Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
The Voltan software library for building distributed applications provides the support for (i) a processpair to act as single Voltan self-checking ‘fail-silent’ process; and (...
Currently, popular operating systems are unable to support the end-toend real-time requirements of distributed continuous media. Furthermore, the integration of continuous media c...
Geoff Coulson, Gordon S. Blair, Philippe Robin, Do...
Three distinct and interacting types of entities: people, software agents and e-markets are considered in this paper. These entities operate within Shaman, a proposed framework fo...
Gregory E. Kersten, Ryszard Kowalczyk, Hsiangchu L...