Sciweavers

6796 search results - page 1094 / 1360
» Java for Embedded Systems
Sort
View
IFIP
2001
Springer
15 years 8 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
INAP
2001
Springer
15 years 8 months ago
iML: A Logic-based Framework for Constructing Graphical User Interface on Mobile Agents
Mobile agent technology is an emerging technology that allows easier design, implementation, and maintenance of distributed systems. Mobility enables agents to reduce network load,...
Naoki Fukuta, Nobuaki Mizutani, Tadachika Ozono, T...
HPDC
1999
IEEE
15 years 8 months ago
Process Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migr...
Victor C. Zandy, Barton P. Miller, Miron Livny
TIC
1998
Springer
127views System Software» more  TIC 1998»
15 years 8 months ago
Stack-Based Typed Assembly Language
In previous work, we presented a Typed Assembly Language (TAL). TAL is sufficiently expressive to serve as a target language for compilers of high-level languages such as ML. More...
J. Gregory Morrisett, Karl Crary, Neal Glew, David...
ATAL
2006
Springer
15 years 5 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
« Prev « First page 1094 / 1360 Last » Next »