메뉴 건너뛰기




Volumn 2370, Issue , 2002, Pages 15-30

A contract-based approach of resource-constrained software deployment

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 35248813936     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45440-3_2     Document Type: Conference Paper
Times cited : (9)

References (17)
  • 6
    • 38349043294 scopus 로고    scopus 로고
    • PhD thesis, Massachussets Institute of Technology
    • David Evans. Policy-Directed Code Safety. PhD thesis, Massachussets Institute of Technology, February 2000.
    • (2000) Policy-Directed Code Safety
    • Evans, D.1
  • 9
    • 0003313661 scopus 로고    scopus 로고
    • Present and Near Future
    • Li Gong. Java Security, May
    • Li Gong. Java Security: Present and Near Future. IEEE Micro 14-19, May 1997.
    • (1997) IEEE Micro , pp. 14-19
  • 12
    • 0035394434 scopus 로고    scopus 로고
    • Reliable Objects: A Lightweight Approach applied to Java
    • July/August
    • J.-M. Jezequel, D. Deveaux, and Y. Le Traon. Reliable Objects: a Lightweight Approach applied to Java. IEEE Software, 18(4):76-83, July/August 2001.
    • (2001) IEEE Software , vol.18 , Issue.4 , pp. 76-83
    • Jezequel, J.-M.1    Deveaux, D.2    Le Traon, Y.3
  • 15
    • 85008590313 scopus 로고    scopus 로고
    • Providing Trusted Components to the Industry
    • B. Meyer, C. Mingins, and H. Schmidt. Providing Trusted Components to the Industry. IEEE Computer, pages 104-15, May 1998.
    • (1998) IEEE Computer , pp. 104-115
    • Meyer, B.1    Mingins, C.2    Schmidt, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.