Portable resource control in Java
Preventing abusive resource consumption is indispensable for all kinds of systems that
execute untrusted mobile coee, such as mobile object sytems, extensible web servers, and …
execute untrusted mobile coee, such as mobile object sytems, extensible web servers, and …
Termination in language-based systems
A Rudys, DS Wallach - ACM Transactions on Information and System …, 2002 - dl.acm.org
Language run-time systems are increasingly being embedded in systems to support run-
time extensibility via mobile code. Such systems raise a number of concerns when the code …
time extensibility via mobile code. Such systems raise a number of concerns when the code …
IDReAM: Intrusion detection and response executed with agent mobility architecture and implementation
N Foukia - Proceedings of the fourth international joint conference …, 2005 - dl.acm.org
This paper deals with a new approach to build a completely distributed and decentralized
Intrusion Detection and Response System (IDRS) in computer networks. This approach is …
Intrusion Detection and Response System (IDRS) in computer networks. This approach is …
Discovery of association rules in temporal databases
AU Tansel, SP Imberman - Fourth International Conference on …, 2007 - ieeexplore.ieee.org
Temporal databases naturally contain a wealth of information that can be unearthed by
knowledge discovery and data mining techniques. Discovering association rules in market …
knowledge discovery and data mining techniques. Discovering association rules in market …
A portable CPU-management framework for Java
The Java resource accounting framework, second edition (J-RAF2), is a portable CPU-
management framework for Java environments. It is based on fully automated program …
management framework for Java environments. It is based on fully automated program …
Apparatus and methods for managing resource usage
WF Foote - US Patent 7,028,298, 2006 - Google Patents
Disclosed is a method for managing resource usage of a particular resource by a set of
related code, such as code executed on behalf of a downloaded applet. A resource indicator …
related code, such as code executed on behalf of a downloaded applet. A resource indicator …
Secure mobile agent systems using Java: where are we heading?
Java is the predominant language for mobile agent systems, both for implementing mobile
agent execution environments and for writing mobile agent applications. This is due to …
agent execution environments and for writing mobile agent applications. This is due to …
Apparatus and methods for communicating between resource domains
WF Foote, H Kawahara - US Patent 6,829,772, 2004 - Google Patents
Disclosed is a method for executing a remote method. Each argument of the remote method
is wrapped when the argument is a remote object (eg the argument's declared class …
is wrapped when the argument is a remote object (eg the argument's declared class …
Enforcing Java run-time properties using bytecode rewriting
A Rudys, DS Wallach - International Symposium on Software Security, 2002 - Springer
Bytecode rewriting is a portable way of altering Java's behavior by changing Java classes
themselves as they are loaded. This mechanism allows us to modify the semantics of Java …
themselves as they are loaded. This mechanism allows us to modify the semantics of Java …
Using bytecode instruction counting as portable CPU consumption metric
Accounting for the CPU consumption of applications is crucial for software development to
detect and remove performance bottlenecks (profiling) and to evaluate the performance of …
detect and remove performance bottlenecks (profiling) and to evaluate the performance of …