Sciweavers

AIEDU
2005
68views more  AIEDU 2005»
13 years 4 months ago
Software Patterns in ITS Architectures
The paper discusses ITS architectures in terms of patterns that exist within them. The concept of patterns has received surprisingly little attention so far from researchers in the...
Vladan Devedzic, Andreas Harrer
IJCSA
2007
116views more  IJCSA 2007»
13 years 4 months ago
What Enterprise Architecture and Enterprise Systems Usage Can and Can not Tell about Each Other
—There is an increased awareness of the roles that enterprise architecture (EA) and enterprise systems (ES) play in today’s organizations. EA and ES usage maturity models are u...
Maya Daneva, Pascal van Eck
OSN
2008
97views more  OSN 2008»
13 years 4 months ago
Managing Layer 1 VPN services
Control Plane architectures enhance transport networks with distributed signaling and routing mechanisms which allow dynamic connection control. As a result, layer 1 switching net...
Neumar Malheiros, Edmundo Roberto Mauro Madeira, F...
FAC
2007
128views more  FAC 2007»
13 years 4 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
MONET
2008
150views more  MONET 2008»
13 years 4 months ago
A Multi-radio 802.11 Mesh Network Architecture
Routers equipped with multiple 802.11 radios can alleviate capacity problems in wireless mesh networks. However, a practical, complete system architecture that can realize the bene...
Krishna N. Ramachandran, Irfan Sheriff, Elizabeth ...
JPDC
2006
141views more  JPDC 2006»
13 years 4 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
ENTCS
2007
82views more  ENTCS 2007»
13 years 4 months ago
Web Interfaces for Proof Assistants
This article describes an architecture for creating responsive web interfaces for proof assistants. The architecture combines current web development technologies with the functio...
Cezary Kaliszyk
JEC
2006
100views more  JEC 2006»
13 years 4 months ago
RC-SIMD: Reconfigurable communication SIMD architecture for image processing applications
During the last two decades, Single Instruction Multiple Data (SIMD) processors have become important architectures in embedded systems for image processing applications. The main ...
Hamed Fatemi, Bart Mesman, Henk Corporaal, Twan Ba...
DSS
2007
112views more  DSS 2007»
13 years 4 months ago
Service-based P2P overlay network for collaborative problem solving
This paper describes a service-based P2P overlay network architecture to support a collaborative environment for solving complex business processes over the network. In the propos...
Sanjay Goel, Shashishekara S. Talya, Michael W. So...
JUCS
2008
129views more  JUCS 2008»
13 years 4 months ago
The Remote Control Approach - An Architecture for Adaptive Scripting across Collaborative Learning Environments
: In this article we present an architecture for the integration of tutoring approaches and process scaffolds into existing collaborative applications. The architecture allows to c...
Andreas Harrer, Nils Malzahn, Astrid Wichmann