Sciweavers

1151 search results - page 195 / 231
» A Design Requirements Framework for Mobile Learning Environm...
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
ACMDIS
2006
ACM
15 years 5 months ago
Supporting ethnographic studies of ubiquitous computing in the wild
Ethnography has become a staple feature of IT research over the last twenty years, shaping our understanding of the social character of computing systems and informing their desig...
Andy Crabtree, Steve Benford, Chris Greenhalgh, Pa...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 1 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
TRIDENTCOM
2010
IEEE
14 years 9 months ago
COMCON: Use Cases for Virtual Future Networks
Abstract-- It is expected from a Future Internet that a multitude of networks will coexist and complement each other. Such environment allows to run specialized networks possibly p...
Daniel Schlosser, Marco Hoffmann, Tobias Hoß...
PERCOM
2004
ACM
15 years 11 months ago
Pervasive Enablement of Business Processes
People are an important part of many business processes. Current workflow-based implementations of business processes constrain users to the desktop environment; require them to p...
Dipanjan Chakraborty, Hui Lei