Sciweavers

2204 search results - page 180 / 441
» Analyzing architectural styles
Sort
View
99
Voted
WS
2005
ACM
15 years 6 months ago
The security of vehicular networks
Vehicular networks are likely to become the most relevant form of ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis ...
Jean-Pierre Hubaux
121
Voted
ECAL
2005
Springer
15 years 6 months ago
(Co)Evolution of (De)Centralized Neural Control for a Gravitationally Driven Machine
Using decentralized control structures for robot control can offer a lot of advantages, such as less complexity, better fault tolerance and more flexibility. In this paper the ev...
Steffen Wischmann, Martin Hülse, Frank Pasema...
112
Voted
WSTFEUS
2003
IEEE
15 years 6 months ago
Error Resilient Video Transmission over Wireless Networks
— An error resilient architecture for video transmission over mobile wireless networks is presented. Radio link layer, transport layer, and application layer are combined to deal...
Gang Ding, Halima Ghafoor, Bharat K. Bhargava
109
Voted
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
15 years 5 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
104
Voted
VLDB
1994
ACM
133views Database» more  VLDB 1994»
15 years 5 months ago
Composite Events for Active Databases: Semantics, Contexts and Detection
Making a database system active entails developing an expressive event specification language with well-defined semantics, algorithms for the detection of composite events, and an...
Sharma Chakravarthy, V. Krishnaprasad, Eman Anwar,...