نتایج جستجو برای: invocation

تعداد نتایج: 2677  

Journal: :IEEE Access 2021

Service clustering is an efficient method for facilitating service discovery and composition. Traditional approaches based on the self-description documents services usually utilize signatures. In Web composition, can also be performed by invocation relationship between services. Therefore, successful development of several embedding techniques words in contexts, a novel deep learning-based usi...

Journal: : 2022

Invoking before starting prayer (salaah) with the Surah Fatiha is a practice that has been acted by three sects except Maliki. Regarding to narrations about subject, even sahabis were in small number they started like this way. Besides, it was narrated prominent names of tabiin also recitation invocation. Nevertheless, these invocations does not appear as ordinary and standardized invocations. ...

2010
James Gardner Aaron Krowne Li Xiong

Collaborative online encyclopedias or knowledge bases such as Wikipedia and PlanetMath are becoming increasingly popular because of their open access, comprehensive and interlinked content, rapid and continual updates, and community interactivity. To understand a particular concept in these knowledge bases, a reader needs to learn about related and underlying concepts. In this chapter, we intro...

2012
Keith Alan Preston

Migrating functionality from software to hardware has historically held the promise of enhancing performance through exploiting the inherent parallel nature of hardware. Many early exploratory efforts in repartitioning traditional software based services into hardware were hampered by expensive ASIC development costs. Recent advancements in FPGA technology have made it more economically feasibl...

2016
VIJAY KRISHNA PALEPU GUOQING XU JAMES A. JONES Vijay Krishna Palepu Guoqing Xu

Summaries. As described in Section 3 (Challenge 2), concrete summaries contain invocation-specific information and cannot be reused. Abstraction needs to be performed to replace concrete information with suitable abstract information, so that the abstracted summaries are applicable to all other executions. The abstraction process has two steps. In the first step, we express each node in an obje...

Journal: :IEEE Transactions on Parallel and Distributed Systems 2021

Due to the concern on cloud security, digital encryption is applied before outsourcing data for utilization. This introduces a challenge about how efficiently perform queries over ciphertexts. Crypto-based solutions currently suffer from limited operation support, high computational complexity, weak generality, and poor verifiability. An alternative method that utilizes hardware-assisted Truste...

Journal: :J. Parallel Distrib. Comput. 2005
Martin Hoffmann Winfried E. Kühnhauser

Failure semantics in communication models for distributed systems deal with the impossibility of achieving an exactly-once invocation semantics in failure-prone environments. For remote procedure invocation models, failure semantics such as atleast-once and at-most-once specify guarantees about the number of executions of an invocation as well as its completeness even under the assumption that ...

Journal: :Telecommunication Systems 2010
Jong Hyuk Park Qun Jin

Hybrid mobility management schemes integrating mobile IP and SIP for seamless invocation of services in all-IP network , " Telecommunication Systems, 2011. A novel user's authenti-cation scheme for pervasive on-line media services, " Telecommunication Systems,

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید