Sciweavers

1597 search results - page 126 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
14 years 1 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
OOPSLA
2004
Springer
14 years 2 months ago
Second generation web services-oriented architecture in production in the finance industry
Effective and affordable business process integration is a key concern in the finance industry. A large German joint-use centre, supplying services to 237 individual savings banks...
Olaf Zimmermann, Sven Milinski, Michael Craes, Fra...
GLOBECOM
2006
IEEE
14 years 3 months ago
Relay-Assisted Spatial Multiplexing in Wireless Fixed Relay Networks
— Fixed relays are expected to be a part of future infrastructure-based wireless networks. Besides coverage extension, such relays can form advanced architectures due to the fle...
Furuzan Atay Onat, Halim Yanikomeroglu, Shalini S....
TRIDENTCOM
2008
IEEE
14 years 3 months ago
A quantitative evaluation of the MeshTest wireless testbed
The MeshTest testbed is designed to subject wireless devices and protocols to realistic and repeatable mobile scenarios, including multi-hop and disconnected topologies. The testb...
Brenton Walker, Charles Clancy
VTC
2008
IEEE
14 years 3 months ago
Secure Vehicular Communication for Safety Applications - A Measurement Study
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...