Sciweavers

738 search results - page 33 / 148
» Comparison of Approaches to Service Deployment
Sort
View
HCI
2009
13 years 7 months ago
The OASIS Concept
Abstract. OASIS is an Integrated Project with the aim to revolutionise the interoperability, quality, breadth and usability of services for all daily activities of the elderly, by ...
Evangelos Bekiaris, Silvio Bonfiglio
COMPSAC
2005
IEEE
14 years 3 months ago
Constraint Violation Detection: A Fundamental Part of Software Cybernetics
Monitoring of sensitive events is a key step for controlling the behavior of software. Specifying a sufficient set of constraints prior to software deployment is necessary for det...
Qianxiang Wang
CF
2010
ACM
14 years 1 months ago
Towards greener data centers with storage class memory: minimizing idle power waste through coarse-grain management in fine-grai
Studies have shown much of today’s data centers are over-provisioned and underutilized. Over-provisioning cannot be avoided as these centers must anticipate peak load with burst...
In Hwan Doh, Young Jin Kim, Jung Soo Park, Eunsam ...
AICT
2006
IEEE
225views Communications» more  AICT 2006»
13 years 11 months ago
Migration to 4 G: Mobile IP based Solutions
Fourth Generation (4G) is the next generation of wireless networks that will replace third Generation (3G) networks sometimes in future. 4G is intended to provide high speed, high...
K. R. Santhi, G. Senthil Kumaran
SIGSOFT
2007
ACM
14 years 10 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...