Sciweavers

1530 search results - page 212 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
109
Voted
MOBISYS
2008
ACM
15 years 11 months ago
Sherlock: automatically locating objects for humans
Over the course of a day a human interacts with tens or hundreds of individual objects. Many of these articles are nomadic, relying on human memory to manually index, inventory, o...
Aditya Nemmaluri, Mark D. Corner, Prashant J. Shen...
ICS
2003
Tsinghua U.
15 years 5 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
DAGSTUHL
2006
15 years 1 months ago
A Model-Based Approach To Requirements Analysis
A major task in designing systems development is the systematic elaboration of functional system requirements and their integration into the environment of the overall technical s...
Bernhard Schätz, Eva Geisberger, Johannes Gr&...
FAST
2009
14 years 9 months ago
PARDA: Proportional Allocation of Resources for Distributed Storage Access
Rapid adoption of virtualization technologies has led to increased utilization of physical resources, which are multiplexed among numerous workloads with varying demands and impor...
Ajay Gulati, Irfan Ahmad, Carl A. Waldspurger
CIKM
2000
Springer
15 years 4 months ago
Extending OLAP Querying to External Object Databases
On-Line Analytical Processing (OLAP) systems based on a multidimensional view of data have found widespread use in business applications and are being used increasingly in non-sta...
Torben Bach Pedersen, Arie Shoshani, Junmin Gu, Ch...