In this paper, we propose a taxonomy that characterizes and classifies different components of autonomic application management in Grids. We also survey several representative Grid systems developed by various project...
详细信息
High level context recognition and situation detection are enabling technologies for unobtrusive mobile computing systems. Significant progress has been made in processing and managing context information, leading to ...
详细信息
ISBN:
(纸本)9781424477425
High level context recognition and situation detection are enabling technologies for unobtrusive mobile computing systems. Significant progress has been made in processing and managing context information, leading to sophisticated frameworks, middlewares, and algorithms. Despite great improvements, context aware systems still require a significantly increased recognition accuracy for high-level context information on uncertain sensor data to enable the robust execution of context-aware applications. Recently Adaptable Pervasive Work-flows (APF)s have been presented as innovative programming paradigm for mobile context-aware applications. We propose a novel Flow Context System (FlowCon) that builds upon APFs. FlowCon uses structural information from the APF to increase accuracy of uncertain high-level context information up to 49%. this way we make an important step to enable robust execution of mobile context-aware applications.
In this article RESTful semantic web services, a lightweight alternative for the description of semantic web services, are introduced. the conceptual model for this kind of semantic services is reviewed, showing the r...
详细信息
Many of the current service-oriented architectures are built on top of distributed object technologies. these technologies have, however, lost most of their initial appeal, mainly due to the inability to port their co...
详细信息
Withthe current generalisation of parallel architectures arises the concern of applying formal methods to parallelism. the complexity of parallel, compared to sequential, programs makes them more error-prone and diff...
详细信息
Conic curves cryptosystem is a new technology for achieving information security. Point-addition and point-double are fundamental operations in conic curves cryptosystem over ring Zn. there is no existing research abo...
详细信息
this paper proposes a scheme for automatic detection of view access in the View-Oriented parallel Programming (VOPP) model. VOPP is a shared-memory-based, data-centric model that uses "views" to bundle mutua...
详细信息
Combining virtual machine technology, virtual computing is able to effectively aggregate the widely distributed resources to provide users services. We view the federation of multiple data centers and voluntary resour...
详细信息
the distributed optimal path planning (D-OPP) problem has been a bottleneck restricting the performance of Peer-to-Peer (P2P) workflow systems which have met the development trend of workflow systems and been one of t...
详细信息
Concurrency control in distributed and parallelapplications has been studied for many years but is still an ongoing research topic. Transactional memory addresses this challenge for multicore processors by proposing ...
详细信息
暂无评论