The effective usages of computational resources are a primary concern of up-to-date distributed applications. In this paper, we present a methodology to reason about resource usages (acquisition, release, revision, ...), and therefore the proposed approach enables to predict bad usages of resources. Keeping in mind the interplay between local and global information occurring in the application-resource interactions, we model resources as entities with local policies and global properties governing the overall interactions. Formally, our model takes the shape of an extension of pi-calculus with primitives to manage resources. We develop a Control Flow Analysis computing a static approximation of process behaviour and therefore of the resourc...
Millions of computers are now connected together by the Internet. At a fast pace, applications are t...
Abstract — Shared computing utilities allocate compute, network, and storage resources to competing ...
Recourses in a distributed system can be accessed or remotely accessed across multiple nodes in the ...
The effective usages of computational resources are a primary concern of up-to-date distributed appl...
We present a methodology to reason about resource usage (acquisition, release, revision, and so on) ...
Abstract—The notion of resource plays a central role in concurrent systems. In its purest form a res...
An extension of the λ-calculus is proposed, to study resource usage analysis and verification. It fe...
An extension of the $\lambda$-calculus is proposed, to study resource usage analysis and verificat...
Modern computing paradigms for distributed applications advocate a strong control on shared resource...
We propose a model for specifying, analysing and enforcing safe usage of resources.Our usage policie...
Application resource usage models can be used in the decision making process for ensuring quality-of...
We introduce a process calculus that contains constructs to express and program resource negotiation...
Predictable execution enforcement for applications with highly and arbitrarily fluctuating resource ...
Abstract. Resource usage is one of the most important characteristics of programs. Automatically gen...
We present a generic analysis that infers both upper and lower bounds on the usage that a program ma...
Millions of computers are now connected together by the Internet. At a fast pace, applications are t...
Abstract — Shared computing utilities allocate compute, network, and storage resources to competing ...
Recourses in a distributed system can be accessed or remotely accessed across multiple nodes in the ...
The effective usages of computational resources are a primary concern of up-to-date distributed appl...
We present a methodology to reason about resource usage (acquisition, release, revision, and so on) ...
Abstract—The notion of resource plays a central role in concurrent systems. In its purest form a res...
An extension of the λ-calculus is proposed, to study resource usage analysis and verification. It fe...
An extension of the $\lambda$-calculus is proposed, to study resource usage analysis and verificat...
Modern computing paradigms for distributed applications advocate a strong control on shared resource...
We propose a model for specifying, analysing and enforcing safe usage of resources.Our usage policie...
Application resource usage models can be used in the decision making process for ensuring quality-of...
We introduce a process calculus that contains constructs to express and program resource negotiation...
Predictable execution enforcement for applications with highly and arbitrarily fluctuating resource ...
Abstract. Resource usage is one of the most important characteristics of programs. Automatically gen...
We present a generic analysis that infers both upper and lower bounds on the usage that a program ma...
Millions of computers are now connected together by the Internet. At a fast pace, applications are t...
Abstract — Shared computing utilities allocate compute, network, and storage resources to competing ...
Recourses in a distributed system can be accessed or remotely accessed across multiple nodes in the ...