Think: View-based support of non-functional properties in embedded systems
M Anne, R He, T Jarboui, M Lacoste… - 2009 International …, 2009 - ieeexplore.ieee.org
Component-Based Software Engineering (CBSE) does not yet fully address non-functional
requirements of embedded systems. To reach this goal, we show how to extend a …
requirements of embedded systems. To reach this goal, we show how to extend a …
Improving Ethical Leadership in Sustainable Public Health Through Fractal AI
X Chen, J Ryoo - European Journal of Applied Science, Engineering and …, 2025 - ejaset.com
This study explores innovative, ethical leadership approaches using artificial intelligence
(AI) and fractal geometry in public health while fostering sustainable business practices …
(AI) and fractal geometry in public health while fostering sustainable business practices …
Putting together QoS and security in autonomic pervasive systems
Current pervasive systems tend to consider security and QoS separately, ignoring the
influence of each aspect on the other. This paper presents an adaptation model based on …
influence of each aspect on the other. This paper presents an adaptation model based on …
A policy management framework for self-protection of pervasive systems
Although highly promising to meet the challenges of pervasive network security, self-
managed protection has been little addressed in this setting. This paper adopts a policy …
managed protection has been little addressed in this setting. This paper adopts a policy …
Efficient security adaptation framework for internet of things
T El-Maliki, JM Seigne - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Security of Internet of Things has become a hot research topic due to their wide deployment,
their huge generated information and the increasing new runtime attacks they are facing …
their huge generated information and the increasing new runtime attacks they are facing …
Virtual security kernel: A component-based os architecture for self-protection
This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for
self-protection of pervasive devices. A virtual management plane, separate from execution …
self-protection of pervasive devices. A virtual management plane, separate from execution …
Enforcing the security of component-based embedded systems with information flow control
T Abdellatif, N Rouis, W Saïdane… - … on Wireless and …, 2010 - ieeexplore.ieee.org
Information Flow Control (IFC) is mandatory to enforce the confidentiality and the integrity of
data. It is a technique implemented in recent operating systems to track the information flow …
data. It is a technique implemented in recent operating systems to track the information flow …
[PDF][PDF] Security adaptation based on autonomic and trust systems for ubiquitous mobile network and green IT
T El Maliki, JM Seigneur - IARIA conference on mobile ubiquitous …, 2013 - academia.edu
Security in Wireless Sensor Network (WSN) or Internet of Things has become a hot research
topic due to their wide deployment and the increasing new runtime attacks they are facing …
topic due to their wide deployment and the increasing new runtime attacks they are facing …
Ajax Applied in Environment Monitoring System Based on WSN
W Han, K Fang, X Li, L Zhang - 2008 International Symposium …, 2008 - ieeexplore.ieee.org
This article puts forward a method to access the data and analyzed results from the
monitoring system of environment based on WSN with the B/S mode. It resolves the problem …
monitoring system of environment based on WSN with the B/S mode. It resolves the problem …
Predicting cache space contention in utility computing servers
The need to provide performance guarantee in high performance servers has long been
neglected. Providing performance guarantee in current and future servers is difficult …
neglected. Providing performance guarantee in current and future servers is difficult …