Sciweavers

1597 search results - page 90 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
SIGSOFT
2005
ACM
14 years 11 months ago
Dynamically discovering architectures with DiscoTect
One of the challenges for software architects is ensuring that an implemented system faithfully represents its architecture. We describe and demonstrate a tool, called DiscoTect, ...
Bradley R. Schmerl, David Garlan, Hong Yan
INFOCOM
2007
IEEE
14 years 5 months ago
Algorithmic Aspects of Access Networks Design in B3G/4G Cellular Networks
— The forthcoming 4G cellular systems will provide broadband wireless access to a variety of advanced data and voice services. In order to do that, these networks will have a sig...
David Amzallag, Joseph Naor, Danny Raz
IJNSEC
2010
143views more  IJNSEC 2010»
13 years 5 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
UML
2005
Springer
14 years 4 months ago
Integrated Model-Based Software Development, Data Access, and Data Migration
In this paper we describe a framework for robust system maintenance that addresses specific challenges of data-centric applications. We show that for data-centric applications, cl...
Behzad Bordbar, Dirk Draheim, Matthias Horn, Ina S...
COMSUR
2011
221views Hardware» more  COMSUR 2011»
12 years 10 months ago
Computational Intelligence in Wireless Sensor Networks: A Survey
—Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many chall...
Raghavendra V. Kulkarni, A. Forster, Ganesh K. Ven...