Sciweavers

8503 search results - page 69 / 1701
» Secure Software Architectures
Sort
View
99
Voted
AGENTS
2000
Springer
15 years 7 months ago
Towards a fault-tolerant multi-agent system architecture
Multi-agent systems are prone to failures typical of any distributed system. Agents and resources may become unavailable due to machine crashes, communication breakdowns, process ...
Sanjeev Kumar, Philip R. Cohen
179
Voted
ANCS
2008
ACM
15 years 5 months ago
Low power architecture for high speed packet classification
Today's routers need to perform packet classification at wire speed in order to provide critical services such as traffic billing, priority routing and blocking unwanted Inte...
Alan Kennedy, Xiaojun Wang, Zhen Liu, Bin Liu
ACSAC
2003
IEEE
15 years 8 months ago
How to unwittingly sign non-repudiable documents with Java applications
Digital signatures allow us to produce documents whose integrity and authenticity, as we generated them, is verifiable by anybody who has access to our public key. Furthermore, w...
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
103
Voted
DAC
1999
ACM
15 years 7 months ago
System-Level Hardware/Software Trade-offs
Samuel P. Harbison
93
Voted
SIGSOFT
2003
ACM
16 years 4 months ago
Composing architectural styles from architectural primitives
Nikunj R. Mehta, Nenad Medvidovic