Sciweavers

8655 search results - page 459 / 1731
» Challenges for Trusted Computing
Sort
View
NCA
2006
IEEE
15 years 10 months ago
Network-Aware Adaptation Techniques for Mobile File Systems
Wireless networks present unusual challenges for mobile file system clients, since they are characterised by unpredictable connectivity and widely-varying bandwidth. The traditio...
Benjamin Atkin, Kenneth P. Birman
DAC
2006
ACM
15 years 10 months ago
How will the fabless model survive?
The fabless model was traditionally enabled through clean interfaces – both in technical and business terms – between foundries and fabless semiconductor companies. However, w...
Thomas Hartung, Jim Kupec, Ana Hunter, Brad Paulse...
MICCAI
2010
Springer
15 years 10 months ago
  A Fully Automated Approach to Segmentation of Irregularly Shaped Cellular Structures in EM Images
While there has been substantial progress in segmenting natural im- ages, state-of-the-art methods that perform well in such tasks unfortunately tend to underperform ...
A. Lucchi, K. Smith, R. Achanta, V. Lepetit, P. Fu...
ICT
2004
Springer
158views Communications» more  ICT 2004»
15 years 10 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...
SDMW
2004
Springer
15 years 9 months ago
Secure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, ...
Ping Lin, K. Selçuk Candan