Academic literature on the topic 'MASC Middleware'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MASC Middleware.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "MASC Middleware"

1

Hazarika, Hirak Jyoti, and S. Ravikumar. "Implementation and integration of radio-frequency identification system: a practical approach." Library Hi Tech News 36, no. 4 (June 3, 2019): 13–16. http://dx.doi.org/10.1108/lhtn-02-2019-0009.

Full text
Abstract:
Purpose The purpose of this paper is to explain how the author had carried out the implementation of the radio-frequency identification (RFID) system at Central Library, Fakiragram College and to explain to the library professional on how to integrate RFID with Koha integrated library management system (ILMS) in their respective library without taking IT/technical experts assistance. This paper will encourage library professionals to implement RFID technology for the library security and embrace open source software in their institutions. Design/methodology/approach The paper describes the author’s practical experiences regarding implementation of the RFID system and integration of middleware RFID software with library management software. Findings From the present study, it was found that the library staff are having a positive attitude toward embracing RFID technology in their library. The present implementation of RFID technology in the studies area gives a clear picture about integrating a third-party software/tool like RFID to the existing systems and how the new system has helped the library to provide better service to their users Research limitations/implications There were some teething problems at the start between the Koha ILMS SIP2 software and the RFID system. The main issue faced while integration was with setting up the hostname, integrating the instance (i.e. database) and with setting up the port. Practical implications This paper will help librarians to implement RFID technology in a practical way to their libraries. The author implemented Koha ILMS with RFID system at the Central Library, Fakiragram College within 1 month and the author migrated data from common communication format (CCF) format to MARC 21 formats. CCF is basically used in SOUL 2.0 developed by INFLIBNET. Originality/value This study discusses issues and possible solutions in the process of implementing RFID applications for two innovative applications in library services. This will influence library professionals to learn Koha ILMS and RFID technology implement it in their libraries.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "MASC Middleware"

1

Erradi, Abdelkarim Computer Science &amp Engineering Faculty of Engineering UNSW. "Policy-driven framework for manageable and adaptive service-oriented processes." Publisher:University of New South Wales. Computer Science & Engineering, 2008. http://handle.unsw.edu.au/1959.4/41252.

Full text
Abstract:
Dynamic selection and composition of autonomous and loosely-coupled Web services is increasingly used to automate business processes. The typical long-running characteristic of business processes imposes new management challenges such as dynamic adaptation of running process instances. However, current process orchestration engines provide limited flexibility to dynamically adapt to changing runtime conditions (e.g., presence of faults). Additionally, current process specification languages exhibit some limitations regarding modularity of crosscutting management concerns. In particular, monitoring and adaptation logic is often scattered across several process definitions and intertwined with the business logic. This leads to monolithic and complex processes that are hard to understand, reuse, maintain, and evolve. To address these limitations, we developed a policy-based change management framework, named Manageable and Adaptable Service Compositions (MASC), to declaratively express crosscutting monitoring and process adaptation concerns in a separate and modular way. MASC policies use a set of simple, but flexible and relatively powerful, constructs to declaratively specify policies that govern: (1) discovery and selection of services to be used, (2) monitoring to detect the need for adaptation, (3) reconfiguration and adaptation of the process to handle special cases (e.g., context-dependant behaviour) and recover from typical faults in service-based processes. The identified constructs are executed by a lightweight service-oriented management middleware named MASC middleware. The adaptation is transparent because it preserves the original functional behaviour of the business process and does not tangle the adaptation logic with that of the business process. Additionally, policies do not have to be necessarily defined when designing the process; they can also be introduced later during deployment or at runtime. We implemented a MASC proof-of-concept prototype and evaluated it on Stock Trading case study scenarios. We conducted extensive studies to demonstrate the feasibility of the proposed techniques and illustrate the benefits of our approach in providing adaptive composite services using the policy-based approach. Our performance and scalability studies indicate that MASC middleware is scalable and the introduced overhead are acceptable.
APA, Harvard, Vancouver, ISO, and other styles
2

Milagaia, Rui Rodrigues. "Dpws middleware to support agent-based manufacturing control and simulation." Master's thesis, FCT - UNL, 2009. http://hdl.handle.net/10362/1872.

Full text
Abstract:
Dissertação apresentada na Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa para obtenção do grau de Mestre em Engenharia Electrotécnica e de Computadores
In present manufacturing systems, the current challenge is the development of highly reconfigurable, truly distributed solutions. The tendency is to build manufacturing systems with autonomous, intelligent and distributed components that will support reconfiguration and adaptability. The most promising paradigms for the implementation of such systems are multi-agents and service oriented architectures (SOA), mainly over the DPWS (Device Profile for Web Services) implementation which was aimed at devices. An important limitation of most current multi-agent systems is that the management system is not totally distributed. Failure in the agent responsible for the registry can overthrow the entire system. DPWS does not have this limitation, since the management system is totally distributed. However, DPWS does not support agent autonomy notions as efficiently. The possibility of creating a truly distributed multi-agent system by linking both approaches led to this thesis. A Middleware layer was developed that enables agents to benefit from DPWS functionalities in order to reach the proposed goal. This middleware layer joins agents, databases, hardware, simulators, human interface applications such as production system management, error correction and maintenance, etc. To prove this concept a 3D model of an agent controlled manufacturing system with transporters augmented with DPWS communication interfaces was developed.
APA, Harvard, Vancouver, ISO, and other styles
3

Young, David M. "Adaptive Game Music: The Evolution and Future of Dynamic Music Systems in Video Games." Ohio University Honors Tutorial College / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1340112710.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "MASC Middleware"

1

Poza, José L., Juan L. Posadas, and José E. Simó. "Adding an Ontology to a Standardized QoS-Based MAS Middleware." In Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living, 83–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02481-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Phillips Jr., Charles E., Steven A. Demurjian, Thuong Doan, and Keith Bessette. "A Service-Based Approach for RBAC and MAC Security." In Information Security and Ethics, 1741–58. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch119.

Full text
Abstract:
Middleware security encompasses a wide range of potential considerations, ranging from the ability to utilize the security capabilities of middleware solutions (for example, CORBA, .NET, J2EE, DCE, and so forth) directly out-of-the-box in support of a distributed application to leveraging the middleware itself (paradigm) to realize complex and intricate security solutions (for example, discretionary access control, role-based access control, mandatory access control, and so forth). The objective in this chapter is to address the latter consideration: examining the attainment of advanced security capabilities using the middleware paradigm, namely, role-based access control (RBAC) and mandatory access control (MAC). The resulting security provides a robust collection of services that is versatile and flexible and easily integrates into a distributed application comprised of interacting legacy, COTS, GOTS, databases, servers, clients, and so forth.
APA, Harvard, Vancouver, ISO, and other styles
3

Phillips Jr., Charles E., Steven A. Demurjian, Thuong Doan, and Keith Bessette. "A Service-Based Approach for RBAC and MAC Security." In Service-Oriented Software System Engineering, 317–39. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-426-2.ch015.

Full text
Abstract:
Middleware security encompasses a wide range of potential considerations, ranging from the ability to utilize the security capabilities of middleware solutions (for example, CORBA, .NET, J2EE, DCE, and so forth) directly out-of-the-box in support of a distributed application to leveraging the middleware itself (paradigm) to realize complex and intricate security solutions (for example, discretionary access control, role-based access control, mandatory access control, and so forth). The objective in this chapter is to address the latter consideration: examining the attainment of advanced security capabilities using the middleware paradigm, namely, role-based access control (RBAC) and mandatory access control (MAC). The resulting security provides a robust collection of services that is versatile and flexible and easily integrates into a distributed application comprised of interacting legacy, COTS, GOTS, databases, servers, clients, and so forth.
APA, Harvard, Vancouver, ISO, and other styles
4

Rabadi, Yousef E., and Joan Lu. "A Middleware for Distributing XML Data between Mobile Application Servers." In Learning with Mobile Technologies, Handheld Devices, and Smart Phones, 69–89. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0936-5.ch005.

Full text
Abstract:
This research introduces architecture of new approach of distributing XML data files between different mobile application servers. The main objective and goal of this study is to transmit XML data files between different Mobile Application Server (MAS) using internet cloud infrastructure in a secured manner coupled with reliability and quality of communication. Taking into consideration that the system architecture attribute is to be independent, scalable, and flexible of using cloud computing. Furthermore, this architecture is designed to minimize the risk of any alteration, data loss, data abuse, and data misuse of XML critical business data information. As cloud computing, using existing cloud network infrastructure to get advantage of the scalability, operational efficiency, and control of data flow are a big consideration in this architecture. A test has been made to measure the performance of the Real-time Interactive Data Exchange system (RIDX), one by using standard TCP protocol, and one by using RIDX UDP protocol. As a result, RIDX architecture performance showed good results; conversely the study showed that using RIDX UDP protocol as a transport protocol gives better performance than standard TCP. Moreover, using RIDX UDP transport protocol assures the reliability and lossless of data transmission to all nodes.
APA, Harvard, Vancouver, ISO, and other styles
5

Nørvåg, Kjetil. "Query Operators in Temporal XML Databases." In Encyclopedia of Database Technologies and Applications, 500–505. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-560-3.ch083.

Full text
Abstract:
The amount of data available in XML is rapidly increasing and at the same time the price of mass storage is rapidly decreasing, and this makes it possible to store larger amounts of data. The contents of a database or data warehouse are seldom static. New documents are created, documents are deleted and, more important, documents are updated. In many cases, one wants to be able to search in historical (old) versions, retrieve documents that were valid at a certain time, query changes to documents, and so forth. (Note that although this process is somewhat similar to general document versioning maintenance, the aspect of time makes possibilities and appropriate solutions different.) The “easiest” way to do this is to store all versions of all documents in the database and use a middleware layer to convert temporal query language statements into conventional statements, executed by an underlying database system (an example of such a system is TeXOR; Nørvåg, Limstrand, & Myklebust, 2003). Although this approach makes the introduction of temporal support easier, it can be difficult to achieve good performance: temporal query processing is in general costly, and the cost of storing the complete document versions can be high. Thus, a temporal XML database system is necessary.
APA, Harvard, Vancouver, ISO, and other styles
6

Oulasvirta, Antti, and Antti Salovaara. "Ubiquitous Computing and the Concept of Context." In Encyclopedia of Human Computer Interaction, 630–33. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59140-562-7.ch094.

Full text
Abstract:
Mark Weiser (1991) envisioned in the beginning of the 1990s that ubiquitous computing, intelligent small-scale technology embedded in the physical environment, would provide useful services in the everyday context of people without disturbing the natural flow of their activities. From the technological point of view, this vision is based on recent advances in hardware and software technologies. Processors, memories, wireless networking, sensors, actuators, power, packing and integration, optoelectronics, and biomaterials have seen rapid increases in efficiency with simultaneous decreases in size. Moore’s law on capacity of microchips doubling every 18 months and growing an order of magnitude every five years has been more or less accurate for the last three decades. Similarly, fixed network transfer capacity grows an order of magnitude every three years, wireless network transfer capacity every 5 to 10 years, and mass storage every 3 years. Significant progress in power consumption is less likely, however. Innovations and breakthroughs in distributed operating environments, ad hoc networking, middleware, and platform technologies recently have begun to add to the ubiquitous computing vision on the software side. Altogether, these technological advances have a potential to make technology fade into the background, into the woodwork and fabric of everyday life, and incorporate what Weiser (1991) called natural user interfaces. Awareness of situational factors (henceforth, the context) consequently was deemed necessary for this enterprise. This article looks at the history of the concept of context in ubiquitous computing and relates the conceptual advances to advances in envisioning human-computer interaction with ubiquitous computing.
APA, Harvard, Vancouver, ISO, and other styles
7

Oulasvirta, Antti, and Antti Salovaara. "Ubiquitous Computing and the Concept of Context." In Human Computer Interaction, 20–24. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-87828-991-9.ch002.

Full text
Abstract:
Mark Weiser (1991) envisioned in the beginning of the 1990s that ubiquitous computing, intelligent small-scale technology embedded in the physical environment, would provide useful services in the everyday context of people without disturbing the natural flow of their activities. From the technological point of view, this vision is based on recent advances in hardware and software technologies. Processors, memories, wireless networking, sensors, actuators, power, packing and integration, optoelectronics, and biomaterials have seen rapid increases in efficiency with simultaneous decreases in size. Moore’s law on capacity of microchips doubling every 18 months and growing an order of magnitude every five years has been more or less accurate for the last three decades. Similarly, fixed network transfer capacity grows an order of magnitude every three years, wireless network transfer capacity every 5 to 10 years, and mass storage every 3 years. Significant progress in power consumption is less likely, however. Innovations and breakthroughs in distributed operating environments, ad hoc networking, middleware, and platform technologies recently have begun to add to the ubiquitous computing vision on the software side. Altogether, these technological advances have a potential to make technology fade into the background, into the woodwork and fabric of everyday life, and incorporate what Weiser (1991) called natural user interfaces. Awareness of situational factors (henceforth, the context) consequently was deemed necessary for this enterprise. This article looks at the history of the concept of context in ubiquitous computing and relates the conceptual advances to advances in envisioning human-computer interaction with ubiquitous computing.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "MASC Middleware"

1

Erradi, Abdelkarim, Vladimir Tosic, and Piyush Maheshwari. "MASC - .NET-Based Middleware for Adaptive Composite Web Services." In IEEE International Conference on Web Services (ICWS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icws.2007.116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tosic, Vladimir, Abdelkarim Erradi, and Piyush Maheshwari. "WS-Policy4MASC - A WS-Policy Extension Used in the MASC Middleware." In IEEE International Conference on Services Computing (SCC 2007). IEEE, 2007. http://dx.doi.org/10.1109/scc.2007.137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chapin, Peter, and Christian Skalka. "SpartanRPC: Secure WSN middleware for cooperating domains." In 2010 IEEE 7th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2010. http://dx.doi.org/10.1109/mass.2010.5663965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hui Ma, Sumit Roy, and Jing Zhu. "PHY/MAC adaptation approaches for dense wireless LAN MESH." In Middleware and Workshops (COMSWARE '08). IEEE, 2008. http://dx.doi.org/10.1109/comswa.2008.4554408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chaudhuri, Saptarshi, Ranjish Bhaskaran, and VenkatAveen Reddy. "Design of adaptive MAC for high speed packet access system." In Middleware and Workshops (COMSWARE '08). IEEE, 2008. http://dx.doi.org/10.1109/comswa.2008.4554397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Flores, Huber, and Satish Narayana Srirama. "Dynamic configuration of mobile cloud middleware based on traffic load." In 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2012. http://dx.doi.org/10.1109/mass.2012.6502552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prashanth, L. A., and K. Gopinath. "OFDM-MAC algorithms and their impact on TCP performance in next generation mobile networks." In Middleware and Workshops (COMSWARE '08). IEEE, 2008. http://dx.doi.org/10.1109/comswa.2008.4554395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Prabhakar, T. V., H. S. Jamadagni, M. Aswath kumar, and Jacques Panchard. "A Slotted Aloha joint MAC - cum - Routing protocol for data gathering sensor network applications." In Middleware and Workshops (COMSWARE '08). IEEE, 2008. http://dx.doi.org/10.1109/comswa.2008.4554396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"USING META-AGENTS TO BUILD MAS MIDDLEWARE." In 3rd International Conference on Agents and Artificial Intelligence. SciTePress - Science and and Technology Publications, 2011. http://dx.doi.org/10.5220/0003149603850388.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liao, Jilong, Kefa Lu, and Qing Cao. "Uno: A Privacy-Aware Distributed Storage and Replication Middleware for Heterogeneous Computing Platforms." In 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2013. http://dx.doi.org/10.1109/mass.2013.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography