Results 1 - 10
of
619
Safe Kernel Extensions Without Run-Time Checking
- Proc. of OSDI'96
"... Abstract This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel first defines a safety policy and makes it public. Then, using this policy, an application can provide binaries i ..."
Abstract
-
Cited by 429 (20 self)
- Add to MetaCart
. If the validation succeeds, the code is guaranteed to respect the safety policy without relying on run-time checks. The main practical difficulty of PCC is in generating the safety proofs. In order to gain some preliminary experience with this, we have written several network packet filters in hand-tuned DEC Alpha
A Generic Solution for Agile Run-Time Inspection Middleware
"... Abstract. Contemporary middleware offers powerful abstractions to construct distributed software systems. However, when inspecting the software at run-time, these abstractions are no longer visible. While inspection, monitoring and management are increasingly important in our always-online world, t ..."
Abstract
- Add to MetaCart
transformation capabilities that extends run-time entities with higher-level abstract views, in order to enable inspection in terms of the original and most relevant abstractions. Our solution is lightweight in terms of performance overhead and agile in the sense that it can selectively (and on-demand) generate
Composition and Run-time Adaptation of Mismatching Behavioural Interfaces
"... Abstract: Reuse of software entities such as components or Web services raise com-position issues since, most of the time, they present mismatches in their interfaces. These mismatches may appear at different interoperability levels: signature, behaviour, quality of service and semantics. The behavi ..."
Abstract
- Add to MetaCart
, we focus on systems in which composition is affected by run-time behaviour of the system. This is the case in pervasive systems where a client interacts with a specific service by using new communication channels dynamically created. These are of special interest to allow private interaction between
Using Specification Models for RunTime Adaptations ⋆
"... Abstract. For a myriad of reasons, modern applications face constant change to their requirements and working environment, requiring them to adapt accordingly. Increasingly, such adaptation is even required during runtime. In Model-Driven Engineering (MDE) approaches, models are first-class entities ..."
Abstract
- Add to MetaCart
-class entities in the development of applications, though they have not, to date, been sufficiently taken advantage of in runtime adaptation specification. In many existing approaches, designers are required to consider the execution model when specifying any runtime adaptation, forcing them to understand
Circuit Profiling Mechanisms for High-Level ATPG Abstract—Our Mutation-based Validation Paradigm (MVP)
"... is a validation environment for high-level microprocessor implementations. To be able to efficiently generate test sequences, we need to enable MVP’s ATPG to learn important details of the circuit under validation as a means to explore critical new circuit scenarios. In this paper, we present new pr ..."
Abstract
- Add to MetaCart
profiling mechanisms that can exist either as a pre-processor that gathers circuit information prior to the circuit validation process, or as run-time entities that allow MVP to learn from its progressive experience.
Model-based run-time monitoring of endto-end deadlines”,
- in Proceedings of the 5th ACM international conference on Embedded software, ACM,
, 2005
"... ABSTRACT The correct interplay among components in a distributed, reactive system is a crucial development task, particularly for embedded systems such as those in the automotive domain. Model-based development is a promising means for capturing key structural and behavioral requirements before imp ..."
Abstract
-
Cited by 16 (5 self)
- Add to MetaCart
implementing code. Current development approaches focus on components as the central development entity, leaving component integration as a separate and error-prone task in later stages of the system development process. This approach is particularly problematic in the area of Qualityof-Service properties
Executable Connectors: Towards Reusable Design Elements
- In ACM Foundations of Software Engineering (ESEC/FSE’97), number 1301 in LNCS
, 1997
"... . The decomposition of a software application into components and connectors at the design stage has been promoted as a way to describe and reason about complex software architectures. There is, however, surprisingly little language support for this decomposition at implementation level. Interaction ..."
Abstract
-
Cited by 39 (3 self)
- Add to MetaCart
level. Our connectors are run-time entities which control the interaction of components and can express a rich repertoire of interaction relationships. We show how connectors can be reused and how they enhance the reuse of components. 1 Introduction In modeling software architectures Allen and Garlan
The GRUMPS Architecture: Run-time Evolution in a Large Scale Distributed System
- In Workshop on Engineering Complex Object-Oriented Solutions for Evolution (ECOOSE), colocated with OOPSLA
, 2001
"... This paper describes the first version of the distributed programming architecture for the Grumps 1 project. The architecture consists of objects that communicate in terms of both asynchronous and synchronous events. A novel three-level extensible naming scheme is discussed that allows Grumps develo ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
developers to deploy systems that can refer to entities not identified at the time when the Grumps system and application-level code were implemented. Examples detailing how the topology of a Grumps system may be changed at run-time and how new object implementations may be distributed during system
Air-Ground Combat Simulation Through The Onera HLA Run-Time Infrastructure
- Symposium on Military, Government and Aerospace Simulation,MGA2000, April 16-20 2000, Washington D.C
, 2000
"... The High Level Architecture (HLA) establishes a common modeling and simulation framework facilitating interoperability and reuse of simulation components (DMSO 1996). Since 1996, ONERA (French Aeronautics and Space Research Center) carries out several studies on HLA in order to gain a better underst ..."
Abstract
-
Cited by 3 (3 self)
- Add to MetaCart
understanding of the underlying mechanisms of HLA implementations, called RTI's (Run Time Infrastructure) 1 (HLA 1999). The first critical step of this initiative was to develop our own RTI from the HLA specifications. In order to achieve a step by step validation of the RTI, and to evaluate the cost
Abstract Safe Kernel Extensions Without Run-Time Checking
"... This paper describes a mechanism by which anoperating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel rst de nes a safety policy and makes it public. Then, using this policy, an application can provide binaries in a special f ..."
Abstract
- Add to MetaCart
succeeds, the code is guaranteed to respect the safety policy without relying on run-time checks. The main practical di culty of PCC is in generating the safety proofs. In order to gain some preliminary experience with this, we have written several network packet lters in hand-tuned DEC Alpha assembly
Results 1 - 10
of
619