Sciweavers

690 search results - page 68 / 138
» Extended Software Architecture Based on Security Patterns
Sort
View
131
Voted
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 4 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
TC
2010
14 years 10 months ago
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and Montgomery modular reduction. The algorithms are simple and especially suitable ...
Miroslav Knezevic, Frederik Vercauteren, Ingrid Ve...
126
Voted
IAT
2005
IEEE
15 years 9 months ago
Conversation Pattern-based Anticipation of Teammates' Information Needs via Overhearing
One research focus of human-centered teamwork is on advanced decision architectures that can help people make effective and timely decisions. This requires distributed team member...
Xiaocong Fan, John Yen
WWW
2004
ACM
16 years 4 months ago
A web services architecture for learning object discovery and assembly
Courseware systems are often based on an assembly of different components, addressing the different needs of storage and delivery functionality. The Learning Technology Standard A...
Claus Pahl, Ronan Barrett
116
Voted
ACSAC
2006
IEEE
15 years 10 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg