Sciweavers

8655 search results - page 170 / 1731
» Challenges for Trusted Computing
Sort
View
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 4 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
SIAMSC
2008
191views more  SIAMSC 2008»
15 years 3 months ago
ORBIT: Optimization by Radial Basis Function Interpolation in Trust-Regions
Abstract. We present a new derivative-free algorithm, ORBIT, for unconstrained local optimization of computationally expensive functions. A trust-region framework using interpolati...
Stefan M. Wild, Rommel G. Regis, Christine A. Shoe...
QSHINE
2009
IEEE
15 years 9 months ago
Revisiting a QoE Assessment Architecture Six Years Later: Lessons Learned and Remaining Challenges
In 2003, we presented an architecture for a streaming video quality assessment system [1]. Six years later, many of the challenges outlined in that paper remain. This paper revisit...
Amy Csizmar Dalal
ICSNC
2007
IEEE
15 years 9 months ago
Programming Approaches and Challenges for Wireless Sensor Networks
Wireless sensor networks (WSNs) constitute a new pervasive and ubiquitous technology. They have been successfully used in various application areas and in future computing environ...
Bartolomé Rubio, Manuel Díaz, Jos&ea...
DAC
2001
ACM
16 years 4 months ago
Future Performance Challenges in Nanometer Design
We highlight several fundamental challenges to designing highperformance integrated circuits in nanometer-scale technologies (i.e. drawn feature sizes < 100 nm). Dynamic power ...
Dennis Sylvester, Himanshu Kaul