Sciweavers

103 search results - page 19 / 21
» Dynamic Secure Aspect Modeling with UML: From Models to Code
Sort
View
OOPSLA
2004
Springer
15 years 3 months ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed
84
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Network Resource Allocation for Competing Multiple Description Transmissions
Providing real-time multimedia services over a best-effort network is challenging due to the stringent delay requirements in the presence of complex network dynamics. Multiple des...
Ying Li, Chao Tian, Suhas N. Diggavi, Mung Chiang,...
ESOP
2003
Springer
15 years 2 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
ASM
2000
ASM
15 years 2 months ago
Report on a Practical Application of ASMs in Software Design
ASMs have been used at Siemens Corporate Technology to design a component in a software package called FALKO. Main purpose of FALKO is the construction and validation of timetables...
Egon Börger, Peter Päppinghaus, Joachim ...
76
Voted
INFOCOM
2002
IEEE
15 years 2 months ago
SWAN: Service Differentiation in Stateless Wireless Ad Hoc Networks
—We propose SWAN, a stateless network model which uses distributed control algorithms to deliver service differentiation in mobile wireless ad hoc networks in a simple, scalable ...
Gahng-Seop Ahn, Li-Hsiang Sun, Andras Veres, Andre...