Besides the complexity in time or in number of messages, a common approach for analyzing distributed algorithms is to look at their assumptions on the underlying network. This paper focuses on the study of such assumptions in dynamic networks, where the connectivity is expected to change, predictably or not, during the execution. Our main contribution is a… (More)
Traditional distributed frameworks such as DCOM, CORBA or EJB do not allow any object to become remote dynamically even if they were not designed for it. This is a major drawback solved by the active container concept presented in this article. The Java TM 1 implementation of this concept, JACOb, is also presented.
Till recently it was impossible to have more than one single application running on a smart card. Multiapplication cards, and especially Java Cards, now make it possible to have several applications sharing the same physical piece of plastic. Today, these cards accept to load code only after an authentication. But in the future, the cards will be open an… (More)
In this paper, we present a novel approach for the detection and signature extraction for a subclass of polymorphic computer viruses. Our detection scheme offers 0 false negative and a very low false positives detection rate. We use context-free grammars as viral signatures, and design a process able to extract this signature from a single sample of a… (More)
Multiapplication smart cards now make it possible to have several applications sharing the same physical piece of plastic.This raises new security problems by creating additional ways to attack them. This is particularly true with future open multiapplication cards that allow anybody to load his/her own application. For example an attacker can load her own… (More)
—This paper proposes a new solution to the problem of self-deploying a network of wireless mobile robots with simultaneous consideration to several criteria, that are, the fault-tolerance (biconnectivity) of the resulting network, its coverage, its diameter, and the quantity of movement required to complete the deployment. These criteria have already been… (More)
Till recently it was impossible to have more than one single application running on a smart card. Multiapplication cards, and especially Java Cards TM1 , now make it possible to have several applications sharing the same physical piece of plastic. This raises new security problems by creating additional ways to attack a card. These problems are the topic of… (More)