Showing 61 - 80 results of 407 for search '"Invocator"', query time: 0.08s Refine Results
  1. 61

    Serverless computing in clouds (part C) by Goh, Lisa Shannon

    Published 2023
    “…However, there is the problem of cold starts, referring to when containers have to be initialized for function invocation, which increases the latency of execution. …”
    Get full text
    Final Year Project (FYP)
  2. 62

    Non-Repudiation In Web Services. by Ling, Elvis,Ing Seng, Khoo, Vincent

    Published 2007
    “…A web service is a set-of-.programmable functions that could be invoked protocols, and consumed through some internet The design of Web services has been plagued with security flaws. Web services invocations could be executed on the fly with the invokers remain anonymous. …”
    Get full text
    Conference or Workshop Item
  3. 63

    Question answering system for chemistry—a semantic agent extension by Zhou, Xiaochi, Nurkowski, Daniel, Menon, Angiras, Akroyd, Jethro, Mosbach, Sebastian, Kraft, Markus

    Published 2024
    “…This extension enables the automatic invocation of semantic agents to answer questions when static data is absent from the KG. …”
    Get full text
    Journal Article
  4. 64

    Wezwania lubelskich świątyń jako elementy krajobrazu sakralnego miasta by Adam Siwiec

    Published 2020-12-01
    “…The article discusses the historical and descriptive aspects of the invocations of patron saints in the Lublin churches, in the context of the city’s space and sacral landscape. …”
    Get full text
    Article
  5. 65

    CHASE BY AND TRANSFORMATION OF THE SHAMAN FROM TOMSKAYA PISANITSA by I. V. Kovtun

    Published 2013-09-01
    “…The key meaning of the scene is the Shaman's statute appropriation through his invocation to the Shaman's Mother-Animal.…”
    Get full text
    Article
  6. 66

    Artémis Digaia Blaganitis en Macédoine by Miltiades B Hatzopoulos

    Published 2023-12-01
    “… The study of a copy of an inscription, now lost, and of a text of Hesychius leads to the interpretation of two mysterious invocations of Artemis, "Blaganitis" and "Digaia", known on an altar found before the last war in Emathia. …”
    Get full text
    Article
  7. 67

    Reasonableness and Legality of Judicial Decisions by the General Board of Administrative Justice Court; Defect in Invoking to the Constitution by Abdolmajid Soudmandi

    Published 2019-03-01
    “…Failure of the GBAJC to comply with this rule could be occurred in invocation of any of the legal evidences. In this paper, by studying the types of violation of this rule by the GBAJC in invocation of "the Constitution", it was seen that this violation resulted in issuing doubtful or even wrongful decisions. …”
    Get full text
    Article
  8. 68

    MAPI: towards the integrated exploitation of bioinformatics Web Services by Karlsson Johan, Ramirez Sergio, Trelles Oswaldo

    Published 2011-10-01
    “…</p> <p>Results</p> <p>To facilitate the construction of software clients and make integrated use of this variety of tools, we present a modular programmatic application interface (<it>MAPI</it>) that provides the necessary functionality for uniform representation of Web Services metadata descriptors including their management and invocation protocols of the services which they represent. …”
    Get full text
    Article
  9. 69

    تطـــويـر الـتطــبيـقـات المــوزّعــة المــوثـوقـة والقــابــلـة للتـجــزئــة بـاســتـخـدام Jgroup/ARM... by بشار محمد, علي اسماعيل

    Published 2017-04-01
    “…In this paper, we compare Jgroup and JavaGroups for different Group Method Invocation modes. These modes are Anycast and Multicast in Jgroup, GET_FIRST and GET_ALL in JavaGroups. …”
    Get full text
    Article
  10. 70

    Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform by Lei Yin, Jin Liu, Fengyu Zhou, Ming Gao, Ming Li

    Published 2023-03-01
    “…Secondly, three factors (i.e. evolutionary factor, hunting factor and parent similarity) are integrated with RHGA to promote the efficiency of small-scale service invocations and improve the performance of large-scale service invocations on the platform. …”
    Get full text
    Article
  11. 71

    Al-Ad’iyyah al-Ma’tsūrah and Its Use in Arabic Language Practice by Mahadi Masoud, Marsufah Binti Jalil, Jamsuri Bin Mohd Shamsudin

    Published 2018-10-01
    “…Therefore, the researchers by using analytical and experimental approach chose some Arabic words or vocabulary from the popular invocations used by Muslims in their daily recitations and then presented it in the Arabic language classes. …”
    Get full text
    Article
  12. 72

    Towards Dynamic Reconfiguration of a Composite Web Service: An Approach Based on QoS Prediction by Abdessalam Messiaid, Farid Mokhati, Rohallah Benaboud, Hajer Salem

    Published 2021-07-01
    “…Dynamic reconfiguration may be enhanced by avoiding the invocation of degraded web services by predicting QoS for the candidate web service. …”
    Get full text
    Article
  13. 73

    Concurrent, Real-Time and Distributed Programming in Java : Threads, RTSJ and RMI / by Benmammar, Badr, author

    Published 2018
    “…We are particularly interested in communication using the TCP Sockets and high-level communication using Java Remote Method Invocation (RMI). The book also contains an annex which contains a practical set of application exercises in relation to the theme of the book. …”
  14. 74

    Politics, subjectivity and the public/private distinction by Panton, J

    Published 2010
    “…Against this I propose that a number of the most dominant invocations of the distinction can be understood to express public/private as an irreducibly political dialectic that mediates the relationship between the subjective and objective side of social and political life. …”
    Thesis
  15. 75

    The making of Nigeria as a sovereign state - a theoretical prognosis and analysis of a balanced federalism by Bassey, Antigha Okon

    Published 2014
    “…The paper recommends the invocation of a Natu-centric force as put forward in the Bassonian theory through the introduction of a domiciliary policy as the only way to attaining unity, integration and development in Nigeria which will result in a federal balance. …”
    Get full text
    Article
  16. 76

    Automating Release of Android APIs Based on Computational Reflection by WANG Yi, CHEN Ying-ren, CHEN Xing, LIN Bin, MA Yun

    Published 2022-12-01
    “…With the development of mobile hardware and 5G communication technologies,smart applications are booming,which has penetrated into all the aspects of our life and work.There are many functions in applications,which can not only satisfy the user’s requirements,but also be further released as APIs for external invocations.For instance,the APIs provided by applications can be invoked by the intelligent voice assistant.However,these functions must be released as APIs during the development phase,otherwise they cannot be used for external invocations.To address this problem,this paper proposes an approach to automatic release of APIs of Android applications based on computational reflection.It first rebuilds runtime software architecture for the activities of Android applications based on the reflection mechanism,without modifying the source code of application.Then,based on test cases of the specified function,it analyzes its user-behavior workflow and corresponding procedure calls.Finally,the function can be invoked by simulating the user behaviors,and then is released as the corresponding API.We evaluate our approach with 300 popular apps on Android app store Wandoujia,and the results show that our approach is effective for 280 of them.For the specified functions,APIs can be implemented by our approach in about 15 minutes,and their runtime performance is desirable.…”
    Get full text
    Article
  17. 77

    Edge/cloud resource management for time-sensitive applications by Yap, Ming Chuen

    Published 2024
    “…With the proliferation of Internet-of-Things (IoT), many of such functions are increasingly time-sensitive in nature, and there is a need to investigate and improve on the various latencies involved in the lifecycle of a serverless function invocation. However, commercial cloud providers such as AWS, Google and Microsoft Azure are proprietary in nature, with much of the inner workings of the cloud architecture and APIs hidden from clients. …”
    Get full text
    Final Year Project (FYP)
  18. 78

    CONSIDERAȚII RELATIVE LA CONCEPTUL DE ORDINE PUBLICĂ ÎN DREPTUL INTERNAȚIONAL PRIVAT by Victor VOLCINSCHI

    Published 2017-07-01
    “…By analyzing the legal regulations, the practice and the doctrine in the field, are being analyzed the conditions of invocation of public order exception in private international law, and demonstrated separately the specifics of invocation of the public order exception in the procedure of refusal of foreign judgments and in the procedure of refusal of foreign arbitral awards.…”
    Get full text
    Article
  19. 79

    THE PRICE OF ANTON FRANKI’S BOOK by Gordana Čupković

    Published 2020-01-01
    “…This work consists of a critique publication of a colophon text in verse form, which was written in the 18th century cursive Glagolitic script at the end of a book (kvadirnica) of Invocations, compiled by the priest Anton Franki from Omišalj, along with the remaining paratexts from the same book. …”
    Get full text
    Article
  20. 80

    Interpellativité et appellativité. Une étude pragmatique de l’avis de décès by Françoise Hammer

    “…In confrontation with other concepts such as convocation, invocation and evocation, interpellativity appears to be a particular form of appellativity that secures the acceptance of a dialogue at interpersonal level.…”
    Get full text
    Article