Sciweavers

4287 search results - page 679 / 858
» Assessing Architectural Complexity
Sort
View
WISEC
2010
ACM
15 years 12 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
PDP
2010
IEEE
15 years 12 months ago
Trusted Interaction Patterns in Large-scale Enterprise Service Networks
Abstract—The evolution towards cross-organizational collaboration and interaction patterns has led to the emergence of scalable, Web services-based composition infrastructures. T...
Florian Skopik, Daniel Schall, Schahram Dustdar
CCGRID
2009
IEEE
15 years 11 months ago
Multicast Trees for Collaborative Applications
—Current implementations of real-time collaborative applications rely on a dedicated infrastructure to carry out all synchronizing and communication functions, and require all en...
Krzysztof Rzadca, Jackson Tan Teck Yong, Anwitaman...
COMPSAC
2009
IEEE
15 years 11 months ago
The Design and Implementation of a Bare PC Email Server
— This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing sta...
George H. Ford Jr., Ramesh K. Karne, Alexander L. ...
DATE
2009
IEEE
86views Hardware» more  DATE 2009»
15 years 11 months ago
A formal approach to design space exploration of protocol converters
In the field of chip design, hardware module reuse is a standard solution to the increasing complexity of chip architecture and the pressures to reduce time to market. In the abs...
Karin Avnit, Arcot Sowmya