Sciweavers

1879 search results - page 246 / 376
» Extending Reflective Architectures
Sort
View
92
Voted
INFOCOM
2010
IEEE
14 years 9 months ago
Overcoming Failures: Fault-tolerance and Logical Centralization in Clean-Slate Network Management
—We investigate the design of a clean-slate control and nt plane for data networks using the abstraction of 4D architecture, utilizing and extending 4D’s concept of logically c...
Hammad Iqbal, Taieb Znati
101
Voted
JCS
2010
124views more  JCS 2010»
14 years 9 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
137
Voted
STTT
2010
126views more  STTT 2010»
14 years 9 months ago
Towards an industrial grade IVE for Java and next generation research platform for JML
Tool support for the Java Modeling Language (JML) is a very pressing problem. A main issue with current tools is their architecture: the cost of keeping up with the evolution of Ja...
Patrice Chalin, Robby, Perry R. James, Jooyong Lee...
HT
2010
ACM
14 years 9 months ago
Provenance meets adaptive hypermedia
In this paper we consider provenance modelling in Adaptive Hypermedia Systems (AHS). We revisit adaptation and data provenance questions and bring up new and complementary aspects...
Evgeny Knutov, Paul De Bra, Mykola Pechenizkiy
112
Voted
IAT
2010
IEEE
14 years 9 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski