How to apply CBR methods in Web service composition? Вид публикации: Conference Paper Авторы: Sou¯ene Lajmi; Chirine Ghedira; Khaled Ghedira Источник: 2nd international conference on Security of information and networks (2006)