Sciweavers

1564 search results - page 86 / 313
» The STEP Modular Architecture
Sort
View
TC
2008
13 years 7 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...
EWSA
2005
Springer
14 years 1 months ago
The Decision View of Software Architecture
Abstract. Documenting software architectures is a key aspect to achieve success when communicating the architecture to different stakeholders. Several architectural views have been...
Juan C. Dueñas, Rafael Capilla
APSEC
2004
IEEE
13 years 11 months ago
JCMP: Linking Architecture with Component Building
Approaches to enforcing communication integrity in the implementation, exemplified by ArchJava, consider only architectural constraints, without taking into account the late integ...
Guoqing Xu, Zongyuan Yang, Haitao Huang
IMCSIT
2010
13 years 5 months ago
Software and hardware in the loop component for an IEC 61850 Co-Simulation platform
The deployment of IEC61850 standard in the world of substation automation system brings to the use of specific strategies for architecture testing. To validate IEC61850 architectur...
Haffar Mohamad, Thiriet Jean Marc
OOPSLA
2004
Springer
14 years 1 months ago
Resolving feature convolution in middleware systems
Middleware provides simplicity and uniformity for the development of distributed applications. However, the modularity of the architecture of middleware is starting to disintegrat...
Charles Zhang, Hans-Arno Jacobsen