Sciweavers

1597 search results - page 126 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
148
Voted
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
15 years 8 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
113
Voted
OOPSLA
2004
Springer
15 years 9 months ago
Second generation web services-oriented architecture in production in the finance industry
Effective and affordable business process integration is a key concern in the finance industry. A large German joint-use centre, supplying services to 237 individual savings banks...
Olaf Zimmermann, Sven Milinski, Michael Craes, Fra...
135
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
Relay-Assisted Spatial Multiplexing in Wireless Fixed Relay Networks
— Fixed relays are expected to be a part of future infrastructure-based wireless networks. Besides coverage extension, such relays can form advanced architectures due to the fle...
Furuzan Atay Onat, Halim Yanikomeroglu, Shalini S....
155
Voted
TRIDENTCOM
2008
IEEE
15 years 10 months ago
A quantitative evaluation of the MeshTest wireless testbed
The MeshTest testbed is designed to subject wireless devices and protocols to realistic and repeatable mobile scenarios, including multi-hop and disconnected topologies. The testb...
Brenton Walker, Charles Clancy
92
Voted
VTC
2008
IEEE
15 years 10 months ago
Secure Vehicular Communication for Safety Applications - A Measurement Study
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...