Sciweavers

1376 search results - page 98 / 276
» Monitoring Software Requirements Using Instrumented Code
Sort
View
ICISC
2007
99views Cryptology» more  ICISC 2007»
14 years 11 months ago
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
VMM (virtual machine monitor) based system provides the useful inspection and interposition of guest OS. With proper modification of guest OS, we can obtain event-driven memory sn...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
ATAL
2006
Springer
15 years 1 months ago
Exploring sensor networks using mobile agents
Today's wireless sensor networks have limited flexibility because their software is static. Mobile agents alleviate this problem by introducing mobile code and state. Mobile ...
Daniel Massaguer, Chien-Liang Fok, Nalini Venkatas...
DLS
2009
196views Languages» more  DLS 2009»
14 years 7 months ago
Contracts for first-class modules
Behavioral software contracts express properties concerning the flow of values across component (modules, classes, etc) interfaces. These properties are often beyond the reach of ...
T. Stephen Strickland, Matthias Felleisen
JDCTA
2010
95views more  JDCTA 2010»
14 years 4 months ago
WebAccess Based Remote Graphic Surveillance System for Mechatronics
This study employed WebAccess software to construct a remote graphic surveillance system, which was developed differently from previous remote monitoring systems. Advantech WebAcc...
Wen-Jye Shyr, Chia-Ming Lin, Wei-Ting Chiang
IWPC
2008
IEEE
15 years 4 months ago
Reusing Program Investigation Knowledge for Code Understanding
Software maintenance tasks typically involve an important amount of program investigation effort on the part of software developers. To what extent can we benefit from prior prog...
Martin P. Robillard, Putra Manggala