Portable resource control in Java

W Binder, JG Hulaas, A Villazón - ACM SIGPLAN Notices, 2001 - dl.acm.org
Preventing abusive resource consumption is indispensable for all kinds of systems that
execute untrusted mobile coee, such as mobile object sytems, extensible web servers, and …

Termination in language-based systems

A Rudys, DS Wallach - ACM Transactions on Information and System …, 2002 - dl.acm.org
Language run-time systems are increasingly being embedded in systems to support run-
time extensibility via mobile code. Such systems raise a number of concerns when the code …

IDReAM: Intrusion detection and response executed with agent mobility architecture and implementation

N Foukia - Proceedings of the fourth international joint conference …, 2005 - dl.acm.org
This paper deals with a new approach to build a completely distributed and decentralized
Intrusion Detection and Response System (IDRS) in computer networks. This approach is …

Discovery of association rules in temporal databases

AU Tansel, SP Imberman - Fourth International Conference on …, 2007 - ieeexplore.ieee.org
Temporal databases naturally contain a wealth of information that can be unearthed by
knowledge discovery and data mining techniques. Discovering association rules in market …

A portable CPU-management framework for Java

W Binder, J Hulaas - IEEE Internet Computing, 2004 - ieeexplore.ieee.org
The Java resource accounting framework, second edition (J-RAF2), is a portable CPU-
management framework for Java environments. It is based on fully automated program …

Apparatus and methods for managing resource usage

WF Foote - US Patent 7,028,298, 2006 - Google Patents
Disclosed is a method for managing resource usage of a particular resource by a set of
related code, such as code executed on behalf of a downloaded applet. A resource indicator …

Secure mobile agent systems using Java: where are we heading?

W Binder, V Roth - Proceedings of the 2002 ACM symposium on Applied …, 2002 - dl.acm.org
Java is the predominant language for mobile agent systems, both for implementing mobile
agent execution environments and for writing mobile agent applications. This is due to …

Apparatus and methods for communicating between resource domains

WF Foote, H Kawahara - US Patent 6,829,772, 2004 - Google Patents
Disclosed is a method for executing a remote method. Each argument of the remote method
is wrapped when the argument is a remote object (eg the argument's declared class …

Enforcing Java run-time properties using bytecode rewriting

A Rudys, DS Wallach - International Symposium on Software Security, 2002 - Springer
Bytecode rewriting is a portable way of altering Java's behavior by changing Java classes
themselves as they are loaded. This mechanism allows us to modify the semantics of Java …

Using bytecode instruction counting as portable CPU consumption metric

W Binder, J Hulaas - Electronic Notes in Theoretical Computer Science, 2006 - Elsevier
Accounting for the CPU consumption of applications is crucial for software development to
detect and remove performance bottlenecks (profiling) and to evaluate the performance of …