Sciweavers

1530 search results - page 212 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
146
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Sherlock: automatically locating objects for humans
Over the course of a day a human interacts with tens or hundreds of individual objects. Many of these articles are nomadic, relying on human memory to manually index, inventory, o...
Aditya Nemmaluri, Mark D. Corner, Prashant J. Shen...
138
Voted
ICS
2003
Tsinghua U.
15 years 8 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
120
Voted
DAGSTUHL
2006
15 years 4 months ago
A Model-Based Approach To Requirements Analysis
A major task in designing systems development is the systematic elaboration of functional system requirements and their integration into the environment of the overall technical s...
Bernhard Schätz, Eva Geisberger, Johannes Gr&...
157
Voted
FAST
2009
15 years 1 months ago
PARDA: Proportional Allocation of Resources for Distributed Storage Access
Rapid adoption of virtualization technologies has led to increased utilization of physical resources, which are multiplexed among numerous workloads with varying demands and impor...
Ajay Gulati, Irfan Ahmad, Carl A. Waldspurger
161
Voted
CIKM
2000
Springer
15 years 7 months ago
Extending OLAP Querying to External Object Databases
On-Line Analytical Processing (OLAP) systems based on a multidimensional view of data have found widespread use in business applications and are being used increasingly in non-sta...
Torben Bach Pedersen, Arie Shoshani, Junmin Gu, Ch...