Sciweavers

8503 search results - page 322 / 1701
» Secure Software Architectures
Sort
View
CASES
2004
ACM
15 years 10 months ago
LNS architectures for embedded model predictive control processors
Jesus Garcia, Mark G. Arnold, Leonidas G. Bleris, ...
WICSA
2008
15 years 6 months ago
Understanding Architectural Assets
"The life of a software architect is a long and rapid succession of suboptimal design decisions taken partly in the dark." [1] The purpose of this paper is to shed some ...
Peter Eeles
COMSWARE
2007
IEEE
15 years 11 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
SAC
2006
ACM
15 years 11 months ago
STRUDEL: supporting trust in the dynamic establishment of peering coalitions
The Coalition Peering Domain (CPD) is a recent innovation within the field of mesh networking. It facilitates the management of community-area networks in a distributed and scala...
Daniele Quercia, Manish Lad, Stephen Hailes, Licia...