Sciweavers

8655 search results - page 1582 / 1731
» Challenges for Trusted Computing
Sort
View
138
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Asymmetry-Aware Real-Time Distributed Joint Resource Allocation in IEEE 802.22 WRANs
—In IEEE 802.22 Wireless Regional Area Networks (WRANs), each Base Station (BS) solves a complex resource allocation problem of simultaneously determining the channel to reuse, p...
Hyoil Kim, Kang G. Shin
128
Voted
MMS
2010
15 years 2 months ago
Asynchronous reflections: theory and practice in the design of multimedia mirror systems
-- In this paper, we present a theoretical framing of the functions of a mirror by breaking the synchrony between the state of a reference object and its reflection. This framing p...
Wei Zhang, Bo Begole, Maurice Chu
143
Voted
PUC
2010
87views more  PUC 2010»
15 years 2 months ago
Pursuing genius loci: interaction design and natural places
Human computer interaction (HCI) has little explored everyday life and enriching experiences in rural, wilderness and other predominantly ‘‘natural’’ places despite their s...
Nicola J. Bidwell, David Browning
116
Voted
PVLDB
2010
110views more  PVLDB 2010»
15 years 2 months ago
Read-Once Functions and Query Evaluation in Probabilistic Databases
Probabilistic databases hold promise of being a viable means for large-scale uncertainty management, increasingly needed in a number of real world applications domains. However, q...
Prithviraj Sen, Amol Deshpande, Lise Getoor
144
Voted
RAID
2010
Springer
15 years 2 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
« Prev « First page 1582 / 1731 Last » Next »