Sciweavers

8655 search results - page 257 / 1731
» Challenges for Trusted Computing
Sort
View
SIGUCCS
2003
ACM
15 years 8 months ago
Computing labs and technology classroom (CLTC) initiative: a model for distributed support
DePauw University is a small, liberal arts institution with 2200 undergraduate residential students and 222 faculty members, located in Greencastle, Indiana. The challenges of sup...
Lynda S. LaRoche, Julianne M. Miranda, Angela P. S...
EDBT
2012
ACM
395views Database» more  EDBT 2012»
13 years 5 months ago
Data management with SAPs in-memory computing engine
We present some architectural and technological insights on SAP’s HANA database and derive research challenges for future enterprise application development. The HANA database m...
Joos-Hendrik Boese, Cafer Tosun, Christian Mathis,...
WWW
2004
ACM
16 years 3 months ago
CS AKTive space: representing computer science in the semantic web
We present a Semantic Web application that we call CS AKTive Space1 . The application exploits a wide range of semantically heterogeneous and distributed content relating to Compu...
Monica M. C. Schraefel, Nigel R. Shadbolt, Nichola...
PROVSEC
2007
Springer
15 years 9 months ago
Practical Threshold Signatures Without Random Oracles
We propose a secure threshold signature scheme without trusted dealer. Our construction is based on the recently proposed signature scheme of Waters in EUROCRYPT’05. The new thre...
Jin Li, Tsz Hon Yuen, Kwangjo Kim
COLCOM
2005
IEEE
15 years 8 months ago
SLACER: randomness to cooperation in peer-to-peer networks
Peer-to-peer applications can benefit from human friendship networks (e.g., e-mail contacts or instant message buddy lists). However these are not always available. We propose an...
David Hales, Stefano Arteconi, Özalp Babaoglu