Sciweavers

529 search results - page 32 / 106
» Source Address Validation: Architecture and Protocol Design
Sort
View
ECIS
2001
15 years 5 months ago
Using Problem-Domain and Artefact-Domain Architectural Modelling to Understand System Evolution
The authors describe on going research to uncover the architectonic nature of artefacts and see how these may be related to high-level, but also grounded, model of the original pr...
Thomas R. Addis, Galal Hassan Galal
INFOCOM
2007
IEEE
15 years 10 months ago
A Multipath Background Network Architecture
— Background transfers, or transfers that humans do not actively wait on, dominate the Internet today. In today’s best-effort Internet, background transfers can interfere with ...
Ravi Kokku, Aniruddha Bohra, Samrat Ganguly, Arun ...
JCISE
2002
166views more  JCISE 2002»
15 years 4 months ago
The STEP Modular Architecture
The first Technical Note in this series [1] introduced the international standard ISO 10303, informally known as STEP (STandard for the Exchange of Product model data). Subsequent...
Allison Barnard Feeney
FDL
2007
IEEE
15 years 10 months ago
Mapping Actor-Oriented Models to TLM Architectures
Actor-oriented modeling approaches are convenient for implementing functional models of embedded systems. Architectural models for heterogeneous system-on-chip architectures, howe...
Jens Gladigau, Christian Haubelt, Bernhard Niemann...
ACMSE
2006
ACM
15 years 10 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang