Sciweavers

58 search results - page 9 / 12
» Developing the extended enterprise with the FADEE
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
MIDDLEWARE
2001
Springer
15 years 2 months ago
An Efficient Component Model for the Construction of Adaptive Middleware
Middleware has emerged as an important architectural component in modern distributed systems. Most recently, industry has witnessed the emergence of component-based middleware pla...
Michael Clarke, Gordon S. Blair, Geoff Coulson, Ni...
ICDCSW
2007
IEEE
15 years 4 months ago
Exploiting Gossip for Self-Management in Scalable Event Notification Systems
1 Challenges of scale have limited the development of event notification systems with strong properties, despite the urgent demand for consistency, reliability, security, and other...
Ken Birman, Anne-Marie Kermarrec, Krzysztof Ostrow...
ECOOP
2004
Springer
15 years 3 months ago
Parametric Aspects: A Proposal
Abstract. Aspect-Oriented Software Development (AOSD) provides better design solutions to problems where Object Oriented Development produces tangled and scattered designs. Neverth...
Jordi Alvarez Canal
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 4 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang