Think: View-based support of non-functional properties in embedded systems

M Anne, R He, T Jarboui, M Lacoste… - 2009 International …, 2009 - ieeexplore.ieee.org
Component-Based Software Engineering (CBSE) does not yet fully address non-functional
requirements of embedded systems. To reach this goal, we show how to extend a …

Improving Ethical Leadership in Sustainable Public Health Through Fractal AI

X Chen, J Ryoo - European Journal of Applied Science, Engineering and …, 2025 - ejaset.com
This study explores innovative, ethical leadership approaches using artificial intelligence
(AI) and fractal geometry in public health while fostering sustainable business practices …

Putting together QoS and security in autonomic pervasive systems

M Alia, M Lacoste, R He, F Eliassen - … of the 6th ACM workshop on QoS …, 2010 - dl.acm.org
Current pervasive systems tend to consider security and QoS separately, ignoring the
influence of each aspect on the other. This paper presents an adaptation model based on …

A policy management framework for self-protection of pervasive systems

R He, M Lacoste, J Leneutre - 2010 Sixth International …, 2010 - ieeexplore.ieee.org
Although highly promising to meet the challenges of pervasive network security, self-
managed protection has been little addressed in this setting. This paper adopts a policy …

Efficient security adaptation framework for internet of things

T El-Maliki, JM Seigne - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Security of Internet of Things has become a hot research topic due to their wide deployment,
their huge generated information and the increasing new runtime attacks they are facing …

Virtual security kernel: A component-based os architecture for self-protection

R He, M Lacoste, J Leneutre - 2010 10th IEEE International …, 2010 - ieeexplore.ieee.org
This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for
self-protection of pervasive devices. A virtual management plane, separate from execution …

Enforcing the security of component-based embedded systems with information flow control

T Abdellatif, N Rouis, W Saïdane… - … on Wireless and …, 2010 - ieeexplore.ieee.org
Information Flow Control (IFC) is mandatory to enforce the confidentiality and the integrity of
data. It is a technique implemented in recent operating systems to track the information flow …

[PDF][PDF] Security adaptation based on autonomic and trust systems for ubiquitous mobile network and green IT

T El Maliki, JM Seigneur - IARIA conference on mobile ubiquitous …, 2013 - academia.edu
Security in Wireless Sensor Network (WSN) or Internet of Things has become a hot research
topic due to their wide deployment and the increasing new runtime attacks they are facing …

Ajax Applied in Environment Monitoring System Based on WSN

W Han, K Fang, X Li, L Zhang - 2008 International Symposium …, 2008 - ieeexplore.ieee.org
This article puts forward a method to access the data and analyzed results from the
monitoring system of environment based on WSN with the B/S mode. It resolves the problem …

Predicting cache space contention in utility computing servers

Y Solihin, F Guo, S Kim - 19th IEEE International Parallel and …, 2005 - ieeexplore.ieee.org
The need to provide performance guarantee in high performance servers has long been
neglected. Providing performance guarantee in current and future servers is difficult …