Sciweavers

2422 search results - page 142 / 485
» Composition of Services with Constraints
Sort
View
ICSOC
2009
Springer
13 years 7 months ago
Using Personal Information Management Infrastructures to Facilitate User-Generated Services for Personal Use
Ad-hoc and situational applications for personal use will gain more and more traction in the work support for knowledge workers (KWers). Personal information is a key element in th...
Olaf Grebner
TSC
2010
133views more  TSC 2010»
13 years 7 months ago
Semantic-Based Mashup of Composite Applications
—The need for integration of all types of client and server applications that were not initially designed to interoperate is gaining popularity. One of the reasons for this popul...
Anne H. H. Ngu, Michael Pierre Carlson, Quan Z. Sh...
COMPSAC
2005
IEEE
14 years 2 months ago
Constraint Violation Detection: A Fundamental Part of Software Cybernetics
Monitoring of sensitive events is a key step for controlling the behavior of software. Specifying a sufficient set of constraints prior to software deployment is necessary for det...
Qianxiang Wang
SAC
2009
ACM
14 years 4 months ago
Applying Reo to service coordination in long-running business transactions
Ensuring transactional behavior of business processes and web service compositions is an essential issue in the area of serviceoriented computing. Transactions in this context may ...
Natallia Kokash, Farhad Arbab
AUSAI
2006
Springer
14 years 1 months ago
Heyting Domains for Constraint Abduction
Abstract. We investigate constraint domains in which answers to constraint abduction problems can be represented compactly by a most general answer. We demonstrate several classes ...
Michael J. Maher