Results for 'middleware'

11 found
Order:
  1.  42
    Middleware’s Message: the Financial Technics of Codata.Michael Castelle - 2019 - Philosophy and Technology 34 (1):33-55.
    In this paper, I will argue for the relevance of certain distinctive features of messaging systems, namely those in which data can be sent and received asynchronously, can be sent to multiple simultaneous recipients and is received as a “potentially infinite” flow of unpredictable events. I will describe the social technology of the stock ticker, a telegraphic device introduced at the New York Stock Exchange in the 1860s, with reference to early twentieth century philosophers of synchronous experience, simultaneous sign interpretations, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2. Workshop on Mobile and Networking Technologies for Social Applications (MONET)-Architecture and Middleware-MobiSoft: An Agent-Based Middleware for Social-Mobile Applications.Steffen Braun Kern & Wilhelm Rossak - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 984-993.
  3. Identity and Functionality in the Common Instrument Middleware Architecture.Donald McMullen & Thomas Reichherzer - unknown
    No categories
     
    Export citation  
     
    Bookmark  
  4. Controlled and uncontrolled English for ontology editing.Brian Donohue, Douglas Kutach, Robert Ganger, Ron Rudnicki, Tien Pham, Geeth de Mel, Dave Braines & Barry Smith - 2015 - Semantic Technology for Intelligence, Defense and Security 1523:74-81.
    Ontologies formally represent reality in a way that limits ambiguity and facilitates automated reasoning and data fusion, but is often daunting to the non-technical user. Thus, many researchers have endeavored to hide the formal syntax and semantics of ontologies behind the constructs of Controlled Natural Languages (CNLs), which retain the formal properties of ontologies while simultaneously presenting that information in a comprehensible natural language format. In this paper, we build upon previous work in this field by evaluating prospects of implementing (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  19
    Bridging Theorem Proving and Mathematical Knowledge Retrieval.Christoph Benzmüller, Andreas Meier & Volker Sorge - 2004 - In Dieter Hutter (ed.), Mechanizing Mathematical Reasoning: Essays in Honor of Jörg Siekmann on the Occasion of His 60th Birthday. Springer. pp. 277-296.
    Accessing knowledge of a single knowledge source with different client applications often requires the help of mediator systems as middleware components. In the domain of theorem proving large efforts have been made to formalize knowledge for mathematics and verification issues, and to structure it in databases. But these databases are either specialized for a single client, or if the knowledge is stored in a general database, the services this database can provide are usually limited and hard to adjust for (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  46
    xAAL: A Distributed Infrastructure for Heterogeneous Ambient Devices.Jérôme Kerdreux, Philippe Tanguy & Christophe Lohr - 2015 - Journal of Intelligent Systems 24 (3):321-331.
    Ambient assisted living systems are based on sensors and actuators, with a diversity of network protocols and vendors. This commonly leads to the introduction of gateways or middlewares into the technical infrastructure in order to address interoperability issues. The xAAL framework presented in this paper aims to provide interoperability and to redesign such “gateways” into well-defined functional entities communicating with each other via a lightweight message bus over IP. Each entity may have multiple instances, may be shared between several boxes, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  22
    Towards a scalable, open standards service for cross-protocol data transfers across multiple sources an sinks.David Meredith, Stephen Crouch, Gerson Galang, Ming Jiang, Nguyen Hung & Peter Turner - unknown
    Data Transfer Service (DTS) is an open-source project that is developing a document-centric message model for describing a bulk data transfer activity, with an accompanying set of loosely coupled and platform-independent components for brokering the transfer of data between a wide range of (potentially incompatible) storage resources as scheduled, fault-tolerant batch jobs. The architecture scales from small embedded deployments on a single computer to large distributed deployments through an expandable ‘worker-node pool’ controlled through message-orientated middleware. Data access and transfer (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  8. Towards ontologies for formalizing modularization and communication in large software systems.Daniel Oberle, Steffen Lamparter, S. Grimm, D. Vrandečić, S. Staab & A. Gangemi - 2006 - Applied ontology 1 (2):163-202.
    Large software systems are modularized in order to improve manageability. The parts of a software system communicate in order to achieve the desired functionality. To better understand, develop, manage, and maintain the resulting complexity, this paper presents a framework of ontologies. The ontologies range from very general, foundational ones to ontologies that elucidate the specificities of particular modularization and communication paradigms. We support two specific paradigms. First, we define an ontology for software components that may be used in traditional (...) architectures, e.g., application servers. Second, we specify an ontology for Web services. Through the reuse of existing foundational ontologies and our new Core Software Ontology, our proposal offers several advantages. In particular, it avoids the typical shortcomings related approaches exhibit and it allows for the concise definition of commonalities and differences of the two paradigms. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  16
    (1 other version)Une technologie de base : l’intergiciel.Giuditta de Prato - 2012 - Hermès: La Revue Cognition, communication, politique 62 (1):, [ p.].
    Cet article analyse le rôle croissant, la signification et la fonction d’une couche logicielle intermédiaire : les intergiciels en tant que technologie de base dans un environnement en évolution rapide. Il montre leur rôle clé dans une nouvelle ère de moteurs modulaires.This article analyses the increasing role, significance and function of “middleware”, the intermediate software layer that drives interactive gaming, as a fundamental technology in a rapidly evolving environment, to illustrate its key role in the new age of modular (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10. Computational epistemology and e-science: A new way of thinking. [REVIEW]Jordi Vallverdú I. Segura - 2009 - Minds and Machines 19 (4):557-567.
    Recent trends towards an e-Science offer us the opportunity to think about the specific epistemological changes created by computational empowerment in scientific practices. In fact, we can say that a computational epistemology exists that requires our attention. By ‘computational epistemology’ I mean the computational processes implied or required to achieve human knowledge. In that category we can include AI, supercomputers, expert systems, distributed computation, imaging technologies, virtual instruments, middleware, robotics, grids or databases. Although several authors talk about the extended (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  11.  49
    Competing Fairly in the New Economy: Lessons from the Browser Wars.R. A. Spinello - 2005 - Journal of Business Ethics 57 (4):343-361.
    The browser wars case is a useful springboard for considering the principle of positive competition and the proper regulation of platform technologies. There are lessons to be culled about policy, the application of antitrust law, and the parameters of fair competition. We argue that despite Microsofts opportunistic exploitation of its proprietary code, policy makers should resist the temptation to mandate an open source code model. Vigilant anti-trust enforcement is a preferable alternative. But courts must refrain from using antitrust law to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation