Sciweavers

8655 search results - page 467 / 1731
» Challenges for Trusted Computing
Sort
View
CHI
2007
ACM
16 years 4 months ago
Home networking and HCI: what hath god wrought?
For much of the industrialized world, network connectivity in the home is commonplace. Despite the large number of networked homes, even the most technically savvy people can have...
Erika Shehan, W. Keith Edwards
IPPS
2006
IEEE
15 years 10 months ago
Grid solutions for biological and physical cross-site simulations on the TeraGrid
Computational grids and grid middleware offer unprecedented computational power and storage capacity, and thus, have opened the possibility of solving problems that were previousl...
Suchuan Dong, Nicholas T. Karonis, George E. Karni...
158
Voted
IWEC
2004
15 years 5 months ago
TEAM: The Team-Oriented Evolutionary Adaptability Mechanism
Many commercial computer games allow a team of players to match their skills against another team, controlled by humans or by the computer. Most players prefer human opponents, sin...
Sander Bakkes, Pieter Spronck, Eric O. Postma
WWW
2005
ACM
16 years 5 months ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
SPAA
2009
ACM
16 years 5 months ago
The weakest failure detector for wait-free dining under eventual weak exclusion
Dining philosophers is a classic scheduling problem for local mutual exclusion on arbitrary conflict graphs. We establish necessary conditions to solve wait-free dining under even...
Srikanth Sastry, Scott M. Pike, Jennifer L. Welch