2018
DOI: 10.1007/s12652-018-0792-5
|View full text |Cite
|
Sign up to set email alerts
|

iPOJO flow: a declarative service workflow architecture for ubiquitous cloud applications

Abstract: The growth of innovative services backed up by various sensors and devices provides an unprecedented potential for ubiquitous computing applications and systems. However, in order to benefit from the recent developments, the current service middleware technology needs a catch-up of being able to fully support interactions among the services. OSGi is considered as a viable service framework solution due to its ability to deal with the dynamism inherent with ubiquitous cloud environments. iPOJO has also emerged … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 28 publications
0
0
0
Order By: Relevance
“…A distributed and declarative cloud-automated architecture called Cloud Orchestration Policy Engine (COPE) [19] was developed to alleviate the negative efects of poor performance on operational needs and service level agreements. For complicated applications that beneft from declaratively defned workfow topologies, the authors of [20] developed a declarative service workfow architecture based on iPOJO. Te authors of [21] proposed to have developed a system to identify network intrusions through deep learning.…”
Section: Literature Surveymentioning
confidence: 99%
“…A distributed and declarative cloud-automated architecture called Cloud Orchestration Policy Engine (COPE) [19] was developed to alleviate the negative efects of poor performance on operational needs and service level agreements. For complicated applications that beneft from declaratively defned workfow topologies, the authors of [20] developed a declarative service workfow architecture based on iPOJO. Te authors of [21] proposed to have developed a system to identify network intrusions through deep learning.…”
Section: Literature Surveymentioning
confidence: 99%