Sciweavers

657 search results - page 40 / 132
» Recovering architectural assumptions
Sort
View
ITIIS
2008
128views more  ITIIS 2008»
14 years 12 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
CORR
2011
Springer
181views Education» more  CORR 2011»
14 years 7 months ago
Lightweight Service Oriented Architecture for Pervasive Computing
Pervasive computing appears like a new computing era based on networks of objects and devices evolving in a real world, radically different from distributed computing, based on ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
VLSID
2004
IEEE
117views VLSI» more  VLSID 2004»
16 years 8 days ago
Evaluating the Reliability of Defect-Tolerant Architectures for Nanotechnology with Probabilistic Model Checking
As we move from deep submicron technology to nanotechnology for device manufacture, the need for defect-tolerant architectures is gaining importance. This is because, at the nanos...
Gethin Norman, David Parker, Marta Z. Kwiatkowska,...
ICSE
1995
IEEE-ACM
15 years 3 months ago
Architectural Mismatch or Why It's Hard to Build Systems Out Of Existing Parts
Many would argue that future breakthroughs in software productivity will dependon our ability to combine existing pieces of software to produce new applications. An important step...
David Garlan, Robert Allen, John Ockerbloom
CCS
2007
ACM
15 years 6 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...