Sciweavers

8655 search results - page 148 / 1731
» Challenges for Trusted Computing
Sort
View
NSPW
2006
ACM
15 years 4 months ago
Large-scale collection and sanitization of network security data: risks and challenges
Over the last several years, there has been an emerging interest in the development of widearea data collection and analysis centers to help identify, track, and formulate respons...
Phillip A. Porras, Vitaly Shmatikov
93
Voted
DEBS
2009
ACM
15 years 1 months ago
Event-based systems: opportunities and challenges at exascale
Streaming data models have been shown to be useful in many applications requiring high-performance data exchange. Application-level overlay networks are a natural way to realize t...
Greg Eisenhauer, Matthew Wolf, Hasan Abbasi, Karst...
ACSC
2005
IEEE
15 years 3 months ago
Dependable Dynamic Source Routing without a Trusted Third Party
Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These networks are formed with the help of t...
Asad Amir Pirzada, Chris McDonald, Amitava Datta
AINA
2011
IEEE
14 years 1 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor
APL
1992
ACM
15 years 2 months ago
Challenging the Mathematics Curriculum
Ready access to computing power through APL opens new avenues for mathematical experimentation and new strategies for developing concepts in the teaching of basic engineering math...
Walter G. Spunde