Sciweavers

10159 search results - page 1906 / 2032
» System Design Validation Using Formal Models
Sort
View
PERCOM
2008
ACM
13 years 8 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
SACMAT
2011
ACM
12 years 11 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
IACR
2011
221views more  IACR 2011»
12 years 7 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identiļ¬cation (RFID) systems are vulnerable to relay attacks (i.e., maļ¬a, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
FPGA
2007
ACM
124views FPGA» more  FPGA 2007»
14 years 2 months ago
A practical FPGA-based framework for novel CMP research
Chip-multiprocessors are quickly gaining momentum in all segments of computing. However, the practical success of CMPs strongly depends on addressing the diļ¬ƒculty of multithread...
Sewook Wee, Jared Casper, Njuguna Njoroge, Yuriy T...
WIKIS
2005
ACM
14 years 1 months ago
WikiWiki weaving heterogeneous software artifacts
Good documentation beneļ¬ts every software development project, especially large ones, but it can be hard, costly, and tiresome to produce when not supported by appropriate tools...
Ademar Aguiar, Gabriel David
« Prev « First page 1906 / 2032 Last » Next »