Sciweavers

1615 search results - page 93 / 323
» Evaluation of current architecture frameworks
Sort
View
APSCC
2008
IEEE
15 years 6 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
IPCCC
2007
IEEE
15 years 10 months ago
Optimal Cluster Head Selection in the LEACH Architecture
LEACH (Low Energy Adaptive Clustering Hierarchy) [1] is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. LEACH uses a TDMA ...
Haiming Yang, Biplab Sikdar
IJIPT
2007
111views more  IJIPT 2007»
15 years 4 months ago
System architecture of a mobile message transport system
Many scenarios of beyond 3G mobile communications describe the integration of various access technologies into one system. Being always best connected under certain optimization c...
Bernd Gloss
ACSAC
2001
IEEE
15 years 8 months ago
A Framework for Multiple Authorization Types in a Healthcare Application System
In most of the current authorization frameworks in application systems, the authorization for a user operation is determined using a static database like ACL entries or system tab...
Ramaswamy Chandramouli
WSC
2001
15 years 5 months ago
A taxonomy of a living model of the enterprise
A designer has a choice of many models, methods, frameworks, and architectures. There is little consistency between these terms among researchers. Some of the most widely used arc...
Larry Whitman, Kartik Ramachandran, Vikram Ketkar