<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">PathExplorer: Service Mining for Biological Pathways on the Web</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">George</forename><surname>Zheng</surname></persName>
							<email>gzheng@vt.edu</email>
							<affiliation key="aff0">
								<orgName type="institution">Virginia Tech</orgName>
								<address>
									<settlement>Blacksburg</settlement>
									<region>Virginia</region>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Athman</forename><surname>Bouguettaya</surname></persName>
							<email>athman.bouguettaya@csiro.au</email>
							<affiliation key="aff1">
								<orgName type="institution">CSIRO ICT Centre</orgName>
								<address>
									<settlement>Canberra</settlement>
									<region>ACT</region>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">PathExplorer: Service Mining for Biological Pathways on the Web</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">D4E69F932C38C9A0D3C7BA063D3B255C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T03:56+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We propose to model biological processes using Web services to address limitations of existing biological representation methodologies. We apply our Web service mining tool, named PathExplorer, to discover potentially interesting biological pathways linking service models of biological processes. The tool uses an innovative approach to identify useful pathways based on graph-based hints and service-based simulation verifying user's hypotheses.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Biological pathways are represented as networks of interactions among biological entities such as cell, DNA, RNA and enzyme. The exposure of biological pathways are expected to deepen our understanding of how diseases come about and help expedite drug discovery for treating them. Computer-based pathway study currently relies on two main approaches of entity/process representation: free-text descriptions and computer models. Free-text based approaches used in GenBank <ref type="bibr">[25]</ref>, DIP <ref type="bibr" target="#b25">[28]</ref>, KEGG <ref type="bibr" target="#b19">[21,</ref><ref type="bibr" target="#b21">23]</ref>, Swiss-Prot <ref type="bibr" target="#b5">[7]</ref>, and COPE <ref type="bibr" target="#b18">[20]</ref> rely on free text annotations and narratives <ref type="bibr" target="#b13">[15,</ref><ref type="bibr" target="#b14">16]</ref> to target towards human comprehension. One major disadvantage with these approaches is their inherent lack of support for computer-based simulation of these processes. Computer models (e.g., <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b15">17,</ref><ref type="bibr" target="#b20">22,</ref><ref type="bibr" target="#b24">27]</ref>) of biological processes, on the other hand, are often constructed to simulate biological processes in an isolated environment, limited to the study of known pathways, and lack the ability to facilitate the discovery of new pathways. We propose to use Web service modeling strategy <ref type="bibr" target="#b26">[29]</ref> to bridge the gaps between the two representation approaches. Using this strategy, biological processes are modeled as Web service operations, which can be first described and published by one organization, and later discovered and invoked by other independently developed applications. A service operation may consume some input substance meeting a set of preconditions and then produce some output substance as a result of its invocation. Some of these input and output substances may themselves carry processes that are known to us and thus can be also modeled and deployed as Web services. Domain ontologies containing definition of various entity types would be used by these Web services when referring to their operation inputs and outputs. This service oriented process modeling and deployment strategy not only allows for the identification of pathways linking processes of biological entities, as do existing natural language processing approaches (e.g., <ref type="bibr" target="#b16">[18,</ref><ref type="bibr" target="#b23">26]</ref>), but would more importantly bring about unprecedented opportunity for validating such pathways right on the Web through direct invocation of involved services. When enough details are captured in these process models, this in-place invocation capability presents an inexpensive and accessible alternative to existing in vitro and/or in vivo exploratory mechanisms. In <ref type="bibr" target="#b28">[31]</ref>, we applied our Web service mining framework <ref type="bibr" target="#b27">[30]</ref> to WSML/WSDL service models of biological processes that are deployed using WSMX <ref type="bibr" target="#b8">[10]</ref> for the discovery of biological pathways. We then explored the unprecedented opportunity of evaluating such pathways right on the Web through direct invocation of involved services. In this paper, we extend our approach to also provide graphbased hints on discovered pathways to help user formulate hypotheses, which can then be either confirmed or rejected based on simulation results, leading to the identification of useful pathways.</p><p>In the remainder of this paper, we first describe in Section 2 the architecture of PathExplorer. In Section 3, we introduce how we model biological processes as WSML services. In Section 4, we describe the mechanisms PathExplorer uses to discover pathways linking WSML service models of biological processes. In particular, we focus on how PathExplorer identifies potentially interesting subgraphs within such a pathway network. In Section 5, we describe our simulation algorithm, first introduced in <ref type="bibr" target="#b28">[31]</ref> and since extended for this paper. The algorithm is used to invoke Web services involved in discovered pathways for validation and predictive analysis purposes. We then present and discuss our simulation results from applying this algorithm. We conclude the paper in Section 6.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Architecture</head><p>Fig. <ref type="figure">1</ref> shows the architecture of PathExplorer, which starts with scope specification, a manual phase involving a domain expert defining mining context including functional areas (e.g., cell enzyme, drug functions) and/or locales (e.g., heart, brain) where these functions reside. Based on such mining context, PathExplorer establishes a hierarchy of domain ontology indices to speed up later phases in the mining process. Scope specification is followed by several automatic phases. The first of these is search space determination, where the mining context is used to define a focused library of existing Web services as the initial pool for further mining. The next is the screening phase, where Web services in the focused library would go through filtering algorithms for the purpose of identifying potentially interesting leads of service compositions or pathway segments. The filtering algorithms are based on the following three service/operation recognition mechanisms:</p><p>Promotion. When operation op 1 of service s a produces an entity (i.e., output parameter) that in turn provides service s b , we say that s a : op 1 promotes s b , as shown in Fig. <ref type="figure">1 (a)</ref>. </p><formula xml:id="formula_0">E 7F G 3H I H P #Q SR T U 3V 6T 3W I 3F X Y `X Sa T 3b T c R d X 8e 3F P SG 8f g &amp;h pi pq r q s t #u #r v q w xu y ! ¤ t u #r v q w xu T P # f G 8e 8F H I H R F X F X c T X Sa G # pa</formula><p>x p p p pd pe f p hg d p x hd f pg 4 ¤5 31 2 #2 3A &amp;9 A &amp;i j 8q k l u r q s pm t #l n hl q w o &amp;u 8r q p q w xn hl q q Ss r pq s s tq s xm u v w u v x y &amp;© 3 ¤z w { © 8 £ ¥ t 6| h} ~u pw tl q v hu Sv hn Sk | pn xl q q 8s } ~u pw l q v hu Sv hn Sk | xn hl q q s % 3 # 3) &amp; S" 9 0 !A { t !q ¢| pk n l q q Ss s tl u Sr n pw tl q q Ss &amp;I #a Q</p><formula xml:id="formula_1">h I #R B ¤G #a T H xf ! ¤</formula><p>Bt | ps ps q s xm Bt `r 7t u 8r v q w xu ph u hl l &amp; | ps s pq s pm t ! 6r t u #r v q w xu hh</p><formula xml:id="formula_2">| xw p| xh t u 8r v q w xu ¤ ! ! 3¡ ¢ t£ ¤ 8¥ ¦ `£ 8¤ § &amp; 6¡ ¥ ¡ § 3 © tª « ¬ 8® 8¯ °3 !± ¤¢ t § &amp;² § !¥ ¡ § &amp; t³ 6 3 3&amp;¡ µ &amp;¡ ¥ ¡ § ¶ 3• ¶ ¶ 3¸© hª « ¬ #® 8¯ ¶ • ¶ 3¸¹ ¶ ¹ « ¬ #® º ¬ 8® » « ¬ q 8i xu Sr n hl q q Ss Bu S} t u #r v q w xu ¼ 7½ &amp;¾ ¿½ &amp;À ¿Á 6Â © xª « ¬ «</formula><p>h u Sr v q w xu i pr q hv hq Ã Sq s xm u Ss l q l r u pm 8| pk n r u 8s tl q l q s pÄ pq } hq l q s xm q 8i xu Sr n hl q q Ss ¹ Fig. <ref type="figure">1</ref>. PathExplorer Architecture</p><p>Inhibition. When operation op 1 of service s a consumes an entity (i.e., input parameter) that in turn provides service s b , we say that s a : op 1 inhibits s b as shown in Fig. <ref type="figure">1 (b)</ref>.</p><p>Indirect Recognition<ref type="foot" target="#foot_0">3</ref> . A target operation op t indirectly recognizes a source operation op s , if op s generates some or all input parameters of op t , as shown in Fig. <ref type="figure">1 (c)</ref>.</p><p>Based on these recognition mechanisms coupled with a publication/subscriptionbased algorithm <ref type="bibr" target="#b27">[30]</ref>, linkages between Web services and their operations in the focused library can be quickly established from bottom-up. These pathway segment leads are then semantically verified based on a subset of operation preand post-conditions involving binary variables (e.g., whether the input to an operation is activated) and enumerated properties (e.g., the locale of an operation input). Finally, verified pathway segment leads are linked together using our link algorithms <ref type="bibr" target="#b26">[29]</ref> for establishing more comprehensive pathway network. Discovered pathways from the screening phase are input to the evaluation phase, which consists of four sub-phases. Objective evaluation identifies and highlights interesting segments of a pathway by checking whether such linkages are novel (i.e., previously unknown). An interactive session follows next with the user taking hints from these highlighted interesting segments within the pathway network and picking a handful of nodes representing services, operations and parameters to pursue further. PathExplorer then attempts to link these nodes into a fully connected graph using a subset of nodes and edges in the original graph. This subgraph provides the user the basis to formulate hypotheses. As an example, such a hypothesis may state that an increase in the dosage amount of Aspirin will lead to the relief of pain, but may inadvertently increase the risk of ulcer in the stomach. These hypotheses can be tested out via simulation, which involves PathExplorer invoking the relevant service operations, changing the quantity/attribute value of various entities involved. Simulation results showing the dynamic relationships between these biological entities are then presented to the user, whose subjective evaluation finally determines whether the pathway in pursuit is actually useful.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Service-based Modeling of Biological Processes</head><p>To model biological processes as Web services, we first compiled a list of conceptual process models shown in Fig. <ref type="figure" target="#fig_1">2</ref> that are based on <ref type="bibr" target="#b1">[2]</ref>, <ref type="bibr" target="#b4">[6]</ref>, <ref type="bibr" target="#b12">[14]</ref>, <ref type="bibr" target="#b17">[19]</ref> and <ref type="bibr" target="#b22">[24]</ref>.</p><p>In addition to describing process models, these sources also reveal some simple relevant pathways that can be manually put together. Multiple examples of promotion, inhibition and indirect recognition can be found in these pathways. For example, Fig. <ref type="figure" target="#fig_1">2</ref> (a) shows that 15 LO provides an operation called produce LXA4, which promotes the service of LXA4. Fig. <ref type="figure" target="#fig_1">2</ref> (c) shows that upon injury, LTB4 recruits Neutrophil, promoting its service of producing COX2. Fig. <ref type="figure" target="#fig_1">2</ref> (i) shows that Gastric Juice's service can inhibit the services of both Stomach Cell and Mucus.</p><p>Examples of indirect recognition can be found in Fig. <ref type="figure" target="#fig_1">2</ref> (h), where PLA2's service can liberate Arachidonic Acid, which can in turn be used as input to either the produce PGG2 operation of COX1's service or the produce PGE2 operation of the COX2 service. Examples of pre-and post-conditions can be found in Fig. <ref type="figure" target="#fig_1">2</ref> (g), where NF-κB/Rel when not phosphorylated can translocate from cytoplasm to cell nucleus, where it can stimulate proinflammatory gene transcription. NF-κB/Rel's service, however, may be inhibited by the IκB service if NF-κB/Rel is bound by its corresponding operation when IκB is not phosphorylated. We use process models such as these as references when we develop real Web services. We also use simple pathways manually constructed here as references when we check the correctness of pathways automatically discovered in Section 4 using our mining algorithms. Each of the conceptual process models is next captured in a Java class and exposed through Axis2 <ref type="bibr" target="#b0">[1]</ref> running inside a Jetty Web server [5] as a WSDL service. Although the internal details of biological processes can be modeled as WSDL Web services, WSDL itself does not provide elaborate mechanism for expressing the pre-and post-conditions of service operations. WSDL also lacks the semantics needed to unambiguously describe data types used by operation input and output messages. We choose WSML <ref type="bibr" target="#b6">[8]</ref> among others (e.g., OWL-S <ref type="bibr" target="#b11">[13]</ref>, WSDL-S <ref type="bibr" target="#b9">[11]</ref>) to fill this gap due to the availability of WSMX, which supports</p><formula xml:id="formula_3">¢¡ ¤£ ¦¥ ¨ § © © © ! #" © $ &amp;% ¢ ! ' $ ( ) ¨% 0 $ § 1 1 % 02 &amp; § © 3 © ¡ § 4 © ! 5" © &amp;% 0% % ! ' $ ( 3) 6% ¦ $ 1 1 7 &amp;8 2 § § 3" ( 39 ¤! ' ¢© 4 4 § © © A@ ( $ B 5© C9 &amp;B 5B D E 0F 1 G &amp;B 5 B D H ( 5I P B ! 3) #" " Q SR T U § G ¤B 5 B D S § © © ¡ ( 5© D " ( 9 ¨! ' 6V ¤! 4 4 E 0F 1 § 3" ( 39 ¤! ' ¨ ¢© 4 4 § 7 ¨! D " W B © § © 3 © ¡ $ © @ 4 © 5" © 9 &amp;B 5 B D ¡ © 3 ( $ © D #" ( 39 S! ' ¨ © 4 4 X Y 5a Y b c d c e f 5g d Y h i h p q p `r #s t ¢u v f R T U U ( @ © ! 5" ( ) w x© 3 ¤ § y© #© @ ( 5 $ ) " ' #© ( @ © ! 5" ( 3) ¨ x ¤ C E 0F 1 © ) " " Q @ ( 5 5 $ ) " ' © w © ¨ § © 5 © ) @ B #" D S" ( ( @ © ! 5" ( ) 9 ¤© © 5" ) @ © ( ) $ " ( 3) ( @ © ! 5" ( ) @ ( D " ( ) 5$ " ( ) 1 1 E 0F 1 D © © F @ ( 5 $ ) D B D " ! 3) © E 0F 1 © B 4 ! © ) #" " Q D #© 5© F @ ( 5 $ ) © ) #" " Q @ ( $ B © 1 7 ¨7 S2 E yF 1 ¢¡ ¤£ y2 § ¢¡ 6£ ¦2 § y© #© ¡ @ ( $ B #© C1 07 ¨E 02 t ¢ 0u ¢c q X Y 3`g Y d g 5 Y d r #q i `c e § 8 e #f g § 0© 3 #© ¡ ) $ h ¢i F e f 3j k ¢© 4 h ¢i F e 5f 3j k ¢© 4 E 0F 1 § ¡ ¡ " ! ) 5D 4 ( ! 5" © D " 9 ¨B 4 ! 5" © @ ( ) #I 4 ! 39 ¨9 ¤! " ( Q © ) 5© ¨" ! ) D 5 @ " ( )</formula><p>l q Y a i q c m ¨a #r 5`Y g q i d 5n q Y a i q c m ¤X 3o a q c o d q Y a i q c m X 3o a q c o d p xX Y 3`g Y d g Y 5d r 5q i `c e q Y a 5i q c Cm &amp;q 0X e Y g q i d n &amp;p a ¨ ¢c `p a o q o n § the deployment of ontologies and Web services described in WSML. We categorize biological entities within our mining context into several ontologies. These include Fatty Acid, Protein, Cell, and Drug. They would all refer to a Common ontology containing generic entity types such as Substance, the root concept of all entity types. We use UnknownSubstance as a placeholder for process inputs that are not fully described in the literature. We also create a Miscellaneous ontology capturing definitions of entity types found in the literature that don't seem to belong to any domain. Fig. <ref type="figure" target="#fig_2">3</ref> shows several ontologies including those for cells, proteins, fatty acids and the miscellaneous entities rendered in WSMT <ref type="bibr" target="#b7">[9]</ref>.</p><formula xml:id="formula_4">1 07 &amp;E 2 § © © ¡ § h © B #" ( @ ' 4 § © © ¡ 1 ( $ B #© ¢¡ 6£ ¦2 8 ) $ B #© ¥ r F ¡ E 0F 1 ¥ r F ¡ ) $ h ( © @ " ( E 0F 1 h © B #" ( @ ' 4 ! 5" 3 ) s B Q ¡ @ ( $ B © #t yf yu E 0F 1 t ¦f u § ¡ #t yf 0u D 5© #© © 5 B " 3h © B " ( @ ' 4 1 h © B #" ( @ ' 4 q Y a i q c ¨v m p X w o #d r 1 % 02 x ¥ y z E 0F 1 % 0D @ ) § 0© 3 © § ¢¡ ¤£ y2 ) 5$ &amp;8 { { | E 0F 1 ¢¡ ¤£ ¦¥ ! © #" Q 4 ! 5" © ¢¡ ¤£ ¦¥ ! © #" Q 4 ! 5" © ¢¡ ¤£ y2 E 0F 1 E 3F 1 8 { { F | ¡ 1 1 07 ¨7 S2 1 07 ¨E 02 E 0F 1 t p } ¦} u § 8 { 0{ 0F | ¤¦ 5 8 e #f E 0F 1 l p X Y `g Y d g Y 5d r q i 3`c e @ ' ( D @ ' ( Q 4 ! 5" © 8 e f p g Y d g Y 5d r 5q i `c e § ¥ r F ¡ D © © ¡ @ ( $ B © £ ¦% 0u E F 1 #£ ¢% u § ¡ #£ ¦% u ¨ § © © D B @ @ © D #D ) #I 4 ! 9 &amp;9 S! 5" ( ) ¡ ) " © ) #I 4 ! 9 ¨9 ¨! 5" ( ) C ¤ g g g ¨ © B 4 ! © 3) #" " Q h ¢i F e #f 3j k © 34 § © 5 © ¡ § ¡ D © ) D #© C1 y! ) E 0F 1 1 ! ) ¨D ) ! 4 #! 5" 3 ) #I 4 ! 39 ¤9 ¨! 5" ( ) E 0F 1 h ( © @ " ( ¡ " ! ) #D 9 &amp; " 01 0! ) ¢Y a p a c g `Y 5d 0p d S Y o 5X e E 0F 1 1 0! ) SD ) ! 4 5 ) ¨D @ ) 5! 4 ( 3 $ ¡ E 0F 1 k © 4 © 5I D ) 5! 4 ) ¨D @ ) ! 4 #( $ q Y a i q m ¤p X v q i n &amp;n i 3`p Y X q Y a i q m ¨d g p X i q 5a Y 5d e # § § @ ) ! 34 ¢( $ § © © ¡ " ! ) 5D 9 ¨ " 01 0! ) E 0F 1 1 0! ) ¤D 5 3) ! 4 ! " D @ ) ! 4 ( $ E F 1 1 ! ) ¨D ) ! 4 ! " 3 ! ) ¡ " ! 3) D 9 &amp; " 1 0! ) ¨k © 4 © 5I E 3F 1 k © 34 © 5I D 5 3) ! 4 ! " 3 ! ) E 0F 1 k © 4 © I D ) ! 4 #! 5" D @ ) 5! 4 ( $ § f ! ) ¨ § 0© 5 © ¡ @ ( © D D ¨1 0! 3 ) ¡ ¡ ¡ ¡ ¡ y ¡ h ( © @ " ( § y© #© D © ) D #© Ck © 34 © 5I</formula><p>Using these ontologies, we then wrap the semantic interfaces of existing WSDL services as WSML services. WSML supports the descriptions of pre-and post-conditions in the capability section and the ontological type description in the interface section. Fig. <ref type="figure" target="#fig_3">4</ref> gives an example of each for the NF kappaB Rel service. The capability section states for the precondition that the input entity instance named nfkbr should be of type NF kappaB Rel (defined in the protein ontology). In addition, nfkbr's locale should be cytoplasm and it should not be phosphorylated. The interface section states that input entity NF kappaB Rel has grounding with the translocate operation of the corresponding WSDL service. The output from this service operation should be mapped to NF kappaB Rel as defined in the protein ontology. ¢¡ ¤£ ¦¥ ¨ § ¦© ¦ © ¦ ¨ ! " $# &amp;% % ' ! )( 0¡ ¤£ !1 2( 31 ¦ ¤4 ¢% ' ¢¡ ¤£ ¦¥ 5% ' 0¡ ¤£ 6¥ 57 ¨¡ ¨8 5 ¤© !9 ¢% ' 0¡ ¤£ ¦¥ 07 ¨ @ ¥ ¤A ¢ © £ A ¦¡ " ¤© B !A DC E ¨ ! " $# &amp;% % ¨¡ A ¦ ¨F 5 ¤B A !£ ¦ ¤4 2( G1 ¦ ¤4 ¢% IH P !H 0¡ 5% &amp;Q R S 0T ¤© 6" " ¤© U S 6V !A ¦¥ W 0X W !H ¦A 6 ¨F 5 ¤B A Y ¢ a" ¤1 b ¨ " $# W% % ¨¡ ¤A ¦ ¨F 5 B A £ ¦ ! ¤4 2( 31 ¦ ¤4 ¢% dc 5 ¤1 ¦¥ ¤1 4 6 ¤A ¦¡ 5% &amp;e ¦ ¤1 6 ¤A ¦ ¨c 5 ! ¤1 ¦¥ ¤1 4 ¤8 ¦Y a ¢f B b ¨ " $# W% % ¨" @ ¥ $( G1 ¦ ¤4 ¢% f B a% &amp;A ¦¥ ¤A £ A ¦ ! ¡ 5% ¨X $( gX ¤Y a ¢` 0¡ ¤£ 6¥ ¨ !" $# &amp;% % ' h( 0¡ ¤£ 1 2( G1 ¦ ¤4 ¢% ' 0¡ ¤£ 6¥ 5% ' 0¡ ¤£ ¦¥ 57 S¡ ¨8 5 ¤© 9 Y a pi 5A ¦q ¨H ¦A ¦ ¨F 5 B A pQ R S 0T © ¦" " ¤© U S 6V !A ¦¥ W 0X W !H 6A ¦ ¨F 5 ¤B A !r " f B Y B 1 ¦ ! q @ ¤1 6 p ¤© ¦¡ ¨ § ¦© 6¥ @ ¤A s It ¦A !1 ¦ ¤4 A bu 5 A ¦ ¤4 ¢ ¨ " $# W% % &amp;1 S 0 ¤A 6 5 v ¤© ¦¡ ¨ § 6© ¦¥ @ ¤A w S " $# &amp;% % dH ¦A ¦ ¨F 5 ¤B !A x ¦ ¤4 a ¨ " $# W% % &amp;£ 1 f A 6¥ ¨H ¦1 ¦@ ¤B A a v ¤© ¦¡ ¨ § ¦© 6¥ @ ¤A w ¨ ! " $# &amp;% % dH ¦A ¦ ¨F 5 ¤B A !x ¦ ¤4 ¢% W4 ¢ ¨ " $# W% % ¨" ¤1 ¤F 0 f A ¦ 5 v © ¦¡ ¨ § ¦© ¦¥ @ ¤A b ¨ " y# &amp;% % ¨¡ ¤A ¦ SF 5 ¤B A £ ¦ ! ¤4 2( 31 ¦ ¤4 a% Ic 5 ¤1 ¦¥ 1 4 ¦ ¤A ¦¡ 5% e 6 ¤1 ¦ ¤A ¦ ¨c 0 ¤1 ¦¥ ¤1 4 ¤8 6Y Q R S 0T ¤© ¦" !" ¤© U S 6V A 6¥ 5 ¨ " $# W% % ¨" ¤1 ¤F 0 f A ¦ ¨ ¦1 ¦ !¡ @ ¤£ © ¦q ¥ ¤A a v ¤© ¦¡ ¨ § ¦© 6¥ @ ¤A w S " $# &amp;% % S¡ ¤A ¦ ¨F 5 ¤B A !£ ¦ ¤4 ( 31 ¦ ¤4 ¢% ¨ !@ ¤A ¢ A 6 f r " ¤£ ¦" ¤1 6 ¡ ¨c 5 ¤1 6¥ ¤1 4 ¤8 C " ¤1 Y e 6 ¤1 ¦ ¤A ¦ ¨c 0 ¤1 ¦¥ ¤1 4 8 To work with WSML, we have made slight adaptations to our screening algorithms so they can be applied directly to WSML services. First, we add a provider property in the non functional properties (nfp) section of each WSML service to indicate the corresponding ontological type of an entity that can provide the service. PathExplorer uses this information to establish the relationship between a service providing entity and the service it provides. Second, we add a modelSource property in the nfp section to indicate the source information that the model is based on. Third, we add a providerConsumable property in the nfp section to indicate to PathExplorer whether the service providing entity should be consumed along the invocation of its operation. For example, in order for mucus (Fig. <ref type="figure" target="#fig_1">2 (i)</ref>) to cover the wall of stomach, the mucus itself will have to be consumed. Finally, our validation algorithm has been customized to work with the service interrogation APIs of the WSMX runtime library for determining the overlap between the postcondition of a source operation and the precondition of a target operation. Unfortunately, WSML allows for the specification of preand post-conditions for only an entire service, but not its individual operations. Thus we have to split services that each originally has multiple operations into several services (e.g., NF kappaB Rel 1 Service and NF kappaB Rel 2 Service) so that different conditions can be individually specified for these operations.</p><formula xml:id="formula_5">i B !© ¦" ¤© ¦q ¥ ! ¨8 ¤© ¦ !¡ ¥ ¤1 B © ¦ ¤A " ¤A B !1 ¦ f ¤1 6 f A ¦r ¤A f U ¤8 r T q b£ !A £ ¦q ¤A ¦ ¨c 0r bQ R S 0T ¤© 6" " ¤© U S 6V A 6¥ $ ¥ 1 B © ¦¥ ¤A © ¦¡ ¨ § ¦© ¦¥ @ A ¥ $" ! ¤1 ¦¡ " ¤1 ¦ S8 5¥ ¤© ¦ ¤A f ¤© ¦¡ ¨ § ¦© ¦¥ !@ ¤A " 5 © ¦ f ' ¥ b s &amp;B 8 5 ¤1 ¦" ¥ ¤© 6¡ ¤£ ¢ © ¦ f ' " b r ¤© 6¥ ¡ ¤A ¢ ¢( " ¤1 ¦¡ B 1 ¦ f 1 ¦ f A ¦r ¤A f U ¤8 r T q b£ !A £ ¦q ¤A ¦ ¨c 0r bQ R S 0T ¤© 6" " ¤© U S 6V A 6¥ $ ¥ 1 B © ¦¥ ¤A © ¦¡ ¨ § ¦© ¦¥ @ A ¥ 5 © 6 f ' ¥ b s ¨ !@ ¤B ¦¥ ¤A ¦@ ¡ 0 ¢( ! ¤A ¦ r ¤© B !A pQ R S 0T ¤© 6" " ¤© U S 6V A 6¥ W 0X W !H ¦A 6 ¨F 5 ¤B A 5 ¤ ! ¤A ¦ r ¤© B A B 6 ¤1 ¦ ¤A 1 4 6 ¤© ¦" ¨8 Q !R S 0T ¤© ¦" " ¤© !U S 6V A ¦¥ W 0X ¨ !H ¦A ¦ ¨F 5 B A ¤ 5 ¤1 ¦ ¤A !1 4 ¦ ¤© ¦" ¨8 ¡ ¤© ¦ A ¤H 5 ¤4 ¦ ¤© ¦ !@ ¤A pQ R S ¢T ¤© ¦" " ¤© U ¤ 6V A ¦¥ W 0X W ¦H ¦A ¦ ¨F 5 ¤B A H 5 ¤© ¦ ¤A ¦¡ 4 ¦ ¤© ¦ @ A ¤£ ¦" ¤1 6 ¡ ¨c 5 ¤1 6¥ ¤1 4 ¤8 C " ¤1 Y e 6 ¤1 ¦ ¤A ¦ ¨c 0 ¤1 ¦¥ ¤1 4 8 i B 1 ¦ ¤B A ¦" " ¤1 Y Q R ¤ 0T ¤© ¦" " ¤© U ¤ 6V A ¦¥ 0 ! ¨t 5 ¤1 ¦@ f ¤4 w $ ¨ " $# &amp;% !% ¨¡ ¤A ¦ ¨F 5 ¤B !A £ ¦ ¤4 ( 31 ¦ ¤4 2# 3 ! ¦X 5% Q !R ¦T ¤© ¦" " ¤© U !V A ¦¥ 0¡ f ¥ ¤Y S 0¡ f ¥ $( ' ¤A ¦ r © B A x A ¦¡ ¡ © 4 A V A ¦r ¤A 6 ¤A ¦ ¤B A Q !R ¦T ¤© ¦" " ¤© !U V A ¦¥ 5% ¨ © ¦ ¡ ¥ ¤1 B © 6 ¤A ¢% ¨ ¤ a 1 ¦@ B 1 ¦ ¤B A ¦" " ¤1 Y Q R ¤ 0T ¤© ¦" " ¤© U ¤ 6V A ¦¥ ¤© ¦ !¡ ¤1 ¦ ¤V 6@ ¥ ¤A ¦¡ bQ R ¤ 0T ¤© ¦" " ¤© !U S 6V A ¦¥ W 0X ¨ !H ¦A ¦ ¨F 5 ¤B !A ¤ 5 ¤© ¦ ¡ ! ¤1 ¦ ¤V ¦@ !¥ ¤A ¦¡ ed !f g bh )i f</formula><p>PathExplorer uses the name of these services to keep track of their relationship and uses that information to merge these services towards the end of the screening phase. During simulation, PathExplorer uses lowering/lifting adapters <ref type="bibr" target="#b28">[31]</ref> to convert ontological entity instances used by WSML services to/from SOAP messages used by WSDL services.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Discovery of Interesting Pathways</head><p>Algorithms from <ref type="bibr" target="#b26">[29]</ref> and <ref type="bibr" target="#b28">[31]</ref> enabled PathExplorer to discover potentially interesting pathways linking WSML service models of biological processes as represented in Fig. <ref type="figure" target="#fig_1">2</ref>. To support pathway visualization, PathExplorer generates a GraphML file for each discovered pathway network and uses yEd <ref type="bibr" target="#b10">[12]</ref> to render the corresponding graph. We have since also developed new algorithms in PathExplorer to help user, during the evaluation phase, formulate hypotheses that would lead to the identification of useful pathways extended from interesting segments. The addition of the modelSource property (Fig. <ref type="figure" target="#fig_3">4</ref>) in the nfp section allows PathExplorer to identify novel (i.e., interesting) linkages between service models in a discovered pathway network by comparing the source indicator of linkages in the pathway graph representing the three types of service/operation recognitions as shown in Fig. <ref type="figure">1</ref>. PathExplorer then automatically highlights these edges in the graph, presenting them as visual aid to the user for focusing more on nodes that may lead to the identification of useful pathways. After the user selects nodes of interest, PathExplorer attempts to link them into a fully connected graph to the extent possible using the following steps:</p><p>-Coalescing nodes (e.g., a, b, c in Fig. <ref type="figure" target="#fig_4">5</ref>) linked by interesting edges into a group.</p><p>-Converting interesting nodes (e.g., t picked by user) and groups encompassing interesting nodes (e.g., c, f ) into nuclei, i.e., graph expansion focus nodes. -Incrementally expanding all the nuclei. We use the heuristics of connecting all the interesting nodes using as many interesting edges as possible. To achieve this, whenever a newly encountered node is part of a non-nucleus group (e.g., one that contains h, i and j), an additional expansion is also triggered and the whole group are engulfed. The expansion stops when all nuclei are connected or when all nodes in the graph are visited. Discovered pathway networks are first presented to the user in yEd graphs with interesting linkages highlighted. Once interesting nodes are picked by the user, PathExplorer attempts to use the above process to link them into a fully connected subgraph, an example of which is shown in Fig. <ref type="figure" target="#fig_5">6</ref> and highlighted with thick edges. Such graphs are then presented to the user as basis for hypothesis formulation. For brevity, we display only shortened names for nodes in the graph. We keep the full name containing either the ontological path for entity nodes or the WSML service path for both service and operation nodes in a separate description field (not shown in Fig. <ref type="figure" target="#fig_5">6</ref>). In addition, we omit preand post-condition details of operation linking edges such as the two forming a loop between operation coverStomachWall and entity Stomach Cell 4 . However, we keep track of the pre-and post-conditions in our algorithm as such information along with the ontological entity paths and WSML service paths are needed when we try to invoke these services during simulation. To ensure the correctness of our algorithms, we compared segments within the automatically discovered pathway network with those constructed manually in Fig. <ref type="figure" target="#fig_1">2</ref> and found them to be consistent in all cases.</p><formula xml:id="formula_6">¢¡ ¤£ ¦¥ ¨ § ©¡ ¦ ¤ ¥ ¥ § ! ¨" #¥ ¨£ %$ '&amp; )( ¦ § 0¥ 1 2 ¡ 3 4 ¦¥ ' ¥ £ 5 § 6( ¦$ 87 3 @9 BA C D E F G H 6D PI ¨E Q @F RG S G T @U VD ¨T W G W X C 6D E F @G H D Q I @D ¨E Y RW G Q T</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Pathway Simulation</head><p>The verification of pathway validity can be carried out using a simulation environment, where functions of biological Web services can be invoked in the order as identified in pathway leads. A pathway lead identified in the screening phase indicates the potential possibility of a pathway based on service and operation recognition. Verification aims at determining if segments of an identified pathway lead can indeed be enabled with a chain of relevant conditions. The second important aspect of runtime simulation is its ability to support predictive analysis. Based on pathway leads established from the screening phase and later highlighted in the interactive hypothesis formulation sub-phase, the user may attempt to predict certain outcome from indirect relationships derived from the way the pathway network is laid out. For example, the user may predict based on Fig. <ref type="figure" target="#fig_5">6</ref> that an increase in the dosage amount of Aspirin will lead to the relief of pain, but may also increase the risk of ulcer in the stomach. Such prediction can be tested out using a simulation strategy outlined in Algorithm 1.</p><p>When an operation is to be invoked, the algorithm checks two factors. First, it examines whether all the pre-conditions of the operation are met. An operation that does not have available input entities meeting its preconditions should simply not be invoked. Second, it determines how many instances are available for providing the corresponding service. This factor is needed due to the fact that biological entities of the same type each has a discrete service process that deals with input and output of a finite proportion. The available instances of a particular service providing entity will drive the amount of various other entities they may consume and/or produce. For this reason, the algorithm treats each entity node in a pathway network such as one shown in Fig. <ref type="figure" target="#fig_5">6</ref> as a container of entity instances of the noted ontology type. In some cases, the service provider is also used as an input parameter. For example, the sensePain operation from the NociceptorService in Fig. <ref type="figure" target="#fig_1">2</ref> (f) has a precondition stating that the Nociceptor itself should be bound in order to provide this service. In order to express this precondition, we decided to include the service providing entity also as an input parameter. In cases such as this, the number of service providing instances will be determined by checking further whether each of the service providing entity instances also meets the precondition of the corresponding operation.</p><p>In Algorithm 1, an initial number of instances for each entity type et are first generated based on function f (et) (lines 01-03). It is conceivable that an expert may want to create different number of instances at the beginning for different entity types. Next, we conduct I iterations of operation invocations (lines 05-31). We take a snapshot of the quantities at the end of each iteration </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>30:</head><p>Stats ← Tally entity quantities in each container; 31: end for and before the very first iteration (lines 30 and 04). We determine the number of times the corresponding operation should be invoked based on the quantity of the corresponding service providing entity (lines 7 to 15). To make sure that an operation from a service providing entity of a small quantity also gets the chance to be invoked, a random number generator is used (line 15). Upon invocation of the operation, we remove corresponding entity instance based on the truth table depicted in Fig. <ref type="figure" target="#fig_6">7</ref>. When we determine the provider should be removed (lines 19 to 21), we remove the first instance found in the corresponding container. Since the provider is not the input parameter, it is consequently not involved in the evaluation of the operation precondition. Thus we can remove any one instance found in the container. Lines 22 to 24 are for removing the input parameter instance when the corresponding condition is met. Finally, we add the output parameter instance to the corresponding entity container (lines 25 and 26).</p><p>Simulation results obtained from each run by the PathExplorer are compiled into an Excel spreadsheet, which is then used to generate a plot such as those in Fig. <ref type="figure" target="#fig_7">8</ref> (for the graph in Fig. <ref type="figure" target="#fig_5">6</ref>), where the horizontal axis is for the number of iterations and vertical axis is for quantity. Fig. <ref type="figure" target="#fig_7">8 (a)</ref> shows that when the quantity of Aspirin is 10, there is no sign of stomach erosion. When the quantity of Aspirin increases to 40 in Fig. <ref type="figure" target="#fig_7">8</ref> (b), the quantity of stomach cell drops to around 30 after 150 iterations of operation invocation. This confirms the user hypothesis that Aspirin has a side effect on the stomach. In addition, we also noticed that given a fixed quantity of Aspirin, the reduction of the initial quantity of COX1 also has a negative effect on the stomach (Fig. <ref type="figure" target="#fig_7">8</ref>   <ref type="figure" target="#fig_7">8 (a)</ref>, which shows some accumulation of PainSignal when the quantity of Aspirin is 10, the rest of plots show no pattern of such accumulation or the variation thereof. A closer look at the highlighted pathway in Fig. <ref type="figure" target="#fig_5">6</ref> reveals that this is actually consistent with the way the simulation is set up. Since PainSignal is created and then converted by the Brain to ReliefSignal, which disappears after it is sensed by Nociceptor, this whole path at the bottom actually acts as a 'leaky bucket'.</p><formula xml:id="formula_7">¡ £¢ ¥¤ §¦ ¨¢ §© §¤ © ¡ §¢ ¤ §¦ ¢ © !¤ " ¤ © # $© §¤ © % &amp; ' %( ¥&amp; ) § 0 1 §2 ¤ 3 4¤ §&amp; 3 4¤ £&amp; 5 4 5 4 6 6 6 7 7 6 7 7 8 @9 ¤ ¨9 ¥¤ © A¢ © B¤ ¤ © &amp; C9 §) §2 D1 ¤ D© ¤ £ ! " §¤ § 8 @9 ¤ ¨9 ¥¤ © A¢ §© £ §¤ © &amp; C9 §) §2 D1 ¤ D© ¤ £ ! " §¤ § # $© " §¤ © A &amp; ' ( &amp; C) § 0 1 §2 ¤ FE £G 4 H H H ¤ © ¤ %( " § ¡ £¢ ¤ I ¨9 ¥ ( D¢ ¥ © 0¤ ¤ © # P© " £ §¤ © A &amp; ' ( &amp; ) § 0 1 §2 ¤ FQ R TS U H F H H ¤ © ¤ ( V § ¡ C¢ ¤ B W9 ( F¢ © 0¤ ¤ ©</formula><p>To examine exactly what is going on along that path, we decided to make two changes in the simulation setting. First, we reduce the maximum frequency of invoking the Brain service to half that of Nociceptor. This creates a potential imbalance between the production rate of PainSignal and ReliefSignal since the processPain operation from the BrainService will be consequently invoked less frequently than the sensePain operation from the NociceptorService. Second, we disable the senseRelief operation of the NociceptorService. This essentially stops the leaking of the ReliefSignal that are generated as a result of the PainSignal. When we apply only the first change to the simulation, the imbalance of the processing rates for PainSignal and ReliefSignal results in a net accumulation of PainSignal when the quantity of Aspirin is 10 (Fig. <ref type="figure" target="#fig_7">8</ref>  is increased to 40 (Fig. <ref type="figure" target="#fig_7">8</ref> (f)), we see there are some occasional and temporary accumulation of PainSignal. Finally, we apply the second change along with the first one. Consequently, we notice that while the pattern of PainSignal's accumulation hasn't changed much, there is a consistent accumulation of Re-liefSignal. Since each PainSignal is eventually converted to a ReliefSignal by the Brain according to the highlighted pathway in Fig. <ref type="figure" target="#fig_5">6</ref>, the rate of ReliefSignal's accumulation actually provides a much better picture on how fast PainSignal has been generated. We see that as the dosage amount of Aspirin increases, less ReliefSignal is generated, an indication that less PainSignal has been generated. Thus it is obvious that the increase of the dosage amount of Aspirin has a positive effect on the suppression of PainSignal's generation. This confirms the other half of user's original hypothesis. Simulation results such as these presented in Fig. <ref type="figure" target="#fig_7">8</ref> provide information to a pathway analyst who would otherwise get such information from in vitro and/or in vivo exploratory mechanisms. Using the service-oriented simulation environment, the interrelationships among various entities involved in the pathway network can now be exposed in a more holistic fashion than traditional text-based pathway discovery mechanisms, which inherently lack the simulation capability.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>We proposed to model biological processes as Web service to bridge the gap between free-text description and traditional computer models of these processes. We presented our service mining tool named PathExplorer and demonstrated the feasibility of applying our service mining strategy to the discovery of pathways linking service models of biological processes. We described how PathExplorer identifies interesting segments in a pathway graph and automatically establishes a fully connected graph linking nodes that the user is interested in exploring. The graph, which is highlighted inside the discovered pathway network provides the user the basis for formulating hypothesis, which can then be tested out through simulation.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Examples of Conceptual Process Model and Simple Pathway</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Example Ontologies Rendered in WSMT</figDesc><graphic coords="6,240.38,442.60,270.00,151.83" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Semantic Interface Description in WSML</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Expansion of Interesting Segments</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. Discovered Pathway Rendered in yEd</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. Logic for Removing Entity Instance After Operation Invocation</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Fig. 8 .</head><label>8</label><figDesc>Fig. 8. Simulation Results</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>Algorithm 1 Simulation Algorithm Input: Pathway Network P N , function f () determining initial number of instances for an entity type, total number of iterations I, upper bound S for random number generator random with uniform distribution Output: Statistics Stats Variables: entity type et, entity instance container Container(et) of type et, operation op, input entity opin, output entity opout and precondition oppre 1: for all et ∈ P N do 2:</figDesc><table><row><cell>Container(et) ← create f (et) instances; 3: end for 4: Stats ← Tally entity quantities in each container; 5: for i = 0 to I do 6: for all op ∈ P N do 7: s ← op.getP roviderServce(); 8: etparameter ← op.getInputP arameter().getEntityT ype(); 9: et provider ← s.getP roviderEntityT ype(); 10: if etparameter = et provider then 11: n ← number of entities of type et provider that match oppre 12: else 13: n ← number of entities of type etparameter 14: end if 15: n ← n/S + ((random.nextInt(S) &lt; (n modulo S))?1 : 0); 16: for j = 0 to n do 17: if ∃opin ∈ Container(etparameter ) : opin matches oppre then 18: opout ← invoke(op) with opin; 19: if etparameter = et provider ∧ provider is consumable then 20: Container(et provider ).remove(0); 21: end if 22: if etparameter = et provider ∨ provider is consumable then 23: Container(etparameter ).remove(opin); 24: end if 25: etparameter ← opout.getEntityT ype(); 26: Container(etparameter ).add(opout); 27: end if 28: end for 29: end for</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>(c) and (d)). When the initial quantity of COX1 is high, it takes longer for all the COX1 to get acetylated by Aspirin. As a result, enough PGG2 and consequently PGH2 and PGI2 will be built up to feed into the produceMucus operation of the StomachCellService. As the initial quantity of COX1 becomes smaller and while the depletion rate of Mucus by GastricJuiceService remains the same, less Mucus is being produced by the StomachCellService as less PGI2 becomes available.While Figures 8 (a) to (d) clearly illustrate the relationships between Aspirin and Stomach Cell, the relationship between the dosage amount of Aspirin and the sensation of pain is less obvious in these Figures. Except forFig.</figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_0">Indirect recognition is in contrast to direct recognition<ref type="bibr" target="#b27">[30]</ref>, where an operation can be directly invoked by another. Direct recognition is applicable to fields such as e-commerce but not pathway discovery and is thus not included here.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_1">The precondition along the upper edge states that Stomach Cell is not covered by Mucus and the postcondition along the lower edge states that Stomach Cell is covered by Mucus.</note>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0" />			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="http://ws.apache.org/axis2/" />
		<title level="m">Apache axis2/java -next generation web services</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title/>
		<ptr target="http://www3.interscience.wiley.com:8100/legacy/college/boyer/0471661791/cuttingedge/aspirin/aspirin.htm" />
	</analytic>
	<monogr>
		<title level="j">Aspirin</title>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<ptr target="http://www.brc.dcs.gla.ac.uk/projects/bps/" />
		<title level="m">Bps: Biochemical pathway simulator</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<ptr target="http://mendes.vbi.vt.edu/tiki-index.php?page=COPASI" />
		<title level="m">Copasi</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<ptr target="http://www.cellsignal.com/reference/pathway/NFkappaB.jsp" />
		<title level="m">Nf-kappab pathway</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<ptr target="http://www.ebi.ac.uk/swissprot/" />
		<title level="m">Uniprotkb</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<ptr target="http://www.wsmo.org/wsml/wsml-syntax" />
		<title level="m">The web service modeling language wsml</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<ptr target="http://sourceforge.net/projects/wsmt" />
		<title level="m">The web service modeling toolkit (wsmt</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<ptr target="http://sourceforge.net/projects/wsmx" />
		<title level="m">Web services execution environment</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<ptr target="http://www.w3.org/Submission/WSDL-S/" />
		<title level="m">Web services semantics -wsdl</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<ptr target="http://www.yworks.com/en/productsyedabout.htm" />
		<title level="m">yed -java graph</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Owl-s: Semantic markup for web services</title>
		<ptr target="http://www.w3.org/Submission/OWL-S/" />
		<imprint>
			<date type="published" when="2004-11">November 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">Sunny</forename><forename type="middle">Y</forename><surname>Auyang</surname></persName>
		</author>
		<ptr target="http://www.creatingtechnology.org/biomed/aspirin.htm" />
		<title level="m">From experience to design -the science behind aspirin</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Can computers help to explain biology?</title>
		<author>
			<persName><forename type="first">Roger</forename><surname>Brent</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jehoshua</forename><surname>Bruck</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Nature</title>
		<imprint>
			<biblScope unit="volume">440</biblScope>
			<biblScope unit="issue">23</biblScope>
			<biblScope unit="page" from="416" to="417" />
			<date type="published" when="2006-03">March 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Bioinformatics: An introduction for computer scientists</title>
		<author>
			<persName><forename type="first">Jacques</forename><surname>Cohen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Computing Surveys</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="122" to="158" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Qualitative simulation of large and complex genetic regulatory systems</title>
		<author>
			<persName><forename type="first">H</forename><surname>Jong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Page</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 14th European Conference on Artificial Intelligence, ECAI</title>
				<meeting>the 14th European Conference on Artificial Intelligence, ECAI<address><addrLine>Amsterdam</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="141" to="145" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Pathwayfinder: Paving the way toward automatic pathway extraction</title>
		<author>
			<persName><forename type="first">Daming</forename><surname>Yao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second Conference on Asia-Pacific Bioinformatics</title>
				<meeting>the Second Conference on Asia-Pacific Bioinformatics<address><addrLine>Dunedin, New Zealand</addrLine></address></meeting>
		<imprint>
			<publisher>Australian Computer Society, Inc</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="52" to="62" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<author>
			<persName><forename type="first">Craig</forename><surname>Freudenrich</surname></persName>
		</author>
		<ptr target="http://health.howstuffworks.com/pain.htm" />
		<title level="m">How pain works</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">Horst</forename><surname>Ibelgaufts</surname></persName>
		</author>
		<ptr target="http://www.copewithcytokines.de/" />
		<title level="m">Cope -cytokines online pathfinder encyclopaedia</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">From genomics to chemical genomics: new developments in kegg</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kanehisa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Goto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hattori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">F</forename><surname>Aoki-Kinoshita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Itoh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kawashima</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Katayama</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hirakawa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mucleic Acids Research</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="354" to="357" />
			<date type="published" when="2006-01">January 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">The pathway tools software</title>
		<author>
			<persName><forename type="first">D</forename><surname>Peter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Suzanne</forename><surname>Karp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pedro</forename><surname>Paley</surname></persName>
		</author>
		<author>
			<persName><surname>Romero</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Bioinformatics</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="S1" to="S8" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Kegg: Kyoto encyclopedia of genes and genomes</title>
		<author>
			<persName><forename type="first">Kanehisa</forename><surname>Laboratories</surname></persName>
		</author>
		<ptr target="http://www.genome.jp/kegg/" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Inflammatory villain turns do-gooder</title>
		<author>
			<persName><forename type="first">Misia</forename><surname>Landau</surname></persName>
		</author>
		<ptr target="http://focus.hms.harvard.edu/2001/Aug102001/immunology.html" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">Toward routine automatic pathway discovery from on-line scientific text abstracts</title>
		<author>
			<persName><forename type="first">See-Kiong</forename><surname>Ng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marie</forename><surname>Wong</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="104" to="112" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">E-cell: software environment for whole-cell simulation</title>
		<author>
			<persName><forename type="first">Masaru</forename><surname>Tomita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kenta</forename><surname>Hashimoto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Koichi</forename><surname>Takahashi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Thomas</forename><surname>Simon Shimizu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yuri</forename><surname>Matsuzaki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fumihiko</forename><surname>Miyoshi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Saito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tanida</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Katsuyuki Yugi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A</forename><surname>Venter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Iii</forename><surname>Hutchison</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Bioinformatics</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="72" to="84" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">Database of interacting proteins</title>
		<ptr target="http://dip.doe-mbi.ucla.edu/" />
		<imprint/>
		<respStmt>
			<orgName>UCLA</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Mining web services for pathway discovery</title>
		<author>
			<persName><forename type="first">George</forename><surname>Zheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Athman</forename><surname>Bouguettaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">VLDB Workshop on Data Mining in Bioinformatics</title>
				<meeting><address><addrLine>Vienna, Austria</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007-09">2007. September 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">A web service mining framework</title>
		<author>
			<persName><forename type="first">George</forename><surname>Zheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Athman</forename><surname>Bouguettaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Web Services (ICWS)</title>
				<meeting><address><addrLine>Salt Lake City, Utah</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007-07">2007. July 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Discovering pathways of service oriented biological processes</title>
		<author>
			<persName><forename type="first">George</forename><surname>Zheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Athman</forename><surname>Bouguettaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Ninth International Conference on Web information Systems Engineering (WISE 2008)</title>
				<meeting><address><addrLine>Auckland, New Zealand</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008-09">September 2008</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
