نتایج جستجو برای: invocation
تعداد نتایج: 2677 فیلتر نتایج به سال:
Semantic Service Clustering With Lightweight BERT-Based Service Embedding Using Invocation Sequences
Service clustering is an efficient method for facilitating service discovery and composition. Traditional approaches based on the self-description documents services usually utilize signatures. In Web composition, can also be performed by invocation relationship between services. Therefore, successful development of several embedding techniques words in contexts, a novel deep learning-based usi...
Invoking before starting prayer (salaah) with the Surah Fatiha is a practice that has been acted by three sects except Maliki. Regarding to narrations about subject, even sahabis were in small number they started like this way. Besides, it was narrated prominent names of tabiin also recitation invocation. Nevertheless, these invocations does not appear as ordinary and standardized invocations. ...
Collaborative online encyclopedias or knowledge bases such as Wikipedia and PlanetMath are becoming increasingly popular because of their open access, comprehensive and interlinked content, rapid and continual updates, and community interactivity. To understand a particular concept in these knowledge bases, a reader needs to learn about related and underlying concepts. In this chapter, we intro...
Migrating functionality from software to hardware has historically held the promise of enhancing performance through exploiting the inherent parallel nature of hardware. Many early exploratory efforts in repartitioning traditional software based services into hardware were hampered by expensive ASIC development costs. Recent advancements in FPGA technology have made it more economically feasibl...
Summaries. As described in Section 3 (Challenge 2), concrete summaries contain invocation-specific information and cannot be reused. Abstraction needs to be performed to replace concrete information with suitable abstract information, so that the abstracted summaries are applicable to all other executions. The abstraction process has two steps. In the first step, we express each node in an obje...
Due to the concern on cloud security, digital encryption is applied before outsourcing data for utilization. This introduces a challenge about how efficiently perform queries over ciphertexts. Crypto-based solutions currently suffer from limited operation support, high computational complexity, weak generality, and poor verifiability. An alternative method that utilizes hardware-assisted Truste...
Failure semantics in communication models for distributed systems deal with the impossibility of achieving an exactly-once invocation semantics in failure-prone environments. For remote procedure invocation models, failure semantics such as atleast-once and at-most-once specify guarantees about the number of executions of an invocation as well as its completeness even under the assumption that ...
Hybrid mobility management schemes integrating mobile IP and SIP for seamless invocation of services in all-IP network , " Telecommunication Systems, 2011. A novel user's authenti-cation scheme for pervasive on-line media services, " Telecommunication Systems,
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید