Sciweavers

372 search results - page 46 / 75
» Trade-Off Results for Connection Management
Sort
View
ICCD
2007
IEEE
152views Hardware» more  ICCD 2007»
15 years 3 months ago
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors
As application-specific instruction set processors (ASIPs) are being increasingly used in mobile embedded systems, the ubiquitous networking connections have exposed these systems...
Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi
IM
1997
15 years 1 months ago
The Hollowman: An Innovative ATM Control Architecture
The current implementation of out-of-band control in ATM networks inhibits their successful exploitation. The confusion in signalling protocols between application services and th...
Sean Rooney
SASN
2006
ACM
15 years 5 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...
LOBJET
2006
196views more  LOBJET 2006»
14 years 11 months ago
Mapping High-Level Business Rules To and Through Aspects
Many object-oriented software applications contain implicit business rules. Although there exist many approaches that advocate the separation of rules, the rules' connections ...
María Agustina Cibrán, Maja D'Hondt,...
NOMS
2008
IEEE
15 years 6 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi