Sciweavers

243 search results - page 31 / 49
» Communication under Strong Asynchronism
Sort
View
CCS
2007
ACM
15 years 6 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
DSN
2007
IEEE
15 years 6 months ago
On the Cost of Modularity in Atomic Broadcast
Modularity is a desirable property of complex software systems, since it simplifies code reuse, verification, maintenance, etc. However, the use of loosely coupled modules intro...
Olivier Rütti, Sergio Mena, Richard Ekwall, A...
100
Voted
ESORICS
2003
Springer
15 years 5 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
81
Voted
CORR
2008
Springer
103views Education» more  CORR 2008»
15 years 17 days ago
Path Loss Exponent Estimation in Large Wireless Networks
In wireless channels, the path loss exponent (PLE) has a strong impact on the quality of the links, and hence, it needs to be accurately estimated for the efficient design and oper...
Sunil Srinivasa, Martin Haenggi
91
Voted
PRESENCE
2002
113views more  PRESENCE 2002»
15 years 3 days ago
"It/I": A Theater Play Featuring an Autonomous Computer Character
"It / I" is a two-character theater play where the human character I (played by a real actor) is taunted and played with by an autonomous computer character It on a comp...
Claudio S. Pinhanez, Aaron F. Bobick