<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>PathExplorer: Service Mining for Biological Pathways on the Web</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>George Zheng</string-name>
          <email>gzheng@vt.edu</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Athman Bouguettaya</string-name>
          <email>athman.bouguettaya@csiro.au</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CSIRO ICT Centre</institution>
          ,
          <addr-line>Canberra, ACT</addr-line>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Virginia Tech</institution>
          ,
          <addr-line>Blacksburg, Virginia</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We propose to model biological processes using Web services to address limitations of existing biological representation methodologies. We apply our Web service mining tool, named PathExplorer, to discover potentially interesting biological pathways linking service models of biological processes. The tool uses an innovative approach to identify useful pathways based on graph-based hints and service-based simulation verifying user's hypotheses.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Biological pathways are represented as networks of interactions among
biological entities such as cell, DNA, RNA and enzyme. The exposure of biological
pathways are expected to deepen our understanding of how diseases come about
and help expedite drug discovery for treating them. Computer-based pathway
study currently relies on two main approaches of entity/process representation:
free-text descriptions and computer models. Free-text based approaches used in
GenBank [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], DIP [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], KEGG [
        <xref ref-type="bibr" rid="ref21 ref23">21, 23</xref>
        ], Swiss-Prot [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], and COPE [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] rely on
free text annotations and narratives [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ] to target towards human
comprehension. One major disadvantage with these approaches is their inherent lack
of support for computer-based simulation of these processes. Computer
models (e.g., [
        <xref ref-type="bibr" rid="ref17 ref22 ref27 ref3 ref4">3, 4, 17, 22, 27</xref>
        ]) of biological processes, on the other hand, are often
constructed to simulate biological processes in an isolated environment, limited
to the study of known pathways, and lack the ability to facilitate the
discovery of new pathways. We propose to use Web service modeling strategy [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] to
bridge the gaps between the two representation approaches. Using this strategy,
biological processes are modeled as Web service operations, which can be rst
described and published by one organization, and later discovered and invoked by
other independently developed applications. A service operation may consume
some input substance meeting a set of preconditions and then produce some
output substance as a result of its invocation. Some of these input and output
substances may themselves carry processes that are known to us and thus can be
also modeled and deployed as Web services. Domain ontologies containing de
nition of various entity types would be used by these Web services when referring
to their operation inputs and outputs. This service oriented process modeling
and deployment strategy not only allows for the identi cation of pathways
linking processes of biological entities, as do existing natural language processing
approaches (e.g., [
        <xref ref-type="bibr" rid="ref18 ref26">18, 26</xref>
        ]), but would more importantly bring about
unprecedented opportunity for validating such pathways right on the Web through
direct invocation of involved services. When enough details are captured in these
process models, this in-place invocation capability presents an inexpensive and
accessible alternative to existing in vitro and/or in vivo exploratory mechanisms.
In [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ], we applied our Web service mining framework [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] to WSML/WSDL
service models of biological processes that are deployed using WSMX [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] for the
discovery of biological pathways. We then explored the unprecedented
opportunity of evaluating such pathways right on the Web through direct invocation of
involved services. In this paper, we extend our approach to also provide
graphbased hints on discovered pathways to help user formulate hypotheses, which
can then be either con rmed or rejected based on simulation results, leading to
the identi cation of useful pathways.
      </p>
      <p>
        In the remainder of this paper, we rst describe in Section 2 the architecture
of PathExplorer. In Section 3, we introduce how we model biological processes as
WSML services. In Section 4, we describe the mechanisms PathExplorer uses to
discover pathways linking WSML service models of biological processes. In
particular, we focus on how PathExplorer identi es potentially interesting subgraphs
within such a pathway network. In Section 5, we describe our simulation
algorithm, rst introduced in [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] and since extended for this paper. The algorithm
is used to invoke Web services involved in discovered pathways for validation
and predictive analysis purposes. We then present and discuss our simulation
results from applying this algorithm. We conclude the paper in Section 6.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Architecture</title>
      <p>Promotion. When operation op1 of service sa produces an entity (i.e., output
parameter) that in turn provides service sb, we say that sa : op1 promotes sb, as
shown in Fig. 1 (a).
76!8 . : d cFd DCFEFG GL KJ D MNK $@: &amp;6!A!9 25/&amp;1 !B. bF]\N_N^Fchc_FFdf Fe‘gfFca hb^Fg HM NGIK &amp;|NHMF|NLG
"%! &amp;# !(’ #&amp; ’ )
=1 3h14*/= w fi›&amp;fl ‹ 'h“ «
GJ |Fk nl Gq5I rFG IstG INm j&amp;G k l KH G IFm t‡$! !·¡ ¡ ¥ ¡ § J$5Lh|hn5}~k |FKFnNMtll GGLqh&amp;KI
!¡ ¢t£⁄&amp;¥ƒ&lt;£&amp;⁄§¤$¡ ¥ ¡ §!
KJH
u xVy!z v w { &amp;
KJH
#"$ u rJKH l G M " &amp;! #*"%!&amp;# KD5H LG MNK …%‰¿‰¿`$´ J$Khl |FIFGL NIFK hmD
{ } ~ KFM l GLhK !! 5 ’ ) Itl K5H nFMtl Gq5I lJ G p G q5I ¶!‚ „ !–¢t§†V§¥ 't“ « ¡ § #"!Ko&amp;H GnhMN!lnhGM)’li
-%. /!0 10 2354
! *J ›&amp;fi» ‹ |FGLI FMNIG KFDINm ««
Inhibition. When operation op1 of service sa consumes an entity (i.e., input
parameter) that in turn provides service sb, we say that sa : op1 inhibits sb as
shown in Fig. 1 (b).</p>
      <p>
        Indirect Recognition3. A target operation opt indirectly recognizes a source
operation ops, if ops generates some or all input parameters of opt, as shown in
3 Indirect recognition is in contrast to direct recognition [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], where an operation can
be directly invoked by another. Direct recognition is applicable to
elds such as
e-commerce but not pathway discovery and is thus not included here.
previously unknown). An interactive session follows next with the user taking
hints from these highlighted interesting segments within the pathway network
and picking a handful of nodes representing services, operations and parameters
to pursue further. PathExplorer then attempts to link these nodes into a fully
connected graph using a subset of nodes and edges in the original graph. This
subgraph provides the user the basis to formulate hypotheses. As an example,
such a hypothesis may state that an increase in the dosage amount of Aspirin
will lead to the relief of pain, but may inadvertently increase the risk of
ulcer in the stomach. These hypotheses can be tested out via simulation, which
involves PathExplorer invoking the relevant service operations, changing the
quantity/attribute value of various entities involved. Simulation results showing
the dynamic relationships between these biological entities are then presented
to the user, whose subjective evaluation nally determines whether the pathway
in pursuit is actually useful.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Service-based Modeling of Biological Processes</title>
      <p>
        To model biological processes as Web services, we rst compiled a list of
conceptual process models shown in Fig. 2 that are based on [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
In addition to describing process models, these sources also reveal some simple
relevant pathways that can be manually put together. Multiple examples of
promotion, inhibition and indirect recognition can be found in these pathways. For
example, Fig. 2 (a) shows that 15 LO provides an operation called produce LXA4,
which promotes the service of LXA4. Fig. 2 (c) shows that upon injury, LTB4
recruits Neutrophil, promoting its service of producing COX2. Fig. 2 (i) shows that
Gastric Juice's service can inhibit the services of both Stomach Cell and Mucus.
Examples of indirect recognition can be found in Fig. 2 (h), where PLA2's service
can liberate Arachidonic Acid, which can in turn be used as input to either the
produce PGG2 operation of COX1's service or the produce PGE2 operation of
the COX2 service. Examples of pre- and post-conditions can be found in Fig. 2
(g), where NF- B/Rel when not phosphorylated can translocate from cytoplasm
to cell nucleus, where it can stimulate proin ammatory gene transcription.
NF
      </p>
      <p>B/Rel's service, however, may be inhibited by the I B service if NF- B/Rel is
bound by its corresponding operation when I B is not phosphorylated. We use
process models such as these as references when we develop real Web services.
We also use simple pathways manually constructed here as references when we
check the correctness of pathways automatically discovered in Section 4 using
our mining algorithms.</p>
      <p>
        Each of the conceptual process models is next captured in a Java class and
exposed through Axis2 [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] running inside a Jetty Web server [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] as a WSDL
service. Although the internal details of biological processes can be modeled as
WSDL Web services, WSDL itself does not provide elaborate mechanism for
expressing the pre- and post-conditions of service operations. WSDL also lacks the
semantics needed to unambiguously describe data types used by operation input
and output messages. We choose WSML [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] among others (e.g., OWL-S [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ],
WSDL-S [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]) to ll this gap due to the availability of WSMX, which supports
i
g
.
.
the deployment of ontologies and Web services described in WSML. We
categorize biological entities within our mining context into several ontologies. These
include Fatty Acid, Protein, Cell, and Drug. They would all refer to a Common
ontology containing generic entity types such as Substance, the root concept of
all entity types. We use UnknownSubstance as a placeholder for process inputs
that are not fully described in the literature. We also create a Miscellaneous
ontology capturing de nitions of entity types found in the literature that don't
seem to belong to any domain. Fig. 3 shows several ontologies including those for
cells, proteins, fatty acids and the miscellaneous entities rendered in WSMT [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>Using these ontologies, we then wrap the semantic interfaces of existing
WSDL services as WSML services. WSML supports the descriptions of pre- and
post-conditions in the capability section and the ontological type description in
the interface section. Fig. 4 gives an example of each for the NF kappaB Rel
service. The capability section states for the precondition that the input entity
instance named nfkbr should be of type NF kappaB Rel (de ned in the protein
ontology). In addition, nfkbr's locale should be cytoplasm and it should not be
phosphorylated. The interface section states that input entity NF kappaB Rel
has grounding with the translocate operation of the corresponding WSDL
service. The output from this service operation should be mapped to NF kappaB Rel
as de ned in the protein ontology.</p>
      <p>
        To work with WSML, we have made slight adaptations to our screening
algorithms so they can be applied directly to WSML services. First, we add a
provider property in the non functional properties (nfp) section of each WSML
service to indicate the corresponding ontological type of an entity that can
provide the service. PathExplorer uses this information to establish the relationship
between a service providing entity and the service it provides. Second, we add a
modelSource property in the nfp section to indicate the source information that
the model is based on. Third, we add a providerConsumable property in the nfp
section to indicate to PathExplorer whether the service providing entity should
be consumed along the invocation of its operation. For example, in order for
mucus (Fig. 2 (i)) to cover the wall of stomach, the mucus itself will have to be
consumed. Finally, our validation algorithm has been customized to work with
the service interrogation APIs of the WSMX runtime library for determining the
overlap between the postcondition of a source operation and the precondition
of a target operation. Unfortunately, WSML allows for the speci cation of
preand post-conditions for only an entire service, but not its individual operations.
Thus we have to split services that each originally has multiple operations into
several services (e.g., NF kappaB Rel 1 Service and NF kappaB Rel 2 Service)
so that di erent conditions can be individually speci ed for these operations.
PathExplorer uses the name of these services to keep track of their relationship
and uses that information to merge these services towards the end of the
screening phase. During simulation, PathExplorer uses lowering/lifting adapters [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]
to convert ontological entity instances used by WSML services to/from SOAP
messages used by WSDL services.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Discovery of Interesting Pathways</title>
      <p>
        Algorithms from [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] and [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] enabled PathExplorer to discover potentially
interesting pathways linking WSML service models of biological processes as
represented in Fig. 2. To support pathway visualization, PathExplorer generates a
GraphML le for each discovered pathway network and uses yEd [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] to
render the corresponding graph. We have since also developed new algorithms in
PathExplorer to help user, during the evaluation phase, formulate hypotheses
that would lead to the identi cation of useful pathways extended from interesting
segments. The addition of the modelSource property (Fig. 4) in the nfp section
allows PathExplorer to identify novel (i.e., interesting) linkages between service
models in a discovered pathway network by comparing the source indicator of
linkages in the pathway graph representing the three types of service/operation
recognitions as shown in Fig. 1. PathExplorer then automatically highlights these
edges in the graph, presenting them as visual aid to the user for focusing more on
nodes that may lead to the identi cation of useful pathways. After the user
selects nodes of interest, PathExplorer attempts to link them into a fully connected
graph to the extent possible using the following steps:
{ Coalescing nodes (e.g., a, b, c in Fig. 5) linked by interesting edges into a group.
{ Converting interesting nodes (e.g., t picked by user) and groups encompassing
interesting nodes (e.g., c, f ) into nuclei, i.e., graph expansion focus nodes.
{ Incrementally expanding all the nuclei. We use the heuristics of connecting all
the interesting nodes using as many interesting edges as possible. To achieve this,
whenever a newly encountered node is part of a non-nucleus group (e.g., one that
contains h, i and j), an additional expansion is also triggered and the whole group
are engulfed. The expansion stops when all nuclei are connected or when all nodes
in the graph are visited.
      </p>
      <p>Discovered pathway networks are rst presented to the user in yEd graphs
with interesting linkages highlighted. Once interesting nodes are picked by the
user, PathExplorer attempts to use the above process to link them into a fully
connected subgraph, an example of which is shown in Fig. 6 and highlighted
with thick edges. Such graphs are then presented to the user as basis for
hypothesis formulation. For brevity, we display only shortened names for nodes
in the graph. We keep the full name containing either the ontological path for
entity nodes or the WSML service path for both service and operation nodes
in a separate description eld (not shown in Fig. 6). In addition, we omit
preand post-condition details of operation linking edges such as the two forming a
loop between operation coverStomachWall and entity Stomach Cell 4. However,
4 The precondition along the upper edge states that Stomach Cell is not covered by
Mucus and the postcondition along the lower edge states that Stomach Cell is
covered by Mucus.
we keep track of the pre- and post-conditions in our algorithm as such
information along with the ontological entity paths and WSML service paths are needed
when we try to invoke these services during simulation. To ensure the correctness
of our algorithms, we compared segments within the automatically discovered
pathway network with those constructed manually in Fig. 2 and found them to
be consistent in all cases.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Pathway Simulation</title>
      <p>The veri cation of pathway validity can be carried out using a simulation
environment, where functions of biological Web services can be invoked in the order
as identi ed in pathway leads. A pathway lead identi ed in the screening phase
indicates the potential possibility of a pathway based on service and operation
recognition. Veri cation aims at determining if segments of an identi ed
pathway lead can indeed be enabled with a chain of relevant conditions. The second
important aspect of runtime simulation is its ability to support predictive
analysis. Based on pathway leads established from the screening phase and later
highlighted in the interactive hypothesis formulation sub-phase, the user may
attempt to predict certain outcome from indirect relationships derived from the
way the pathway network is laid out. For example, the user may predict based
on Fig. 6 that an increase in the dosage amount of Aspirin will lead to the relief
of pain, but may also increase the risk of ulcer in the stomach. Such prediction
can be tested out using a simulation strategy outlined in Algorithm 1.</p>
      <p>When an operation is to be invoked, the algorithm checks two factors. First,
it examines whether all the pre-conditions of the operation are met. An
operation that does not have available input entities meeting its preconditions should
simply not be invoked. Second, it determines how many instances are available
for providing the corresponding service. This factor is needed due to the fact
that biological entities of the same type each has a discrete service process that
deals with input and output of a nite proportion. The available instances of a
particular service providing entity will drive the amount of various other entities
they may consume and/or produce. For this reason, the algorithm treats each
entity node in a pathway network such as one shown in Fig. 6 as a container of
entity instances of the noted ontology type. In some cases, the service provider
is also used as an input parameter. For example, the sensePain operation from
the NociceptorService in Fig. 2 (f) has a precondition stating that the Nociceptor
itself should be bound in order to provide this service. In order to express this
precondition, we decided to include the service providing entity also as an input
parameter. In cases such as this, the number of service providing instances will
be determined by checking further whether each of the service providing entity
instances also meets the precondition of the corresponding operation.</p>
      <p>In Algorithm 1, an initial number of instances for each entity type et are
rst generated based on function f (et) (lines 01-03). It is conceivable that an
expert may want to create di erent number of instances at the beginning for
di erent entity types. Next, we conduct I iterations of operation invocations
(lines 05-31). We take a snapshot of the quantities at the end of each iteration
and before the very rst iteration (lines 30 and 04). We determine the number
of times the corresponding operation should be invoked based on the quantity of
the corresponding service providing entity (lines 7 to 15). To make sure that an
operation from a service providing entity of a small quantity also gets the chance
to be invoked, a random number generator is used (line 15). Upon invocation of
the operation, we remove corresponding entity instance based on the truth table
depicted in Fig. 7. When we determine the provider should be removed (lines 19
to 21), we remove the rst instance found in the corresponding container. Since
the provider is not the input parameter, it is consequently not involved in the
evaluation of the operation precondition. Thus we can remove any one instance
found in the container. Lines 22 to 24 are for removing the input parameter
instance when the corresponding condition is met. Finally, we add the output
parameter instance to the corresponding entity container (lines 25 and 26).</p>
      <p>Simulation results obtained from each run by the PathExplorer are compiled
into an Excel spreadsheet, which is then used to generate a plot such as those
in Fig. 8 (for the graph in Fig. 6), where the horizontal axis is for the number of
iterations and vertical axis is for quantity. Fig. 8 (a) shows that when the quantity
of Aspirin is 10, there is no sign of stomach erosion. When the quantity of Aspirin
increases to 40 in Fig. 8 (b), the quantity of stomach cell drops to around 30
after 150 iterations of operation invocation. This con rms the user hypothesis
that Aspirin has a side e ect on the stomach. In addition, we also noticed that
given a xed quantity of Aspirin, the reduction of the initial quantity of COX1
also has a negative e ect on the stomach (Fig. 8 (c) and (d)). When the initial
quantity of COX1 is high, it takes longer for all the COX1 to get acetylated by
Aspirin. As a result, enough PGG2 and consequently PGH2 and PGI2 will be
built up to feed into the produceMucus operation of the StomachCellService. As
the initial quantity of COX1 becomes smaller and while the depletion rate of
Mucus by GastricJuiceService remains the same, less Mucus is being produced
by the StomachCellService as less PGI2 becomes available.</p>
      <p>While Figures 8 (a) to (d) clearly illustrate the relationships between Aspirin
and Stomach Cell, the relationship between the dosage amount of Aspirin and
the sensation of pain is less obvious in these Figures. Except for Fig. 8 (a), which
shows some accumulation of PainSignal when the quantity of Aspirin is 10, the
rest of plots show no pattern of such accumulation or the variation thereof. A
closer look at the highlighted pathway in Fig. 6 reveals that this is actually
consistent with the way the simulation is set up. Since PainSignal is created and
then converted by the Brain to ReliefSignal, which disappears after it is sensed
by Nociceptor, this whole path at the bottom actually acts as a `leaky bucket'.
To examine exactly what is going on along that path, we decided to make two
changes in the simulation setting. First, we reduce the maximum frequency of
invoking the Brain service to half that of Nociceptor. This creates a potential
imbalance between the production rate of PainSignal and ReliefSignal since the
processPain operation from the BrainService will be consequently invoked less
frequently than the sensePain operation from the NociceptorService. Second, we
disable the senseRelief operation of the NociceptorService. This essentially stops
the leaking of the ReliefSignal that are generated as a result of the PainSignal.
When we apply only the rst change to the simulation, the imbalance of the
processing rates for PainSignal and ReliefSignal results in a net accumulation of
PainSignal when the quantity of Aspirin is 10 (Fig. 8 (e)). When the quantity</p>
      <p>W- 10
0 10 20 30 40 50 60 70 80 90 100 110 120 130 140 150
0 10 20 30 40 50 60 70 80 90 100 110 120 130 140 150
"$#
is increased to 40 (Fig. 8 (f)), we see there are some occasional and temporary
accumulation of PainSignal. Finally, we apply the second change along with
the rst one. Consequently, we notice that while the pattern of PainSignal's
accumulation hasn't changed much, there is a consistent accumulation of
ReliefSignal. Since each PainSignal is eventually converted to a ReliefSignal by the
Brain according to the highlighted pathway in Fig. 6, the rate of ReliefSignal's
accumulation actually provides a much better picture on how fast PainSignal
has been generated. We see that as the dosage amount of Aspirin increases, less
ReliefSignal is generated, an indication that less PainSignal has been generated.
Thus it is obvious that the increase of the dosage amount of Aspirin has a
positive e ect on the suppression of PainSignal's generation. This con rms the other
half of user's original hypothesis.</p>
      <p>Simulation results such as these presented in Fig. 8 provide information to a
pathway analyst who would otherwise get such information from in vitro and/or
in vivo exploratory mechanisms. Using the service-oriented simulation
environment, the interrelationships among various entities involved in the pathway
network can now be exposed in a more holistic fashion than traditional text-based
pathway discovery mechanisms, which inherently lack the simulation capability.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>We proposed to model biological processes as Web service to bridge the gap
between free-text description and traditional computer models of these processes.
We presented our service mining tool named PathExplorer and demonstrated the
feasibility of applying our service mining strategy to the discovery of pathways
linking service models of biological processes. We described how PathExplorer
identi es interesting segments in a pathway graph and automatically establishes
a fully connected graph linking nodes that the user is interested in exploring. The
graph, which is highlighted inside the discovered pathway network provides the
user the basis for formulating hypothesis, which can then be tested out through
simulation.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Apache</surname>
          </string-name>
          <article-title>axis2/java - next generation web services</article-title>
          . http://ws.apache.org/axis2/.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>2. Aspirin. http://www3.interscience.wiley.com:8100/legacy/college/boyer/ 0471661791/cutting edge/aspirin/aspirin.htm.</mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. Bps:
          <article-title>Biochemical pathway simulator</article-title>
          . http://www.brc.dcs.gla.ac.uk/projects/bps/.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>4. Copasi. http://mendes.vbi.vt.edu/tiki-index.php?page=COPASI.</mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>5. Jetty. http://www.mortbay.org/.</mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <article-title>Nf-kappab pathway</article-title>
          . http://www.cellsignal.com/reference/pathway/NF kappaB.jsp.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>7. Uniprotkb/swiss-prot. http://www.ebi.ac.uk/swissprot/.</mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>8. The web service modeling language wsml</article-title>
          . http://www.wsmo.org/wsml/wsmlsyntax.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>9. The web service modeling toolkit (wsmt)</article-title>
          . http://sourceforge.net/projects/wsmt.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <article-title>Web services execution environment</article-title>
          . http://sourceforge.net/projects/wsmx.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <article-title>Web services semantics - wsdl-s</article-title>
          . http://www.w3.org/Submission/WSDL-S/.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. yed - java graph editor. http://www.yworks.com/en/products yed about.
          <source>htm.</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <article-title>Owl-s: Semantic markup for web services</article-title>
          .
          <source>November</source>
          <year>2004</year>
          . http://www.w3.org/ Submission/OWL-S/.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Sunny</surname>
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Auyang</surname>
          </string-name>
          .
          <article-title>From experience to design - the science behind aspirin</article-title>
          . http://www.creatingtechnology.org/biomed/aspirin.htm.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>Roger</given-names>
            <surname>Brent</surname>
          </string-name>
          and
          <string-name>
            <given-names>Jehoshua</given-names>
            <surname>Bruck</surname>
          </string-name>
          .
          <article-title>Can computers help to explain biology?</article-title>
          <source>Nature</source>
          ,
          <volume>440</volume>
          (
          <issue>23</issue>
          ):
          <volume>416</volume>
          {
          <fpage>417</fpage>
          ,
          <string-name>
            <surname>March</surname>
          </string-name>
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. Jacques Cohen.
          <article-title>Bioinformatics: An introduction for computer scientists</article-title>
          .
          <source>ACM Computing Surveys</source>
          ,
          <volume>36</volume>
          (
          <issue>2</issue>
          ):
          <volume>122</volume>
          {
          <fpage>158</fpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. H. de Jong and M. Page.
          <article-title>Qualitative simulation of large and complex genetic regulatory systems</article-title>
          .
          <source>In Proceedings of the 14th European Conference on Arti cial Intelligence, ECAI</source>
          , pages
          <volume>141</volume>
          {
          <fpage>145</fpage>
          , Amsterdam,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Daming</surname>
          </string-name>
          Yao et. al.
          <article-title>Pathway nder: Paving the way toward automatic pathway extraction</article-title>
          .
          <source>In Proceedings of the Second Conference on Asia-Paci c Bioinformatics</source>
          , volume
          <volume>29</volume>
          , pages
          <fpage>52</fpage>
          {
          <fpage>62</fpage>
          ,
          <string-name>
            <surname>Dunedin</surname>
          </string-name>
          , New Zealand,
          <year>2004</year>
          . Australian Computer Society, Inc.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>Craig</given-names>
            <surname>Freudenrich</surname>
          </string-name>
          .
          <article-title>How pain works</article-title>
          . http://health.howstu works.com/pain.htm.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>Horst</given-names>
            <surname>Ibelgaufts</surname>
          </string-name>
          .
          <article-title>Cope - cytokines online path nder encyclopaedia</article-title>
          . http:// www.copewithcytokines.de/.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>M. Kanehisa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Goto</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Hattori</surname>
            ,
            <given-names>K. F.</given-names>
          </string-name>
          <string-name>
            <surname>Aoki-Kinoshita</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Itoh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Kawashima</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Katayama</surname>
            ,
            <given-names>M.</given-names>
            arki, and M.
          </string-name>
          <string-name>
            <surname>Hirakawa</surname>
          </string-name>
          .
          <article-title>From genomics to chemical genomics: new developments in kegg</article-title>
          .
          <source>Mucleic Acids Research</source>
          ,
          <volume>34</volume>
          :
          <fpage>354</fpage>
          {
          <fpage>357</fpage>
          ,
          <year>January 2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Peter D. Karp</surname>
            , Suzanne Paley, and
            <given-names>Pedro</given-names>
          </string-name>
          <string-name>
            <surname>Romero</surname>
          </string-name>
          .
          <article-title>The pathway tools software</article-title>
          .
          <source>Bioinformatics</source>
          ,
          <volume>18</volume>
          :S1 {
          <fpage>S8</fpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>Kanehisa</given-names>
            <surname>Laboratories</surname>
          </string-name>
          . Kegg:
          <article-title>Kyoto encyclopedia of genes and genomes</article-title>
          . http://www.genome.jp/kegg/.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>Misia</given-names>
            <surname>Landau</surname>
          </string-name>
          .
          <article-title>In ammatory villain turns do-gooder</article-title>
          . http://focus.hms.harvard. edu/2001/Aug10 2001/immunology.html.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>25. NCBI. Genbank. http://www.ncbi.nlm.nih.gov/Genbank/.</mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>See-Kiong Ng</surname>
            and
            <given-names>Marie</given-names>
          </string-name>
          <string-name>
            <surname>Wong</surname>
          </string-name>
          .
          <article-title>Toward routine automatic pathway discovery from on-line scienti c text abstracts</article-title>
          . volume
          <volume>10</volume>
          , pages
          <fpage>104</fpage>
          {
          <fpage>112</fpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Masaru</surname>
            <given-names>Tomita</given-names>
          </string-name>
          , Kenta Hashimoto, Koichi Takahashi, Thomas Simon Shimizu, Yuri Matsuzaki, Fumihiko Miyoshi,
          <string-name>
            <given-names>K.</given-names>
            <surname>Saito</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tanida</surname>
          </string-name>
          , Katsuyuki Yugi,
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Venter</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C. A. Hutchison</given-names>
            <surname>III</surname>
          </string-name>
          .
          <article-title>E-cell: software environment for whole-cell simulation</article-title>
          .
          <source>Bioinformatics</source>
          ,
          <volume>15</volume>
          (
          <issue>1</issue>
          ):
          <volume>72</volume>
          {
          <fpage>84</fpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28. UCLA.
          <article-title>Database of interacting proteins</article-title>
          . http://dip.doe-mbi.ucla.edu/.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>George</given-names>
            <surname>Zheng</surname>
          </string-name>
          and
          <string-name>
            <given-names>Athman</given-names>
            <surname>Bouguettaya</surname>
          </string-name>
          .
          <article-title>Mining web services for pathway discovery</article-title>
          .
          <source>In 2007 VLDB Workshop on Data Mining in Bioinformatics</source>
          , Vienna, Austria,
          <year>September 2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <given-names>George</given-names>
            <surname>Zheng</surname>
          </string-name>
          and
          <string-name>
            <given-names>Athman</given-names>
            <surname>Bouguettaya</surname>
          </string-name>
          .
          <article-title>A web service mining framework</article-title>
          .
          <source>In 2007 IEEE International Conference on Web Services (ICWS)</source>
          ,
          <source>Salt Lake City</source>
          , Utah,
          <year>July 2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <given-names>George</given-names>
            <surname>Zheng</surname>
          </string-name>
          and
          <string-name>
            <given-names>Athman</given-names>
            <surname>Bouguettaya</surname>
          </string-name>
          .
          <article-title>Discovering pathways of service oriented biological processes</article-title>
          .
          <source>In The Ninth International Conference on Web information Systems Engineering (WISE</source>
          <year>2008</year>
          ), Auckland, New Zealand,
          <year>September 2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>