Building a distributed system from third-party components introduces a set of problems, mainly related to compatibility and communication. Our approach to solve these problems is to build an adaptor which forces the system to exhibit only a set of safe or desired behaviors. By exploiting an abstract and partial specification of the global behavior that must be enforced, we automatically build a centralized adaptor. It mediates the interaction among components by both performing the specified behavior and, simultaneously, avoiding possible deadlocks. However in a distributed environment it is not always possible or convenient to insert a centralized adaptor. In contrast, building a distributed adaptor might increase the applicability of the ...
Abstract. The complexity of today’s distributed computing environ-ments is such that the presence of...
Component adaptation is widely recognised to be one of the crucial problems in Component-Based Softw...
International audienceThe complexity of today's distributed computing environments is such that the ...
Building a distributed system from third-party components introduces a set of problems, mainly relat...
Building a distributed system from third-party components introduces a set of problems, mainly relat...
Building a distributed system from third-party components introduces a set of problems, mainly relat...
This paper illustrates an approach to add security policies to a component-based system. We consider...
This paper illustrates an approach to add security policies to a component-based system. We consider...
In this work we present the DESERT tool that allows the automatic generation of distributed monitori...
In this work we present the DESERT tool that allows the automatic generation of distributed monitori...
AbstractComponent adaptation is widely recognised to be one of the crucial problems in Component-Bas...
Large systems-of-systems are developed by integrating several smaller systems that have been develop...
This paper describes some attack and intrusion detection elements of a security architecture for dis...
International audienceDynamic adaptability of distributed components, nowadays scarcely supported, s...
Nowadays, there are many protocols able to cope with process crashes, but, unfortunately, a process ...
Abstract. The complexity of today’s distributed computing environ-ments is such that the presence of...
Component adaptation is widely recognised to be one of the crucial problems in Component-Based Softw...
International audienceThe complexity of today's distributed computing environments is such that the ...
Building a distributed system from third-party components introduces a set of problems, mainly relat...
Building a distributed system from third-party components introduces a set of problems, mainly relat...
Building a distributed system from third-party components introduces a set of problems, mainly relat...
This paper illustrates an approach to add security policies to a component-based system. We consider...
This paper illustrates an approach to add security policies to a component-based system. We consider...
In this work we present the DESERT tool that allows the automatic generation of distributed monitori...
In this work we present the DESERT tool that allows the automatic generation of distributed monitori...
AbstractComponent adaptation is widely recognised to be one of the crucial problems in Component-Bas...
Large systems-of-systems are developed by integrating several smaller systems that have been develop...
This paper describes some attack and intrusion detection elements of a security architecture for dis...
International audienceDynamic adaptability of distributed components, nowadays scarcely supported, s...
Nowadays, there are many protocols able to cope with process crashes, but, unfortunately, a process ...
Abstract. The complexity of today’s distributed computing environ-ments is such that the presence of...
Component adaptation is widely recognised to be one of the crucial problems in Component-Based Softw...
International audienceThe complexity of today's distributed computing environments is such that the ...