• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 30,080
Next 10 →

Table 2: Adaptive middleware categorized by middleware layers and adaptation type.

in A Survey of Adaptive Middleware
by S. M. Sadjadi 2003
"... In PAGE 31: ... Middleware Application Domain Layers QoS-Enabled Dependable Embedded Domain-Services Common- QuO OGS, IRL, FTS, Services TAO-LB, Racks TAO, CIAO, Orbix, OpenORB, FRIENDS, UIC, Distribution Squirrel, DynamicTAO, Electra, ZEN, FlexiNET, OpenCorba, AspectIX Orbix+Isis Orbix/E Host-Infra. ACE, Eternal, Isis, Horus, PersonalJava MetaSockets Ensemble, Totem, Rocks EmbeddedJava Table2 categorizes the adaptive middleware projects using the middleware layers and adaptation type. This table shows that adaptive middleware research has exploited both static and dynamic adaptations.... In PAGE 31: ... Safe adaptation can harness the dangerous power of dynamic adaptation provided by mutable middleware. Table2 also shows that... ..."
Cited by 7

Table 2: Adaptive middleware categorized by middleware layers and adaptation type.

in A Survey for Ph.D. Qualifier Exam. A Survey of Adaptive Middleware
by S. M. Sadjadi
"... In PAGE 31: ... Middleware Application Domain Layers QoS-Enabled Dependable Embedded Domain-Services Common- QuO OGS, IRL, FTS, Services TAO-LB, Racks TAO, CIAO, Orbix, OpenORB, FRIENDS, UIC, Distribution Squirrel, DynamicTAO, Electra, ZEN, FlexiNET, OpenCorba, AspectIX Orbix+Isis Orbix/E Host-Infra. ACE, Eternal, Isis, Horus, PersonalJava MetaSockets Ensemble, Totem, Rocks EmbeddedJava Table2 categorizes the adaptive middleware projects using the middleware layers and adaptation type. This table shows that adaptive middleware research has exploited both static and dynamic adaptations.... In PAGE 31: ... Safe adaptation can harness the dangerous power of dynamic adaptation provided by mutable middleware. Table2 also shows that... ..."

Table 5. From DL-safe rules (Datalog safeness condition)

in THE DATALOG DL COMBINATION OF DEDUCTION RULES AND DESCRIPTION LOGICS
by Jing Mei, Harold Boley, Jie Li, Virendrakumar C. Bhavsar, et al.
"... In PAGE 15: ...3. Examples DL-safe Rules In Table5 , the hybrid rule of \BadChild quot; has a variable ?Y as the pure-DL variable, and the binary DL queries of parent(?X, ?Y) and parent(?Z, ?Y) are chained by this ?Y, con icting with our deflnition of independent properties. That means, our system fails to infer \BadChild(Cain) quot; under the Datalog safeness condition, lacking of expressions for nominals such as 9parent.... ..."

Table 3. From non-recursive CARIN (Datalog safeness condition)

in THE DATALOG DL COMBINATION OF DEDUCTION RULES AND DESCRIPTION LOGICS
by Jing Mei, Harold Boley, Jie Li, Virendrakumar C. Bhavsar, et al.
"... In PAGE 14: ...2. Examples from CARIN Here ( Table3 ), in the second hybrid rule of \price quot;, the variable ?Z is a pure- DL variable, such that associate(?Y, ?Z) and american(?Z) have a folding result of 9associate.american(?Y).... ..."

Table V Average total network throughput of MP and SDN+HFD in single-cell simulation as different sizes of UDP packet are used UDP Packet Size (Byte) 50 210 500 1460

in Merit of PHY-MAC cross-layer carrier sensing: a MAC-address-based Physical Carrier Sensing scheme for solving hidden-node and exposed-node problems in large-scale Wi-Fi networks,” The 6
by An Chan, Soung Chang Liew 2006
Cited by 1

Table 11. Large Hybrid Network Parameters

in Frequency Reuse Impact on the Optimum Channel Allocation for a Hybrid Mobile System
by Tamer A. Elbatt, Anthony Ephremides 1999
"... In PAGE 6: ...We compared the performance of two policies, namely policy which allocates all the channels to the satellite and policy ~ which partitions the total number of chan- nels equally between the satellite and the cellular lay- ers. For the numerical parameters given in Table11 , the blocking and dropping probabilities for policy turned out to be 0.... ..."
Cited by 3

Table 3: Ring frame modal frequencies for an updated hybrid model and a refined hybrid model (twice the plate elements)

in Aiaa 2002-2418
by Finite Element Modeling, Ferdinand W. Grosveld, Jocelyn I. Pritchard, Ralph D. Buehrle, Structural Dynamics Branch, W. Grosveld

Table 4. Modified SDN Packet

in Machine Vision in Profibus Networks
by Javier Silvestre Blanes, Víctor M. Sempere Payá, Víctor M
"... In PAGE 6: ...The modified format of the SDN packet utilizes 238 of the 240 bytes available to transmit information about the image, and the first two bytes for the numeration of the packets ( Table4 ). Taking into account the fact that the Profibus packets dedicate 16 of the 256 bytes available to control information [10], useful information is reduced for each packet to 94.... ..."

Table 1. S(Dn)

in Learning to Use Referrals to Select Satisficing Service
by Teddy C, Ip Sen

Table 2 Hybrid Protocol

in Improving the Compiler/Software DSM Interface: Preliminary Results
by Pete Keleher, Chau-wen Tseng 1996
"... In PAGE 11: ... The current algorithm used to select data is fairly imprecise, and marks all arrays accessed in parallel as data requiring updates. Table2 contains statistics on di s, page invalidations, remote misses, and messages both with and without compiler-generated barrier ushes. Because of the interference with lazy di ng, described below, barrier ushes uniformly create more di s.... In PAGE 14: ...low \Percent Useful quot; number in Table2 . Merely detecting such changes and directing the DSM to clear copysets would eliminate most problems associated with phase changes.... ..."
Cited by 7
Next 10 →
Results 1 - 10 of 30,080
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University