Sciweavers

16 search results - page 1 / 4
» Trustworthy Computing under Resource Constraints with the DO...
Sort
View
TDSC
2008
125views more  TDSC 2008»
13 years 4 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
GLOBECOM
2006
IEEE
13 years 11 months ago
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies
Abstract— For many evolving application scenarios like ubiquitous and autonomic computing systems, trustworthy computing solutions are essential. However the fact that the autono...
Mahalingam Ramkumar
GLOBECOM
2006
IEEE
13 years 11 months ago
Adaptive Learning of Transmission Control Policies for MIMO Fading Channels under Delay Constraint
— This paper addresses learning based adaptive resource allocation for wireless MIMO channels with Markovian fading. The problem is posed as Constrained Markov Decision Process w...
Dejan V. Djonin, Vikram Krishnamurthy
TELSYS
2008
85views more  TELSYS 2008»
13 years 4 months ago
Trustworthy Web services provisioning for differentiated customer services
With the number of e-Business applications dramatically increasing, a service level agreement (SLA) will play an important part in Web services. The SLA is a combination of severa...
Kaiqi Xiong, Harry G. Perros
INFOCOM
2006
IEEE
13 years 11 months ago
Policy-Based Resource Management and Service Provisioning in GMPLS Networks
— Emerging network applications tend to be built over heterogeneous network resources spanning multiple management domains. Many such applications have dynamic demands for dedica...
Xi Yang, Tom Lehman, Chris Tracy, Jerry Sobieski, ...