A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is
In this paper we present a framework that supports run-time service discovery. ... The framework uses the former components to detect violations of requirements at run-time and uses the specifications of the violated requirements to generate queries for discovering services that could ... Note that, the decision on whether the violation of a requirement is significant enough to require the discovery of a new service is taken by the SCS manager based on pre-defined policies as described ...doi:10.1109/scc.2005.17 dblp:conf/IEEEscc/SpanoudakisZK05 fatcat:plwikhdrpza6nacblaapa6hv6y
The Quarterly Review
Among the mistakes of the home Government must probably be placed the policy pursued towards the Boer population and the Dutch of Cape Colony. ... But to the general consternation the discovery was made that ...
In this paper, we present Allia: a peer-to-peer caching based and policy-driven agentservice discovery framework to facilitate cross-platform service discovery in ad-hoc environments for mobile electronic ... Static directory based service discovery is unsuitable for mcommerce in ad-hoc environments. ... A description matching mechanism during service discovery is not specified or constrained by Allia framework. ...doi:10.1145/570705.570707 dblp:conf/wmc/RatsimorCJF02 fatcat:wv57j2m5hbhavf3lbrucoj7aji
Bio-Inspired Computing and Networking
Each agent/platform possesses behavior policies, as genes, each of which determines when to and how to invoke a particular behavior. ... Agents and platforms are designed to evolve and adjust their genes (behavior policies) through generations and autonomously improve their scalability, adaptability and survivability. ... For example, an agent may invoke the migration behavior to move toward a platform that forwards a large number of request messages for its services. ...doi:10.1201/b10781-23 fatcat:ufc3s2275naphkjmb6n5mk76pq
Lecture Notes in Computer Science
Little attention has been given to the specification and verification of context-aware composition of services during the requirement engineering process. ... However, so far, most of the research work in this area has been focused on the design of architectures handling service discovery, compatibility and orchestration. ... This work represents therefore a first step toward the design of service compositions aligned with different requirements policies. ...doi:10.1007/11596141_16 fatcat:ispbdefztbaxtaocd3upfugcy4
Proceedings of the 2006 international workshop on Service-oriented software engineering - SOSE '06
The rapid diffusion of service-oriented systems is becoming a reality in today's software engineering. ... The framework is also able to support run-time recovery actions, by performing service re-binding. ... During the execution, instead, WS Binder aims at dynamically binding the services either based on a global or a local (re)-binding policy. ...doi:10.1145/1138486.1138502 fatcat:pxmaz2dtbffnjnk35qvjkuy7iu
We designed and implemented algorithms to check policy compliance and integrated them in the service selection process of the OWL-S MatchMaker. ... Moreover, we propose to incorporate privacy and authentication policies into OWL-S descriptions and requester profiles. ... Policies are useful primarily during the discovery phase and for forming informal contracts. ...doi:10.1109/mis.2004.23 fatcat:6joffesvsnecfjp66bwwqmjrw4
Dynamic verification provides the means of monitoring aspects of peer behaviour at runtime and the capacity to react to identified violations with the aim of preserving the system in the desired state. ... Two services, an event broker discovery service (EBDS) and a monitor discovery service (MDS), are available as part of DVF to allow discovery of available event brokers and monitors respectively at runtime ... Related Work Research on P2P systems and protocols has flourished during the last few years with a variety of P2P protocols, peer and resource discovery approaches and network topology studies available ...doi:10.1109/iciw.2007.63 dblp:conf/iciw/KoulourisST07 fatcat:elryhp6i3vccjiddaqkkvtsbg4
Duke law journal
with a shareholder's request, and that by prosecuting all such requests, insiders could work toward the day when no attorney would find it profitable to investigate 16(b) violations. ... The Court of Appeals for the Second Circuit reiterated its statement from Gilson that it had not yet been necessary to decide the narrow issue of counsel fees for mere discovery of a claim. ...doi:10.2307/1371568 fatcat:shtwmqpu5ffexkkwhnhc5hsuei
Thus Service Level Agreement (SLA) is made between providers and customers that include service quality, resources capability, scalability, obligations and consequences in case of violations. ... This makes them to move towards cloud computing. ... sensors, discovery and monitoring. ...doi:10.5120/ijca2015907358 fatcat:oyfhbiawzffnzat6iz7jzcgcdi
Background Framework of Disability Systemic human rights violations against people with disabilities are usually interpreted as issues of service provision rather than being recognized as fundamental ... Department of Health and Human Services, 2008) and decided to use a light XHTML W3C compliant template for the layout, with few pictures, to reduce users waiting time and enhance accessibility. ...doi:10.4018/jvcsn.2012040101 fatcat:cfkmlzxcsvbxnokc5m6kbmpbtu
Therefore, an extension of the OM2M platform is proposed, defining a new policy enforcement plugin, which aims to manage the access to the resources provided by the platform itself and to handle any violation ... attempts of the policies. ... OM2M provides a horizontal service platform which facilitates the deployment of vertical applications and leads innovation towards an effective interoperability. ...doi:10.1109/icac.2015.59 dblp:conf/icac/SicariRCGM15 fatcat:7kiztt7z6fahxmaarlzknbc2my
This paper presents ongoing work toward an innovative approach, based on knowledge representation, to formally specify the contractual, administrative and technical contents of Service Level Agreements ... , and the network service management processes and their orchestration promoting network service autonomic management and configuration. ... ] , Web Service Modeling Language (WSML)  , focusing on web services discovery, composition, choreography and orchestration. ...doi:10.1109/inm.2007.374717 dblp:conf/im/AlipioNC07 fatcat:f7ophdluezfh7dcsllpbfzxgsq
Lecture Notes in Computer Science
and adapt dynamically through dynamic service discovery and binding. ... In service-oriented computing, the vision is a market of services with alternative providers offering the same services with different cost and quality of service (QoS) properties, where applications form ... CARISMA does not support dynamic service discovery that can trigger application reconfiguration and the rule-based policies do not consider prediction of non-functional properties. ...doi:10.1007/978-3-642-13645-0_2 fatcat:fij3eyt5zbgu3mouroytgk2gwu
Publishers represented that the only fair way to take care of the deficit was to spread it over the entire postal service. ... The French and Belgians are especially alarmed at the alleged discovery of parts for 40,000 ma- chine guns, which, the report says, have been cleverly camouflaged and concealed in storage. ...
« Previous Showing results 1 — 15 out of 40,213 results