Sciweavers

304 search results - page 52 / 61
» Systematic Integration Between Requirements and Architecture
Sort
View
158
Voted
COMCOM
2008
104views more  COMCOM 2008»
15 years 3 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
DATE
2010
IEEE
153views Hardware» more  DATE 2010»
15 years 2 months ago
Heterogeneous vs homogeneous MPSoC approaches for a Mobile LTE modem
— Applications like 4G baseband modem require single-chip implementation to meet the integration and power consumption requirements. These applications demand a high computing pe...
Camille Jalier, Didier Lattard, Ahmed Amine Jerray...
148
Voted
LCTRTS
2009
Springer
15 years 10 months ago
Synergistic execution of stream programs on multicores with accelerators
The StreamIt programming model has been proposed to exploit parallelism in streaming applications on general purpose multicore architectures. The StreamIt graphs describe task, da...
Abhishek Udupa, R. Govindarajan, Matthew J. Thazhu...
137
Voted
ICSE
2004
IEEE-ACM
16 years 3 months ago
Concerning Predictability in Dependable Component-Based Systems: Classification of Quality Attributes
One of the main objectives of developing component-based software systems is to enable efficient building of systems through the integration of components. All component models def...
Ivica Crnkovic, Magnus Larsson, Otto Preiss
142
Voted
TRUST
2009
Springer
15 years 10 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi