Sciweavers

5640 search results - page 138 / 1128
» The Primacy of Process Architecture
Sort
View
ACSAC
2002
IEEE
15 years 5 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
116
Voted
ICASSP
2009
IEEE
15 years 7 months ago
Layers and layer interfaces in wireless networks
This paper proposes an optimal architecture for wireless networks based on layers and layer interfaces. In the presence of fading the architecture is shown to be optimal. The resu...
Alejandro Ribeiro
DAC
1999
ACM
15 years 4 months ago
Application of High Level Interface-Based Design to Telecommunications System Hardware
The assumption in moving system modelling to higher levels is that this improves the design process by allowing exploration of the architecture, providing an unambiguous specifica...
Dyson Wilkes, M. M. Kamal Hashmi
98
Voted
SIGSOFT
2005
ACM
16 years 1 months ago
CHARMY: an extensible tool for architectural analysis
Charmy is a framework for designing and validating architectural specifications. In the early stages of the software development process, the Charmy framework assists the software...
Paola Inverardi, Henry Muccini, Patrizio Pelliccio...
76
Voted
ICRA
2007
IEEE
192views Robotics» more  ICRA 2007»
15 years 6 months ago
Control Architecture for Robot Cells to Enable Plug'n'Produce
- This paper deals with the concept of a control architecture for robot cells that enables Plug’n’Produce according to Plug’n’Play in the office world. To achieve this, a s...
Martin Naumann, Kai Wegener, Rolf Dieter Schraft