Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
The book constitutes the refereed proceedings of the 12th International Conference on Software Composition, SC 2013, held in Budapest, Hungary, in June 2013, co-located with the STAF 2013 Federated Conferences. The 9 revised full papers were carefully reviewed and selected from 21 submissions for inclusion in the book. The papers reflect all current research in software composition, including but not limited to component-based software engineering; composition and adaption techniques; composition algebras, calculi, and type systems; feature-oriented software development; verification, validation, and testing; dynamic composition and reconfiguration.
This third volume on Emerging Web Services Technologies follows the current - search activities in the areas of Web Services and Service Oriented Architectures. rd It includes the proceedings of the 3 Workshop on Emerging Web Services Te- th nology2008(WEWST’08),whichwascolocatedwiththe6 EuropeanConference on Web Services (ECOWS’08) and took place in November 2008 in Dublin, I- land. In addition, this volume features three papers from the ECOWS’08 business track. WEWST focuses on research contributions advancing the state of the art in Web Services technologies. The main goal of the WEWST workshop is to serve as a forum for providing early exposure and much needed feedback to grow and establish original and emerging ideas within the Web Services community. The widevarietyoftools,techniques,andtechnologicalsolutionspresentedinWEWST share one common feature – they advance the current Web Services research in new directions by introducing new, sometimes controversial ideas into the ?eld. As such, WEWST is the natural extension to the main ECOWS conference. For this edition of WEWST, we accepted 6 full papers and 3 short papers. We would like to thank the paper authors for their submissions and for their contribution to the timely preparation of these proceedings, as well as for their presentations and lively discussions during the workshop. At the same time, we would like to thank our ProgramCommittee for their work and for submitting the reviewsontime.Lastbutnotleast,wewouldliketothank theECOWSconference organizers for their help organizing a successful workshop.
Doctoral Thesis / Dissertation from the year 2001 in the subject Computer Science - Commercial Information Technology, Vienna University of Technology (Technische Naturwissenschaften und Informatik), language: English, abstract: Inhaltsangabe: Abstract: Even though the benefits of mobile agents have been highlighted in numerous research works, mobile agent applications are not in widespread use today. For the success of mobile agent applications, secure, portable, and efficient execution platforms for mobile agents are crucial. However, available mobile agent systems do not meet the high security requirements of commercial applications, are not portable, or cause high overhead. Currently, the majority of mobile agent platforms is based on Java. These systems simply rely on the security facilities of Java, although the Java security model is not suited to protect agents and service components from each other. Above all, Java is lacking a concept of strong protection domains that could be used to isolate agents. The J-SEAL2 mobile agent system extends the Java environment with a model of strong protection domains. The core of the system is a micro-kernel fulfilling the same functions as a traditional operating system kernel: Protection, communication, domain termination, and resource control. For portability reasons, J-SEAL2 is implemented in pure Java. J-SEAL2 provides an efficient communication model and offers good scalability and performance for large-scale applications. This thesis explains the key concepts of the J-SEAL2 micro-kernel and how they are implemented in Java. Inhaltsverzeichnis: Table of Contents: 1Overview5 1.1Introduction5 1.2Mobile Agent Systems in Java8 1.3J-SEAL2 System Structure10 1.4J-SEAL2 Security Properties12 2.Related Work14 2.1Java Operating Systems14 2.1.1JavaSeal14 2.1.2KaffeOS16 2.1.3Alta16 2.1.4J-Kernel17 2.1.5Luna17 2.1.6NOMADS17 2.2Resource Control in Java18 2.2.1Jres18 2.2.2Real-time Extensions for Java18 2.2.3Java Profilers19 2
|
You may like...
Miss Peregrine's Home for Peculiar…
Eva Green, Asa Butterfield, …
Blu-ray disc
(1)
R29 Discovery Miles 290
|