Results 1 - 10
of
30,080
Table 2: Adaptive middleware categorized by middleware layers and adaptation type.
2003
"... In PAGE 31: ... Middleware Application Domain Layers QoS-Enabled Dependable Embedded Domain-Services Common- QuO OGS, IRL, FTS, Services TAO-LB, Racks TAO, CIAO, Orbix, OpenORB, FRIENDS, UIC, Distribution Squirrel, DynamicTAO, Electra, ZEN, FlexiNET, OpenCorba, AspectIX Orbix+Isis Orbix/E Host-Infra. ACE, Eternal, Isis, Horus, PersonalJava MetaSockets Ensemble, Totem, Rocks EmbeddedJava Table2 categorizes the adaptive middleware projects using the middleware layers and adaptation type. This table shows that adaptive middleware research has exploited both static and dynamic adaptations.... In PAGE 31: ... Safe adaptation can harness the dangerous power of dynamic adaptation provided by mutable middleware. Table2 also shows that... ..."
Cited by 7
Table 2: Adaptive middleware categorized by middleware layers and adaptation type.
"... In PAGE 31: ... Middleware Application Domain Layers QoS-Enabled Dependable Embedded Domain-Services Common- QuO OGS, IRL, FTS, Services TAO-LB, Racks TAO, CIAO, Orbix, OpenORB, FRIENDS, UIC, Distribution Squirrel, DynamicTAO, Electra, ZEN, FlexiNET, OpenCorba, AspectIX Orbix+Isis Orbix/E Host-Infra. ACE, Eternal, Isis, Horus, PersonalJava MetaSockets Ensemble, Totem, Rocks EmbeddedJava Table2 categorizes the adaptive middleware projects using the middleware layers and adaptation type. This table shows that adaptive middleware research has exploited both static and dynamic adaptations.... In PAGE 31: ... Safe adaptation can harness the dangerous power of dynamic adaptation provided by mutable middleware. Table2 also shows that... ..."
Table 5. From DL-safe rules (Datalog safeness condition)
"... In PAGE 15: ...3. Examples DL-safe Rules In Table5 , the hybrid rule of \BadChild quot; has a variable ?Y as the pure-DL variable, and the binary DL queries of parent(?X, ?Y) and parent(?Z, ?Y) are chained by this ?Y, con icting with our deflnition of independent properties. That means, our system fails to infer \BadChild(Cain) quot; under the Datalog safeness condition, lacking of expressions for nominals such as 9parent.... ..."
Table 3. From non-recursive CARIN (Datalog safeness condition)
"... In PAGE 14: ...2. Examples from CARIN Here ( Table3 ), in the second hybrid rule of \price quot;, the variable ?Z is a pure- DL variable, such that associate(?Y, ?Z) and american(?Z) have a folding result of 9associate.american(?Y).... ..."
Table V Average total network throughput of MP and SDN+HFD in single-cell simulation as different sizes of UDP packet are used UDP Packet Size (Byte) 50 210 500 1460
2006
Cited by 1
Table 11. Large Hybrid Network Parameters
1999
"... In PAGE 6: ...We compared the performance of two policies, namely policy which allocates all the channels to the satellite and policy ~ which partitions the total number of chan- nels equally between the satellite and the cellular lay- ers. For the numerical parameters given in Table11 , the blocking and dropping probabilities for policy turned out to be 0.... ..."
Cited by 3
Table 3: Ring frame modal frequencies for an updated hybrid model and a refined hybrid model (twice the plate elements)
Table 4. Modified SDN Packet
"... In PAGE 6: ...The modified format of the SDN packet utilizes 238 of the 240 bytes available to transmit information about the image, and the first two bytes for the numeration of the packets ( Table4 ). Taking into account the fact that the Profibus packets dedicate 16 of the 256 bytes available to control information [10], useful information is reduced for each packet to 94.... ..."
Table 2 Hybrid Protocol
1996
"... In PAGE 11: ... The current algorithm used to select data is fairly imprecise, and marks all arrays accessed in parallel as data requiring updates. Table2 contains statistics on di s, page invalidations, remote misses, and messages both with and without compiler-generated barrier ushes. Because of the interference with lazy di ng, described below, barrier ushes uniformly create more di s.... In PAGE 14: ...low \Percent Useful quot; number in Table2 . Merely detecting such changes and directing the DSM to clear copysets would eliminate most problems associated with phase changes.... ..."
Cited by 7
Results 1 - 10
of
30,080