Sciweavers

575 search results - page 35 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
SCP
1998
138views more  SCP 1998»
13 years 7 months ago
A Hierarchy of Constraint Systems for Data-Flow Analysis of Constraint Logic-Based Languages
Many interesting analyses for constraint logic-based languages are aimed at the detection of monotonic properties, that is to say, properties that are preserved as the computation...
Roberto Bagnara
FPL
2007
Springer
190views Hardware» more  FPL 2007»
14 years 1 months ago
The ANDRES Project: Analysis and Design of Run-Time Reconfigurable, Heterogeneous Systems
Today’s heterogeneous embedded systems combine components from different domains, such as software, analogue hardware and digital hardware. The design and implementation of thes...
Andreas Herrholz, Frank Oppenheimer, Philipp A. Ha...
IMC
2003
ACM
14 years 28 days ago
An analysis of Internet chat systems
In our quest to better understand network traffic dynamics, we examine Internet chat systems. Although chat as an application does not contribute huge amounts of traffic, chat sys...
Christian Dewes, Arne Wichmann, Anja Feldmann
SAC
2008
ACM
13 years 7 months ago
Contextualizing normative open multi-agent systems
Open MASs can be extremely dynamic due to heterogeneous agents that migrate among them to obtain resources or services not found locally. In order to prevent malicious actions and...
Carolina Howard Felicíssimo, Caroline Chopi...
PDP
2005
IEEE
14 years 1 months ago
Tuning Dynamic Web Applications using Fine-Grain Analysis
In this paper we present a methodology to analyze the behavior and performance of Java application servers using a performance analysis framework. This framework considers all lev...
Jordi Guitart, David Carrera, Jordi Torres, Eduard...