Sciweavers

3341 search results - page 434 / 669
» A Communication Virtual Machine
Sort
View
ESORICS
2003
Springer
15 years 10 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
ICICS
2003
Springer
15 years 10 months ago
A Novel Two-Level Trust Model for Grid
Abstract. Trust is hard to establish in a service-oriented grid architecture because of the need to support end user single sign-on and dynamic transient service. In order to enhan...
Tieyan Li, Huafei Zhu, Kwok-Yan Lam
ICOIN
2003
Springer
15 years 10 months ago
Personal Server Model for Real-Space Networking
As the Internet population grows, not only computers but household electric appliances, such as VCRs and a refrigerators, will become connected to a network. The demand of connecti...
Shirou Wakayama, Yuusuke Kawakita, Mitsunobu Mitsu...
DATE
2002
IEEE
146views Hardware» more  DATE 2002»
15 years 9 months ago
Automatic Generation of Fast Timed Simulation Models for Operating Systems in SoC Design
To enable fast and accurate evaluation of HW/SW implementation choices of on-chip communication, we present a method to automatically generate timed OS simulation models. The meth...
Sungjoo Yoo, Gabriela Nicolescu, Lovic Gauthier, A...
CSE
2009
IEEE
15 years 9 months ago
Social Learning Applications in Resource Constrained Networks
Efficient design of social networking applications must take account of two guiding principles: the adaptive processes by which humans learn and spread new information, and the co...
Ali Saidi, Mahesh V. Tripunitara, Mojdeh Mohtashem...