Sciweavers

8655 search results - page 507 / 1731
» Challenges for Trusted Computing
Sort
View
156
Voted
APLAS
2011
ACM
14 years 4 months ago
Decentralized Delimited Release
Abstract. Decentralization is a major challenge for secure computing. In a decentralized setting, principals are free to distrust each other. The key challenge is to provide suppor...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
PERCOM
2008
ACM
16 years 4 months ago
On-demand Video Streaming in Mobile Opportunistic Networks
Providing on-demand video streaming services to large numbers of nodes in mobile wireless networks is a challenging task. We propose MOVi (Mobile Opportunistic Video-on-demand), a...
Hayoung Yoon, JongWon Kim, Feiselia Tan, Robert Hs...
DATE
2009
IEEE
107views Hardware» more  DATE 2009»
15 years 11 months ago
Learning early-stage platform dimensioning from late-stage timing verification
— Today's innovations in the automotive sector are, to a great extent, based on electronics. The increasing integration complexity and stringent cost reduction goals turn E/...
Kai Richter, Marek Jersak, Rolf Ernst
IAT
2007
IEEE
15 years 11 months ago
A Multi-Phase Protocol for Negotiation with Interdependent Issues
— Multi-issue negotiations are a central component of many important coordination challenges. Almost all previous work in this area has assumed that negotiation issues are indepe...
Hiromitsu Hattori, Mark Klein, Takayuki Ito
LCN
2006
IEEE
15 years 11 months ago
ROADNet: A network of SensorNets
As sensor networks become denser and more widely deployed, the potential develops for interconnecting these networks to combine datasets, share technological solutions, and to con...
Todd Hansen, Sameer Tilak, Steve Foley, Kent Lindq...