Sciweavers

675 search results - page 57 / 135
» Mobilization of software developers: the free software movem...
Sort
View
MOBISEC
2009
Springer
14 years 3 months ago
Context-Aware Monitoring of Untrusted Mobile Applications
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
Andrew Brown, Mark Ryan
TLCA
2007
Springer
14 years 2 months ago
Two Session Typing Systems for Higher-Order Mobile Processes
Abstract. This paper proposes two typing systems for session interactions in higherorder mobile processes. Session types for the HOπ-calculus capture high-level structures nicatio...
Dimitris Mostrous, Nobuko Yoshida
ICRA
2006
IEEE
158views Robotics» more  ICRA 2006»
14 years 2 months ago
An Agent-based Mobile Robot System using Configurable SOC Technique
– To make a mobile robot with real-time vision system adapt to the highly dynamic environments and emergencies under the real-time constraints, a significant account of processin...
Yan Meng
WCRE
2010
IEEE
13 years 7 months ago
Mining Source Code for Structural Regularities
Abstract—During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming ...
Angela Lozano, Andy Kellens, Kim Mens, Gabriela Ar...
ISIM
2007
13 years 10 months ago
Component Model with Support of Mobile Architectures
Common features of current information systems have significant impact on software architectures of these systems. The systems can not be realised as monoliths, formal specifica...
Marek Rychlý