Sciweavers

2178 search results - page 168 / 436
» Toward Systemically Secure IT Architectures
Sort
View
OOPSLA
1990
Springer
14 years 1 months ago
A Framework for Visualizing Object-Oriented Systems
This paper describes a new approach to visualizing program systems within the object-oriented paradigm. This approach is based on a TEX-like notation which has been extended and g...
Volker Haarslev, Ralf Möller
EUROPLOP
2006
13 years 10 months ago
Patterns for Adaptive Service-Centric Systems
Service-centric systems are driven more and more towards self-adaptation in order to satisfy QoS in highly dynamic environments. However, the young age and immaturity of this doma...
Paris Avgeriou
CIDR
2003
134views Algorithms» more  CIDR 2003»
13 years 10 months ago
Approximate Range Selection Queries in Peer-to-Peer Systems
We present an architecture for a data sharing peer-to-peer system where the data is shared in the form of database relations. In general, peer-to-peer systems try to locate exactm...
Abhishek Gupta, Divyakant Agrawal, Amr El Abbadi
HICSS
1996
IEEE
136views Biometrics» more  HICSS 1996»
14 years 1 months ago
Design of a Real-Time Co-Operating System for Multiprocessor Workstations
: We have designed a Real-Time Co-Operating System (RTCOS) for simultaneously supporting real-time and non-real-time activities on a workstation with two or more processors. The RT...
Gebran Krikor, Md. Touhidur Raza, David B. Stewart
TC
2008
13 years 9 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...