نتایج جستجو برای: invocation
تعداد نتایج: 2677 فیلتر نتایج به سال:
In this paper we describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element views. In this paradigm, smart cards are viewed as secure containers for objects, whose methods can be called straightforwardly a...
Many distributed opcraLing systems have been developed in recent years based on the acLion/object paradigm. The Clouds mullicamputee system provides a faull-tolemnt distributed compuling environment buill from passive data objccts,fault-aromic lransactions, processes, and a global kemel inlerface implemented on LOp of unreliable hardware. Key to the successful functioning of Clouds is its simpl...
SOA and Web Services technologies have been increasingly applied to network centric C2. In this paper, a service‐oriented C2 software architecture is firstly proposed based on SOA ideas and Web services technology to provide framework and guidance to service integration in future service‐oriented C2 systems, in which software and capability of C2 systems often are wrapped web serv...
In distributed object systems, one has the possibility to make method invocations on objects located on other host. During such an invocation, data is sent to another host and back. However, the system tries to hide this and simulate a standcard method invocation as close as possible. Some systems [Voyager] try to offer other invocation semantics, e.g. asynchronous method invocation. We try to ...
Abstract The system architecture presented in Chapter controls (i.e., sustains and constrains) the invocation of inference methods introduced Chapter. In this chapter, we describe higher level more detail.
The automatic invocation of a web service by an agent is a complex task which is currently being addressed by semantic markup techniques. However, it is difficult to define the computational aspects of a web service in this approach. In this paper we propose a protocol-based formalism which appears better suited to a representation of these issues. We define the syntax and semantics of a protoc...
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class specific serializers and deserializers, this paper demonstrates that with transformations based on compile time analysis an additional 18% performance gain can be achieved over class specific serializers alone for a simple...
Reflective method invocation is a long known performance bottle neck in Java. Different approaches to optimizing reflective method invocation are adopted by JVMs. In this paper we present an overview of the different approaches and a performance analysis using synthetic and the DaCapo benchmarks. We implement all of the approaches in the Jikes RVM.
Most object-based distributed systems do not support replicated objects. Replication is crucial because it is the only means to tolerate partial failures in distributed systems. The key issue for replicated objects is an appropriate invocation support. An object O1 must invoke an object O2 always in the same fashion regardless of their own replication policies. This paper investigates the suppo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید