Most agent systems today are closed and static. That is, one uses Agent-Oriented Software Engineering techniques to build agent systems in which the set of agents is specified ahe...
Abstract. This article deals with performance verifications of architecture models of real-time embedded systems. We focus on models verified with the real-time scheduling theory...
Alain Plantec, Frank Singhoff, Pierre Dissaux, J&e...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Abstract. A framework for the autonomous management of clustered server systems called LAMA1 (Large-scale system’s Autonomous Management Agent) is proposed in this paper. LAMA is...
Chul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...