Sciweavers

8655 search results - page 161 / 1731
» Challenges for Trusted Computing
Sort
View
72
Voted
CHI
2011
ACM
14 years 1 months ago
Home automation in the wild: challenges and opportunities
Visions of smart homes have long caught the attention of researchers and considerable effort has been put toward enabling home automation. However, these technologies have not bee...
A. J. Bernheim Brush, Bongshin Lee, Ratul Mahajan,...
85
Voted
ICPR
2004
IEEE
15 years 11 months ago
Biometrics: A Grand Challenge
Reliable person recognition is an important problem in diverse businesses. Biometrics, recognition based on distinctive personal traits, has the potential to become an irreplaceab...
Anil K. Jain, Sharath Pankanti, Salil Prabhakar, L...
100
Voted
WWW
2010
ACM
15 years 5 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
JHSN
2000
390views more  JHSN 2000»
14 years 10 months ago
Telemedicine: challenges and opportunities
Telemedicine is many things to many people. Only until a few years ago, telemedicine was equated to video teleconferencing between physicians, while nowadays, perhaps the most acti...
Sang-goo Lee, Seong K. Mun, Prakash Jha, Betty Ann...
P2P
2007
IEEE
139views Communications» more  P2P 2007»
15 years 4 months ago
A Trust-Based Exchange Framework for Multiple Services in P2P Systems
In this paper we propose fully distributed trustbased policies for p2p systems to regulate the exchange of different type of services and discourage misbehaviour. In a system of p...
Anna Satsiou, Leandros Tassiulas