Sciweavers

356 search results - page 2 / 72
» Evolutionary Computing and Autonomic Computing: Shared Probl...
Sort
View
CCS
2006
ACM
13 years 9 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
ICAC
2009
IEEE
14 years 2 days ago
Applying genetic algorithms to decision making in autonomic computing systems
Increasingly, applications need to be able to self-reconfigure in response to changing requirements and environmental conditions. Autonomic computing has been proposed as a means...
Andres J. Ramirez, David B. Knoester, Betty H. C. ...
IFIP
2009
Springer
13 years 3 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan
MM
2006
ACM
122views Multimedia» more  MM 2006»
13 years 11 months ago
Human computing for interactive digital media
Widespread adoption of interactive, peer-to-peer digital media will require a solution to the Privacy, Sharing, and Interest (PSI) problem: how can we know what the user wants to ...
Alex Pentland, Jonathan Gips, Wen Dong, Will Stolt...
SPDP
1993
IEEE
13 years 9 months ago
How to Share an Object: A Fast Timing-Based Solution
We consider the problem of transforming a given sequential implementation of a data structure into a wait-free concurrent implementation. Given the code for different operations ...
Rajeev Alur, Gadi Taubenfeld