Sciweavers

8655 search results - page 119 / 1731
» Challenges for Trusted Computing
Sort
View
CHI
2004
ACM
16 years 3 months ago
Evaluating interactive information retrieval systems: opportunities and challenges
Information retrieval or search plays an important role in a wide range of information management and electronic commerce tasks. In spite of the importance of information retrieva...
Nicholas J. Belkin, Susan T. Dumais, Jean Scholtz,...
124
Voted
ICITA
2005
IEEE
15 years 8 months ago
Specknets: New Challenges for Wireless Communication Protocols
Speckled Computing [1] is an emerging technology in which data will be sensed and processed in small (around 5X5 sq. millimeter) semiconductor grains called Specks. A dense and no...
Kai Juan Wong, D. K. Arvind
CCR
2010
196views more  CCR 2010»
15 years 17 days ago
OFDMA in the field: current and future challenges
OFDMA will be the predominant technology for the air interface of broadband mobile wireless systems for the next decades. In recent years, OFDMA-based networks based on IEEE 802.1...
Andreas Maeder, Nader Zein
TGC
2007
Springer
15 years 9 months ago
Access Control Based on Code Identity for Open Distributed Systems
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
Andrew Cirillo, James Riely
FC
2005
Springer
80views Cryptology» more  FC 2005»
15 years 8 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos