Results 1 - 10
of
82,191
Table 1. Mappings between CCA and EJB model elements [12]
"... In PAGE 3: ...1 Transforming CCA to EJB A way for transforming a CCA model to an EJB model by mappings between CCA and EJB is described in paper [12]. In Table1 , mappings limited to these examined ... In PAGE 3: ...Table 1. Mappings between CCA and EJB model elements [12] Transformations built according to the mapping in the paper [12], in particular Table1 , generate correct EJB models and are able to transform a specification of any system expressed in the CCA. However, the proposal given in the paper [12], does not avoid pitfalls related to remote methods call or a Session Bean component apos;s life cycle, which can cause a low overall performance of a system [7], [8], [14].... In PAGE 3: ... Model element CCA EJB Process Component Java Class Flow Port In Java Class - an Java Method without return value Table 2. Enhancements of the mappings from Table 1 The enhancement of the mappings from Table1 , as alternative mappings of Process Component and Ports is presented in Table 2. The proposed enhancement does not ensure that a transformation defined according to it will generate a model of a better efficiency characteristic.... In PAGE 5: ... Mapping operations of CCA elements to EJB elements, limited to proposed alternative mappings, are presented herein. Four mapping operations are presented, see Listing 1, and each is a realisation of the mappings in Table1 , and Table 2. They are expressed using MOF QVT Operational Mapping language [10].... In PAGE 6: ... Figure 1. Input model - the compound Process Component Seller [12] Now, let us consider a transformation based on mappings in the both Table1 and Table 2. The transformation is a composition of mapping operations in a following order: PCtoEJBSessBean for Seller; PCtoJavaClass for QuoteCalculator, SellerOrders; FlowPortToRemMethEJBSessBean for Quote and Order; FlowPortToOperJavaClass for QuoteCalculator and SellerOrders.... ..."
Table 2: Classification of the components of ODM using the framework.
"... In PAGE 6: ... The general approach is that, by completing the stage, a program designer can add to the Data Flow Model and so incrementally develop the design. As Table2 illustrates, according to our framework oDM is concerned with the software description activities. Then, using the framework, we can identify the following actions of oDM: Zdentifr creates an instance of a concept-type.... In PAGE 7: ...1 Specification of oDM We now show how ODM has been specified within the formal framework. Firstly, we defined the primary concepts of ODM as given in Table2 using given sets: EventClassState 2 Element-State[EVCLASS] [ knownEventClasses/lownEIements, EventClassDesc/EJementDesc] Which is equivalent to: [PROCESS, EVENT, CHANNEL] The secondary concepts are given by [ DESC] dom EventCkssDesc c hownEventChsses Further, for the purposes of reporting, we build up new types from these concept-types as follows: OP ::= Create 1 Define 1 Identify 1 .... ..."
Table 1: Classification of the components of the framework using the process model.
1996
"... In PAGE 3: ... One of the important aspects of the framework, as we will seeinthenext section, istoenabletheSDM developers, and also their users, to classify the components of a SDM in a systematic way. Table1 corresponds to an archetype methodology and the intention is to identify which of those components a particular methodology contains. The next section presents a formal description of the framework in... In PAGE 5: ... Lastly, representation of the artifacts can take several forms such as code fragments, textual descriptions and structured diagrams. Within our framework we have defined a set of generic state and operation schemas representing the possible arti- facts and actions given in Table1 . We then draw from this library as required.... ..."
Cited by 9
Table 1: Classification of the components of the framework using the process model.
"... In PAGE 3: ... One of the important aspects of the framework, as we will see in the next section, is to enable the SDM developers, and also their users, to classify the components of a SDM in a systematic way. Table1 corresponds to an archetype methodology and the intention is to identify which of those components a particular methodology contains. The next section presents a formal description of the framework in terms of Z.... In PAGE 5: ... Lastly, representation of the artifacts can take several forms such as code fragments, textual descriptions and structured diagrams. Within our framework we have deiined a set of generic state and operation schemas representing the possible arti- facts and actions given in Table1 . We then draw from this library as required.... ..."
Table 1. Mapping of ERP model to security framework Policy Component People Component Technology Component
"... In PAGE 11: ... The above sections mapped the ERP model to the ERP security framework to determine how it can be used to implement and manage security within an ERP system. Table1 provides a summary of this mapping process. Table 1.... ..."
Table 2. Comparison Framework.
2002
"... In PAGE 9: ... The framework consists of an organized set of desired features of composition environments that we identified by studying the literature, examining existing composition environments, and creating usage scenarios. Table2 introduces the features of the framework, as organized into ten high-level categories. The first four categories relate to the component model underlying a composition environment, the remaining six relate to the composition process supported by a composition environment.... ..."
Cited by 3
Table 2. Comparison Framework.
2002
"... In PAGE 10: ... The framework consists of an organized set of desired features of composition environments that we identified by studying the literature, examining existing composition environments, and creating usage scenarios. Table2 introduces the features of the framework, as organized into ten high-level categories. The first four categories relate to the component model underlying a composition environment, the remaining six relate to the composition process supported by a composition environment.... ..."
Cited by 3
Table 1. Optimal Processors for Split and Merge Model
1991
"... In PAGE 10: ...o this ratio is 0.004 or less. In the connected components algorithm discussed later, the ratio is less than 0.001. Table1 gives the optimal processor numbers for two image sizes and three algorithms under various combining methods. We see from this table that the number of processors that can be effectively used under the split and merge model is on the order of hundreds, not thousands, except with enormous images and algorithms in which the combining function is trivial.... In PAGE 11: ....2.4 Interprocessor Bandwidth Interprocessor bandwidth is critical in the split and merge model. The numbers in Table1 indicate a severe limita- tion in the number of processors that can be effectively exploited, even assuming favorable ratios like 0.001 between the and functions.... In PAGE 41: ... Border replicated means that the first and last rows and columns of the image are replicated, so that pixels (-1,0), (-2,0), (-3,0), etc. have the same Table1 . Correspondence between Adapt and C types Adapt Type C Type signed_byte char unsigned_byte unsigned char byte unsigned char signed_integer int unsigned_integer unsigned int integer int float float long_float... ..."
Cited by 2
Table 1. The key components in our general statistical framework. 3
1995
"... In PAGE 4: ... We denote the initial set of regions as R, which represents a partition of D. For each Rk 2 R we associate the following: a parameter space, an observation space, a degrada- tion model, and a prior model (see Table1 ). The parameter space directly captures the notion of homogeneity: every region has a parameter value (a point in the parameter space) associated with it, which is unknown to the observer.... ..."
Cited by 22
Table 6: The key components in our general statistical framework.
1995
"... In PAGE 25: ...nd expression can be found in Section 4.3.1 and in [45]. For each Rk 2 R we associate the following: a parameter space, an observation space, a degradation model, and a prior model (see Table6 ). The parameter space directly captures the notion of homogeneity: every region has a parameter value (a point in the parameter space) associated with it, which is unknown to the observer.... ..."
Cited by 5
Results 1 - 10
of
82,191