Sciweavers

4330 search results - page 17 / 866
» Analyzing security architectures
Sort
View
GLOBECOM
2009
IEEE
14 years 2 months ago
Building Femtocell More Secure with Improved Proxy Signature
—Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP define new architecture and security requirement f...
Chan-Kyu Han, Hyoung-Kee Choi, In-Hwan Kim
ICSE
1999
IEEE-ACM
13 years 11 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...
IEEEARES
2009
IEEE
14 years 2 months ago
Risk-Driven Architectural Decomposition
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
AGENTS
2001
Springer
13 years 12 months ago
An architecture for action selection in robotic soccer
ÅÍÒ Ø ¹ Û × Ø ½ ÊÓ Ó ÙÔ ÖÓ ÓØ ×Ó Ö × ÑÙ¹ Ð ØÓÖ Ð Ù ÑÔ ÓÒº ÁÒ Ø ÊÓ Ó ÙÔ¹¾¼¼¼ ÓÑÔ Ø Ø ÓÒ¸ ÅÍÒ Ø ¹ Û × ÒØ Ö Ò Ò ...
Peter Stone, David A. McAllester
AGENTS
2000
Springer
13 years 11 months ago
Requirements for an architecture for believable social agents
Anthony Guye-Vuillème, Daniel Thalmann