Books 2005(1 publication) [publication]Marques, P. and Pedroso, H. and Pedroso, H. , "C# 2.0", 2005 2002(1 publication) [publication]Marques, P. and Pedroso, H. and Pedroso, H. , "C# - Curso Completo", 2002 Journal Articles 2014(1 publication) [publication]Stork, S. and Naden, K. and Sunshine, J. and Mohr, M. and Alcides Fonseca and Marques, P. and Aldrich, J. , "ÆMINIUM: A Permission Based Concurrent-by-Default Programming Language Approach", ACM Transactions on Programming Languages and Systems, vol. 36, pp. 2, 2014 2011(1 publication) [publication]Bruno Cabral and Marques, P. , "A transactional model for automatic exception handling", Computer Languages, Systems & Structures, vol. 37, 2011 [citation][year=2014]Huqiu Liu; Yuping Wang; Lingbo Jiang; Shimin Hu, "PF-Miner: A New Paired Functions Mining Method for Android Kernel in Error Paths," Computer Software and Applications Conference (COMPSAC), 2014 IEEE 38th Annual , vol., no., pp.33,42, 21-25 July 2014 doi: 10.1109/COMPSAC.2014.10 [citation][year=2013]Antonio Carzaniga, Alessandra Gorla, Andrea Mattavelli, Nicolò Perino, and Mauro Pezzè. 2013. Automatic recovery from runtime failures. In Proceedings of the 2013 International Conference on Software Engineering (ICSE '13). IEEE Press, Piscataway, NJ, USA, 782-791. [citation][year=2013]Hannu Jaakkola, Bernhard Thalheim, Exception-Aware (Information) Systems, Frontiers in Artificial Intelligence and Applications, Volume 251: Information Modelling and Knowledge Bases XXIV, IOS Press EBooks pp. 300 - 313. DOI 10.3233/978-1-61499-177-9-300 [citation][year=2013]Nicolò Perino. 2013. A framework for self-healing software systems. In Proceedings of the 2013 International Conference on Software Engineering (ICSE '13). IEEE Press, Piscataway, NJ, USA, 1397-1400. [citation][year=2012]Simone Hanazumi and Ana C. V. de Melo. 2012. Coordinating Exceptions of Java Systems: Implementation and Formal Verification. In Proceedings of the 2012 Eighth International Conference on the Quality of Information and Communications Technology (QUATIC '12). IEEE Computer Society, Washington, DC, USA, 108-113. DOI=10.1109/QUATIC.2012.26 http://dx.doi.org/10.1109/QUATIC.2012.26 2009(1 publication) [publication]Marmelo, R. and Bizarro, P. and Marques, P. , "9ticks - The Web as a Stream (extended version)", IETE Technical Review, vol. 26, pp. 369-374, 2009 2007(1 publication) [publication]Bruno Cabral and Sacramento, P. and Marques, P. , "The Hidden Truth Behind .NET's Exception Handling Today", IET Software Journal, vol. 1, pp. 223-250, 2007 [citation][year=2011]I. Garcia, and N. Cacho, eFlowMining: An Exception-Flow Analysis Tool for .NET Applications, Fifth Latin-American Symposium on Dependable Computing Workshops, IEEE, 2011. 2004(1 publication) [publication]Bruno Cabral and Marques, P. and Silva, L. , "IL Code Instrumentation with RAIL", .NET Developers Journal, vol. 2, pp. 34-35, 2004 [citation][year=2006]C. Anslow, S. Marshall, J. Noble, K. Jackson, M. McGavin, and R. Biddle, "Program Trace Formats for Software Visualisation", Technical Report CS-TR-06/1, School of Mathematical and Computing Sciences, VICTORIA UNIVERSITY OF WELLINGTON, New Zeland, May 2006 [citation][year=2006]Craig Anslow, Stuart Marshall, James Noble, Kirk Jackson, Mike McGavin, and Robert Biddle, Program Trace Formats for Software Visualisation, Technical Report CS-TR-06/1, VICTORIA UNIVERSITY OF WELLINGTON, School of Mathematical and Computing Sciences, May 2006. [citation][year=2004]Luis Vinuesa, Francisco Ortin, TEJEDOR DINÁMICO DE ASPECTOS SOBRE LA PLATAFORMA .NET, in Iberian workshop on Aspect Oriented Software Development DSOA'2004, Málaga, November, 2004 [citation][year=2004]B. Wang, X. Liu, J. Kerridge, Y. Li, "Scenario Based Generative Component Adaptation in .NET", in Proc. of the 2004 International Conference on Information Reuse and Integration, Las Vegas, USA, 2004 [citation][year=2004]Ninghui Li and John C. Mitchell; "Securing Java RMI-based Distributed Applications", in Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC"04); 2004 2003(1 publication) [publication]Marques, P. , "Task Farming & the Message Passing Interface", Dr. Dobb's Journal, vol. 28, pp. 32-37, 2003 2002(2 publications) [publication]Marques, P. and Silva, L. and Silva, J.G. , "M&M's: Building Binary Software Components for Supporting Mobile-Agent Enabled Applications", Journal of Autonomous Agents and Multi-Agents Systems, vol. 5, pp. 101-109, 2002 [citation][year=2005]1. H. Wang and B. Feng, "Research of the Chinese Meta-Search Engine Model Based on Intelligent Agent", in Proc. of the 19th International Conference on Advanced Information Networking and Applications (AINA"05), IEEE Press, Taiwan, March 2005 [citation][year=2004]1. Yingjie Z.; Liling G., "Using the philosophy of mobile agent technology for e-service in the field of reverse engineering applications", Rapid Prototyping Journal, 1 March 2004, vol. 10, no. 3, pp. 158-165(8), Publisher: Emerald Group Publishing Limited [publication]Marques, P. , "Building Secure Java RMI Servers", Dr. Dobb's Journal, vol. 27, pp. 36-42, 2002 [citation][year=2005]Maria Julia de Lima, Taciana Melcop, Renato Cerqueira, Carlos Cassino, Bruno Silvestre, Marcelo Nery, Cristina Ururahy. "CSGrid: um Sistema para Integração de Aplicações em Grades Computacionais", 23º Simpósio Brasileiro de Redes de Computadores, Fortaleza, Maio/2005 [citation][year=2004]1. N. Li, J. Mitchell and D. Tong, "Securing Java RMI-Based Distributed Applicationsâ?, in the 20th Computer Security Applications Conference (ACSAC'04), IEEE Press, December 2004. Conference Articles 2015(1 publication) [publication]Bruno Cabral and Alcides Fonseca and Marques, P. and Aldrich, J. , "Cooperative Exceptions for Concurrent Objects", in 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), 2015 2013(3 publications) [publication]Mendes, M.R.N. and Bizarro, P. and Marques, P. , "Overcoming Memory Limitations in High-Throughput Event-Based Applications", in 4th ACM/SPEC International Conference on Performance Engineering, 2013 [publication]Mendes, M.R.N. and Bizarro, P. and Marques, P. , "Towards a Standard Event Processing Benchmark", in 4th ACM/SPEC International Conference on Performance Engineering, 2013 [publication]Mendes, M.R.N. and Bizarro, P. and Marques, P. , "FINCoS: Benchmark Tools for Event Processing Systems", in 4th ACM/SPEC International Conference on Performance Engineering, 2013 2011(1 publication) [publication]Alves, D. and Marques, P. and Bizarro, P. , "Deadline Queries: Leveraging the Cloud to Produce On-Time Results", in IEEE CLOUD, 2011 2010(3 publications) [publication]Mendes, M.R.N. and Marques, P. and Bizarro, P. , "Benchmarking event processing systems: current state and future directions", in First joint WOSP/SIPEW International Conference on Performance Engineering, 2010 [publication]Mendes, M.R.N. and Marques, P. and Bizarro, P. , "Assessing and Optimizing Microarchitectural Performance of Event Processing Systems", in 2nd TPC Technology Conference on Performance Evaluation & Benchmarking (TPC TC), 2010 [publication]Alves, D. and Marques, P. and Bizarro, P. , "Flood: Elastic Streaming MapReduce", in ACM DEBS, 2010 2009(6 publications) [publication]Stork, S. and Marques, P. and Aldrich, J. , "Concurrency by Default: Using Permissions to Express Dataflow in Stateful Programs", 2009 [publication]Bruno Cabral and Marques, P. , "Implementing Retry ' featuring AOP", in 4th Latin-American Symposium on Dependable Computing (LADC'09), 2009 [citation][year=2015]Felber, Pascal and Fetzer, Christof and Gramoli, Vincent and Harmanci, Derin and Nowack, Martin. Safe Exception Handling with Transactional Memory. Transactional Memory. Foundations, Algorithms, Tools, and Applications. Lecture Notes in Computer Science Volume 8913, 2015, pp 245-267 [citation][year=2012]Xiao Xing Sun et al., A CPN Based Method for Aspect-Oriented Modeling and Analysis of Fault Tolerance, in Advanced Materials Research (Volumes 457 - 458), Advanced Materials and Engineering Materials, Sally Gao (Editor), Pages 891-898, 2011 Doi 10.4028/www.scientific.net/AMR.457-458.891 [citation][year=2012]Mehmet Derin Harmanci, Semantics, Performance and Language Support for Transactional Memory, Ph.D. Thesis, Faculte des Sciences Universite de Neuchatel, June 2012. [citation][year=2011]D. Harmanci, V. Gramoli, P. Felber, Atomic Boxes: Coordinated Exception Handling with Transactional Memory, in Proceedings of the 25th European Conference on Object-Oriented Programming (ECOOP'11), Springer Verlag, Lancaster, UK, July 2011. [publication]Marques, P. and Paulo Gomes and Marco Vieira and Prieto, J.F. and Navarro, V. and Pecchioli, M. , "BIRF: Keeping Software Development under Control across the Organization", 2009 [citation][year=2012]1. Kenelly Almeida, Cristine Gusmão, Júlio Venâncio, "A Risk Breakdown Structure for Multiple Project Software Environments", 9th International Conference on Information Systems and Technology Management, 9th CONTECSI, São Paulo, SP, Brazil, 2012. [citation][year=2012]Kenelly Almeida, Cristine Gusmão, Júlio Venâncio, "A Risk Breakdown Structure for Multiple Project Software Environments", 9th International Conference on Information Systems and Technology Management, 9th CONTECSI, São Paulo, SP, Brazil, 2012. [publication]Mendes, M.R.N. and Bizarro, P. and Marques, P. , "A Performance Study of Event Processing Systems", 2009 [publication]Marmelo, R. and Bizarro, P. and Marques, P. , "The Internet contains Thousands of Poorly Explored FUTS Data Sources", 2009 [publication]Taran, G. and Mario Zenha-Rela and Marques, P. and Bizarro, P. , "A Training Process for Faculty Members in Collaborative Degree Programs: Design, Implementation and Feedback", 2009 2008(2 publications) [publication]Bruno Cabral and Marques, P. , "A Case for Automatic Exception Handling", in 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008 [citation][year=2014]Ziying Dai, Xiaoguang Mao, Liqian Chen, Yan Lei: Automatic recovery from resource exhaustion exceptions by collecting leaked resources. Journal of Zhejiang University - Science C 15(8): 622-635 (2014) [citation][year=2012]Ismael Figueroa Palet, Exception Handling in Aspect-Oriented Programming, CC79T - Introducción a la Tesis, PLEIAD laboratory of the Computer Science Department (DCC) of the University of Chile (Faculty of Engineering), 2012. [citation][year=2012]Krischer, R.; Buhr, P.A.; , Usability challenges in exception handling, Exception Handling (WEH), 2012 5th International Workshop on , vol., no., pp.7-13, 9-9 June 2012 doi: 10.1109/WEH.2012.6226604 [citation][year=2010]R. Krischer, Advanced Concepts in Asynchronous Exception Handling, in Electronic Theses and Dissertations, Faculty of Mathematics Theses and Dissertations, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, Canada, 2010. [citation][year=2010]Y. Fukushima, An Approach to Software Maintainability Improvement with focus on Detecting Diffused Code Clones in a System, Master's Thesis, Department of Information Systems, Graduate School of Information Science, Nara Institute of Science and Technology, NAIST-IS-MT0851099, February 4, 2010. [publication]Mendes, M.R.N. and Marques, P. and Bizarro, P. , "A Framework for Performance Evaluation of Complex Event Processing Systems (poster)", in 2nd International Conference on Distributed Event-Based Systems, 2008 2007(1 publication) [publication]Bruno Cabral and Marques, P. , "Exception Handling: A Field Study in Java and .NET", in European Conference in Object-Oriented Programming 2007 (ECOOP'07), 2007 [citation][year=2015]Felber, Pascal and Fetzer, Christof and Gramoli, Vincent and Harmanci, Derin and Nowack, Martin. Safe Exception Handling with Transactional Memory. Transactional Memory. Foundations, Algorithms, Tools, and Applications. Lecture Notes in Computer Science Volume 8913, 2015, pp 245-267 [citation][year=2015]Benoit Cornu, Lionel Seinturier, Martin Monperrus, Exception handling analysis and transformation using fault injection: Study of resilience against unanticipated exceptions, Information and Software Technology, Volume 57, January 2015, Pages 66-76 [citation][year=2014]Mohammad Masudur Rahman. Exploiting Context in Dealing with Programming Errors and Exceptions in the IDE. MSc Thesis. Department of Computer Science, University of Saskatchewan Saskatoon. August 2014. [citation][year=2014]Andrews, A.; Boukhris, S.; Elakeili, S., "Fail-Safe Testing of Web Applications," Software Engineering Conference (ASWEC), 2014 23rd Australian , vol., no., pp.200,209, 7-10 April 2014 doi: 10.1109/ASWEC.2014.29 [citation][year=2014]Cacho, N.; Adachi Barbosa, E.; Araujo, J.; Pranto, F.; Garcia, A.; Cesar, T.; Soares, E.; Cassio, A.; Filipe, T.; Garcia, I., "How Does Exception Handling Behavior Evolve? An Exploratory Study in Java and C# Applications," Software Maintenance and Evolution (ICSME), 2014 IEEE International Conference on , vol., no., pp.31,40, Sept. 29 2014-Oct. 3 2014 doi: 10.1109/ICSME.2014.25 [citation][year=2014]Nélio Cacho,Thiago César, Thomas Filipe, Eliezio Soares, Arthur Cassio, Rafael Souza, Israel Garcia, Eiji Adachi Barbosa, Alessandro Garcia. Trading Robustness for Maintainability: An Empirical Study of Evolving C# Programs. In Proceeding of ICSE’14, May 31 – June 7, 2014, Hyderabad, India. [citation][year=2014]MARTINS, A. L. ; HANAZUMI, S. ; MELO, Ana C. V. de . Exercising Java Exceptions Using Java Pathfinder and Program Instrumentation. In: The 14th International Conference on Computational Science and Its Applications (ICCSA 2014), 2014, Guimarães. Computational Science and Its Applications ICCSA 2014: 14th International Conference, Guimarães, Portugal, June 30 July 3, 2014, Proceedings, Part I, 2014. v. 8579. p. 671-682. [citation][year=2014]Rahman, M.M.; Roy, C.K., "On the Use of Context in Recommending Exception Handling Code Examples," Source Code Analysis and Manipulation (SCAM), 2014 IEEE 14th International Working Conference on , vol., no., pp.285,294, 28-29 Sept. 2014 doi: 10.1109/SCAM.2014.15 [citation][year=2014]Fei, L, Jain, M. Programmer specified conditions for raising exceptions and handling errors detected within programming code. Patent US 8793661 B1. Published 29/07/2014. http://www.google.com/patents/US8793661 [citation][year=2014]Adachi Barbosa, E.; Garcia, A.; Barbosa, S.D.J., "Categorizing Faults in Exception Handling: A Study of Open Source Projects," Software Engineering (SBES), 2014 Brazilian Symposium on , vol., no., pp.11,20, Sept. 28 2014-Oct. 3 2014 doi: 10.1109/SBES.2014.19 [citation][year=2014]Martins, A.L.; Hanazumi, S.; De Melo, A.C.V., "Testing Java Exceptions: An Instrumentation Technique," Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International , vol., no., pp.626,631, 21-25 July 2014 doi: 10.1109/COMPSACW.2014.105 [citation][year=2014]Martin Monperrus, Maxence Germain De Montauzan, Benoit Cornu, Raphael Marvie, Romain Rouvoy. Challenging Analytical Knowledge On Exception-Handling: An Empirical Study of of 32 Java Software Packages. [Technical Report] Laboratoire d’Informatique Fondamentale de Lille. 2014. [citation][year=2014]Eiji Adachi Barbosa. Improving Exception Handling with Recommendations. In proceedings of ICSE ’14, May 31 – June 7, 2014, Hyderabad, India. [citation][year=2013]Hao Zhong, Suresh Thummalapenta, and Tao Xie. 2013. Exposing behavioral differences in cross-language API mapping relations. In Proceedings of the 16th international conference on Fundamental Approaches to Software Engineering (FASE'13), Vittorio Cortellessa and Dániel Varró (Eds.). Springer-Verlag, Berlin, Heidelberg, 130-145. DOI=10.1007/978-3-642-37057-1_10 http://dx.doi.org/10.1007/978-3-642-37057-1_10 [citation][year=2013]Thiago B. L. Silva and Fernando Castor. 2013. New exception interfaces for Java-like languages. In Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13). ACM, New York, NY, USA, 1661-1666. DOI=10.1145/2480362.2480675 http://doi.acm.org/10.1145/2480362.2480675 [citation][year=2013]Hannu Jaakkola, Bernhard Thalheim, Exception-Aware (Information) Systems, Frontiers in Artificial Intelligence and Applications, Volume 251: Information Modelling and Knowledge Bases XXIV, IOS Press EBooks pp. 300 - 313. DOI 10.3233/978-1-61499-177-9-300 [citation][year=2012]Krohn-Hansen, Håkon. Program crash analysis. Masteroppgave, University of Oslo, 2012 [citation][year=2012]Huang Yanyi, Yu Yang, Peng Xin, Zhao Wenyun, An Aspect-Oriented Software Fault Tolerance Enhancement Tool, Computer Applications and Software, Vol.29, N. 2, February 2012. [citation][year=2012]Rami Rashkovits and Ilana Lavy, Students' Understanding of Advanced Properties of Java Exceptions, in Journal of Information Technology Education: Innovations in Practice, Meliha Handzic (Ed.), Volume 11, 2012. [citation][year=2012]Krohn-Hansen, Håkon, Program Crash Analysis: Evaluation and Application of Current Methods, Master thesis, UNIVERSITY OF OSLO, Department of Informatics, 2012. [citation][year=2012]Barbosa, Eiji Adachi; Garcia, Alessandro; Mezini, Mira; , Heuristic Strategies for Recommendation of Exception Handling Code, Software Engineering (SBES), 2012 26th Brazilian Symposium on , vol., no., pp.171-180, 23-28 Sept. 2012 doi: 10.1109/SBES.2012.22 [citation][year=2012]Rashkovits, Rami and Lavy, Ilana, Students’ Misconceptions of Java Exceptions, in Knowledge and Technologies in Innovative Information Systems, Rahman, Hakikur and Mesquita, Anabela and Ramos, Isabel and Pernici, Barbara (editors), Lecture Notes in Business Information Processing, Volume 129, Springer Berlin Heidelberg, pages 1-21, 2012. doi:10.1007/978-3-642-33244-9_1 [citation][year=2012]Mehmet Derin Harmanci, Semantics, Performance and Language Support for Transactional Memory, Ph.D. Thesis, Faculte des Sciences Universite de Neuchatel, June 2012. [citation][year=2012]Barbosa, E.A.; Garcia, A.; Mezini, M.; , A recommendation system for exception handling code, Exception Handling (WEH), 2012 5th International Workshop on , vol., no., pp.52-54, 9-9 June 2012 doi: 10.1109/WEH.2012.6226601 [citation][year=2012]Rafael Tavares Dantas, Specification of Exceptional Behavior: A Test-Based Approach, M.Sc Thesis, Universidade Federal de Pernambuco, March 2012. [citation][year=2012]Ismael Figueroa Palet, Exception Handling in Aspect-Oriented Programming, CC79T - Introducción a la Tesis, PLEIAD laboratory of the Computer Science Department (DCC) of the University of Chile (Faculty of Engineering), 2012. [citation][year=2011]P. Loretan, Software Cartography: A Prototype for Thematic Software Maps, diploma thesis for the Philosophic-natural Science Faculty, University of Bern, April 2011 [citation][year=2011]R. Coelho, A. von Staa, U. Kulesza, A. Rashid, C. Lucena, Unveiling and taming liabilities of aspects in the presence of exceptions: A static analysis based approach, Information Sciences, Volume 181, Issue 13, Including Special Section on Databases and Software Engineering, Pages 2700-2720, July 2011. [citation][year=2011]D. Harmanci, V. Gramoli, P. Felber, Atomic Boxes: Coordinated Exception Handling with Transactional Memory, in Proceedings of the 25th European Conference on Object-Oriented Programming (ECOOP'11), Springer Verlag, Lancaster, UK, July 2011. [citation][year=2011]I. Garcia, and N. Cacho, eFlowMining: An Exception-Flow Analysis Tool for .NET Applications, Fifth Latin-American Symposium on Dependable Computing Workshops, IEEE, 2011. [citation][year=2011]Di Bernardo, R.; Sales, R.; Castor, F.; Coelho, R.; Cacho, N.; Soares, S.; , Agile Testing of Exceptional Behavior, Software Engineering (SBES), 2011 25th Brazilian Symposium on , vol., no., pp.204-213, 28-30 Sept. 2011 doi: 10.1109/SBES.2011.28 [citation][year=2011]Xiaoquan Wu; Zhongxing Xu; Jun Wei; , Static Detection of Bugs Caused by Incorrect Exception Handling in Java Programs, Quality Software (QSIC), 2011 11th International Conference on , vol., no., pp.61-66, 13-14 July 2011 doi: 10.1109/QSIC.2011.25 [citation][year=2011]Rami Rashkovits and Ilana Lavy, Students’ Strategies for Exception Handling, in Journal of Information Technology Education: Innovations in Practice, Meliha Handzic (Ed.), Volume 10, 2011 [citation][year=2010]A. Kuhn, D. Erni, P. Loretan, and O. Nierstrasz, Software Cartography: thematic software visualization with consistent layout. in Journal of Software Maintenance and Evolution: Research and Practice, 22: 191–210, 2010. [citation][year=2010]G. Soares, R. Gheyi, D. Serey, T. Massoni, "Making Program Refactoring Safer," Software, IEEE , vol.27, no.4, pp.52-57, July-Aug. 2010. [citation][year=2010]H. B. Shah, C. Gorg, and M. J. Harrold, Understanding Exception Handling: Viewpoints of Novices and Experts, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 36, NO. 2, MARCH/APRIL 2010. [citation][year=2010]J. C. Taveira, H. O. Silva, F. Castor, and S. Soares, On Inter-Application Reuse of Exception Handling Aspects, In Proceedings of the AOSD'2010 Workshop on Empirical Evaluation of Software Composition Techniques (ESCOT'2010). Rennes, France, March 2010. [citation][year=2010]X. Wu, J. Wei, Static Detection Unsafe Use of variables In Java, in 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2010. [citation][year=2010]R. Rashkovits, I. Lavy, "Coping with abstraction in object orientation with a special focus on application errors," in 5th International Conference on Computer Science and Education (ICCSE), pp.277-287, 24-27 Aug. 2010. [citation][year=2010]P. Fatourou, T. Riegel, P. Felber, C. Fetzer, The Distributed Computing Column, Composable Error Recovery With Transactional Memory. EATCS Bulletin, North America, 0, jan. 2010. [citation][year=2010]G. A. Soares, Uma Abordagem para Aumentar a Segurança em Refatoramentos de Programas, Masters Thesis, Universidade Federal de Campina Grande, Centro de Engenharia Elétrica e Informática, Coordenação de Pós-Graduação em Informática, Campina Grande, Paraíba, Brasil, 2010 [citation][year=2009]J. Gil and T. Shragai, Are We Ready for a Safer Construction Environment?, In Proceedings of the 23rd European Conference on Object-Oriented Programming (ECOOP'09) (Genoa), Sophia Drossopoulou (Ed.). Springer-Verlag, Berlin, Heidelberg, 2009. [citation][year=2009]J. C. Taveira, C. Queiroz, R. Lima, J. Saraiva, S. Soares, H. Oliveira, N. Temudo, A. Araújo, J. Amorim, F. Castor, E. Barreiros, "Assessing Intra-application Exception Handling Reuse with Aspects," sbes, pp.22-31, 2009 XXIII Brazilian Symposium on Software Engineering, 2009 [citation][year=2008]R. Coelho et al., "Assessing the Impact of Aspects on Exceptions Flows: An Exploratory Study", in Proc. of the 22nd European Conference on Object Oriented Programming (ECOOP'08), LNCS 5142, Springer, July 2008 [citation][year=2008]Hervé Chang, Leonardo Mariani, Mauro Pezzè, "Self-healing Strategies For Component Integration Faults", in Proc. 1st International Workshop on Automated engineeRing of Autonomous and run-tiMe evolvIng Systems (ARAMIS 2008), L'Aquila, Italy, September 16, 2008 [citation][year=2008]N. Cacho, F. Filho, A. Garcia, E. Figueiredo, "EJFlow: taming exceptional control flows in aspect-oriented programming", in Proc. of the 7th international conference on Aspect-oriented software development, ACM Press, 2008. [citation][year=2008]A. Naderlinger, J. Templ, \"A Framework for Command Processing in Java/Swing Programs Based on the MVC Pattern", in Proc. of the 6th international symposium on Principles and practice of programming in Java, ACM Press, Modena, Italy, 2008 [citation][year=2008]R. Muschevici, A. Potanin, E. Tempero, J. Noble, "Multiple Dispatch in Practice", in Proceedings of the 23rd ACM SIGPLAN conference on Object oriented programming systems languages and applications (OOPSLA"2008), ACM Press, 2008 [citation][year=2008]A. Kuhn, P. Loretan, O. Nierstrasz, "Consistent Layout for Thematic Software Maps", In Proc. of 15th Working Conference on Reverse Engineering (WCRE"08), IEEE Computer Society Press, Los Alamitos CA, ,pp. 209-218, October 2008. [citation][year=2008]R. Coelho, U. Kulesza, A. Rashid, A. von Staa, C. Lucena, "Unveiling and Taming the Liabilities of Aspect Libraries Reuse", in Simpósio Brasileiro de Engenharia de Software (SBES), Brasil, Outubro 2008. [citation][year=2008]R. Coelho, Analyzing Exception Flows of Aspect-Oriented Programs, PhD Thesis, Dissertation presented to Pontifícia Universidade Católica do Rio de Janeiro, Departamento de Informática, 2008. [citation][year=2007]R. Muschevici, Understanding programming: a study of the adoption of multiple dispatch, in Proceedings of the SIENZ’07: Software Innovation and Engineering New Zealand Workshop 2007, edited by John Hosking (Auckland, University of Auckland, Dept. of Computer Science, 2007), 2007. 2006(4 publications) [publication]Bruno Cabral and Marques, P. , "Making Exception Handling Work", in HotDep06, 2006 [citation][year=2012]Rami Rashkovits and Ilana Lavy, Students' Understanding of Advanced Properties of Java Exceptions, in Journal of Information Technology Education: Innovations in Practice, Meliha Handzic (Ed.), Volume 11, 2012. [citation][year=2012]Rashkovits, Rami and Lavy, Ilana, Students’ Misconceptions of Java Exceptions, in Knowledge and Technologies in Innovative Information Systems, Rahman, Hakikur and Mesquita, Anabela and Ramos, Isabel and Pernici, Barbara (editors), Lecture Notes in Business Information Processing, Volume 129, Springer Berlin Heidelberg, pages 1-21, 2012. doi:10.1007/978-3-642-33244-9_1 [citation][year=2011]Rami Rashkovits and Ilana Lavy, Students’ Strategies for Exception Handling, in Journal of Information Technology Education: Innovations in Practice, Meliha Handzic (Ed.), Volume 10, 2011. [citation][year=2010]R. Rashkovits, I. Lavy, "Coping with abstraction in object orientation with a special focus on application errors," in 5th International Conference on Computer Science and Education (ICCSE), pp.277-287, 24-27 Aug. 2010. [citation][year=2010]P. Fatourou, T. Riegel, P. Felber, C. Fetzer, The Distributed Computing Column, Composable Error Recovery With Transactional Memory. EATCS Bulletin, North America, 0, jan. 2010. [citation][year=2008]Haryadi S. Gunawi, Cindy Rubio-Gonzalez, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Ben Liblit, "EIO: Error Handling is Occasionally Correct", in Proc. of the 6th USENIX Conference on File and Storage Technologies (FAST "08), San José, California, USA, February 2008 [publication]Sacramento, P. and Bruno Cabral and Marques, P. , "Unchecked Exceptions: Can the Programmer be Trusted to Document Exceptions?", in International Conference on Innovative Views of .NET Technologies, 2006 [citation][year=2012]Cindy Rubio González, Finding Error-Propagation Bugs In Large Software Systems Using Static Analysis, Ph.D. Thesis, University Of Wisconsin–Madison, USA, 2012. [citation][year=2011]I. Garcia, and N. Cacho, eFlowMining: An Exception-Flow Analysis Tool for .NET Applications, Fifth Latin-American Symposium on Dependable Computing Workshops, IEEE, 2011. [citation][year=2010]C. Rubio-Gonzalez and B. Liblit, Expect the unexpected: error code mismatches between documentation and the real world, In Proceedings of the 9th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering (PASTE '10). ACM, New York, NY, USA, 73-80, 2010. [citation][year=2009]C. Rubio-Gonzalez, H. S. Gunawi, B. Liblit, R. H. Arpaci-Dusseau, and A. C. Arpaci-Dusseau, Error propagation analysis for file systems, In Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation (PLDI '09). ACM, New York, NY, USA, 270-280, 2009. [citation][year=2009]A. Romanovsky, A Looming Fault Tolerance Software Crisis?, Chapter 2.4., in RTO-MP-IST-064 - Building Robust Systems with Fallible Construction, Report of the IST-064/RWS-011 Workshop held in Prague, Czech Republic, 9-10 November 2006, NATO Research and Technology Organisation, ISBN 978-92-837-0081-4, May 2009. [citation][year=2009]C. Dony, SaGE, an Exception Handling System for Message-Oriented Programming, Chapter 3.2, in RTO-MP-IST-064 - Building Robust Systems with Fallible Construction, Report of the IST-064/RWS-011 Workshop held in Prague, Czech Republic, 9-10 November 2006, NATO Research and Technology Organisation, ISBN 978-92-837-0081-4, May 2009. [citation][year=2008]R. Coelho, U. Kulesza, A. Rashid, A. von Staa, C. Lucena, "Unveiling and Taming the Liabilities of Aspect Libraries Reuse", in Simpósio Brasileiro de Engenharia de Software (SBES), Brasil, Outubro 2008. [citation][year=2008]H. S. Gunawi, C. Rubio-Gonzalez, A. C. Arpaci-Dusseau, Re. H. Arpaci-Dusseau, B. Liblit, "EIO: Error Handling is Occasionally Correct", in Proc. of the 6th USENIX Conference on File and Storage Technologies (FAST "08), San José, California, USA, February 2008. [citation][year=2007]A. Romanovsky; "A Looming Fault Tolerance Software Crisis?"; ACM SIGSOFT Software Engineering Notes, Volume 32, Issue 2, pp 27, ACM Press, 2007 [citation][year=2006]A. Romanovsky, "A Looming Fault Tolerance Software Crisis?", Technical Report CS-TR-991, University of Newcastle upon Tyne, November 2006 [publication]Marques, P. and Feiteirinha, J. and Pureza, L. and Lindman, N. and Pecchioli, M. , "LeonVM: Using Dynamic Translation For Developing High-Speed Space Processor Emulators", 2006 [publication]Domingues, P. and Marques, P. and Silva, L. , "DGSchedSim: a trace-driven simulator to evaluate scheduling algorithms for desktop grid environments", 2006 [citation][year=2013]Gil, Joon-Min and Kim, SungSuk and Lee, JongHyuk, ”Task Replication and Scheduling Based on Nearest Neighbor Classification in Desktop Grids”, Ubiquitous Information Technologies and Applications, pp. 889-895, 2013, Springer. [citation][year=2012]Da Costa, Georges, ”Heterogeneity: the key to achieve Power-Proportional Computing”, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp 656-662, 2013. [citation][year=2012]Pearce, Michael and Zeadally, Sherali and Hunt, Ray, ”Virtualization: Issues, security threats, and solutions”, ACM Computing Surveys (CSUR), vol. 45(2), 2013. [citation][year=2010]Al-Azzoni, I., Down, D.G., “Dynamic scheduling for heterogeneous Desktop Grids”, Journal of Parallel and Distributed Computing, 70(12), pp 1231-1240, 2010. DOI: 10.1016/j.jpdc.2010.08.001 [citation][year=2010]Farkas, Z., Marosi, A.C., Kacsuk, P., “Job Scheduling in Hierarchical Desktop Grids”, pp. 79-97, 2010. [citation][year=2010]Al-Daoud, H., Al-Azzoni, I., Down, D.G., “Power-Aware Linear Programming based Scheduling for heterogeneous computer clusters”, 2010 International Green Computing Conference, pp. 325-332, 2010. [citation][year=2010]Farkas, Z. and Marosi, A.C. and Kacsuk, P., “Job Scheduling in Hierarchical Desktop Grids”, Remote Instrumentation and Virtual Laboratories, pp. 79-97, 2010 [citation][year=2010]AL-DAOUD, HADIL, "POWER-AWARE SCHEDULING FOR SERVER CLUSTERS" (2010), Master Thesis. Open Access Dissertations and Theses. Paper 4101. http://digitalcommons.mcmaster.ca/opendissertations/4101 [citation][year=2009]Majd Kokaly, Issam Al Azzoni, Douglas G. Down, “MGST: A Framework for Performance Evaluation of Desktop Grids”, Proc. 3rd Workshop on Desktop Grids and Volunteer Computing Systems (PCGrid 2009), Rome, Italy, In Workshops Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium, IEEE Computer Society. [citation][year=2009]Estrada, T., Taufer, M., Anderson, D.P.,” Performance Prediction and Analysis of BOINC Projects: An Empirical Study with EmBOINC”, Journal of Grid Computing, volume 7, issue 4, pp. 537-554, 2009, Springer. [citation][year=2008]I. Al-Azzoni and D.G. Down, Dynamic Scheduling for Heterogeneous Desktop Grids, The 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, October 2008. [citation][year=2007]K. Watanabe, M. Fukushi, S. Horiguchi, “Expected-credibility based Job Scheduling for Volunteer Computing Systems”, Proceedings of the 2nd International Conference on Advances in Information Technology (IAIT2007), pp 222-229, 2007. 2005(3 publications) [publication]Domingues, P. and Marques, P. and Silva, L. , "Distributed Data Collection through Remote Probing in Windows Environments", in PDP'05, 2005 [citation][year=2013]Tie, Zhixin, ”Mobile-C Based Agent System for Detecting Improper Computer Usage at Computer Laboratories”, Journal of Software, 8(9), pp. 2262-2271, 2013. [citation][year=2011][PDF] http://www.csi.ucd.ie/Staff/jmurphy/publications/1721.pdf Jesus Omana Iglesias, James Thorburn, Trevor Parsons, John Murphy, and Patrick O’Sullivan, "Scoring System Utilization Through Business Profiles", IEEE CloudCom 2011, 2011. [citation][year=2011][PDF] http://www.cse.wustl.edu/~schmidt/PDF/RTCSA-2011.pdf James Hill and Douglas C. Schmidt Experiences with Service-Oriented Middleware for Dynamic Instrumentation of Enterprise Distributed Real-time and Embedded Systems, Proceedings of the 1st International Symposium on Secure Virtual Infrastructures (DOA-SVI'11), October 17-19, 2011, Crete, Greece. [citation][year=2009][PDF] http://doi.ieeecomputersociety.org/10.1109/ESIAT.2009.123 C. Fang, Y. Zhao, Z. Wang, “Research and Design of a Service Management System for Deadline Render Farm”, International Conference on Environmental Science and Information Application Technology, Wuhan, China, pp. 542-454, 2009. [citation][year=2009][PDF] http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5198525 Jinwei Wang, Huazhi Sun, Jianping Fan, "DUMS: A Dynamical Updatable Monitoring System for Desktop PCs Used for Distributed Computing", pp 309-310, Third IEEE International Symposium on, Theoretical Aspects of Software Engineering, 2009 (TASE 2009). DOI:10.1109/TASE.2009.44 [citation][year=2005][PDF] http://www-vs.informatik.uni-ulm.de/DE/intra/bib/2005/PDCS/466-153.pdf Jinwei Wang, Yuzhong Sun, Jianping Fan, "Analysis on Resource Utilization Patterns of Office Computer", Proceedings of the 17th IASTED International Conference Parallel and Distributed Computing and Systems, pp 626-631, 2005. [publication]Bruno Cabral and Marques, P. and Silva, L. , "RAIL: Code Instrumentation for .NET", in ACM Symposium On Applied Computing (SAC'05), 2005 [citation][year=2011]L . Liu, Multi-level Sandboxing Techniques for Execution-based Stealthy Malware Detection, PhD Thesis, George Mason University, 2011. [citation][year=2010]Y. Ba, Sampling-based Program Execution Monitoring, Masters Thesis of Applied Science in Electrical and Computer Engineering, Waterloo, Ontario, Canada, 2010. [citation][year=2010]Antonia Bertolino, Silvano Chiaradonna, Gabriele Costa, Felicita Di Giandomenico, Antinisca Di Marco, Paul Grace, Valerie Issarny, Marta Kwiatkowska, Fabio Martinelli, Paolo Masci, Ilaria Matteucci, Hongyang Qu, Mark Rouncefield, Rachid Saadi, Antonino Sabetta, Romina Spalazzese, Francois Taiani, Deliverable D5.2- Report on Conceptual Models for Assessment & Assurance of Dependability, Security and Privacy in the Eternal CONNECTed World, Antonia Bertolini (Editor), CONNECT – Emergent Connectors for Eternal Software Intensive Networked Systems, ICT FET IP Project, 2010. [citation][year=2010]Lei Liu, Xinwen Zhang, Guanhua Yan, and Songqing Chen. sePlugin: Towards transparently secure plugins in your internet explorers, In Proceedings of the 8th International Conference on Applied Cryptography and Network Security, 2010. 67 [citation][year=2008]N. Kumar, "SOURCE LEVEL DEBUGGING OF DYNAMICALLY TRANSLATED PROGRAMS", PhD Thesis, University of Pittsburgh, 2008 [citation][year=2008]T. Kempf, K. Karuri, and L. Gao, Software Instrumentation, in Wiley Encyclopedia of Computer Science and Engineering, pp1–11, 2008. [citation][year=2007]Fu, Xiang; Lu, Xin; Peltsverger, Boris; Chen, Shijun; Qian, Kai; Tao, Lixin; "A Static Analysis Framework For Detecting SQL Injection Vulnerabilities", in Proc. of the 31st International Computer Software and Applications Conference, July 2007 [citation][year=2007]Schmied, F. Cyment, A. ; " Aspect-oriented weaving and the .NET common language runtime", in IET Software, Vol. 1(6), IET, December 2007 [citation][year=2006]Joon S. Park, G. Jayaprakash, J. Giordano, "Component Integrity Check and Recovery Against Malicious Codes", in Proc. of the 20th IEEE International Conference on Advanced Information Networking and Applications (AINA'06), IEEE Press, Vienna, Austria, April 2006 [citation][year=2006]M. Lumpe, "Using Metadata Transformations to Integrate Class Extensions in an Existing Class Hierarchy", in Proceedings of Fourth ASIAN Symposium on Programming Languages and Systems (APLAS 2006), Naoki Kobayashi (Ed.), LNCS 4279, Springer, Sydney, Australia, November 2006 [citation][year=2006]Markus Lumpe; "Using Metadata Transformations as a Means to Integrate Class Extensions in an Existing Class Hierarchy", Technical Report #0602, Iowa State University, March 2006 [citation][year=2006]David Durand, "Gestion de la Qualité de Service dans les Applications Réparties sur Bus Middleware Orientés Objet -- Approche Dirigée par les Modèles.", PhD Thesis, Université de Picardie Jules Verne, November 2006. [citation][year=2006]J. S. Park, T.A. Suresh, G. An, and J. Giordano, "A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration in Mission-Critical Systems", in Proceeding of the International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2006, pp.1-7, 17-20 Nov. 2006. [publication]Domingues, P. and Marques, P. and Silva, L. , "Resource usage of Windows computer laboratories", in ICPP 2005 - Workshops on Parallel Processing, 2005 [citation][year=2013]Da Costa, Georges, ”Heterogeneity: the key to achieve Power-Proportional Computing”, 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp 656-662, 2013. [citation][year=2013]Pearce, Michael and Zeadally, Sherali and Hunt, Ray, ”Virtualization: Issues, security threats, and solutions”, ACM Computing Surveys (CSUR), vol. 45(2), 2013. [citation][year=2012]Azab, Abdulrahman and Meling, Hein, Stroll: A Universal Filesystem-Based Interface for Seamless Task Deployment in Grid Computing, In Proceedings of Distributed Applications and Interoperable Systems, Lecture Notes in Computer Science, pages 162-176, 2012. DOI: 10.1007/978-3-642-30823-9 14 [citation][year=2012]Harold Castro, Mario Villamizar, German Sotelo, Cesar O. Diaz, Johnatan E. Pecero and Pascal Bouvry. ”Green flexible opportunistic computing with task consolidation and virtualization”, Cluster Computing, 2012. DOI: 10.1007/s10586-012-0222-y [citation][year=2012]Harold Castro, Mario Villamizar, German Sotelo, Cesar O. Diaz, Johnatan Pecero, Pascal Bouvry, and Samee U. Khan. ”GFOG: Green and Flexible Opportunistic Grids”, Chapter 18, Scalable Computing and Communications: Theory and Practice - Wiley. USA, June 1, 2012. [citation][year=2012]Hanappe, Peter, ”Fine-grained CPU Throttling to Reduce the Energy Footprint of Volunteer Computing”, Technical Report, Sony Computer Science Laboratory Paris, 2012. [citation][year=2012]Han, Dong and Gnawali, Omprakash, ”Understanding Desktop Energy Footprint in an Academic Computer Lab”, IEEE International Conference on Green Computing and Communications (GreenCom), pp. 541-548, 2012. [citation][year=2011][PDF] http://www.sciencedirect.com/science/article/pii/S0743731511002061 Daniel Lazaro, Derrick Kondo, Joan Manuel Marques, "Long-term availability prediction for groups of volunteer resources", Journal of Parallel and Distributed Computing, 2011, DOI: DOI;10.1016/j.jpdc.2011.10.007 [citation][year=2011][PDF] http://www.springerlink.com/content/5u71m8013150876g/ James H. Hill and Douglas C. Schmidt, Experiences with Service-Oriented Middleware for Dynamic Instrumentation of Enterprise DRE Systems, ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2011, Lecture Notes in Computer Science, 2011, Volume 7045/2011, 478-497, DOI: 10.1007/978-3-642-25106-1_5 [citation][year=2010][PDF] http://doi.ieeecomputersociety.org/10.1109/WSCAD-SCC.2010.24 Berto de Tácio Pereira Gomes, Gilberto Cunha Filho, Igor Ramos Campos, Jesseildo Figueredo Gonçalves, Francisco José da Silva e Silva, "Scheduling Strategies Evaluation for Opportunistic Grids," WSCAD-SCC, pp.88-95, 2010 11th Symposium on Computing Systems, 2010 [citation][year=2010][PDF] http://hdl.handle.net/10803/3066 José Ramón García Gutiérrez, “Planificación de Diferentes Clases de Aplicaciones en Entornos No Dedicados Considerando Procesadores Multicore”, PhD Thesis, Universitat Autónoma de Barcelona, 2010 [citation][year=2009][PDF] http://portal.acm.org/citation.cfm?id=1629036.1629044# Brent Wilson and Mary Jane Willshire, “EDGAR: grid computing project”, J. Comput. Small Coll. 25(2), pp 52-57, 2009. [citation][year=2009]T.F., Clayton, A.F. Murray, and I. Lindsay, “GP-GPU: Bridging the Gap between Modelling & Experimentation”, 2009 NASA/ESA Conference on Adaptive Hardware and Systems., pp 453-459, 2009. [citation][year=2009][PDF] http://hdl.handle.net/1842/4023 T.F., Clayton, “Enabling rapid iterative model design within the laboratory environment”, PhD Thesis, The University of Edinburgh, 2009 [citation][year=2009][PDF] http://hdl.handle.net/10803/5775 Josep Lluís Lérida Monsó, “Meta-Planificador Predictivo para Entornos Multicluster no Dedicados”, PhD Thesis, Universitat Autònoma de Barcelona, 2009 [citation][year=2009][PDF] http://www.tdx.cesca.es/TESIS_UAB/AVAILABLE/TDX-0527110-121159/jllm1de1.pdf Camargo, R.Y. and Castor, F. and Kon, F., “Reliable management of checkpointing and application data in opportunistic grids”, Journal of the Brazilian Computer Society, pp. 1 14, 2009. [citation][year=2008]Constantinescu-Fuløp, Zoran, "A Desktop Grid Computing Approach for Scientific Computing and Visualization?, PhD Thesis, Norwegian University of Science and Technology, May 2008. [citation][year=2008][PDF] http://www.dbpia.co.kr/view/ar_view.asp?arid=739548 Gandhi, P.J. and Munot, S.M. and Patel, S.A. and Memon, N.A., “Host Load Prediction Using Adaptive Models”, International Journal Of Computer Science And Applications, volume 1, issue 2, 2008. [citation][year=2007]J. Bustos-Jiménez, D. Caromel, J. M. Piquer, "Load Balancing: Towards the Infinite Network and Beyond?, Job Scheduling Strategies for Parallel Processing (selected paper of the 12th Workshop on Job Scheduling Strategies for Parallel Processing), Lecture Notes in Computer Science, 4376/2007: pp 176-191, Springer, 2007. [citation][year=2007]Raphael Yokoingawa de Camargo, "Armazenamento Distribuído de Dados e Checkpointing de Aplicações Paralelas em Grades Oportunistas?, PhD Thesis, Agosto 2007. [citation][year=2007]Raphael Y. de Camargo, Fabio Kon, "Design and Implementation of a Middleware for Data Storage in Opportunistic Grid," ccgrid, Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid '07), pp. 23-30, 2007. [citation][year=2007]Ju-Ho Hyun, Sunggu Lee, Sang Cheol Kim, Min-Gu Lee, "An Efficient Scheduling Method Taking into Account Resource Usage Patterns on Desktop Grids", DBPIA, Vol. 6, pp. 429-439, 2007 [citation][year=2006]J. Wang, L. Zang, Y. Han, "Client-Centric Adaptive Scheduling of Service-Oriented Applications", Journal of Computer Science and Technology, 21(4): pp 537-546, Springer, 2006. [citation][year=2006]J. Bustos-Jiménez, "Dynamic Load Balancing for Active Objects on Computer Grids?, PhD Thesis, Université de Nice-Sophia Antipolis, France, December 2006. [citation][year=2006]J. Bustos-Jiménez, D. Caromel, A. Iosup, M. Leyton, J.M. Piquer, “The rocking chair and the grid: Balancing load across project grids”, Integrated Research in Grid Computing, CoreGrid Integration Workshop, pp. 117-128, 2006. 2004(1 publication) [publication]Bruno Cabral and Marques, P. and Silva, L. , "RAIL: Code Instrumentation for .NET (extended abstract)", in ACM OOPSLA'04 Conference Companion, 2004 [citation][year=2007]Schmied, F. Cyment, A. ; " Aspect-oriented weaving and the .NET common language runtime", in IET Software, Vol. 1(6), IET, December 2007 [citation][year=2006]Joon S. Park, Gautam Jayaprakash, Joseph Giordano, "Component Integrity Check and Recovery Against Malicious Codes," aina, pp. 466-470, 20th International Conference on Advanced Information Networking and Applications - Volume 2 (AINA'06), 2006 [citation][year=2006]J. Park, A. Suresh, G. An, J. Giordano, "A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration in Mission-Critical Systems", in Proc. 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2006 2003(1 publication) [publication]Santos, N. and Marques, P. and Silva, L. , "Dynamic Deployment of Services on Mobile Agents Systems", 2003 2002(3 publications) [publication]Marques, P. and Fonseca, R. and Simões, P. and Silva, L. and Silva, J.G. , "A Component-Based Approach for Integrating Mobile Agents Into the Existing Web Infrastructure", 2002 [citation][year=2015]M. M. Nasr, "A proposed paradigm for tracing the effect of security threats in various mobile agent systems," 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), Riyadh, 2015, pp. 1-8. doi: 10.1109/NSITNSW.2015.7176428 [citation][year=2013]Mauro Dragone, Building Self-adaptive Software Systems with Component, Services & Agents Technologies: Self-OSGi, Agents and Artificial Intelligence, Communications in Computer and Information Science Volume 358, 2013, pp 300-316, http://dx.doi.org/10.1007/978-3-642-36907-0_20 [citation][year=2010]Qusay H. Mahmoud and Leslie Yu, Integrating the Havana agent platform into the existing web infrastructure, International Journal of Wireless and Mobile Computing, Volume 4, Number 4 / 2010, pp. 290–304, Indescience. [citation][year=2009]Oscar Urra, Sergio Ilarri, Raquel Trillo and Eduardo Mena, Mobile Agents and Mobile Devices: Friendship or Difficult Relationship?, Journal of Physical Agents, Vol. 3 No. 2 May 2009. [citation][year=2008]Tong-Seng Quah, Chye-Huang Leow, Linking Business for Competitive Advantage: a Mobile Agent-Based Approach. In Electronic Business: Concepts, Methodologies, Tools, and Applications, I. Lee (Ed.), pp. 117-141, Idea Group Inc (IGI), 2008. [citation][year=2007]WANG Xiaohu, WU Jianbin, Research of an Agent platform based on Web services, Journal of Zheijiang Normal University (Natural Sciences), 2007 (30)2, 10.3969/j.issn.1001-5051.2007.02.014 [citation][year=2007]1. I.E. Foukarakis, A.I. Kostaridis, C.G. Biniaris, D.I. Kaklamani, and I.S. Venieris; "Webmages: An agent platform based on web services"; in Computer Communications, Volume 30, Issue 3, February 2007 [citation][year=2005]Mona Nasr, A Simulation-based Model for Tracing the Effect of Masquerading Security Threat in Mobile Agent Systems; In Proc the 13th Int. Conf. on Artificial Applications, ICAIA’05, American University in Cairo (AUC), Egypt, February 2005. [citation][year=2005]1. M. Eid, H. Artail, A. Kayssi, and A. Chehab, "Trends in Mobile Agent Applications", in Journal of Research and Practice in Information Technology, Vol. 37, No. 4, November 2005 [citation][year=2004]V. Tan, "Interaction Tracing for Mobile Agent Security", PhD Thesis, University of Southampton, Southampton, UK, March 2004 [citation][year=2003]I.E. Foukarakis, A.I. Kostaridis, C.G. Biniaris, D.I. Kaklamani, I.S. Venieris, "Implementation of a Mobile Agent Platform Based on Web Services", Proc. Mobile Agents for Telecommunication Applications MATA-03, Lecture Notes in Computer Science, Volume 2881 / 2003, Springer-Verlag Heidelberg. [citation][year=2003]Odysseas Papapetrou, Location Aware Web-Crawling With the Use of Migrating Crawlers, Master Thesis, University of Cyprus, Department of Computer Science, December 2003. [publication]Santos, N. and Marques, P. and Silva, L. and Silva, J.G. , "A Framework for Smart Proxies and Interceptors in RMI", 2002 [citation][year=2008]1. A. Stevenson and S. MacDonald, "Smart Proxies in Java RMI with Dynamic Aspect-Oriented Programming", in Proceedings of the 10th International Workshop on Java and Components for Parallelism, Distribution, and Concurrency (IWJPDC 2008), Miama, FL, April 2008. [citation][year=2008]2. A. Stevenson and S. MacDonald, "Dynamic Aspect-Oriented Load Balancing in Java RMI", in Proceedings of the 2008 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 2008), Las Vegas, NV, July 2008, pages 485-491. [citation][year=2008]3. A. Stevenson, "Aspect-Oriented Smart Proxies in Java RMI", M.Sc. Thesis, University of Waterloo, Waterloo, Ontario, Canada, 2008 [citation][year=2007]1. Buyya, R. Venugopal, S., " Smart Proxies for Accessing Replicated Web Services", in IEEE Distributed Systems Online, Vol. 8(12), IEEE, December 2007 [citation][year=2006]1. J. Junior, G. Carmo, M. Valente, \\\"Invocation of replicated web services using smart proxies\\\", in Proceedings of the 12th Brazilian symposium on Multimedia and the Web, ACM Press, Natal, Rio Grande do Norte, Brazil, November 2006 [citation][year=2006]2. Y. Wang, J. Wei, Z. Wang. \"An architecture for extensible and configurable event notification service\", in Journal of Software, Vol. 17(3), pgs. 638-648, 2006. [citation][year=2005]1. Güray Yilmaz and Nadia Erdogan, "DCOBE: Distributed Composite Object-Based Environment?, in The Computer Journal, Vol. 48(3):273-291, 2005 [citation][year=2005]2. R. Kapitza, M. Kirstein, H. Schmidt, F. Hauck, "FORMI: an RMI extension for adaptive applications", in Proceedings of the 4th Workshop on Reflective and Adaptive Middleware Systems, ACM Press, Grenoble, France, 2005 [citation][year=2004]1. M. Keidl and A. Kemper, "Towards Context-Aware Adaptable Web Services?, in Proc. 13th International Conference on World Wide Web (WWW"04), ACM Press, New York, USA, May 2004 [citation][year=2003]H. Reiser, F. Hauck, R. Kapitza, and A. Schmied, "Integrating Fragmented Objects into a CORBA Environment?, in Proc. Net.Objects Days 2003, Erfurt, Germany, September 2003. [citation][year=2003]S. Schulz, M. Friedrich, W. Küchlin, and T. Hüttner, "A RMI-Security-Extension Using the PERMI Framework?, in Proc. Net.Objects Days 2003, Erfurt, Germany, September 2003. [citation][year=2003]J. Hallstrom, W. Leal, A. Arora, "Scalable Evolution of Highly Available Systems?, in IEICE/IEEE Joint Special Issue on Assurance Systems and Networks, E86-D(10), 2154 " 2166 (October 2003) [publication]Marques, P. and Santos, P. and Silva, L. and Silva, J.G. , "Supporting Disconnected Computing in Mobile Agent Systems", 2002 2001(5 publications) [publication]Marques, P. and Simões, P. and Silva, L. and Silva, J.G. and Boavida, F. , "Towards Manageable Mobile Agent Infrastructures", 2001 [citation][year=2004]Emmanuel Reuter, Agents Mobiles: Itinéraires pour l"administration système et réseau, PhD thesis, Université de Nice Sophia Antipolis, May 2004. [citation][year=2003]1. Rui Pedro Lopes, José Luis Oliveira, "A Mobile Agent Manager", Proc. MATA-2003, Mobile Agents for Telecommunication Applications, Oct 2003, Lecture Notes in Computer Science, Volume 2881 / 2003, Springer-Verlag [publication]Marques, P. and Simões, P. and Silva, L. and Boavida, F. and Silva, J.G. , "Providing Applications With Mobile Agent Technology", 2001 [citation][year=2016]Muhammad Saleh Kaukab, Sabih Khan Afridi, Yaqoob Wani and Khalid Hussain, A Comprehensive Analysis of Agent Based Backup Management System, International Journal of Scientific & Engineering Research, Volume 7, Issue 3, pp. 530-536, March-2016, ISSN 2229-5518 [citation][year=2015]Nai-Ching Chao, A Research on the Implementation of Enterprise BOYD Policy, These for Master of Business Administration – Department of Information Management, Tatung University, January 2015. [citation][year=2014]Miada Al-masre, Fathy Alburi. Manager Architecture for Mobile Cloud Computing-Cloudlet based. Asian Journal of Computer and Information Systems (ISSN: 2321 – 5658), Vol. 02 – Issue 01, February 2014. [citation][year=2013]Atul Srivastava, Manpreet Singh, Mamta Sharma and Manali Aggarwal, Mobile Agents and their Application in Distributed Crawling, Proceedings of the 2nd National Conference on Recent Trends in Computer Science and Information Technology (RTCSIT-2013), Excel India Publishers, pp. 68-70, October 2013. [citation][year=2012]Bhattacharya, A., Mobile agent based elastic executor service, Computer Science and Software Engineering (JCSSE), 2012 Int. Joint Conf. on, 2012, pp. 351-356, DOI: 10.1109/JCSSE.2012.6261978 [citation][year=2010]Mohammad Hasan Samadani and Mehdi Shajari. 2010. Path reduction in complex grid service provision. In Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business (ICEC '10). ACM, New York, NY, USA, 88-93. DOI=10.1145/2389376.2389388 http://doi.acm.org/10.1145/2389376.2389388 [citation][year=2010]Saifur Rahman, Manisa Pipattanasomporn, Modeling and Simulation of a Distributed Generation-Integrated Intelligent Microgrid, SERDP Project SI-1650 (Final Report), Virginia Tech, February 2010. [citation][year=2009]Zhiqiang Wei; Yewei Feng, "A Mobile Agent Sub-optimal Migration Algorithm Based on Probability," Web Information Systems and Mining, 2009. WISM 2009. International Conference on, vol., no., pp.413,417, 7-8 Nov. 2009, doi: 10.1109/WISM.2009.90 [citation][year=2009]Hassan Feroze, "Multi-Agent Systems in Microgrids: Design and Implementation?, Masters thesis in Electrical Engineering, Faculty of the Virginia Polytechnic Institute and State University, USA, August 2009. [citation][year=2009]B. Molina, S.F. Pileggi, M. Esteve, C.E. Palau, "A negotiation framework for content distribution in mobile transient networks?, Journal of Network and Computer Applications, Volume 32, Issue 5, September 2009. [citation][year=2009]Daniele Puccinelli (editor), Specification of the ADULT-Haggle, Haggle Deliverable D1.4, European Union FP6 Project 027918, http://www.haggleproject.org/, September 2009. [citation][year=2008]Molina, B., Pileggi, S. F., Palau, C. E., and Esteve, M. 2008. A social framework for content distribution in mobile transient networks. In Proceedings of the Third international Workshop on Use of P2p, Grid and Agents For the Development of Content Networks (Boston, MA, USA, June 23 - 23, 2008). UPGRADE '08. ACM, New York, NY, 29-36. DOI= http://doi.acm.org/10.1145/1384209.1384216. [citation][year=2008]Shamila Makki, Subbarao Wunnava, Next Generation Networks and Code Mobility. ISAST Transactions on Communications and Networking, No.1 Vol. 2, 2008. [citation][year=2007]Liam Cragg, Huosheng Hu and Norbert Voelker, Modularity and Mobility of Distributed Control Software for Networked Mobile Robots, Software Engineering for Experimental Robotics, Springer Tracts in Advanced Robotics, 2007, Volume 30/2007, 459-484, DOI: 10.1007/978-3-540-68951-5_26 [citation][year=2006]Jinghao Ju; Dong Wang; Huanye Sheng. RFID Data Collection and Integration Based on Mobile Agent," IEEE Conference on Cybernetics and Intelligent Systems (ICCIS 2006), June 2006 [citation][year=2006]D. Gavalas, C. Politi, Low-Cost Itineraries for Multi-Hop Agents Designed for Scalable Monitoring of Multiple Subnets, Computer Networks, Elsevier Science , 50(16), pp. 2937-2952, November 2006. [citation][year=2006]Xi-Cheng Tan and Fu-Ling Bian, "P2P and Agent Service Based On-Line 3DGIS�?�, Lecture Notes in Computer Science Volume 4295/2006 Book Web and Wireless Geographical Information Systems ISBN978-3-540-49466-9, 2006. [citation][year=2005]1. J Ko, BD Gerardo, J Lee, JJ Hwang, The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile Agent, in O. Gervasi et al. (Eds.): ICCSA 2005, LNCS 3481, pp. 205"214, Springer-Verlag Berlin Heidelberg 2005. [citation][year=2005]2. X Wang, A Jiang, S Wang; Mobile agent based wireless sensor network for intelligent maintenance, in DS Huang, XP Zhang, GB Huang (Eds.): Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Part II, LNCS 3645, pp. 316"325, Springer-Verlag Berlin Heidelberg 2005. [citation][year=2005]3. Christophe Cubat Dit Cros, Agents Mobiles Coopérants pour les Environnements Dynamiques, PhD thesis, Institut National Polytechnique de Toulouse, France, December 2005. [citation][year=2005]4. W. Buchanan, J. Graves, L. Saliou, H. Al Sebea, N. Migas, Agent-based Forensic Investigations with an Integrated Framework, Proc. of the Proceedings of the 5th European Conference on Information Warfare and Security (ECIW 2005), Academic Conferences, 2005. [citation][year=2005]5. C. Diaz, SWAM: Un lengua je para la programacíon de agentes móviles inteligentes en la Web Semántica, Tesis sometida a evaluacíon como requisito parcial para la obtencíon del grado de Magister en Ingeniería de Sistemas, Universidad Nacional Del Centro de la Provincia de Buenos Aires, Argentina, 2005. [citation][year=2004]1. Aneiba, J. Rees, "Mobile Agent Technology and Mobility?, in Proc. of the 5th Annual Postgraduate Symposium on the Convergence of Telecommunications (PGNet 2004), Networking and Broadcasting, pp. 14-20, Liverpool, June 2004 [citation][year=2004]2. S. S. Manvi, P. Venkataram: "Applications of agent technology in communications: a review". Computer Communications 27(15): 1493-1508 (2004) [citation][year=2004]3. Damianos Gavalas, "Network Management Itineraries for Mobile Agents?, Proceedings of the 2nd Internation Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs"04), Ilkley, West Yorkshire, UK, 26-28 July, 2004. [citation][year=2003]L. Cragg, P. Tsui, and H. Hu, "Building a Fault Tolerant Architecture for Internet Robots Using Mobile Agentsâ?, in Proc. 1st British Workshop on Internet and Online Robots (IORW"03), Reading, UK, 2003 [citation][year=2003]C. Hsu, H. Hsu, D. Yang, and F. Wang, "Constructing a Multiple Mobile-BDI Agent Systemâ?, in Proc. of 14th Workshop on Object-Oriented Technology and Applications (OOTA'2003), 2003. [citation][year=2003]M. Chuang and W. Chang, "Performance Monitoring Web Applications via a Mobile-Agent Approachâ?, in Tunghai Science Journal, Vol. 5, pp. 21-41, July 2003 [citation][year=2003]A. Boulis, C.-C. Han, and M.B. Srivastava, "Design and Implementation of a Framework for Efficient and Programmable Sensor Networks", in Proceedings of First International Conference on Mobile Systems, Applications, and Services (MobiSys), May 2003. [citation][year=2002]A. Boulis and M. B. Srivastava, "A Framework for Efficient and Programmable Sensor Networksâ?, in Proc. 5th IEEE International Conference on Open Architectures and Network Programming (OpenArch'02), IEEE Computer Press, New York, June, 2002 [citation][year=2002]Required reading in the graduate course "Desenvolvimento de Software Baseado em Agentes Móveisâ?, of the Universidade Federal de Campina Grande, Brazil. 2002. (http://www.dsc.ufcg.edu.br/~patricia/ma/) [citation][year=2001]Damianos Gavalas, Mobile Software Agents for Network Monitoring and Performance Management, PhD Thesis, University of Essex, UK, 2001. [publication]Marques, P. and Santos, N. and Silva, L. and Silva, J.G. , "The Security Architecture of the M&M Mobile Agent Framework", 2001 [citation][year=2007]1. Adam Pridgen and Christine Julien; "SMASH: Modular Security for Mobile Agents"; in Lecture Notes in Computer Science 4408, Springer-Verlag, August 2007 [citation][year=2006]1. A. Pridgen and C. Julien, "A Secure Modular Mobile Agent System", Technical Report TR-UTEDGE-2006-003, University of Texas at Austin, 2006 [citation][year=2006]2. Adam Pridgen and Christine Julien; "A Secure Modular Mobile Agent System?; in Proceedings of the 2006 International Workshop on Software Engineering for Large-Scale Multi-agent Systems; ACM, May 2006 [citation][year=2004]1. Elmarie Biermann, "A Framework for the Protection of Mobile Agents Against Malicious Hosts?, Ph.D Thesis, University of South Africa, September 2004 [publication]Marques, P. and Fonseca, R. and Simões, P. and Silva, L. and Silva, J.G. , "Integrating Mobile Agents into Off-the-Shelf Web Servers: The M&M Approach", in Munich, Germany, 2001 [citation][year=2005]R.D.G Jayarathne, Dynamic Server Access by Mobile Agents Using Attribute Certificates, 7th International Information Technology Conference (IITC), Sri Lanka, 9-10 November 2005. [citation][year=2005]1. Qusay H. Mahmoud, Leslie Yu, "An Architecture and Business Model for Making Software Agents Commercially Viable", in Proc. of the 38th Hawaii International Conference on System Sciences, 2005 [citation][year=2004]Q. Mahmoud, L. Yu, "Havana: a mobile agent platform for seamless integration with the existing Web infrastructure", in Proc. of the 2004 Canadian Conference on Electrical and Computer Engineering, Niagara Falls, Ontario, Canada, May 2004. [citation][year=2002]S. Arumugam, A. Helal, A. Nalla, "aZIMAs: Web Mobile Agent System", in Proceedings of the 6th IEEE International Conference on Mobile Agents (MA'02), Barcelona, Spain, October, 2002 [citation][year=2002]Subramanian Arumugam, "aZIMAS: Web Mobile Agent Systemâ?, MsC Thesis, Science University of Florida, 2002. [publication]Marques, P. and Fonseca, R. and Silva, L. and Silva, J.G. , "Integrating Mobile Agents With Off-the-shelf Web-servers", in Systems and Applications (INBOSA\'2001), 2001 2000(6 publications) [publication]Marques, P. and Silva, L. and Silva, J.G. , "A Flexible Mobile-Agent Framework for Accessing Information Systems in Disconnected Computing Environments", 2000 [citation][year=2004]1. M. Ho, Y. Chang, S. Yuan, "EMARE: An Email-based Mobile Agent Runtime Environment for Information Retrieval on the Internet?, in Proc. 2nd IEEE International Workshop on Wireless and Mobile Technologies in Education, Taoyuan, TAIWAN, March 2004. [citation][year=2002]S. Choudhury, A. Dan, "Downloadable Service Contracts for Disconnected Transactionsâ?, in Proc. 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02), San Jose, California, February 2002 [citation][year=2002]S da Costa Cortes, Sérgio Lifschitz, "Sistemas de Gerencia de Banco de Dados baseados em Agentes para um Ambiente de Computacao Movel", Technical Report MCC1/02, Departamento de Informática da Universidade PUC-Rio, Rio de Janeiro, Brasil, Junho 2002 [citation][year=2001]1. S da Costa Cortes, CJP de Lucena, "Um Framework para construcao de Sistemas de Banco de Dados Movel com Regras Ativas", Technical Report MCC35/01, Departamento de Informática da Universidade PUC-Rio, Rio de Janeiro, Brasil, Outubro 2001 [publication]Marques, P. and Silva, L. and Silva, J.G. , "Building Domain-Specific Mobile Agent Platforms from Reusable Software Components", 2000 [publication]Marques, P. and Silva, L. and Silva, J.G. , "Going Beyond Mobile Agent Platforms: Component-Based Development of Mobile Agent Systems", 2000 [citation][year=2004]1. V. Tan, "Interaction Tracing for Mobile Agent Security", PhD Thesis, University of Southampton, Southampton, UK, March 2004. [publication]Marques, P. and Silva, L. and Silva, J.G. , "Addressing the Question of Platform Extensibility in Mobile Agent Systems", 2000 [publication]Marques, P. and Simões, P. and Silva, L. and Boavida, F. and Silva, J.G. , "Mobile Agent Systems: From Technology to Applications", in OOPSLA'2000 Workshop on Experiences with Autonomous Mobile Objects and Agent Based Systems, 2000 [citation][year=2003]1. M. Bisignano, G. Di Modica, and O. Tomarchio, "Mobile Agent Location Management: a Comparison Between CORBA and P2P Based Systems?, in Proc. 8th IEEE International Symposium on Computers and Communication (ISCC"2003), KEMER, TURKEY, June 2003. [citation][year=2001]1. O. Tomarchio, L. Vita, A. Puliafito, "Mobile Agents and Legacy Systems: How to Integrate Alternative Communication Paradigms?. in Proceedings of the 3rd International Workshop on Mobile Agents for Telecommunication Applications (MATA2001), Montreal (Canada), August 2001. [publication]Marques, P. and Silva, L. and Silva, J. and Silva, J. , "Application Centric Mobile Agent Systems: Bringing the Focus Back to the Applications", in presented at the poster session of the Second Joint Symposium on Agent Systems and Applications/Mobile Agents (ASA/MA\'2000), 2000 1999(2 publications) [publication]Marques, P. and Silva, L. and Silva, J.G. , "Security Mechanisms for Using Mobile Agents in Electronic Commerce", 1999 [citation][year=2006]1. T. Chen, \"A Noval Key Management and Access Control Method for Mobile Agent\", Master\'s Thesis, Institute of Communicational Engineering, 2006. [citation][year=2005]1. W Qu, H Shen, J Sum, ""Stochastic analysis of mobile agent-based e-shopping", in International Journal of Electronic Business, Vol. 3, Nos. 3/4, 2005 [citation][year=2004]1. S. Guan, F. Zhu, and M. Maung, "A Factory-based Approach to Support E-Commerce Agent Fabrication?, in Electronic Commerce Research and Applications Journal, Vol. 3(1), Elsevier Science, pp. 39-53, Spring 2004 [citation][year=2003]S. Guan, T. Wang, S. Ong, "Migration Control for Mobile Agents Based on Passport and Visa?, in Future Generation Computer Systems, pp. 173-186, Elsevier Science, ISSN:0167-739X, 2003 [citation][year=2003]C. Wang, F. Zhang and Y. Wang, "Secure Web Transaction with Anonymous Mobile Agent over the Internet?, in Journal of Science and Technology, Vol. 18(1), pp. 84-89, ISSN 1000-9000, January 2003. [citation][year=2002]L. Korba "Privacy in Distributed Electronic Commerce" Proceedings of th 35th Hawaii International Conference on System Science, Hawaii, January 7-11, 2002, NRC 44891. [citation][year=2002]Wang TH, Guan SU, Chan TK, "Integrity protection for Code-on-Demand mobile agents in e-commerce" JOURNAL OF SYSTEMS AND SOFTWARE 60 (3): 211-221 FEB 15 2002. [citation][year=2002]S. Guan, T. Wang and S. Ong, "A Secure Approach for Mobile Agent Migration Control?, in Proc. of the Seventh International Symposium on Computers and Communications (ISCC"02), IEEE Press, Taormina/Giardini Naxos, Italy, July 2002 [citation][year=2002]O. Tomarchio and A. Puliafito. "Design and development of a practical security model for a mobile agent system?, in IEEE Symposium on Computer Communications (ISCC2002), Taormina (Italy), July 2002. [citation][year=2002]I. Lin, H. Ou, and M Hwang, "Two Secure Transportation Schemes for Mobile Agents?, in Information & Security Journal, Vol. 8(1), pp. 87-97, ISSN 1311-1493, 2002. [citation][year=2002]Required reading in the graduate courses "COS496V/W?, "INF414H? and "INF416H? ("Special Topic with Focus: Mobile Agent Security?), of the University of South Africa, South Africa. Fall 2002. (http://osprey.unisa.ac.za/~elsabe/download/MAsecurityInstructions.pdf) [citation][year=2002]SHENG-UEI GUAN and FANGMING ZHU, "Agent Fabrication and Its Implementation for Agent-Based Electronic Commerce?, in International Journal of Information Technology & Decision Making, Vol. 1, No. 3 (2002) 473"489, World Scientific Publishing Company, 2002 [citation][year=2001]1. O. Onbilger, R. Newman, and R. Chow, "A Distributed and Compromise-tolerant Mobile Agent Protection Schemeâ?, in International Conference on Intelligent Agents, Web Technology and Internet Commerce (IAWTIC'2001), Las Vegas, USA, July 2001. [citation][year=2000]S. Guan, F. Zhu, and C. Ko, "Agent Fabrication and Authorization in Agent-based Electronic Commerce?, in Proc. International ICSC Congress on Intelligent Systems and Applications, Wollongong, Australia, December 2000. [citation][year=2000]Required reading in the "EE657: Parallel Processing? course at the University of Southern California, USA. Fall 2000. (http://www-classes.usc.edu/engr/ee-s/657h/) [citation][year=2000]IEEE Chiper Reader"s Guide to Security and Privacy Conference Papers (http://www.ieee-security.org/Cipher/ReadersGuide/conferences-save.html) [publication]Marques, P. and Silva, L. and Silva, J.G. , "Establishing a Secure Open-Environment for the Computations of Mobile Agents", in In Proceedings of ASA/MAâ??99, 1999 Book Chapters 2007(1 publication) [publication]Marques, P. and Silva, L. , "Component Agent Systems: Building a Mobile Agent Architecture That You Can Reuse", in Architectural Design of Multi-Agent Systems: Technologies and Techniques, 2007 PhD Theses 2003(1 publication) [publication]Marques, P. , "Component-based Development of Mobile Agent Systems", 2003 Tech Report 2010(1 publication) [publication]Alves, D. and Bizarro, P. and Marques, P. , "Deadline Queries: Using Elastic MapReduce to Produce On-Time Results", 2010 2005(1 publication) [publication]Domingues, P. and Marques, P. and Silva, L. , "Resources Usage of Windows Computer Laboratories (technical report)", 2005