You searched on: Author: alden dima
Displaying records 21 to 27.
Resort by: Date / Title
21. Using Intelligent Agents to Assess Pervasive Computing Technologies
L P Ciarletta, Alden A Dima, V P Iordanov
Pervasive Computing (a.k.a. Ubiquitous or Ambient Computing) is a new field of computer science generally considered to lie at the intersection of desktop computing, networking, and embedded systems. Related to pervasive computing are Intelligent Env ...
22. The Case for Simulation-Based Evaluation of Ubiquitous Computing Environments
Alden A Dima, L P Clarletta
Ubiquitous computing (a.k.a. pervasive computing) is ill-defined due to its novelty and the community's current emphasis on its technological aspects. This can lead to serious \existential issues during the evaluation of ubiquitous computing technolo ...
23. A Conceptual Model for Pervasive Computing
L P Ciarletta, Alden A Dima
As an emerging field, pervasive computing has not had the opportunity to develop a conceptual model similar to the OSI Reference Model used to describe computer networks. Such a model would be useful to properly classify issues raised during discussi ...
24. Flits: Pervasive Computing for Processor and Memory Constrained Systems
William J Majurski, Alden A Dima, Mary T Laamanen
Many pervasive computing software technologies are targeted for 32-bit desktop platforms. However, there are innumerable 8, 16, and 32-bit microcontroller and microprocessor-based embedded systems that do not support the resource requirements of thes ...
25. Using XML in a Software Diagnostic Tool
Alden A Dima
Many development tools such as execution tracing tools generate a large amount of text output. The large quantity of text make it hard for the user to sort through and make sense of the output. In addition, the output is often formatted in a manner t ...
26. Raising the Bar on Software Security Testing
Alden A Dima, John P Wack, S A. Wakid
This article describes an effort lead by NIST and NSA to define and promote an open and commercially driven set of testing methods for software security through the National Information Assurance Partnership (NIAP) (see http://niap.nist.gov). This p ...
27. VRML Test Case Generation and Evaluation Using Java
Leonard E. Gebase, Mary C Brady, Alden A Dima, Lynne S. Rosenthal
A well-established approach to conformance testing is to treat the implementation being tested as a black box. With this approach, a reference implementation is built to control and evaluate the implementation being tested, and a supporting implement ...