Sciweavers

955 search results - page 191 / 191
» Semantic Approach to Dynamic Coordination in Autonomous Syst...
Sort
View
ESOP
2005
Springer
13 years 11 months ago
Asserting Bytecode Safety
Abstract. We instantiate an Isabelle/HOL framework for proof carrying code to Jinja bytecode, a downsized variant of Java bytecode featuring objects, inheritance, method calls and ...
Martin Wildmoser, Tobias Nipkow
MM
2004
ACM
149views Multimedia» more  MM 2004»
13 years 11 months ago
Designing experiential environments for management of personal multimedia
With the increasing ubiquity of sensors and computational resources, it is becoming easier and increasingly common for people to electronically record, photographs, text, audio, a...
Rahul Singh, Rachel Knickmeyer, Punit Gupta, Rames...
WCRE
2009
IEEE
14 years 10 days ago
FAMOOSr 2009 - Workshop on FAMIX and Moose in Software Reengineering
The increasing amount of data available about software systems poses new challenges for re- and reverse engineering research, as the proposed approaches need to scale. In this con...
Simon Denier, Tudor Gîrba
INFOCOM
2008
IEEE
14 years 18 hour ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners
HPDC
2010
IEEE
13 years 5 months ago
Software architecture definition for on-demand cloud provisioning
Cloud computing [22] is a promising paradigm for the provisioning of IT services. Cloud computing infrastructures, such as those offered by the RESERVOIR project, aim to facilitat...
Clovis Chapman, Wolfgang Emmerich, Fermín G...