Sciweavers

468 search results - page 76 / 94
» A Group Communication Protocol for CORBA
Sort
View
IJSEKE
2007
52views more  IJSEKE 2007»
13 years 7 months ago
Software Architecture Decomposition Using Attributes
Software architectural design has an enormous effect on downstream software artifacts. Decomposition of functions for the final system is one of the critical steps in software arch...
Chung-Horng Lung, Xia Xu, Marzia Zaman
SAC
2008
ACM
13 years 7 months ago
Providing dependability for web services
Web services have been widely employed to allow interoperability among applications and/or technologies. However, the standard technologies and protocols which provide the foundat...
Jeferson L. R. Souza, Frank Siqueira
MONET
2010
148views more  MONET 2010»
13 years 6 months ago
REP: Location Privacy for VANETs Using Random Encryption Periods
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which ...
Albert Wasef, Xuemin (Sherman) Shen
CN
2007
117views more  CN 2007»
13 years 7 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
GLOBECOM
2007
IEEE
14 years 1 months ago
Two Energy-Saving Schemes for Cooperative Transmission with Opportunistic Large Arrays
— An opportunistic large array (OLA) is a form of cooperative diversity in which a large group of simple, inexpensive relays or forwarding nodes operate without any mutual coordi...
Lakshmi V. Thanayankizil, Aravind Kailas, Mary Ann...