Results 1 - 10
of
6,792
Table 4: Distribution with respect to mechanism trigger Trigger Mechanism Count
"... In PAGE 65: ...3.3 Distribution with respect to mechanism trigger Table4 shows the distribution of the mechanisms according to the type of trigger that invokes the mechanisms. Table 4: Distribution with respect to mechanism trigger Trigger Mechanism Count... ..."
Table 1: Different triggering mechanisms and their features
2006
"... In PAGE 6: ... whether they use simple criteria, such as absolute RSSI values being less than a prescribed threshold value, or use trends in the overall signal received by an AP. Table1 lists the different dimensions in the design of trig- gering mechanisms. The default Beacon scheme uses as its criterion the number of consecutive lost Beacon frames, and thus incorporates historical information.... ..."
Cited by 5
Table. 3 Declarative versus Procedural (Triggers) Mechanisms
Table 2. Trigger Features
"... In PAGE 4: ... Particularly, the action parts differ in the various approaches because each system has its own apos; apos;trigger programming language apos; apos;. Table2 compares the capabilities of the supported trigger mechanisms [16]. The comparison is based on the following properties [16]: ... ..."
Table 5 shows the distribution of the mechanisms according to the type of action taken when the mechanism is triggered. The Action column has been split into the Event save and the State save columns. Each of the Event save and State save columns can contain zero or more types of actions. Of the surveyed mechanisms, twenty-five percent capture events, forty per- cent capture state and the remainder capture both events and state. Many mech- anisms capture hardware state. This set is represented mainly by mechanisms
"... In PAGE 66: ... Table5 : Distribution with respect to mechanism action Action Mechanism Count Event save State save Instruction 29 1 Basic block 31 1 Procedure 3,19,38,39 4 Instruction / Basic block 33,34 2 Instruction / Basic block / Procedure 25,26 2 Software state 1,2,4,5,6,7,8 7 Hardware state 14,16,17,20,21,22,24,32,43,44 10 Software state / Hard- ware state 30 1 Instruction Software state 9 1 Procedure Software state 23 1 Procedure Hardware state 36,37,40 3 Basic block / Proce- dure Hardware state 27 1 Instruction / Basic block / Procedure Software state 10,11,12,18 4 Instruction / Basic block / Procedure Hardware state 35,41,42 3 Instruction / Basic block / Procedure Software state / Hard- ware state 13,15,28 3 reading registers storing system call parameters or content from hardware per- formance counters. Many mechanisms also insert almost arbitrary instruction level log triggering.... ..."
Table 19. The architectural assumptions of the middle-tier, COM and their minimal common upper element (the resulting architecture).
"... In PAGE 13: ...Table19 . The architectural assumptions of the middle-tier, COM and their minimal common upper element (the resulting architecture).... In PAGE 126: ... COM. From Table19 - The architectural assumptions of the middle-tier, COM and their minimal common upper element (the resulting architecture).-, we can see that the baseline middle-tier architecture and the COM architecture differs in two aspects, i.... ..."
Table 5: Distribution with respect to mechanism action Action Mechanism Count
"... In PAGE 65: ...3.4 Distribution with respect to mechanism action Table5 shows the distribution of the mechanisms according to the type of action taken when the mechanism is triggered. The Action column has been split into the Event save and the State save columns.... ..."
Table 3: Accuracy of different mechanisms. Co- Cop(push) is about as accurate as CoCop(global) except at large trigger intervals where it is much better.
Table 4. Mechanism Classification Mechanism Location Condition
2006
"... In PAGE 4: ...ounterparts in Fig. 1, 2 and 3). Table 3 shows that several locations share similar mechanisms. Table4 helps demonstrate this in a clearer fashion. We make the following observations by comparing Table 3 and Table 4: 1) Each group of locations that share a similar mechanism can be modeled as a pointcut [23], while the similar mechanism can be modeled as an advice [23].... In PAGE 4: ... In some cases, mechanisms differ significantly at different locations. For example, the mechanism for the location RateResponsivePacemaker - gt; ExtraSensor - gt; recording interval timeout differs from the second mechanism in Table4 because the first takes the sum and the second takes the average. These mechanisms cannot be modeled as a single advice.... In PAGE 5: ... 4) There are two ways that a condition can affect the mechanism. In the first way (seen in the first condition in the first mechanism group in Table4 ) the condition serves as a switch to decide whether an event is able to trigger the action. In the second way (seen in the second condition in the same group) the condition uses context information passed to tell where the action should apply.... ..."
Cited by 2
Table 8. Declarativeversus Procedural Mechanisms
in Semantic Integrity Support in SQL-99 and Commercial (Object) Relational Database Management Systems
2000
"... In PAGE 32: ... Gertz Although all types of integrity constraints can be implemented by only using triggers, be- cause of performance reasons it is advisable to use declarative mechanisms whenever possi- ble. Table8 gives an overview of what mechanisms should be used for the di#0Berenttypes of integrity constraints #28with respect to the integrity enforcement capabilities of current com- mercial database systems#29. Note that integrity constraints that contain aggregate functions are listed explicitly because they play an important role in many applications.... In PAGE 37: ...emporarily for performance reasons, e.g. when loading large amounts of data into the table using a loader, when performing batch operations that make massivechanges to the table, or when exporting or importing a table. Given a set C = C 1 ; C 2 ;:::;C n of integrity constraints that can only be enforced using triggers, according to Table8 . Then, the following steps are applied to C to derive respective constraint enforcing triggers #28we assume that per event several triggers can be speci#0Ced#29: 1.... ..."
Cited by 2
Results 1 - 10
of
6,792