to meet di erent user interaction requirements.</p>
      </abstract>
      <kwd-group>
        <kwd>service di erentiation</kwd>
        <kwd>service adaptation</kwd>
        <kwd>matchmaking</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>While improvement in Service Oriented Computing (SOC) has proved e ective
for integration at lower levels (e.g. wrap traditional software component up to
be service), service integration through service interface is till a challenge due
to the heterogeneity of service speci cation. Service interface is a speci cation
for user (client program) to interact with the service. It is supported by
underlying business process(es), and consisted of activities which are implemented by
corresponding tasks of the business processes.</p>
      <p>
        In e-business world, it is common for a set of service consumer with similar
service requirements to have di erent interfaces. The di erences could be caused
either by user contexts [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] (1) at business level such as di erent physical
locations, market conditions, policy regulations, competitive threats, or by service
implementation (2) at application levels such as di erent message formats or
sequences. All of these situations and more drive the need for a service design
which enable the service provider to respond quickly in support of diverse service
users' requirements.
      </p>
      <p>
        On the other hand, ignoring the user heterogeneity, the current service is
designed to be context free which supports the xed monolithic business process
and interface to all users. This in exible design makes it di cult for service
consumer to perform service integration with the provided service, hence obstruct
the service provider to expand the business. SOC research community has been
aware of the issue. The solutions are proposed which mainly use process
matchmaking [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] to identify the mismatch patterns, and adapter [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] to overcome the
mismatch. However, as functionality of adapter is to split/combine messages
or swap message sequences, such solution only resolve the certain mismatch at
application level.
      </p>
      <p>To overcome the problem with current service design, we propose a new
design that supports policy negotiation, process modi cation, and interface
alternation according to use needs, hence cater service to quickly adapt to diver
service consumer requirements. We refer this design as Adaptive Service
Design (ASD). An User Adaptation mechanism is developed based on ASD which
enables the service provider to:
{ identify user functionality and interaction requirements from the user's
interface.
{ dynamically generate the business process and service interface to meet the
speci c requirements.</p>
      <p>The basic design philosophy of ours, and one that distinguishes us from
others, is that the ASD supports service provider to easily vary the policy, business
process and service interface to dynamically adapt di erent user integration
requirements in terms of functionality and interaction patterns.</p>
      <p>This paper is organized as follows: Section 2 discusses the related work. The
structure of Adaptive Service Design (DSD) are speci ed in Section 3. We nally
concludes our work in section 4.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>The related work can be divided in following areas: (1) Service Description which
focuses on enriching the service interface for user accessibility; (2) Service
Differentiation which supports services to provide di erent functionalities to users;
(3) Service Matchmaking which allows the mismatches between provided service
and user required services to be identi ed; (4) Service Adaptation overcomes the
mismatches identi ed by the Service Matchmaking.</p>
      <p>
        We now look at the work that has been done in the area of service interface
design. Chiu et al [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] presented a meta-model for service interface as work ow
views, which provided a novel approach to derive work ow view from a work ow.
By abstracting service interface as a subset of service, it allows internal
information to be hidden from external users. However, the work only focused on
abstracting a single service interface. In order to support users playing di erent role
in Business Collaboration, Zhao et al [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] proposed the concept of relative
workow view by explicitly specifying visibility constraints (Invisible, Traceable,and
Contactable) on activities of work ow. Based on di erent visibility constraint for
di erent users over the same work ow, multiple relative work ow views could be
derived for di erent users that have di erent relationship with the service (e.g.
the retailer service has di erent relationship with customer and wholesaler).
      </p>
      <p>
        The idea of applying the concept of di erentiation in software led was rstly
proposed by Kang et al [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] in the study of Feature-Oriented Domain Analysis
which was based on Abstraction and Re nement in a domain. In their work,
Abstraction represented generic domain products; Re nement was used to extend
the Abstraction to support di erent domain applications. Cao et al [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] further
extended the work in Feature-Oriented Domain Analysis by providing an
algorithm to automate abstraction re nement. The idea of service di erentiation
(Di Serv) was rstly proposed in the area of managing tra c streams in
networking applications [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. For example, certain tra c is treated better than the
others in terms of faster handling, more average bandwidth, and lower average
loss rate. Veryard [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] argued that the di erentiated services should be used as a
design pattern in SOC area. He pointed out the need for service di erentiation in
E-business using an airport example - the airport service needs to meet di erent
requirements of passengers in terms of security, performance and etc. However,
no design method is provided to realize the service di erentiation. In our
previous work [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a Di erentiated Service Design that use policy to control
the service to provide di erentiated functionalities to users, hence realize service
di erentiation.
      </p>
      <p>
        Wombacher et al [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] used nite state machine based model to describe service
interface, a matchmaking algorithm was provided based on the model to identify
if provided interface is compatible with the user required interface. However,
simply showing compatible (or incompatible) is insu cient to help resolve the
mismatches. Benatallah et al [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] further classi ed the compatibility into
several categories. Aalst et al [13] de ne the conformance of service behavior
based on tness and appropriateness. All these work provides a foundation to
service adaptation which overcomes the incompatibilities identi ed.
      </p>
      <p>
        Based on the matchmaking research work been done, Benatallah et al [14]
[15] [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] developed adapter based mechanisms that split/combine messages or
swap message sequences to resolve certain types of mismatches. Because the
adapter is developed only based on the interfaces, it can not support policy
negotiation or process modi cation to overcome mismatches at policy or process
level. Using a totally di erent approach, we propose Adaptive Service Design
(ASD) for service provider. The ASD supports policy negotiation and process
modi cation to overcome the mismatches that can not be resolved by adapters.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Adaptive Service Design</title>
      <p>Instead of supporting a service with one monolithic business process and single
service interface, our design method is to separate the generic tasks that are
available to all users from the speci c tasks with certain context dependent
requirements. The design consists of four components: Abstract Business Process,
Policy, Policy Con gured Business Process (PCBP) and User Oriented Business
Process (UOBP).</p>
      <p>Abstract Business Process (ABP) consists of a set of activities and relevant
edges linking between activities. There are two types of activities: (1) concrete
activity that actually performs general tasks for all users; and (2) abstract activity
that executes di erent tasks or even execute di erent processes depending on
Policy. Abstract activities are linked to Policy which de nes how contexts aware
tasks (or processes) should be performed.</p>
      <p>Policy provides the mappings between usage contexts and tasks (or external
business processes). Take online shopping service as an example, in the
Checkout process, the "customer pro le" as an usage context can be retrieved from
the "login" activity. By applying 'provide discount' policy, "VIP customer" will
get further 15% discount by invoking the 'o er 15% discount' task. Depending
on the usage context values, the policy determines how to plug di erent tasks
(or business processes) into the ABP, and generate Policy Con gured Business
Processes (PCBP) which perform di erent business functions.</p>
      <p>
        After introducing the basic elements of ABP and Policy in the previous
sections, we can now provide a complete picture of how a 'concrete' business
process - Policy Con gured Business Process (PCBP), is generated. As discussed
before, an ABP is a process that contains abstract activities, which refer to policy
templates. A template consists of a set of mappings between context values
and business processes (or tasks in a simple situation). The number of tuples
(mappings) in a template determines the number of tasks can be performed
for the corresponding abstract activity. By replacing all the abstract activities
in ABP with policy speci ed tasks that come with di erent context conditions,
multiple PCBPs can be generated. PCBPs support users with di erent functions,
and thus realizes di erentiated services based on usage contexts. For example,
in Checkout process, the loyal customer and normal customer will be supported
by di erent Context Con gured Business Processes. We regard the process the
generate di erent PCBPs as Service Di erentiation. The details of the Service
Di erentiation can be found in our previous work [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Currently we are focus on constructing a mechanism to derive User Oriented
Business Process (UOBP) based on PCBP for User Required Interface (URI).
Each UOBP corresponds to one URI, it is totally compatible with the speci c
URI. The mechanism consists of three steps:
1. Generating User Service Interface Execution Paths. In this step a in nite set
of execution paths [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] can be derived from the user service interface.
2. Each execution path will be matched by the PCBP. If there is any mismatch,
the mismatch would be identi ed as one of followings: message mismatch,
process mismatch, and policy mismatch. Solutions as adapter development,
process modi cation and policy negotiation would be suggested
correspondingly to resolve the mismatch. An Adaptation E ort List is hence derived
to illustrate the total amount work needs to be done in order to adapt the
speci c execution paths.
3. An Adaptation E ort Tree can be derived by combining all the Adaptation
E ort Lists for the execution paths. The tree illustrate the total work needs
to be done to adapt the how service interface. User could also choose only
certain branches of the Adaptation E ort Tree to partially adapt the user
service interface.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>Service users or applications can often have the same goal but di erent
interaction requirements. In this paper, we proposed and argued the need for service
adaptation to serve the purpose mentioned above. We believe the adaptive
service should dynamically derive multiple User Oriented Business Processes for
di erent users required interfaces. The design is related with following research
areas: service description, service di erentiation, service matchmaking and
service adaptation.
5-9, 2007, Proceedings (ER). Volume 4801 of Lecture Notes in Computer Science.,
Springer (2007) 599{614
13. van der Aalst, W.M.P., Dumas, M., Ouyang, C., Rozinat, A., Verbeek, E.:
Conformance checking of service behavior. ACM Trans. Internet Techn. 8(3) (2008)
14. Benatallah, B., Casati, F., Grigori, D., Nezhad, H.R.M., Toumani, F.: Developing
adapters for web services integration. In Pastor, O., e Cunha, J.F., eds.:
Advanced Information Systems Engineering, 17th International Conference, CAiSE
2005, Porto, Portugal, June 13-17, 2005, Proceedings (CAiSE). Volume 3520 of
Lecture Notes in Computer Science., Springer (2005) 415{429
15. Kongdenfha, W., Saint-Paul, R., Benatallah, B., Casati, F.: An aspect-oriented
framework for service adaptation. In Dan, A., Lamersdorf, W., eds.: ICSOC.
Volume 4294 of Lecture Notes in Computer Science., Springer (2006) 15{26</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Tao</surname>
            ,
            <given-names>A.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Context aware di erentiated services development with congurable business processes</article-title>
          . In: EDOC, IEEE Computer Society (
          <year>2007</year>
          )
          <volume>241</volume>
          {
          <fpage>252</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Wombacher</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mahleko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neuhold</surname>
            ,
            <given-names>E.J.</given-names>
          </string-name>
          :
          <article-title>Ipsi-pf - a business process matchmaking engine based on annotated nite state automata</article-title>
          .
          <source>Inf. Syst. E-Business Management</source>
          <volume>3</volume>
          (
          <issue>2</issue>
          ) (
          <year>2005</year>
          )
          <volume>127</volume>
          {
          <fpage>150</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Nezhad</surname>
            ,
            <given-names>H.R.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Benatallah</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martens</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Curbera</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Casati</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Semiautomated adaptation of service interactions</article-title>
          . In Williamson,
          <string-name>
            <given-names>C.L.</given-names>
            ,
            <surname>Zurko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.E.</given-names>
            ,
            <surname>Patel-Schneider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.F.</given-names>
            ,
            <surname>Shenoy</surname>
          </string-name>
          , P.J., eds.: WWW,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2007</year>
          )
          <volume>993</volume>
          {
          <fpage>1002</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Chiu</surname>
            ,
            <given-names>D.K.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cheung</surname>
            ,
            <given-names>S.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karlapalem</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Till</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Work ow view driven cross-organizational interoperability in a web-service environment</article-title>
          . In Bussler,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Hull</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>McIlraith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.A.</given-names>
            ,
            <surname>Orlowska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.E.</given-names>
            ,
            <surname>Pernici</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Yang</surname>
          </string-name>
          , J., eds.
          <source>: WES</source>
          . Volume
          <volume>2512</volume>
          of Lecture Notes in Computer Science., Springer (
          <year>2002</year>
          )
          <volume>41</volume>
          {
          <fpage>56</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>An organisational perspective on collaborative business processes</article-title>
          . In van der Aalst,
          <string-name>
            <given-names>W.M.P.</given-names>
            ,
            <surname>Benatallah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Casati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Curbera</surname>
          </string-name>
          , F., eds.: Business Process Management. Volume
          <volume>3649</volume>
          ., Springer (
          <year>2005</year>
          )
          <volume>17</volume>
          {
          <fpage>31</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Kang</surname>
            ,
            <given-names>K.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cohen</surname>
            ,
            <given-names>S.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hess</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Novak</surname>
            ,
            <given-names>W.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peterson</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          :
          <article-title>Feature-oriented domain analysis (foda) feasibility study</article-title>
          .
          <source>Technical report</source>
          , Carnegie-Mellon University Software Engineering Institute (November
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Cao</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bryant</surname>
            ,
            <given-names>B.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burt</surname>
            ,
            <given-names>C.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raje</surname>
            ,
            <given-names>R.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olson</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Auguston</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Automating feature-oriented domain analysis</article-title>
          . In Al-Ani,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Arabnia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.R.</given-names>
            ,
            <surname>Mun</surname>
          </string-name>
          , Y., eds.: Software Engineering Research and Practice, CSREA Press (
          <year>2003</year>
          )
          <volume>944</volume>
          {
          <fpage>949</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Blake</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Black</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carlson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davies</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weiss</surname>
          </string-name>
          , W.:
          <article-title>Rfc247: An architecture for di erentiated services</article-title>
          . Available from: http://rfc.net/rfc2475.html (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Veryard</surname>
          </string-name>
          , R.:
          <article-title>Design pattern: Di erentiated service (fewer interfaces than components)</article-title>
          .
          <source>CBDI (December</source>
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Tao</surname>
            ,
            <given-names>A.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Supporting di erentiated services with con gurable business processes</article-title>
          . In: ICWS, IEEE Computer Society (
          <year>2007</year>
          )
          <volume>1088</volume>
          {
          <fpage>1095</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Benatallah</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Casati</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ponge</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toumani</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Compatibility and replaceability analysis for timed web service protocols</article-title>
          . In Benzaken, V., ed.: 21emes
          <string-name>
            <surname>Journees Bases de Donnees Avancees</surname>
            ,
            <given-names>BDA</given-names>
          </string-name>
          <year>2005</year>
          ,
          <string-name>
            <given-names>Saint</given-names>
            <surname>Malo</surname>
          </string-name>
          ,
          <fpage>17</fpage>
          -
          <lpage>20</lpage>
          octobre
          <year>2005</year>
          ,
          <string-name>
            <surname>Actes (Informal Proceedings)(BDA).</surname>
          </string-name>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Ponge</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Benatallah</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Casati</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toumani</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Fine-grained compatibility and replaceability analysis of timed web service protocols</article-title>
          . In Parent,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Schewe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.D.</given-names>
            ,
            <surname>Storey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.C.</given-names>
            ,
            <surname>Thalheim</surname>
          </string-name>
          , B., eds.: Conceptual Modeling - ER
          <year>2007</year>
          , 26th International Conference on Conceptual Modeling, Auckland, New Zealand, November
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>