Processing range-monitoring queries on heterogeneous mobile objects
We consider in this paper how to leverage heterogeneous mobile computing capability for
efficient processing of real-time range-monitoring queries. In our environment, each mobile …
efficient processing of real-time range-monitoring queries. In our environment, each mobile …
Coordinating fast concurrency adapting with autoscaling for slo-oriented web applications
Cloud providers tend to support dynamic computing resources reallocation (eg, Autoscaling)
to handle the bursty workload for web applications (eg, e-commerce) in the cloud …
to handle the bursty workload for web applications (eg, e-commerce) in the cloud …
Model recommendation: Generating object detectors from few samples
In this paper, we explore an approach to generating detectors that is radically different from
the conventional way of learning a detector from a large corpus of annotated positive and …
the conventional way of learning a detector from a large corpus of annotated positive and …
Modelling and verification of web services business activity protocol
WS-Business Activity specification defines two coordination protocols in order to ensure a
consistent agreement on the outcome of long-running distributed applications. We use the …
consistent agreement on the outcome of long-running distributed applications. We use the …
Atomicity analysis of service composition across organizations
Atomicity is a highly desirable property for achieving application consistency in service
compositions. To achieve atomicity, a service composition should satisfy the atomicity …
compositions. To achieve atomicity, a service composition should satisfy the atomicity …
Detection and resolution of atomicity violation in service composition
Atomicity is a desirable property that safeguards application consistency for service
compositions. A service composition exhibiting this property could either complete or cancel …
compositions. A service composition exhibiting this property could either complete or cancel …
Exploring DCT coefficient quantization effect for image tampering localization
In this paper, we focus on image tampering detection and tampered region localization. We
find that the probability distributions of the DCT coefficients of a JEPG image will be …
find that the probability distributions of the DCT coefficients of a JEPG image will be …
Isolation support for service-based applications: A position paper
In this paper, we propose an approach to providing the benefits of isolation in service-
oriented applications where it is not feasible to hold traditional locks for ACID transactions …
oriented applications where it is not feasible to hold traditional locks for ACID transactions …
Maintaining consistency between loosely coupled services in the presence of timing constraints and validation errors
C Molina-Jimenez, S Shrivastava - 2006 European Conference …, 2006 - ieeexplore.ieee.org
Loose coupling is often cited as a defining characteristic of service-oriented architectures.
Interactions between services take place via messages in an asynchronous environment …
Interactions between services take place via messages in an asynchronous environment …
Rest+ t: Scalable transactions over http
Restful APIs are widely adopted in designing components that are combined to form web
information systems. The use of REST is growing with the inclusion of smart devices and the …
information systems. The use of REST is growing with the inclusion of smart devices and the …