Sciweavers

2838 search results - page 175 / 568
» Verifying Controlled Components
Sort
View
COMCOM
2000
125views more  COMCOM 2000»
13 years 10 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
REFLECTION
2001
Springer
14 years 3 months ago
Performance and Integrity in the OpenORB Reflective Middleware
, are to address what we perceive as the most pressing shortcomings of current reflective middleware platforms. First, performance: in the worst case, this needs to be on a par wit...
Gordon S. Blair, Geoff Coulson, Michael Clarke, Ni...
SRDS
2005
IEEE
14 years 4 months ago
Enforcing Enterprise-wide Policies Over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over interacting software components in enterprise computing environments. This fra...
Zhijun He, Tuan Phan, Thu D. Nguyen
WSC
2007
14 years 29 days ago
Agent-based simulation for collaborative cranes
Most of the materials and components for a construction project are lifted by cranes. Much research has been done for path planning, motion control, and online navigation to reduc...
Cheng Zhang, Amin Hammad
ETFA
2005
IEEE
14 years 4 months ago
Assessment of PROFIBUS networks using a fault injection framework
Industrial control systems architectures have been evolving to the decentralization of control tasks. This evolution associated with the time-critical nature of these tasks, incre...
J. A. Carvalho, A. S. Carvalho, Paulo Portugal