Sciweavers

757 search results - page 54 / 152
» Composing Security-Aware Software
Sort
View
WOWMOM
2005
ACM
75views Multimedia» more  WOWMOM 2005»
15 years 8 months ago
Towards an Asynchronous Dissemination and a Safe Deployment of Lightweight Programs in Mobile Networks
This paper presents the design and the implementation of a platform allowing owners of mobile devices to exchange software application programs using a peer-to-peer scheme in hybr...
Hervé Roussain, Nicolas Le Sommer, Fr&eacut...
ICN
2005
Springer
15 years 8 months ago
Enhancing QoS Through Alternate Path: An End-to-End Framework
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These ...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...
FSTTCS
2004
Springer
15 years 8 months ago
Who is Pointing When to Whom?
This paper introduces an extension of linear temporal logic that allows to express properties about systems that are composed of entities (like objects) that can refer to each othe...
Dino Distefano, Joost-Pieter Katoen, Arend Rensink
91
Voted
CIARP
2003
Springer
15 years 8 months ago
Automatic Dark Fibres Detection in Wool Tops
Is proposed a method for the automatic detection of dark fibres in wool tops based on image processing. A software which implements this method was developed, composed by five mo...
J. Bazerque, J. Ciambelli, S. Lafon, S. Randall
CDC
2009
IEEE
138views Control Systems» more  CDC 2009»
15 years 8 months ago
Synthesis of a global asymptotic stabilizing feedback law for a system satisfying two different sector conditions
— Global asymptotic stabilization for a class of nonlinear systems is addressed. The dynamics of these systems are composed of a linear part to which is added some nonlinearities...
Vincent Andrieu, Christophe Prieur, Sophie Tarbour...