Issue Information
No abstract is available for this article.
Reliable self-deployment of distributed cloud applications
Cloud applications consist of a set of interconnected software elements distributed over several virtual machines, themselves hosted on remote physical servers. Most existing solutions for deploying such applications require human intervention to ...
Wireless GINI: an educational platform for hosting virtual wireless networks
We describe Wireless GINI, a wireless platform for hosting virtual networks. Wireless GINI Is Not Internet GINI allows each virtual network to define its own topology and network configuration, while amortizing costs by sharing the physical ...
Multiprocessor platform for partitioned real-time systems
Two current trends in the real-time and embedded systems are the multiprocessor architectures and the partitioning technology that enables several isolated applications with different criticality levels to share the same computer. This paper presents a ...
Cold object identification in the Java virtual machine
Many Java applications instantiate objects within the Java heap that are persistent but seldom if ever referenced by the application. Examples include strings, such as error messages, and collections of value objects that are preloaded for fast access. ...
LeakSpot: detection and diagnosis of memory leaks in JavaScript applications
The migration of application logic to the client side of modern web applications and the use of JavaScript as the main language for client-side development have made memory leaks in JavaScript an issue for web applications. Client-side web applications ...
A web system for reasoning with probabilistic OWL
We present the web application Tableau Reasoner for descrIption Logics in proLog on SWI-Prolog for SHaring TRILL on SWISH which allows the user to write probabilistic description logic DL theories and compute the probability of queries with just a web ...
Bad and good news about using software assurance tools
Software assurance tools - tools that scan the source or binary code of a program to find weaknesses - are the first line of defense in assessing the security of a software project. Even though there are a plethora of such tools available, with multiple ...