Prevention of denial-of-service attacks is indispensable for distributed agent sys-tems to execute securely. To implement the required defense mechanisms, it is necessary to have support for resource control, i.e., ac...
详细信息
Remote Method Invocation (RMI) is an adaptation of the remote procedure call paradigm for object-oriented environments. As such, RMI allows clients to seamlessly invoke methods of objects within remote servers. Commun...
详细信息
Remote Method Invocation (RMI) is an adaptation of the remote procedure call paradigm for object-oriented environments. As such, RMI allows clients to seamlessly invoke methods of objects within remote servers. Communication between the client and server is based upon an agreed protocol stack that defines connection management rules, message formats, and data encoding. This paper presents RMIX, a meta-RMI framework, which offers two concrete protocol providers: RMIX-JRMPX and RMIX-XSOAP.
A java Execution Environment (JEE) presents lots of advantages for embedded architectures. In this paper, we present an approach to build a dependable java execution environment for Wireless PDAs. It is based on a mod...
详细信息
ISBN:
(纸本)9781450378062
A java Execution Environment (JEE) presents lots of advantages for embedded architectures. In this paper, we present an approach to build a dependable java execution environment for Wireless PDAs. It is based on a modular software architecture. Our on-going works focus on reducing software errors, increasing the security of the software and minimizing native software pieces of code to increase the overall stability of the platform by transferring operating system features in java world.
Three java examples are developed to advance an APL approach in reducing conceptual intricacies in javaprogramming. The key part of these examples is a new java class named APL. By making an instance of this class, a...
详细信息
ISBN:
(纸本)1581135777
Three java examples are developed to advance an APL approach in reducing conceptual intricacies in javaprogramming. The key part of these examples is a new java class named APL. By making an instance of this class, a programmer is in a position to call appropriate APL primitive functions and operators to process data. In other words, a programmer is able to think in terms of arrays while programming in java. All sample code is written in java. The goal is to eventually implement all APL primitive functions and operators in this new APL class following the Linux paradigm of contributions from many authors.
To better understand the conceptual issues concerning hierarchical composition, that is the possibility of an assembly of components to become itself a component, we are developing a simple component model that includ...
详细信息
Standardized language level support for threads is one of the most important features of java. However, defining the java Memory Model (JMM) has turned out to be a major challenge. Several models produced to date are ...
详细信息
ISBN:
(纸本)9781581135992
Standardized language level support for threads is one of the most important features of java. However, defining the java Memory Model (JMM) has turned out to be a major challenge. Several models produced to date are not as easily comprehensible and comparable as first thought. Given the growing interest in multithreaded javaprogramming, it is essential to have a sound framework that would allow formal specification and reasoning about the JMM. This paper presents the Uniform Memory Model (UMM), a generic memory model specification framework. Based on guarded commands, UMM can be easily integrated with a model checking utility, providing strong built-in support for formal verification and program analysis. With a flexible and simple architecture, UMM is configurable to capture different memory consistency requirements for both architectural and language level memory models. An alternative formal specification of the JMM, primarily based on the semantics proposed by Manson and Pugh, is implemented in UMM. Systematic analysis has revealed interesting properties of the proposed semantics. Inconsistencies from the original specification have also been uncovered.
We have designed and implemented a network monitoring and analysis system with efficient and integrated methods. As implemented using java with JDBC (java database connectivity), the proposed system can be operated pl...
详细信息
Program analyses and optimizations of java programs require reference information that determines the instances that may be accessed through dereferences. Reference information can be computed using reference analysis...
详细信息
ISBN:
(纸本)1581135629
Program analyses and optimizations of java programs require reference information that determines the instances that may be accessed through dereferences. Reference information can be computed using reference analysis. This paper presents a set of studies that evaluate the precision of two existing approaches for identifying instances and one approach for computing reference information in a reference analysis. The studies use dynamic reference information collected during run-time as a lower bound approximation to the precise reference information. The studies measure the precision of an existing approach by comparing the information computed using the approach with the lower bound approximation. The paper also presents case studies that attempt to identify the cases under which an existing approach is not effective. The presented studies provide information that may guide the usage of existing reference-analysis techniques and the development of new reference analysis techniques.
Most conventional design processes produce documentation as a by-product: design is done within an environment or collection of tools and the design outputs, models, diagrams, results, etc are gathered together along ...
详细信息
The javalanguage specification states that every access to an array needs to be within the bounds of that array;i.e. between 0 and array length -1. Different techniques for different programminglanguages have been p...
详细信息
ISBN:
(纸本)9781581135992
The javalanguage specification states that every access to an array needs to be within the bounds of that array;i.e. between 0 and array length -1. Different techniques for different programminglanguages have been proposed to eliminate explicit bounds checks. Some of these techniques are implemented in off-the-shelf java Virtual Machines (JVMs). The underlying principle of these techniques is that bounds checks can be removed when a JVM/compiler has enough information to guarantee that a sequence of accesses (e.g. inside a for-loop) is safe (within the bounds). Most of the techniques for the elimination of array bounds checks have been developed for programminglanguages that do not support multi-threading and/or enable dynamic class loading. These two characteristics make most of these techniques unsuitable for java. Techniques developed specifically for java have not addressed the elimination of array bounds checks in the presence of indirection, that is, when the index is stored in another array (indirection array). With the objective of optimising applications with array indirection, this paper proposes and evaluates three implementation strategies, each implemented as a java class. The classes provide the functionality of java arrays of type int so that objects of the classes can be used instead of indirection arrays. Each strategy enables JVMs, when examining only one of these classes at a time, to obtain enough information to remove array bounds checks.
暂无评论