Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Alden A. Dima (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 76 - 90 of 90

Using Intelligent Agents to Assess Pervasive Computing Technologies

January 1, 2001
Author(s)
L P. Ciarletta, Alden A. Dima, V P. Iordanov
Pervasive Computing (a.k.a. Ubiquitous or Ambient Computing) is a new field of computer science generally considered to lie at the intersection of desktop computing, networking, and embedded systems. Related to pervasive computing are Intelligent

The Case for Simulation-Based Evaluation of Ubiquitous Computing Environments

January 25, 2000
Author(s)
Alden A. Dima, L P. Clarletta
Ubiquitous computing (a.k.a. pervasive computing) is ill-defined due to its novelty and the community's current emphasis on its technological aspects. This can lead to serious \existential issues during the evaluation of ubiquitous computing technologies

A Conceptual Model for Pervasive Computing

January 1, 2000
Author(s)
L P. Ciarletta, Alden A. Dima
As an emerging field, pervasive computing has not had the opportunity to develop a conceptual model similar to the OSI Reference Model used to describe computer networks. Such a model would be useful to properly classify issues raised during discussion and

Flits: Pervasive Computing for Processor and Memory Constrained Systems

January 1, 2000
Author(s)
William J. Majurski, Alden A. Dima, Mary T. Laamanen
Many pervasive computing software technologies are targeted for 32-bit desktop platforms. However, there are innumerable 8, 16, and 32-bit microcontroller and microprocessor-based embedded systems that do not support the resource requirements of these

Using XML in a Software Diagnostic Tool

December 6, 1999
Author(s)
Alden A. Dima
Many development tools such as execution tracing tools generate a large amount of text output. The large quantity of text make it hard for the user to sort through and make sense of the output. In addition, the output is often formatted in a manner that

Raising the Bar on Software Security Testing

June 1, 1999
Author(s)
Alden A. Dima, John P. Wack, S A. Wakid
This article describes an effort lead by NIST and NSA to define and promote an open and commercially driven set of testing methods for software security through the National Information Assurance Partnership (NIAP) (see http://niap.nist.gov). This

VRML Test Case Generation and Evaluation Using Java

June 1, 1998
Author(s)
Leonard E. Gebase, Mary C. Brady, Alden A. Dima, Lynne S. Rosenthal
A well-established approach to conformance testing is to treat the implementation being tested as a black box. With this approach, a reference implementation is built to control and evaluate the implementation being tested, and a supporting implementation