Sciweavers

8655 search results - page 272 / 1731
» Challenges for Trusted Computing
Sort
View
123
Voted
PERCOM
2009
ACM
16 years 3 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
110
Voted
PERCOM
2004
ACM
16 years 2 months ago
PCOM - A Component System for Pervasive Computing
Applications in the Pervasive Computing domain are challenged by the dynamism in which their execution environment changes, e.g. due to user mobility. As a result, applications ha...
Christian Becker, Marcus Handte, Gregor Schiele, K...
127
Voted
DAWAK
2007
Springer
15 years 9 months ago
Computing Join Aggregates over Private Tables
We propose a privacy-preserving protocol for computing aggregation queries over the join of private tables. In this problem, several parties wish to share aggregated information ov...
Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu
IPPS
2006
IEEE
15 years 9 months ago
Multisite co-allocation algorithms for computational grid
Efficient multisite job scheduling facilitates the cooperation of multi-domain massively parallel processor systems in a computing grid environment. However, co-allocation, hetero...
Weizhe Zhang, A. M. K. Cheng, Mingzeng Hu
ARCS
2005
Springer
15 years 8 months ago
A File System for System Programming in Ubiquitous Computing
In Ubiquitous computing small embedded sensor and computing nodes are the main enabling technologies. System programming for such small embedded systems is a challenging task invol...
Christian Decker, Michael Beigl, Albert Krohn