메뉴 건너뛰기




Volumn , Issue , 2007, Pages 165-174

Aspects of availability

Author keywords

Aspect oriented programming; Availability; Denial of service; Resource management; Timed automata; Weaving

Indexed keywords

ASPECT ORIENTED PROGRAMMING; TIMED AUTOMATA;

EID: 38849189928     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1289971.1289999     Document Type: Conference Paper
Times cited : (5)

References (25)
  • 1
    • 33750011469 scopus 로고    scopus 로고
    • Aspect-oriented programming for reactive systems: Larissa, a proposal in the synchronous framework
    • K. Altisen, F. Maraninchi, and D. Stauch. Aspect-oriented programming for reactive systems: Larissa, a proposal in the synchronous framework. Sci. Comput. Program., 63(3):297-320, 2006.
    • (2006) Sci. Comput. Program , vol.63 , Issue.3 , pp. 297-320
    • Altisen, K.1    Maraninchi, F.2    Stauch, D.3
  • 4
    • 35048861846 scopus 로고    scopus 로고
    • Timed automata: Semantics, algorithms and tools
    • Concurrency and Petri Nets, Springer-Verlag
    • J. Bengtsson and W. Yi. Timed automata: Semantics, algorithms and tools. In Concurrency and Petri Nets, LNCS vol. 3098. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3098
    • Bengtsson, J.1    Yi, W.2
  • 8
    • 84937392520 scopus 로고    scopus 로고
    • A framework for the detection and resolution of aspect interactions
    • Proc. of Conference on Generative Programming and Component Engineering GPCE'02, Springer-Verlag
    • R. Douence, P. Fradet, and M. Südholt. A framework for the detection and resolution of aspect interactions. In Proc. of Conference on Generative Programming and Component Engineering (GPCE'02), LNCS vol. 2487. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2487
    • Douence, R.1    Fradet, P.2    Südholt, M.3
  • 9
    • 18844385093 scopus 로고    scopus 로고
    • Trace-based aspects
    • M. Aksit, S. Clarke, T. Elrad, and R. Filman, editors, Addison-Wesley
    • R. Douence, P. Fradet, and M. Südholt. Trace-based aspects. In M. Aksit, S. Clarke, T. Elrad, and R. Filman, editors, Aspect-Oriented Software Development, pages 201-217. Addison-Wesley, 2004.
    • (2004) Aspect-Oriented Software Development , pp. 201-217
    • Douence, R.1    Fradet, P.2    Südholt, M.3
  • 10
    • 35048852259 scopus 로고    scopus 로고
    • Network fusion
    • Prog. Lang. and Syst, Second Asian Symposium, APLAS'04
    • P. Fradet and S. Hong Tuan Ha. Network fusion. In Prog. Lang. and Syst.: Second Asian Symposium, (APLAS'04), LNCS vol. 3302, 2004.
    • (2004) LNCS , vol.3302
    • Fradet, P.1    Hong Tuan Ha, S.2
  • 12
    • 38849175561 scopus 로고    scopus 로고
    • P. Fradet and S. Hong Tuan Ha. Systèmes de gestion de ressources et aspects de disponibilité. L'Objet - Logiciel, bases de données, réseaux, 12(2-3):183-210, Sept. 2006.
    • P. Fradet and S. Hong Tuan Ha. Systèmes de gestion de ressources et aspects de disponibilité. L'Objet - Logiciel, bases de données, réseaux, 12(2-3):183-210, Sept. 2006.
  • 17
    • 10444244120 scopus 로고    scopus 로고
    • Modeling control speculation for timing analysis
    • X. Li, T. Mitra, and A. Roychoudhury. Modeling control speculation for timing analysis. Real-Time Syst., 29(1):27-58, 2005.
    • (2005) Real-Time Syst , vol.29 , Issue.1 , pp. 27-58
    • Li, X.1    Mitra, T.2    Roychoudhury, A.3
  • 18
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • J. Ligatti, L. Bauer, and D. Walker. Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Security, 4(1-2):2-16, 2005.
    • (2005) Int. J. Inf. Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 19
    • 84974765207 scopus 로고
    • A resource allocation model for denial of service protection
    • J. K. Millen. A resource allocation model for denial of service protection. Journal of Computer Security, 2(2), 1994.
    • (1994) Journal of Computer Security , vol.2 , Issue.2
    • Millen, J.K.1
  • 21
    • 0000039023 scopus 로고
    • Calculating the maximum, execution time of real-time programs
    • P. Puschner and C. Koza. Calculating the maximum, execution time of real-time programs. Real-Time Syst., 1(2):.159-176, 1989.
    • (1989) Real-Time Syst , vol.1 , Issue.2 , pp. 159-176
    • Puschner, P.1    Koza, C.2
  • 22
    • 0028257391 scopus 로고
    • Critical system properties: Survey and taxonomy
    • J. Rushby. Critical system properties: Survey and taxonomy. Reliability Engineering and Systems Safety, 43(2): 189-219, 1994.
    • (1994) Reliability Engineering and Systems Safety , vol.43 , Issue.2 , pp. 189-219
    • Rushby, J.1
  • 25
    • 0025441368 scopus 로고
    • A specification and verification method for preventing denial of service
    • C.-F. Yu and V. D. Gligor. A specification and verification method for preventing denial of service. IEEE Trans. Soft. Eng., 16(6), 1990.
    • (1990) IEEE Trans. Soft. Eng , vol.16 , Issue.6
    • Yu, C.-F.1    Gligor, V.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.