Sciweavers

354 search results - page 64 / 71
» An Architectural Foundation for Relating Features
Sort
View
74
Voted
ENTCS
2002
145views more  ENTCS 2002»
14 years 9 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
86
Voted
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 7 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
WIAS
2010
102views more  WIAS 2010»
14 years 7 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
IEEESCC
2009
IEEE
14 years 7 months ago
Reconfigurable SCA Applications with the FraSCAti Platform
The Service Component Architecture (SCA) is a technology agnostic standard for developing and deploying distributed service-oriented applications. However, SCA does not define sta...
Lionel Seinturier, Philippe Merle, Damien Fournier...
OOPSLA
2004
Springer
15 years 2 months ago
Hard real-time: C++ versus RTSJ
In the domain of hard real-time systems, which language is better: C++ or the Real-Time Specification for Java (RTSJ)? Although standard Java provides a more productive programmin...
Daniel L. Dvorak, William K. Reinholtz