Sciweavers

304 search results - page 52 / 61
» Systematic Integration Between Requirements and Architecture
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
13 years 7 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
DATE
2010
IEEE
153views Hardware» more  DATE 2010»
13 years 6 months ago
Heterogeneous vs homogeneous MPSoC approaches for a Mobile LTE modem
— Applications like 4G baseband modem require single-chip implementation to meet the integration and power consumption requirements. These applications demand a high computing pe...
Camille Jalier, Didier Lattard, Ahmed Amine Jerray...
LCTRTS
2009
Springer
14 years 2 months ago
Synergistic execution of stream programs on multicores with accelerators
The StreamIt programming model has been proposed to exploit parallelism in streaming applications on general purpose multicore architectures. The StreamIt graphs describe task, da...
Abhishek Udupa, R. Govindarajan, Matthew J. Thazhu...
ICSE
2004
IEEE-ACM
14 years 8 months ago
Concerning Predictability in Dependable Component-Based Systems: Classification of Quality Attributes
One of the main objectives of developing component-based software systems is to enable efficient building of systems through the integration of components. All component models def...
Ivica Crnkovic, Magnus Larsson, Otto Preiss
TRUST
2009
Springer
14 years 2 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi