Sciweavers

2178 search results - page 248 / 436
» Toward Systemically Secure IT Architectures
Sort
View
126
Voted
EGC
2005
Springer
15 years 9 months ago
A Grid Architecture for Comfortable Robot Control
This paper describes a research project about robot control across a computing Grid, first step toward a Grid solution for generic process control. A computational Grid can signi...
Stéphane Vialle, Amelia De Vivo, Fabrice Sa...
151
Voted
WOWMOM
2009
ACM
146views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
When opportunity proceeds from autonomy: A tour-based architecture for disconnected mobile sensors
We consider the case of sparse mobile sensors deployed to implement missions in challenging environments. This paper explores a notion of tour networks that is well suited to circ...
Michel Charpentier, Radim Bartos, Swapnil Bhatia
117
Voted
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 2 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
IJNSEC
2006
200views more  IJNSEC 2006»
15 years 3 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
122
Voted
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
15 years 10 months ago
Geographically Distributed Enterprise Architecting: Towards a Theoretical Framework
Enterprise architecting is becoming critical for most modern organizations whose competitive strategies are tightly linked to the underlying information technology (IT) infrastruc...
J. Alberto Espinosa, Frank Armour