micronized 发表于 2025-3-23 10:31:40

Dynamic Event-Based Monitoring in a SOA Environmentse attributes (commonly referred to as QoS attributes) do not allow reconfiguration while services are in execution. This paper presents a generic QoS-aware SOA mechanism able to monitor runtime quality attributes of services. The solution is dynamic, event-based, extensible, transparent and lightwe

追逐 发表于 2025-3-23 14:36:04

http://reply.papertrans.cn/71/7013/701219/701219_12.png

airborne 发表于 2025-3-23 19:04:11

Continuous Access to Cloud Event Services with Event Pipe Queries on a device or on the application tier of the enterprise software stack, is an important issue. Focusing on the consumption of the real-time events service, in this work we extend the Data Access Object (DAO) pattern of enterprise applications for on-demand access and analysis of real-time events..

Nonthreatening 发表于 2025-3-23 23:53:15

QoS-Enabled Distributed Mutual Exclusion in Public Cloudsof using such centralized solutions in the Google File System (GFS), for instance, reduces scalability, increases latency, creates a single point of failure, and tightly couples applications with the underlying services. In addition to these quality-of-service (QoS) and design problems, the GFS meth

Directed 发表于 2025-3-24 06:18:34

http://reply.papertrans.cn/71/7013/701219/701219_15.png

NORM 发表于 2025-3-24 08:11:28

Direct Anonymous Attestation: Enhancing Cloud Service User Privacy architecture provides cloud users with the abilities of controlling the extent of data sharing among their service accounts. A user is then enabled to link Cloud Service applications in such a way, that his/her personal data are shared only among designated applications. The anonymity of the platfo

cardiopulmonary 发表于 2025-3-24 14:37:10

Trust Management Languages and Complexityentials that define membership of roles and delegation of authority over a resource between the members of roles. Making an access control decision is equivalent to resolving a credential chain between the requester and the role, which members are authorized to use a resource. A credential is an ele

轻率看法 发表于 2025-3-24 16:01:36

http://reply.papertrans.cn/71/7013/701219/701219_18.png

争吵 发表于 2025-3-24 20:18:55

http://reply.papertrans.cn/71/7013/701219/701219_19.png

独裁政府 发表于 2025-3-25 00:21:09

2PSIM: Two Phase Service Identifying Method the system development. Selecting appropriate service identification method is essential for prosperity of any service-oriented architecture project. Automation, utilizing middle-out strategy, and quality assess of services, are three important criteria in evaluation of service identification metho
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: On the Move to Meaningful Internet Systems: OTM 2011; Confederated Interna Robert Meersman,Tharam Dillon,Mukesh Mohania Conference proceedi