• No results found

process execution time measurement

Deterministic Measurement of Reliability and Performance Using Explicit Colored Petri Net in Business Process Execution Language and Eflow

Deterministic Measurement of Reliability and Performance Using Explicit Colored Petri Net in Business Process Execution Language and Eflow

... services, the more qualified the WSC. In this paper, instead of fuzzy thinking, now it can be said that the reliability is almost 98% and the performance is approximately 8 unit of time for LAP. SOA analysts, ...

8

Time Execution Constraints using Intricate Encryption and Decryption Process for Secure Data Transmission

Time Execution Constraints using Intricate Encryption and Decryption Process for Secure Data Transmission

... decryption process is widely investigated and developed for a robust data security which is challenging to ...of time added to packet delay and to maintain the node data security in the ...the ...

5

Task-Execution Scheduling Schemes for Network Measurement and Monitoring

Task-Execution Scheduling Schemes for Network Measurement and Monitoring

... required process in high performance networks for efficient quality-of-service (QoS) pro- visioning and service ...Active measurement is an attractive approach because the measurement traffic injected ...

16

Effect of Parallelization, Execution Time and Inter process Communication on Sorting Techniques using Message Passing Interface

Effect of Parallelization, Execution Time and Inter process Communication on Sorting Techniques using Message Passing Interface

... MPI process within the specified communicator. Initially, each process will be assigned a unique integer rank between 0 and number of tasks - 1 within the communicator ...a process becomes associated ...

6

Design and Implementation of Distributed Process Execution Environment

Design and Implementation of Distributed Process Execution Environment

... Each site maintains its status i.e. whether it is in a receiver, OK, or a sender state depending on the threshold. Threshold is decided by process queue length. Every site in an initial state has no processes in ...

11

Secure & privacy preserving eID systems with Attribute Based Credentials

Secure & privacy preserving eID systems with Attribute Based Credentials

... During TA, the test date is sent as a part of the auxiliary data which is signed by the SP terminal and verified by the chip. So this auxiliary data is authenticated at the end of TA. As it is mandatory for TA to be ...

99

A Framework for Adaptive Process Modeling and Execution (FAME)

A Framework for Adaptive Process Modeling and Execution (FAME)

... The Process Monitors are an agent-based system that monitors the process execution status, gathers compiled process status information, and submits this information to the Process ...

7

The multi-assumption architecture and testbed (MAAT v1.0): R code for generating ensembles with dynamic model structure and analysis of epistemic uncertainty from multiple sources

The multi-assumption architecture and testbed (MAAT v1.0): R code for generating ensembles with dynamic model structure and analysis of epistemic uncertainty from multiple sources

... ensemble execution cascade and values assigned to the three ensemble member description lists, the ensemble mem- ber has been completely ...semble execution cascade then calls the model run ...other ...

27

Virtual machine warmup blows hot and cold

Virtual machine warmup blows hot and cold

... in- process iterations of the outer benchmark; our runner fully resets the benchmark and the random number generator between each ...single process execution, this could affect the performance of ...

40

A Total Need based Resource Reservation Technique for Effective Resource Management

A Total Need based Resource Reservation Technique for Effective Resource Management

... any process requesting them as in Deadlock Recovery technique. When a process requests for resource instances available only in the reserve pool then the proposed technique will grant it only if its total ...

6

METHODOLOGY FOR MAPPING BUSINESS PROCESS INTO EXECUTION LANGUAGE

METHODOLOGY FOR MAPPING BUSINESS PROCESS INTO EXECUTION LANGUAGE

... the time to get better performance results by meeting the business ...transformation process generates valid BPEL processes similar to that already in use, the implementation of the solution has only ...

9

CPU thread prioritization using a dynamic quantum time 
		Round Robin 
		algorithm

CPU thread prioritization using a dynamic quantum time Round Robin algorithm

... The time slice of 5 millisecond was used. In RR algorithm, no process is allocated in the CPU for more than one time slice in a ...CPU process exceeds one time slice, the concerned ...

6

Interceptor Technology for Intercontinental Ballistic Missiles by Stretching Time

Interceptor Technology for Intercontinental Ballistic Missiles by Stretching Time

... the time to achieve more rates than usual in the same period or ...of execution varies as orbital altitude change which can be simply explained by considering the following example: If an object regularly ...

11

A. Web Service Business Process Execution Language

A. Web Service Business Process Execution Language

... the process implemented using a case ...calculation process is new web service attempting to combine the existing web ...checking process is completely executed and the property value is valid, the ...

6

Real-Time Sysems and Limiing Even Sreams: A General Model

Real-Time Sysems and Limiing Even Sreams: A General Model

... worst-case execution times (line 8) and stores for every limiting event stream the maximum amount of events which this stream allows within ∆t (line ...worst-case execution time is considered first ...

7

COLOR IMAGE WATERMARKING USING BLOCK SELECTION BY LUMINANCE METHOD

COLOR IMAGE WATERMARKING USING BLOCK SELECTION BY LUMINANCE METHOD

... The original 512*512 host image is divided into 8OE8 and each block is converted to YCbCr color space. The blocks which we select to embed are those having log-average luminance closer to the log-average luminance of the ...

10

Implementation of K Means Clustering Algorithm in Hadoop Framework

Implementation of K Means Clustering Algorithm in Hadoop Framework

... Development. Few of which include Pig, Hive, Zookeeper, HBase, Sqoop, Oozie. The MapReduce structure gives great flexibility and speed to execute a process over a distributed Framework. Unstructured data analysis ...

7

New Approach to Schedule Bag of Tasks (BoTs) with Increase in Parallel Process

New Approach to Schedule Bag of Tasks (BoTs) with Increase in Parallel Process

... (QoS).To process huge number of Bag of-Task (BOT) concurrently in such environment with QOS is a Big ...as, Execution time where two constraints to consider are Network Bandwidth and Storage ...

6

Business Process Configuration according to Data Dependency Specification

Business Process Configuration according to Data Dependency Specification

... transformation between models in BPs. Kulza and Honkisz in [33] transform a Semantic of Business Vocabulary and Rules (SBVR) [34] into a BPMN model. The work is oriented to the transformation of business rules rather ...

23

Reconfigurable test execution systems machine and process development

Reconfigurable test execution systems machine and process development

... IR elements suffer from several manufacturing defects which may take the form of hairline cracks, visible lines formed during casting, lumps due to mould wear, flashing along the perimeter of the element and ...

149

Show all 10000 documents...

Related subjects