The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Service-Oriented Computing (SOC) is a wide and complex research area. Despite the huge effort in both industrial and academics initiatives, several challenges need to be addressed in order to effectively realize the SOC vision. One of the most relevant issues is the need of effective, flexible, reliable, low cost solutions for dynamic service brokering and composition. This paper presents results...
With the proliferation of internet technologies, publish/subscribe systems have gained wide usage as a middleware. However for this model, catering large number of publishers and subscribers while retaining acceptable performance is still a challenge. Therefore, this paper presents two parallelization strategies to improve message delivery of such systems. Furthermore, we discuss other techniques...
A real-time control system has been operating successfully for the TJ-II stellarator since 1997. It was designed and built as a set of distributed and autonomous systems based on VMEbus and OS9 RTOS. At present, an upgrade, based on the VxWorks operating system, is being undertaken. As this process is gradual, both current and future real-time control systems must work simultaneously until this upgrade...
Interoperable DEVS modeling and simulation is desirable to enhance model composability and reusability with DEVS models and non-DEVS models in different languages and platforms. The barrier to such interoperability is that DEVS simulators implement the DEVS modeling formalism in diverse programming environments. Although the DEVS formalism specifies the same abstract simulator algorithm, different...
A growing number of e-businesses have been using XML schemas in recent years. Schema mapping now plays a crucial role in integrating heterogeneous e-business applications. Since large-scale XML schema mapping using complex and hybrid similarity measures requires significant amount of processing time, a sophisticated similarity analysis algorithm is needed to handle its complexity and performance....
Various security and privacy issues have emerged from the SOA healthcare platform. Large amounts of personal data are transmitted daily through the SOA healthcare platform. For security and privacy reasons, the exchanged data should be encapsulated and encoded by a specific standard, a customized standard even. In this study, we first focused on investigating the importance of data exchange and message...
Distributed SOA computing environments usually use SOAP intermediaries that sit between senders and receivers to mediate SOAP messages. The intermediaries may add support services to the SOAP message exchange, such as routing, logging, and security. The typical processing by a SOAP intermediary is parsing the incoming SOAP messages, checking the data in each message, and then serializing the messages...
Many network devices implement capabilities to manipulate traffic depending on the application. Examples include a firewall or a load balancer. These are based on Layer 2-4 packet-based classifications such as port or protocol, or signature recognition. Although configurable or extensible via scripting, they are not generally programmable. We present an architecture extending classification to programmable,...
The increasing ubiquity of mobile embedded systems has been matched by the evolution of a variety of wireless network standards and technologies. The major constraints of wireless embedded systems are limitations of communication bandwidth, processing capabilities, and battery power. Remote wireless embedded systems often act as sensors, which provide data to a certain community. The exchange of data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.