Sciweavers

7596 search results - page 140 / 1520
» Challenges in forensic computing
Sort
View
117
Voted
DEXAW
2004
IEEE
124views Database» more  DEXAW 2004»
15 years 7 months ago
PAC-MEN: Personal Autonomic Computing Monitoring Environment
The overall goal of this research is to improve the `environment awareness' aspect of personal autonomic computing. Personal Computing offers unique challenges for self-manag...
Roy Sterritt, David F. Bantz
124
Voted
ICCS
2009
Springer
15 years 10 months ago
The New Computational and Data Sciences Undergraduate Program at George Mason University
We describe the new undergraduate science degree program in Computational and Data Sciences (CDS) at George Mason University (Mason), which began offering courses for both major (...
Kirk D. Borne, John Wallin, Robert Weigel
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 9 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
114
Voted
DEXAW
2003
IEEE
131views Database» more  DEXAW 2003»
15 years 8 months ago
Privacy and Trusted Computing
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user ...
Juan Manuel González Nieto, Ed Dawson, Eiji...
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 4 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena