Sciweavers

8278 search results - page 1446 / 1656
» Context-Aware Process Networks
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 10 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
ITCC
2005
IEEE
15 years 10 months ago
Semantic Grid - Interoperability Solution for Construction VO?
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows colla...
Ziga Turk, Matevz Dolenc, Vlado Stankovski, Etiel ...
LAWEB
2005
IEEE
15 years 10 months ago
Devices Descriptions for Context-Based Content Adaptation
Nowadays, networks can be accessed by multiple devices with different characteristics. Some of these characteristics such as low processing power and memory capacity restrict the ...
Robson Eisinger, Marcelo G. Manzato, Rudinei Goula...
MMM
2005
Springer
148views Multimedia» more  MMM 2005»
15 years 10 months ago
Paving the Last Mile for Multi-Channel Multimedia Presentation Generation
Users of multimedia applications today are equipped with a variety of different (mobile) devices that each come with different operating systems, memory and CPU capabilities, netw...
Ansgar Scherp, Susanne Boll
P2P
2005
IEEE
104views Communications» more  P2P 2005»
15 years 10 months ago
Range Queries in Trie-Structured Overlays
Among the open problems in P2P systems, support for non-trivial search predicates, standardized query languages, distributed query processing, query load balancing, and quality of...
Anwitaman Datta, Manfred Hauswirth, Renault John, ...
« Prev « First page 1446 / 1656 Last » Next »