Influence control is a very challenging issue in dynamic reconfiguration and still not well addressed in the literature. This paper argues that dynamic reconfiguration influences system execution in four ways: functional update, functional side-effect, logical influence on performance and physical influence on performance. Methods including version control, transaction tracing, switching reconfiguration plan, and reconfiguration scheduling have been proposed for controlling the influence. These methods are integrated into the Reconfigurable Data Flow (RDF) model, which is designed to support the dynamic reconfiguration of stateless data flow systems. The RDF platform is an implementation of the RDF model on Java platform. The RDF platform i...
Dynamic information flow tracking (DIFT) has been proven an effective technique to track data usage;...
Data schema changes occur as a result of evolving software systems. This is a well-known problem and...
Information flow analysis is concerned with validating the security of information flows between obj...
Abstract—Influence control is a very challenging issue in dynamic reconfiguration and still not well...
Dynamic reconfiguration is a useful technique for software update because it can achieve an architec...
The automated way of dynamic reconfiguration has many advantages comparing with the manual way. But ...
This paper proposes a reconfigurable data flow (RDF) model - an architecture meta-model for dynamic ...
In this paper, we firstly review the concerned issues on dynamic reconfiguration of non-stop dataflo...
Adapting software to user needs and environmental constraints at run-time requires extending the sof...
With the increasing demand for long running and highly available distributed services, interest in s...
Dynamic reconfiguration is gaining popularity [2], [4] but it may cause degradation of overall execu...
This paper focuses on global consistency preservation for dynamic reconfiguration. Global consistenc...
International audienceCloud computing and cyber-physical systems involve software capable of adaptin...
. The paper describes a new dynamic protocol for managing replicated data. Like the existing dynamic...
Adapting software to user needs and environmental constraints at run-time requires extending the sof...
Dynamic information flow tracking (DIFT) has been proven an effective technique to track data usage;...
Data schema changes occur as a result of evolving software systems. This is a well-known problem and...
Information flow analysis is concerned with validating the security of information flows between obj...
Abstract—Influence control is a very challenging issue in dynamic reconfiguration and still not well...
Dynamic reconfiguration is a useful technique for software update because it can achieve an architec...
The automated way of dynamic reconfiguration has many advantages comparing with the manual way. But ...
This paper proposes a reconfigurable data flow (RDF) model - an architecture meta-model for dynamic ...
In this paper, we firstly review the concerned issues on dynamic reconfiguration of non-stop dataflo...
Adapting software to user needs and environmental constraints at run-time requires extending the sof...
With the increasing demand for long running and highly available distributed services, interest in s...
Dynamic reconfiguration is gaining popularity [2], [4] but it may cause degradation of overall execu...
This paper focuses on global consistency preservation for dynamic reconfiguration. Global consistenc...
International audienceCloud computing and cyber-physical systems involve software capable of adaptin...
. The paper describes a new dynamic protocol for managing replicated data. Like the existing dynamic...
Adapting software to user needs and environmental constraints at run-time requires extending the sof...
Dynamic information flow tracking (DIFT) has been proven an effective technique to track data usage;...
Data schema changes occur as a result of evolving software systems. This is a well-known problem and...
Information flow analysis is concerned with validating the security of information flows between obj...