Sciweavers

3645 search results - page 688 / 729
» Implementing mapping composition
Sort
View
HPDC
2007
IEEE
14 years 4 months ago
Towards adaptive, scalable, and reliable resource provisioning for wsrf-compliant applications
Although WSRF (Web Services Resource Framework) and Java-based hosting environment have been successful in dealing with the heterogeneity of resources and the diversity of applica...
Eun-Kyu Byun, Jae-Wan Jang, Jin-Soo Kim
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 4 months ago
Narrowband Interference Mitigation in Turbo-Coded OFDM Systems
— A method for the mitigation of the effect of narrowband interference (NBI) on the turbo decoder in OFDM systems is proposed. The presence of NBI leads to a contaminated Gaussia...
Sheetal Kalyani, Vimal Raj, Krishnamurthy Giridhar
IEEESCC
2007
IEEE
14 years 4 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...
IEEESCC
2007
IEEE
14 years 4 months ago
Exchanging Policies between Web Service Entities using Rule Languages
Web rule languages with the ability to cover various types of rules have been recently emerged to make interactions between web resources and broker agents possible. The chance of...
Nima Kaviani, Dragan Gasevic, Marek Hatala, Gerd W...
ISCA
2007
IEEE
103views Hardware» more  ISCA 2007»
14 years 4 months ago
Ginger: control independence using tag rewriting
The negative performance impact of branch mis-predictions can be reduced by exploiting control independence (CI). When a branch mis-predicts, the wrong-path instructions up to the...
Andrew D. Hilton, Amir Roth