Processing range-monitoring queries on heterogeneous mobile objects

Y Cai, KA Hua, G Cao - IEEE International Conference on …, 2004 - ieeexplore.ieee.org
We consider in this paper how to leverage heterogeneous mobile computing capability for
efficient processing of real-time range-monitoring queries. In our environment, each mobile …

Coordinating fast concurrency adapting with autoscaling for slo-oriented web applications

J Liu, S Zhang, Q Wang, J Wei - IEEE Transactions on Parallel …, 2022 - ieeexplore.ieee.org
Cloud providers tend to support dynamic computing resources reallocation (eg, Autoscaling)
to handle the bursty workload for web applications (eg, e-commerce) in the cloud …

Model recommendation: Generating object detectors from few samples

YX Wang, M Hebert - … of the IEEE Conference on Computer …, 2015 - openaccess.thecvf.com
In this paper, we explore an approach to generating detectors that is radically different from
the conventional way of learning a detector from a large corpus of annotated positive and …

Modelling and verification of web services business activity protocol

AP Ravn, J Srba, S Vighio - Tools and Algorithms for the Construction and …, 2011 - Springer
WS-Business Activity specification defines two coordination protocols in order to ensure a
consistent agreement on the outcome of long-running distributed applications. We use the …

Atomicity analysis of service composition across organizations

C Ye, SC Cheung, WK Chan… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Atomicity is a highly desirable property for achieving application consistency in service
compositions. To achieve atomicity, a service composition should satisfy the atomicity …

Detection and resolution of atomicity violation in service composition

C Ye, SC Cheung, WK Chan, C Xu - Proceedings of the the 6th joint …, 2007 - dl.acm.org
Atomicity is a desirable property that safeguards application consistency for service
compositions. A service composition exhibiting this property could either complete or cancel …

Exploring DCT coefficient quantization effect for image tampering localization

W Wang, J Dong, T Tan - 2011 IEEE International Workshop on …, 2011 - ieeexplore.ieee.org
In this paper, we focus on image tampering detection and tampered region localization. We
find that the probability distributions of the DCT coefficients of a JEPG image will be …

Isolation support for service-based applications: A position paper

P Greenfield, A Fekete, J Jang, D Kuo… - arXiv preprint cs/0612113, 2006 - arxiv.org
In this paper, we propose an approach to providing the benefits of isolation in service-
oriented applications where it is not feasible to hold traditional locks for ACID transactions …

Maintaining consistency between loosely coupled services in the presence of timing constraints and validation errors

C Molina-Jimenez, S Shrivastava - 2006 European Conference …, 2006 - ieeexplore.ieee.org
Loose coupling is often cited as a defining characteristic of service-oriented architectures.
Interactions between services take place via messages in an asynchronous environment …

Rest+ t: Scalable transactions over http

A Dey, A Fekete, U Röhm - 2015 IEEE international conference …, 2015 - ieeexplore.ieee.org
Restful APIs are widely adopted in designing components that are combined to form web
information systems. The use of REST is growing with the inclusion of smart devices and the …