Sciweavers

8503 search results - page 314 / 1701
» Secure Software Architectures
Sort
View
145
Voted
GI
2001
Springer
15 years 9 months ago
Building ALL-IP Based Virtual Private Networks in Mobile Environment
Security mechanisms such as firewalls commonly deployed throughout the Internet present serious obstacles to basic usage of Mobile IP. In this paper we describe how IP security me...
Reinhard Ruppelt, Andrei Pelinescu, Cristian Const...
138
Voted
JSW
2007
151views more  JSW 2007»
15 years 5 months ago
Architecture Potential Analysis: A Closer Look inside Architecture Evaluation
— The share of software in embedded systems has been growing permanently in the recent years. Thus, software architecture as well as its evaluation have become important parts of...
Bastian Florentz, Michaela Huhn
161
Voted
CASES
2006
ACM
15 years 8 months ago
Efficient architectures through application clustering and architectural heterogeneity
Customizing architectures for particular applications is a promising approach to yield highly energy-efficient designs for embedded systems. This work explores the benefits of arc...
Lukasz Strozek, David Brooks
123
Voted
KBSE
2008
IEEE
15 years 11 months ago
ADDSS: Architecture Design Decision Support System Tool
This paper describes the ADDSS tool which enables capturing and documenting architectural design decisions in order to avoid knowledge vaporization.
Rafael Capilla, Francisco Nava, Jesus Montes, Carl...
ICSE
2000
IEEE-ACM
15 years 8 months ago
Dragonfly: linking conceptual and implementation architectures of multiuser interactive systems
Software architecture styles for developing multiuser applications are usually defined at a conceptual level, abstracting such low-level issues of distributed implementation as co...
Gary E. Anderson, T. C. Nicholas Graham, Timothy N...