A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
The development of applications for monitoring, control, simulation and diagnosis in the petroleum industry involves a multitude of complex software tools. These tools have their ...
Cong Zhang, Viktor K. Prasanna, Abdollah Orangi, W...
A real-time computer system is a system that must perform its functions within specified time bounds. These systems are generally characterized by complex interactions with the en...
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
There have been various proposals for the formalization of appropriate viewpoint-based frameworks. Each of these approaches have been devised with a specific motive and to addres...