Sciweavers

153 search results - page 26 / 31
» Implementing and Validating an Environmental and Health Moni...
Sort
View
TOOLS
2008
IEEE
14 years 4 months ago
The Meta in Meta-object Architectures
Abstract. Behavioral reflection is crucial to support for example functional upgrades, on-the-fly debugging, or monitoring critical applications. However the use of reflective f...
Marcus Denker, Mathieu Suen, Stéphane Ducas...
COMCOM
2000
125views more  COMCOM 2000»
13 years 9 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
INFOCOM
2009
IEEE
14 years 4 months ago
Sensor Network Navigation without Locations
—We propose a pervasive usage of the sensor network infrastructure as a cyber-physical system for navigating internal users in locations of potential danger. Our proposed applica...
Mo Li, Yunhao Liu, Jiliang Wang, Zheng Yang
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 7 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
JOT
2008
142views more  JOT 2008»
13 years 9 months ago
cmUML - A UML based Framework for Formal Specification of Concurrent, Reactive Systems
Complex software systems possess concurrent and reactive behaviors requiring precise specifications prior to development. Lamport's transition axiom method is a formal specif...
Jagadish Suryadevara, Lawrence Chung, R. K. Shyama...