This paper, the first in a series of four, presents the conceptual design of a subsystem with integrative function based on a Service-Oriented Architecture (SOA), named Geographic...
Fernando Maciel Lima e Sousa, Valdevino Siqueira C...
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
This paper presents SLA monitoring and management framework for telecommunication services. The basic requirements of this class of systems are specified and verified in context o...
Jacek Kosinski, Piotr Nawrocki, Dominik Radziszows...
Abstract. We present the data modeling concepts of Tricia, an opensource Java platform used to implement enterprise web information systems as well as social software solutions inc...