Sciweavers

879 search results - page 110 / 176
» A Constraint Programming Approach for the Service Consolidat...
Sort
View
124
Voted
ICCAD
2003
IEEE
127views Hardware» more  ICCAD 2003»
16 years 10 days ago
Code Placement with Selective Cache Activity Minimization for Embedded Real-time Software Design
– Many embedded system designs usually impose (hard) read-time constraints on tasks. Thus, computing a tight upper bound of the worst case execution time (WCET) of a software is ...
Junhyung Um, Taewhan Kim
177
Voted
CIMCA
2006
IEEE
15 years 9 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
IOR
2007
82views more  IOR 2007»
15 years 3 months ago
Compensating for Failures with Flexible Servers
We consider the problem of maximizing capacity in a queueing network with flexible servers, where the classes and servers are subject to failure. We assume that the interarrival ...
Sigrún Andradóttir, Hayriye Ayhan, D...
122
Voted
WWW
2004
ACM
16 years 4 months ago
XQuery at your web service
XML messaging is at the heart of Web services, providing the flexibility required for their deployment, composition, and maintenance. Yet, current approaches to Web services devel...
Jérôme Siméon, Nicola Onose
144
Voted
JSS
2011
103views more  JSS 2011»
14 years 6 months ago
XML-manipulating test case prioritization for XML-manipulating services
: A web service may evolve autonomously, making peer web services in the same service composition uncertain as to whether the evolved behaviors are compatible with its original col...
Lijun Mei, W. K. Chan, T. H. Tse, Robert G. Merkel