Sciweavers

8655 search results - page 119 / 1731
» Challenges for Trusted Computing
Sort
View
CHI
2004
ACM
15 years 10 months ago
Evaluating interactive information retrieval systems: opportunities and challenges
Information retrieval or search plays an important role in a wide range of information management and electronic commerce tasks. In spite of the importance of information retrieva...
Nicholas J. Belkin, Susan T. Dumais, Jean Scholtz,...
ICITA
2005
IEEE
15 years 3 months ago
Specknets: New Challenges for Wireless Communication Protocols
Speckled Computing [1] is an emerging technology in which data will be sensed and processed in small (around 5X5 sq. millimeter) semiconductor grains called Specks. A dense and no...
Kai Juan Wong, D. K. Arvind
CCR
2010
196views more  CCR 2010»
14 years 7 months ago
OFDMA in the field: current and future challenges
OFDMA will be the predominant technology for the air interface of broadband mobile wireless systems for the next decades. In recent years, OFDMA-based networks based on IEEE 802.1...
Andreas Maeder, Nader Zein
TGC
2007
Springer
15 years 4 months ago
Access Control Based on Code Identity for Open Distributed Systems
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
Andrew Cirillo, James Riely
FC
2005
Springer
80views Cryptology» more  FC 2005»
15 years 3 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos