40,213 Hits in 5.7 sec

A service discovery framework for service centric systems

G. Spanoudakis, A. Zisman, A. Kozlenkov
2005 2005 IEEE International Conference on Services Computing (SCC'05) Vol-1  
In this paper we present a framework that supports run-time service discovery.  ...  The framework uses the former components to detect violations of requirements at run-time and uses the specifications of the violated requirements to generate queries for discovering services that could  ...  Note that, the decision on whether the violation of a requirement is significant enough to require the discovery of a new service is taken by the SCS manager based on pre-defined policies as described  ... 
doi:10.1109/scc.2005.17 dblp:conf/IEEEscc/SpanoudakisZK05 fatcat:plwikhdrpza6nacblaapa6hv6y

Page 823 of The Quarterly Review Vol. 195, Issue 389 [page]

1902 The Quarterly Review  
Among the mistakes of the home Government must probably be placed the policy pursued towards the Boer population and the Dutch of Cape Colony.  ...  But to the general consternation the discovery was made that  ... 


Olga Ratsimor, Dipanjan Chakraborty, Anupam Joshi, Timothy Finin
2002 Proceedings of the 2nd international workshop on Mobile commerce - WMC '02  
In this paper, we present Allia: a peer-to-peer caching based and policy-driven agentservice discovery framework to facilitate cross-platform service discovery in ad-hoc environments for mobile electronic  ...  Static directory based service discovery is unsuitable for mcommerce in ad-hoc environments.  ...  A description matching mechanism during service discovery is not specified or constrained by Allia framework.  ... 
doi:10.1145/570705.570707 dblp:conf/wmc/RatsimorCJF02 fatcat:wv57j2m5hbhavf3lbrucoj7aji

A Biologically Inspired QoS-Aware Architecture for Scalable, Adaptive and Survivable Network Systems [chapter]

Paskorn Champrasert, Junichi Suzuki
2011 Bio-Inspired Computing and Networking  
Each agent/platform possesses behavior policies, as genes, each of which determines when to and how to invoke a particular behavior.  ...  Agents and platforms are designed to evolve and adjust their genes (behavior policies) through generations and autonomously improve their scalability, adaptability and survivability.  ...  For example, an agent may invoke the migration behavior to move toward a platform that forwards a large number of request messages for its services.  ... 
doi:10.1201/b10781-23 fatcat:ufc3s2275naphkjmb6n5mk76pq

Modeling and Analyzing Context-Aware Composition of Services [chapter]

Enzo Colombo, John Mylopoulos, Paola Spoletini
2005 Lecture Notes in Computer Science  
Little attention has been given to the specification and verification of context-aware composition of services during the requirement engineering process.  ...  However, so far, most of the research work in this area has been focused on the design of architectures handling service discovery, compatibility and orchestration.  ...  This work represents therefore a first step toward the design of service compositions aligned with different requirements policies.  ... 
doi:10.1007/11596141_16 fatcat:ispbdefztbaxtaocd3upfugcy4

WS Binder

Massimiliano Di Penta, Raffaele Esposito, Maria Luisa Villani, Roberto Codato, Massimiliano Colombo, Elisabetta Di Nitto
2006 Proceedings of the 2006 international workshop on Service-oriented software engineering - SOSE '06  
The rapid diffusion of service-oriented systems is becoming a reality in today's software engineering.  ...  The framework is also able to support run-time recovery actions, by performing service re-binding.  ...  During the execution, instead, WS Binder aims at dynamically binding the services either based on a global or a local (re)-binding policy.  ... 
doi:10.1145/1138486.1138502 fatcat:pxmaz2dtbffnjnk35qvjkuy7iu

Authorization and privacy for semantic Web services

L. Kagal, T. Finin, M. Paolucci, Navcen Srinivasan, K. Sycara, G. Denker
2004 IEEE Intelligent Systems  
We designed and implemented algorithms to check policy compliance and integrated them in the service selection process of the OWL-S MatchMaker.  ...  Moreover, we propose to incorporate privacy and authentication policies into OWL-S descriptions and requester profiles.  ...  Policies are useful primarily during the discovery phase and for forming informal contracts.  ... 
doi:10.1109/mis.2004.23 fatcat:6joffesvsnecfjp66bwwqmjrw4

Towards a Framework for Dynamic Verification of Peer-to-Peer Systems

Theofrastos Koulouris, George Spanoudakis, Theocharis Tsigkritis
2007 Second International Conference on Internet and Web Applications and Services (ICIW'07)  
Dynamic verification provides the means of monitoring aspects of peer behaviour at runtime and the capacity to react to identified violations with the aim of preserving the system in the desired state.  ...  Two services, an event broker discovery service (EBDS) and a monitor discovery service (MDS), are available as part of DVF to allow discovery of available event brokers and monitors respectively at runtime  ...  Related Work Research on P2P systems and protocols has flourished during the last few years with a variety of P2P protocols, peer and resource discovery approaches and network topology studies available  ... 
doi:10.1109/iciw.2007.63 dblp:conf/iciw/KoulourisST07 fatcat:elryhp6i3vccjiddaqkkvtsbg4

Counsel Fees for Discovery and Recovery of Short-Swing Profits

1969 Duke law journal  
with a shareholder's request, and that by prosecuting all such requests, insiders could work toward the day when no attorney would find it profitable to investigate 16(b) violations.  ...  The Court of Appeals for the Second Circuit reiterated its statement from Gilson that it had not yet been necessary to decide the narrow issue of counsel fees for mere discovery of a claim.  ... 
doi:10.2307/1371568 fatcat:shtwmqpu5ffexkkwhnhc5hsuei

Service Level Agreement based Scheduling Techniques in Cloud: A Survey

Rajeshwari B.S., M. Dakshayini, H.S. Guruprasad
2015 International Journal of Computer Applications  
Thus Service Level Agreement (SLA) is made between providers and customers that include service quality, resources capability, scalability, obligations and consequences in case of violations.  ...  This makes them to move towards cloud computing.  ...  sensors, discovery and monitoring.  ... 
doi:10.5120/ijca2015907358 fatcat:oyfhbiawzffnzat6iz7jzcgcdi

Enabling Virtual Knowledge Networks for Human Rights Monitoring for People with Disabilities

Christo El Morr, Mihaela Dinca-Panaitescu, Marcia Rioux, Julien Subercaze, Pierre Maret, Natalia Bogdan
2012 International Journal of Virtual Communities and Social Networking  
Background Framework of Disability Systemic human rights violations against people with disabilities are usually interpreted as issues of service provision rather than being recognized as fundamental  ...  Department of Health and Human Services, 2008) and decided to use a light XHTML W3C compliant template for the layout, with few pictures, to reduce users waiting time and enhance accessibility.  ... 
doi:10.4018/jvcsn.2012040101 fatcat:cfkmlzxcsvbxnokc5m6kbmpbtu

Secure OM2M Service Platform

Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini, Luigi Alfredo Grieco, Thierry Monteil
2015 2015 IEEE International Conference on Autonomic Computing  
Therefore, an extension of the OM2M platform is proposed, defining a new policy enforcement plugin, which aims to manage the access to the resources provided by the platform itself and to handle any violation  ...  attempts of the policies.  ...  OM2M provides a horizontal service platform which facilitates the deployment of vertical applications and leads innovation towards an effective interoperability.  ... 
doi:10.1109/icac.2015.59 dblp:conf/icac/SicariRCGM15 fatcat:7kiztt7z6fahxmaarlzknbc2my

A Logic-based Approach for IP Network Services Management and Configuration

Pedro Alipio, Jose Neves, Paulo Carvalho
2007 2007 10th IFIP/IEEE International Symposium on Integrated Network Management  
This paper presents ongoing work toward an innovative approach, based on knowledge representation, to formally specify the contractual, administrative and technical contents of Service Level Agreements  ...  , and the network service management processes and their orchestration promoting network service autonomic management and configuration.  ...  ] , Web Service Modeling Language (WSML) [16] , focusing on web services discovery, composition, choreography and orchestration.  ... 
doi:10.1109/inm.2007.374717 dblp:conf/im/AlipioNC07 fatcat:f7ophdluezfh7dcsllpbfzxgsq

Hosting and Using Services with QoS Guarantee in Self-adaptive Service Systems [chapter]

Shanshan Jiang, Svein Hallsteinsen, Paolo Barone, Alessandro Mamelli, Stephan Mehlhase, Ulrich Scholz
2010 Lecture Notes in Computer Science  
and adapt dynamically through dynamic service discovery and binding.  ...  In service-oriented computing, the vision is a market of services with alternative providers offering the same services with different cost and quality of service (QoS) properties, where applications form  ...  CARISMA does not support dynamic service discovery that can trigger application reconfiguration and the rule-based policies do not consider prediction of non-functional properties.  ... 
doi:10.1007/978-3-642-13645-0_2 fatcat:fij3eyt5zbgu3mouroytgk2gwu

Page 53 of The Independent Vol. 114, Issue 3893 [page]

1925 The Independent  
Publishers represented that the only fair way to take care of the deficit was to spread it over the entire postal service.  ...  The French and Belgians are especially alarmed at the alleged discovery of parts for 40,000 ma- chine guns, which, the report says, have been cleverly camouflaged and concealed in storage.  ... 
« Previous Showing results 1 — 15 out of 40,213 results