Sciweavers

2229 search results - page 110 / 446
» Abstract Storage Devices
Sort
View
ERLANG
2006
ACM
15 years 10 months ago
Concurrent caching
A concurrent cache design is presented which allows cached data to be spread across a cluster of computers. The implementation s persistent storage from cache storage and abstract...
Jay Nelson
133
Voted
AINA
2006
IEEE
15 years 10 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
137
Voted
FDTC
2006
Springer
120views Cryptology» more  FDTC 2006»
15 years 8 months ago
Blinded Fault Resistant Exponentiation
As the core operation of many public key cryptosystems, group exponentiation is central to cryptography. Attacks on its implementation in embedded device setting is hence of great ...
Guillaume Fumaroli, David Vigilant
TIT
1998
139views more  TIT 1998»
15 years 4 months ago
Codes for Digital Recorders
—Constrained codes are a key component in the digital recording devices that have become ubiquitous in computer data storage and electronic entertainment applications. This paper...
Kees A. Schouhamer Immink, Paul H. Siegel, Jack K....
165
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
Modeling and Characterizing User Experience in a Cloud Server Based Mobile Gaming Approach
—With the evolution of mobile devices and networks, and the growing trend of mobile Internet access, rich, multi-player gaming using mobile devices, similar to PC-based Internet ...
Shaoxuan Wang, Sujit Dey