Sciweavers

329 search results - page 47 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
CODES
2006
IEEE
14 years 1 months ago
Key technologies for the next generation wireless communications
The principal objectives of next generation wireless communication are the delivery of higher data rate services including video, audio, data and voice signals with worldwide comp...
Kyung-Ho Kim
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
14 years 1 months ago
A Taxonomy for RFID
—Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriente...
Taimur Hassan, Samir Chatterjee
ADHOCNOW
2006
Springer
14 years 1 months ago
A Classification and Performance Comparison of Mobility Models for Ad Hoc Networks
In mobile ad hoc network research, simulation plays an important role in determining the network characteristics and measuring performance. On the other hand, unrealistic simulatio...
Emre Atsan, Öznur Özkasap
HICSS
2005
IEEE
123views Biometrics» more  HICSS 2005»
14 years 1 months ago
Enterprise Architecting: Critical Problems
An enterprise architecture (EA) identifies the main components of the organization, its information systems, the ways in which these components work together in order to achieve d...
Stephen H. Kaisler, Frank Armour, Michael Valivull...
BTW
2005
Springer
107views Database» more  BTW 2005»
14 years 1 months ago
DBMS Architecture - Still an Open Problem
More than two decades ago, DB researchers faced up to the question of how to design a data-independent database management system (DBMS), that is, a DBMS which offers an appropriat...
Theo Härder