scholarly journals Weak persistency semantics from the ground up: formalising the persistency semantics of ARMv8 and transactional models

2019 ◽  
Vol 3 (OOPSLA) ◽  
pp. 1-27 ◽  
Author(s):  
Azalea Raad ◽  
John Wickerson ◽  
Viktor Vafeiadis
Keyword(s):  
Author(s):  
Sami Bhiri ◽  
Walid Gaaloul ◽  
Claude Godart ◽  
Olivier Perrin ◽  
Maciej Zaremba ◽  
...  

Web services are defined independently of any execution context. Due to their inherent autonomy and heterogeneity, it is difficult to examine the behaviour of composite services, especially in case of failures. This paper is interested in ensuring composite services reliability. Reliable composition is defined as a composition where all instance executions are correct from a transactional and business point of view. In this paper, the authors propose a transactional approach for ensuring reliable Web service compositions. The approach integrates the expressivity power of workflow models and the reliability of Advanced Transactional Models (ATM). This method offers flexibility for designers to specify their requirements in terms of control structure, using workflow patterns, and execution correctness. Contrary to ATM, the authors start from the designers’ specifications to define the appropriate transactional mechanisms that ensure correct executions according to their requirements.


Author(s):  
Jorge Torres ◽  
Eduardo Juarez ◽  
Juan Manuel Dodero ◽  
Ignacio Aedo

Author(s):  
Wei Shen

Amid the global economic downturn, Eurozone crisis and Libya war in 2011, Alibaba, Yahoo and Softbank’s dispute over Alipay brought China’s telecoms industry and, more importantly, foreign investment policies into the global spotlight. This article considers Chinese legislative framework regulating foreign investment in China’s telecoms industry, and more importantly, two transactional models, that is, the CCF and VIE structures, foreign investors have adopted in the past three decades to access China’s restricted telecoms industry. This article attempts to unveil the underlying reasons foreign investors creating and utilizing these transactional models and, more importantly, China’s recent regulatory instruments Chinese authorities have taken in tackling the VIE structure in telecoms industry. From a political economy lens, this article offers a possible rationale underpinning such movements in light of China’s policy direction.


1987 ◽  
Vol 46 (2) ◽  
pp. 361-379 ◽  
Author(s):  
David West Rudner

AbstractsMost accounts of South Indian commerce in the seventeenth century depend on European documents and focus on Indo-European trade along the Malabar and Coromandel coasts. This article makes use of indigenous documents to analyze the way a caste of itinerant salt traders, the Nakarattars, combined worship and commerce in the interior of Tamil-speaking South India. It focuses on Nakarattar activities in the seventeenth century before they had achieved power under their better-known name, Nattukottai Chettiars, and at a time when their commercial expansion was just getting under way and when the close association of this expansion with rituals of religious gifting was already apparent. The two main purposes of the article are to illuminate the ritual dimension of commercial activity in precolonial South India and to enrich current transactional models of the relationship between temples and small groups in South India by incorporating a mercantile perspective.


Author(s):  
Yunwei Zhao ◽  
Can Wang ◽  
Chi-Hung Chi ◽  
Kwok-Yan Lam ◽  
Sen Wang

The availability of massive social media data has enabled the prediction of people’s future behavioral trends at an unprecedented large scale. Information cascades study on Twitter has been an integral part of behavior analysis. A number of methods based on the transactional features (such as keyword frequency) and the semantic features (such as sentiment) have been proposed to predict the future cascading trends. However, an in-depth understanding of the pros and cons of semantic and transactional models is lacking. This paper conducts a comparative study of both approaches in predicting information diffusion with three mechanisms: retweet cascade, url cascade, and hashtag cascade. Experiments on Twitter data show that the semantic model outperforms the transactional model, if the exterior pattern is less directly observable (i.e. hashtag cascade). When it becomes more directly observable (i.e. retweet and url cascades), the semantic method yet delivers approximate accuracy (i.e. url cascade) or even worse accuracy (i.e. retweet cascade). Further, we demonstrate that the transactional and semantic models are not independent, and the performance gets greatly enhanced when combining both.


Sign in / Sign up

Export Citation Format

Share Document