Zobrazeno 1 - 10
of 134
pro vyhledávání: '"Santosh K. Shrivastava"'
Publikováno v:
Software: Practice and Experience. 52:1035-1064
The Arjuna transaction system began life in the mid 1980s as an academic project to examine the use of object-oriented techniques in the development of fault-tolerant distributed systems. Twenty five years later, it is an integral part of the JBoss a
Publikováno v:
IEEE Transactions on Services Computing. 5:276-289
The electronic representation of a contract for a business-to-business (B2B) partnership should be such that it can be used by a monitoring service for compliance checking of B2B interactions at runtime, ensuring that the interactions match the right
Publikováno v:
ACM SIGOPS Operating Systems Review. 44:58-63
This paper presents two design approaches to avoid many complications introduced at both user and developer levels by the FLP impossibility. The first approach is appropriate in managed hosting environments, such as datacenters, and involves offering
Publikováno v:
IEEE Transactions on Software Engineering. 34:531-545
Three-tier middleware architecture is commonly used for hosting enterprise-distributed applications. Typically, the application is decomposed into three layers: front end, middle tier, and back end. Front end ("Web server") is responsible for handlin
Publikováno v:
CBI (1)
The subject matter of this paper is concerned with the coordination of message-based interactions within the context of business-to-business integration (B2Bi) that autonomous organizations - business partners - need to do in order to automate their
Publikováno v:
International Journal of Cooperative Information Systems. 15:565-597
The use of open, Internet-based communications for business-to-business (B2B) interactions requires accountability for and acknowledgment of the actions of participants. Accountability and acknowledgment can be achieved by the systematic maintenance
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 2:273-286
Fair exchange protocols play an important role in application areas such as e-commerce where protocol participants require mutual guarantees that a transaction involving exchange of items has taken place in a specific manner. A protocol is fair if no
Publikováno v:
Electronic Commerce Research and Applications. 3:108-125
Converting a conventional contract into an electronic equivalent that can be executed and enforced by computers is a challenging task. The difficulties are caused by the ambiguities that the original human-oriented text is likely to contain. The conv
Autor:
Santosh K. Shrivastava, Mark Cameron Little, Stuart M. Wheater, Iain Stuart Caldwell Houston, Ian Robinson
Publikováno v:
Software: Practice and Experience. 33:351-373
Although it has long been realized that ACID (atomicity, consistency, isolation, durability) transactions by themselves are not adequate for structuring long-lived applications and much research work has been done on developing specific extended tran
Publikováno v:
The Computer Journal. 45:645-652
Bloom filters make use of a ‘probabilistic’ hash-coding method to reduce the amount of space required to store a hash set. A Bloom filter offers a trade-off between its size and the probability that the filter returns the wrong result. It does th