Target Environment

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 227544 Experts worldwide ranked by ideXlab platform

Marie-pierre Gervais - One of the best experts on this subject based on the ideXlab platform.

  • Modeling an OMG-MASIF Compliant Mobile Agent Platform with the RM-ODP Engineering Language
    2001
    Co-Authors: Florin Muscutariu, Marie-pierre Gervais
    Abstract:

    In order to model telecommunications services as mobile agent system, we are defining a methodology based on the RM-ODP standards. Our approach makes the distinction between the service behaviour specification, which is independent of the support Environment, and the complete service specification that must take into account the Target Environment. To obtain this specification, the designer must be able to model the Target Environment according to the concepts used in the methodology, i.e., the RM-ODP concepts. We describe in this paper such a modelling activity. The Target Environment that we consider is an OMG-MASIF compliant mobile agent plat-form. We model it by using the RM-ODP engineering language.

  • Modeling an OMG-MASIF Compliant Mobile Agent Platform with theRM-ODP Engineering Language
    2000
    Co-Authors: Florin Muscutariu, Marie-pierre Gervais
    Abstract:

    In order to model telecommunications services as mobile agent system, we are defining a methodology based on the RM-ODP standards. Our approach makes the distinction between the service behavior specification, that is independent of the support Environment, and the complete service specification that must take into account the Target Environment. To obtain this specification, the designer must be able to model the Target Environment according to the concepts used in the methodology, i.e., the RM-ODP concepts. We describe in this paper such a modeling activity. The Target Environment that we consider is an OMG-MASIF compliant mobile agent platform. We model it by using the RM-ODP engineering language.

  • MATA - Modeling an OMG-MASIF Compliant Mobile Agent Platform with the RM-ODP Engineering Language
    Lecture Notes in Computer Science, 2000
    Co-Authors: Florin Muscutariu, Marie-pierre Gervais
    Abstract:

    In order to model telecommunications services as mobile agent system, we are defining a methodology based on the RM-ODP standards. Our approach makes the distinction between the service behavior specification, that is independent of the support Environment, and the complete service specification that must take into account the Target Environment. To obtain this specification, the designer must be able to model the Target Environment according to the concepts used in the methodology, i.e., the RM-ODP concepts. We describe in this paper such a modeling activity. The Target Environment that we consider is an OMG-MASIF compliant mobile agent platform. We model it by using the RM-ODP engineering language.

Julia Lawall - One of the best experts on this subject based on the ideXlab platform.

  • High-level Programming Support for Robust Pervasive Computing Applications
    2008
    Co-Authors: Wilfried Jouve, Julien Lancia, Nicolas Palix, Charles Consel, Julia Lawall
    Abstract:

    In this paper, we present a domain-specific Interface Definition Language (IDL) and its compiler, dedicated to the development of pervasive computing applications. Our IDL provides declarative support for concisely characterizing a pervasive computing Environment. This description is (1) to be used by programmers as a high-level reference to develop applications that coordinate entities of the Target Environment and (2) to be passed to a compiler that generates a programming framework dedicated to the Target Environment. This process enables verifications to be performed prior to runtime on both the declared Environment and a given application. Furthermore, customized operations are automatically generated to support the development of pervasive computing activities, such as service discovery and session negotiation for stream-oriented devices.

  • PerCom - High-level Programming Support for Robust Pervasive Computing Applications
    2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), 2008
    Co-Authors: Wilfried Jouve, Julien Lancia, Nicolas Palix, Charles Consel, Julia Lawall
    Abstract:

    In this paper, we present a domain-specific interface definition language (IDL) and its compiler, dedicated to the development of pervasive computing applications. Our IDL provides declarative support for concisely characterizing a pervasive computing Environment. This description is (1) to be used by programmers as a high-level reference to develop applications that coordinate entities of the Target Environment and (2) to be passed to a compiler that generates a programming framework dedicated to the Target Environment. This process enables verifications to be performed prior to runtime on both the declared Environment and a given application. Furthermore, customized operations are automatically generated to support the development of pervasive computing activities, such as service discovery and session negotiation for stream-oriented devices.

  • A Domain-Specific IDL and its Compiler for Pervasive Computing Applications
    2007
    Co-Authors: Wilfried Jouve, Julien Lancia, Nicolas Palix, Charles Consel, Julia Lawall
    Abstract:

    Pervasive computing Environments introduce new challenges for application development, due to the heterogeneity of the devices involved. In practice, pervasive computing applications rely on general-purpose middleware to manage this heterogeneity, but this approach does not provide programming support and verifications specific to the pervasive computing Environment. In this paper, we present a domain-specific IDL and its compiler, dedicated to the development of pervasive computing applications. Our IDL is based on that of CORBA and provides declarative support for concisely characterizing a pervasive computing Environment. This description is (1) to be used by programmers as a high-level reference to develop applications that coordinate entities of the Target Environment and (2) to be passed to a compiler that generates a framework dedicated to the Target Environment. This process enables verifications to be performed prior to runtime on both the declared Environment and a given application. Furthermore, customized operations are automatically generated to support the development of pervasive computing activities, such as service discovery and session negotiation for stream-oriented devices. We have implemented a framework generator and have used it to generate frameworks Targeting pervasive computing areas such as building surveillance, advanced telecommunications and home automation.

Florin Muscutariu - One of the best experts on this subject based on the ideXlab platform.

  • Modeling an OMG-MASIF Compliant Mobile Agent Platform with the RM-ODP Engineering Language
    2001
    Co-Authors: Florin Muscutariu, Marie-pierre Gervais
    Abstract:

    In order to model telecommunications services as mobile agent system, we are defining a methodology based on the RM-ODP standards. Our approach makes the distinction between the service behaviour specification, which is independent of the support Environment, and the complete service specification that must take into account the Target Environment. To obtain this specification, the designer must be able to model the Target Environment according to the concepts used in the methodology, i.e., the RM-ODP concepts. We describe in this paper such a modelling activity. The Target Environment that we consider is an OMG-MASIF compliant mobile agent plat-form. We model it by using the RM-ODP engineering language.

  • Modeling an OMG-MASIF Compliant Mobile Agent Platform with theRM-ODP Engineering Language
    2000
    Co-Authors: Florin Muscutariu, Marie-pierre Gervais
    Abstract:

    In order to model telecommunications services as mobile agent system, we are defining a methodology based on the RM-ODP standards. Our approach makes the distinction between the service behavior specification, that is independent of the support Environment, and the complete service specification that must take into account the Target Environment. To obtain this specification, the designer must be able to model the Target Environment according to the concepts used in the methodology, i.e., the RM-ODP concepts. We describe in this paper such a modeling activity. The Target Environment that we consider is an OMG-MASIF compliant mobile agent platform. We model it by using the RM-ODP engineering language.

  • MATA - Modeling an OMG-MASIF Compliant Mobile Agent Platform with the RM-ODP Engineering Language
    Lecture Notes in Computer Science, 2000
    Co-Authors: Florin Muscutariu, Marie-pierre Gervais
    Abstract:

    In order to model telecommunications services as mobile agent system, we are defining a methodology based on the RM-ODP standards. Our approach makes the distinction between the service behavior specification, that is independent of the support Environment, and the complete service specification that must take into account the Target Environment. To obtain this specification, the designer must be able to model the Target Environment according to the concepts used in the methodology, i.e., the RM-ODP concepts. We describe in this paper such a modeling activity. The Target Environment that we consider is an OMG-MASIF compliant mobile agent platform. We model it by using the RM-ODP engineering language.

Wilfried Jouve - One of the best experts on this subject based on the ideXlab platform.

  • High-level Programming Support for Robust Pervasive Computing Applications
    2008
    Co-Authors: Wilfried Jouve, Julien Lancia, Nicolas Palix, Charles Consel, Julia Lawall
    Abstract:

    In this paper, we present a domain-specific Interface Definition Language (IDL) and its compiler, dedicated to the development of pervasive computing applications. Our IDL provides declarative support for concisely characterizing a pervasive computing Environment. This description is (1) to be used by programmers as a high-level reference to develop applications that coordinate entities of the Target Environment and (2) to be passed to a compiler that generates a programming framework dedicated to the Target Environment. This process enables verifications to be performed prior to runtime on both the declared Environment and a given application. Furthermore, customized operations are automatically generated to support the development of pervasive computing activities, such as service discovery and session negotiation for stream-oriented devices.

  • PerCom - High-level Programming Support for Robust Pervasive Computing Applications
    2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), 2008
    Co-Authors: Wilfried Jouve, Julien Lancia, Nicolas Palix, Charles Consel, Julia Lawall
    Abstract:

    In this paper, we present a domain-specific interface definition language (IDL) and its compiler, dedicated to the development of pervasive computing applications. Our IDL provides declarative support for concisely characterizing a pervasive computing Environment. This description is (1) to be used by programmers as a high-level reference to develop applications that coordinate entities of the Target Environment and (2) to be passed to a compiler that generates a programming framework dedicated to the Target Environment. This process enables verifications to be performed prior to runtime on both the declared Environment and a given application. Furthermore, customized operations are automatically generated to support the development of pervasive computing activities, such as service discovery and session negotiation for stream-oriented devices.

  • A Domain-Specific IDL and its Compiler for Pervasive Computing Applications
    2007
    Co-Authors: Wilfried Jouve, Julien Lancia, Nicolas Palix, Charles Consel, Julia Lawall
    Abstract:

    Pervasive computing Environments introduce new challenges for application development, due to the heterogeneity of the devices involved. In practice, pervasive computing applications rely on general-purpose middleware to manage this heterogeneity, but this approach does not provide programming support and verifications specific to the pervasive computing Environment. In this paper, we present a domain-specific IDL and its compiler, dedicated to the development of pervasive computing applications. Our IDL is based on that of CORBA and provides declarative support for concisely characterizing a pervasive computing Environment. This description is (1) to be used by programmers as a high-level reference to develop applications that coordinate entities of the Target Environment and (2) to be passed to a compiler that generates a framework dedicated to the Target Environment. This process enables verifications to be performed prior to runtime on both the declared Environment and a given application. Furthermore, customized operations are automatically generated to support the development of pervasive computing activities, such as service discovery and session negotiation for stream-oriented devices. We have implemented a framework generator and have used it to generate frameworks Targeting pervasive computing areas such as building surveillance, advanced telecommunications and home automation.

Zheng Kang - One of the best experts on this subject based on the ideXlab platform.

  • Network Attack Effects Mining Based on National Vulnerability Database
    Computer Science, 2008
    Co-Authors: Zheng Kang
    Abstract:

    Network attack effect evaluation,pays attention to how to evaluate effect and abilityof network attacks in the Target Environment. It is important to pick up essential attack effects based on analysis of most typical computer attacks for network attack effect evaluation model. The paper makes data mining for network attack effects based on National Vulnerability Database (NVD). Firstly,the NVD data are pretreated and converted to NAED(Network Attack Effect Database),including deleting irrelated vulnerability attributes and imperfect data,decomposing ‘cvss_vector’,and building attack effects. Then,the paper analyzes frequency and correlation of these attack effects,and gains representative,developing,definite and independent network attack effects.