Sciweavers

COMPSAC
2005
IEEE
13 years 10 months ago
Preventing Illegal Usage of Mobile Phone Software
Mobile software industry is suffering from the illegal usage of the software. PKI will not be a solution for small software distribution. We introduce a lightweight but safe metho...
Yun-Sam Kim, Eun-Sun Cho
COMPSAC
2005
IEEE
13 years 10 months ago
Exception Handling in Coordination-Based Mobile Environments
Mobile agent systems have many attractive features including asynchrony, openness, dynamicity and anonymity, which makes them indispensable in designing complex modern application...
Alexei Iliasov, Alexander B. Romanovsky
COMPSAC
2005
IEEE
13 years 10 months ago
RIES - Internet Voting in Action
RIES stands for Rijnland Internet Election System. It is an online voting system that has been used twice in the fall of 2004 for in total over two million potential voters. In th...
Engelbert Hubbers, Bart Jacobs, Wolter Pieters
COMPSAC
2005
IEEE
13 years 10 months ago
Autonomous Hot Patching for Web-Based Applications
Patching technologies are commonly applied to improve the dependability of software after release. This paper proposes an autonomous hot patching (AHP) framework to fully automate...
Hai Huang, Wei-Tek Tsai, Yinong Chen
COMPSAC
2005
IEEE
13 years 10 months ago
Using AOP to Monitor and Administer Software for Grid Computing Environments
Monitoring is a task of collecting measurements that reflect the state of a system. Administration is a collection of tasks for control and manipulation of computer systems. Monito...
Mark Grechanik, Dewayne E. Perry, Don S. Batory
COMPSAC
2005
IEEE
13 years 10 months ago
Goal-Oriented Test Data Generation for Programs with Pointer Variables
Automatic test data generation leads to the identification of input values on which a selected path or a selected branch is executed within a program (path-oriented vs goalorient...
Arnaud Gotlieb, Tristan Denmat, Bernard Botella
COMPSAC
2005
IEEE
13 years 10 months ago
Experiences on Intrusion Tolerance Distributed Systems
Distributed systems today are very vulnerable to malicious attacks, either from insiders or outsiders. When an attacker controls a component of the system, he may steal some sensi...
Dengguo Feng, Ji Xiang
COMPSAC
2005
IEEE
13 years 10 months ago
Considerations on a New Software Architecture for Distributed Environments Using Autonomous Semantic Agents
Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of auton...
Atilla Elçi, Behnam Rahnama
COMPSAC
2005
IEEE
13 years 10 months ago
Experiences with a Dialog-Driven Process Model for Web Application Development
We present a dialog-driven process model for the development of web-based applications that uses a graphical notation to model and iteratively refine the application’s dialog ...
Matthias Book, Volker Gruhn