Sciweavers

8655 search results - page 206 / 1731
» Challenges for Trusted Computing
Sort
View
SAC
2009
ACM
15 years 5 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
ATAL
2004
Springer
15 years 4 months ago
RDS: Remote Distributed Scheme for Protecting Mobile Agents
As of today no solely software-based solution that a priori protects the computation of any mobile code and/or mobile agent was presented. Furthermore, Algesheimer et al. [1], arg...
Asnat Dadon-Elichai
WMTE
2002
IEEE
15 years 3 months ago
A Concept Mapping Tool for Pocket PC Computers
We describe the implementation and evaluation of a concept mapping tool for Pocket PC computers. The paper addresses challenges associated with developing a learning tool for hand...
Tony Chan, Mike Sharples
COMPGEOM
2007
ACM
15 years 2 months ago
Distributed computation of virtual coordinates
Sensor networks are emerging as a paradigm for future computing, but pose a number of challenges in the fields of networking and distributed computation. One challenge is to devis...
Mirela Ben-Chen, Craig Gotsman, Camille Wormser
PLDI
2010
ACM
15 years 2 months ago
Bringing Extensibility to Verified Compilers
Verified compilers, such as Leroy's CompCert, are accompanied by a fully checked correctness proof. Both the compiler and proof are often constructed with an interactive proo...
Zachary Tatlock, Sorin Lerner