-
1
-
-
33750011469
-
Aspect-oriented programming for reactive systems: Larissa, a proposal in the synchronous framework
-
K. Altisen, F. Maraninchi, and D. Stauch. Aspect-oriented programming for reactive systems: Larissa, a proposal in the synchronous framework. Sci. Comput. Program., 63(3):297-320, 2006.
-
(2006)
Sci. Comput. Program
, vol.63
, Issue.3
, pp. 297-320
-
-
Altisen, K.1
Maraninchi, F.2
Stauch, D.3
-
4
-
-
35048861846
-
Timed automata: Semantics, algorithms and tools
-
Concurrency and Petri Nets, Springer-Verlag
-
J. Bengtsson and W. Yi. Timed automata: Semantics, algorithms and tools. In Concurrency and Petri Nets, LNCS vol. 3098. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3098
-
-
Bengtsson, J.1
Yi, W.2
-
5
-
-
0035551933
-
Portable resource control in java
-
ACM Press
-
W. Binder, J. G. Hulaas, and A. Villaz. Portable resource control in java. In OOPSLA '01: Proceedings of the 16th ACM SIGPLAN conference on Object oriented programming, systems, languages, and applications, pages 139-155. ACM Press, 2001.
-
(2001)
OOPSLA '01: Proceedings of the 16th ACM SIGPLAN conference on Object oriented programming, systems, languages, and applications
, pp. 139-155
-
-
Binder, W.1
Hulaas, J.G.2
Villaz, A.3
-
8
-
-
84937392520
-
A framework for the detection and resolution of aspect interactions
-
Proc. of Conference on Generative Programming and Component Engineering GPCE'02, Springer-Verlag
-
R. Douence, P. Fradet, and M. Südholt. A framework for the detection and resolution of aspect interactions. In Proc. of Conference on Generative Programming and Component Engineering (GPCE'02), LNCS vol. 2487. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2487
-
-
Douence, R.1
Fradet, P.2
Südholt, M.3
-
9
-
-
18844385093
-
Trace-based aspects
-
M. Aksit, S. Clarke, T. Elrad, and R. Filman, editors, Addison-Wesley
-
R. Douence, P. Fradet, and M. Südholt. Trace-based aspects. In M. Aksit, S. Clarke, T. Elrad, and R. Filman, editors, Aspect-Oriented Software Development, pages 201-217. Addison-Wesley, 2004.
-
(2004)
Aspect-Oriented Software Development
, pp. 201-217
-
-
Douence, R.1
Fradet, P.2
Südholt, M.3
-
10
-
-
35048852259
-
Network fusion
-
Prog. Lang. and Syst, Second Asian Symposium, APLAS'04
-
P. Fradet and S. Hong Tuan Ha. Network fusion. In Prog. Lang. and Syst.: Second Asian Symposium, (APLAS'04), LNCS vol. 3302, 2004.
-
(2004)
LNCS
, vol.3302
-
-
Fradet, P.1
Hong Tuan Ha, S.2
-
12
-
-
38849175561
-
-
P. Fradet and S. Hong Tuan Ha. Systèmes de gestion de ressources et aspects de disponibilité. L'Objet - Logiciel, bases de données, réseaux, 12(2-3):183-210, Sept. 2006.
-
P. Fradet and S. Hong Tuan Ha. Systèmes de gestion de ressources et aspects de disponibilité. L'Objet - Logiciel, bases de données, réseaux, 12(2-3):183-210, Sept. 2006.
-
-
-
-
14
-
-
82955230066
-
An overview of AspectJ
-
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An overview of AspectJ. Lecture Notes in Computer Science, 2072:327-355, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2072
, pp. 327-355
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.G.6
-
17
-
-
10444244120
-
Modeling control speculation for timing analysis
-
X. Li, T. Mitra, and A. Roychoudhury. Modeling control speculation for timing analysis. Real-Time Syst., 29(1):27-58, 2005.
-
(2005)
Real-Time Syst
, vol.29
, Issue.1
, pp. 27-58
-
-
Li, X.1
Mitra, T.2
Roychoudhury, A.3
-
18
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
J. Ligatti, L. Bauer, and D. Walker. Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Security, 4(1-2):2-16, 2005.
-
(2005)
Int. J. Inf. Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
19
-
-
84974765207
-
A resource allocation model for denial of service protection
-
J. K. Millen. A resource allocation model for denial of service protection. Journal of Computer Security, 2(2), 1994.
-
(1994)
Journal of Computer Security
, vol.2
, Issue.2
-
-
Millen, J.K.1
-
21
-
-
0000039023
-
Calculating the maximum, execution time of real-time programs
-
P. Puschner and C. Koza. Calculating the maximum, execution time of real-time programs. Real-Time Syst., 1(2):.159-176, 1989.
-
(1989)
Real-Time Syst
, vol.1
, Issue.2
, pp. 159-176
-
-
Puschner, P.1
Koza, C.2
-
22
-
-
0028257391
-
Critical system properties: Survey and taxonomy
-
J. Rushby. Critical system properties: Survey and taxonomy. Reliability Engineering and Systems Safety, 43(2): 189-219, 1994.
-
(1994)
Reliability Engineering and Systems Safety
, vol.43
, Issue.2
, pp. 189-219
-
-
Rushby, J.1
-
25
-
-
0025441368
-
A specification and verification method for preventing denial of service
-
C.-F. Yu and V. D. Gligor. A specification and verification method for preventing denial of service. IEEE Trans. Soft. Eng., 16(6), 1990.
-
(1990)
IEEE Trans. Soft. Eng
, vol.16
, Issue.6
-
-
Yu, C.-F.1
Gligor, V.D.2
|