Sciweavers

38 search results - page 7 / 8
» Verifiable digital object identity system
Sort
View
SIGCOMM
2010
ACM
13 years 6 months ago
The case for active device drivers
We revisit the device-driver architecture supported by the majority of operating systems, where a driver is a passive object that does not have its own thread of control and is on...
Leonid Ryzhyk, Yanjin Zhu, Gernot Heiser
SOSP
2003
ACM
14 years 2 months ago
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement m...
Landon P. Cox, Brian D. Noble
SACMAT
2005
ACM
13 years 11 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SAC
2006
ACM
13 years 5 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
AUTOMATICA
2005
91views more  AUTOMATICA 2005»
13 years 5 months ago
Lyapunov-based continuous-time nonlinear controller redesign for sampled-data implementation
: Given a continuous-time controller and a Lyapunov function that shows global asymptotic stability for the closed loop system, we provide several results for modification of the c...
Dragan Nesic, Lars Grüne