Sciweavers

2056 search results - page 73 / 412
» Mobile objects in Java
Sort
View
122
Voted
ICDCSW
2003
IEEE
15 years 7 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
ENTCS
2007
94views more  ENTCS 2007»
15 years 2 months ago
A Distributed Implementation of Mobile Maude
We present a new specification/implementation of the mobile agent language Mobile Maude. This new version uses the external sockets provided by Maude since its 2.2 version, thus ...
Francisco Durán, Adrián Riesco, Albe...
124
Voted
MATA
2001
Springer
158views Communications» more  MATA 2001»
15 years 7 months ago
Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents
This paper presents a framework for building network protocols for migrating mobile agents over a network. The framework allows network protocols for agent migration to be naturall...
Ichiro Satoh
SIGSOFT
2008
ACM
16 years 3 months ago
A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications
Framework-intensive applications (e.g., Web applications) heavily use temporary data structures, often resulting in performance bottlenecks. This paper presents an optimized blend...
Bruno Dufour, Barbara G. Ryder, Gary Sevitsky
123
Voted
UML
2005
Springer
15 years 8 months ago
Lessons Learned from Developing a Dynamic OCL Constraint Enforcement Tool for Java
Analysis and design by contract allows the definition of a formal agreement between a class and its clients, expressing each party’s rights and obligations. Contracts written in ...
Wojciech J. Dzidek, Lionel C. Briand, Yvan Labiche