Sciweavers

8655 search results - page 398 / 1731
» Challenges for Trusted Computing
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 9 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
GROUP
2005
ACM
15 years 9 months ago
Timing in the art of integration: 'that's how the bastille got stormed'
This paper uses a long term ethnographic study of the design and implementation of an electronic patient records (EPR) system in a UK hospital Trust to consider issues arising in ...
David Martin, Mark Rouncefield, Jacki O'Neill, Mar...
ISI
2005
Springer
15 years 9 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
MHCI
2005
Springer
15 years 9 months ago
ContextContacts: re-designing SmartPhone's contact book to support mobile awareness and collaboration
Acontextuality of the mobile phone often leads to a caller’s uncertainty over a callee’s current state, which in turn often hampers mobile collaboration. We are interested in ...
Antti Oulasvirta, Mika Raento, Sauli Tiitta
SSS
2005
Springer
15 years 9 months ago
Memory Management for Self-stabilizing Operating Systems
This work presents several approaches for designing the memory management component of self stabilizing operating systems. We state the requirements which a memory manager should ...
Shlomi Dolev, Reuven Yagel