Sciweavers

2056 search results - page 57 / 412
» Mobile objects in Java
Sort
View
JCS
2010
124views more  JCS 2010»
15 years 27 days ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
ECBS
2000
IEEE
70views Hardware» more  ECBS 2000»
15 years 6 months ago
Model Checking the Java Meta-Locking Algorithm
We apply the XMC model checker to the Java metalocking algorithm, a highly optimized technique for ensuring mutually exclusive access by threads to object monitor queues. Our abst...
Samik Basu, Scott A. Smolka, Orson R. Ward
130
Voted
IJACTAICIT
2010
169views more  IJACTAICIT 2010»
14 years 11 months ago
The Migration of Mobile Agent Using the Object Replication
The migration method of a mobile agent affects the entire performance of the distributed system. Most of the existing migration methods have the slow-witted structures due to the ...
Yonsik Lee, Jeongsu Lee
126
Voted
SSD
2007
Springer
176views Database» more  SSD 2007»
15 years 8 months ago
Distributed, Concurrent Range Monitoring of Spatial-Network Constrained Mobile Objects
The ability to continuously monitor the positions of mobile objects is important in many applications. While most past work has been set in Euclidean spaces, the mobile objects rel...
Hua Lu, Zhiyong Huang, Christian S. Jensen, Linhao...
COMPSAC
2005
IEEE
15 years 8 months ago
Preventing Illegal Usage of Mobile Phone Software
Mobile software industry is suffering from the illegal usage of the software. PKI will not be a solution for small software distribution. We introduce a lightweight but safe metho...
Yun-Sam Kim, Eun-Sun Cho