Sciweavers

577 search results - page 93 / 116
» Engineering Sufficiently Secure Computing
Sort
View
WAN
1998
Springer
15 years 1 months ago
The NRW Metacomputing Initiative
In this paper the Northrhine-Westphalian metacomputing initiative is described. We start by discussing various general aspects of metacomputing and explain the reasons for founding...
Uwe Schwiegelshohn, Ramin Yahyapour
CSE
2009
IEEE
15 years 4 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi
ACSC
2006
IEEE
15 years 3 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
SAC
2006
ACM
15 years 3 months ago
STRUDEL: supporting trust in the dynamic establishment of peering coalitions
The Coalition Peering Domain (CPD) is a recent innovation within the field of mesh networking. It facilitates the management of community-area networks in a distributed and scala...
Daniele Quercia, Manish Lad, Stephen Hailes, Licia...
MUM
2005
ACM
138views Multimedia» more  MUM 2005»
15 years 3 months ago
Group-based content push with dynamic session startup
This paper proposes an intelligent mobile middleware utilizing group-based content push with dynamic session startup and plugand-play features. Solution enhances the distribution ...
Otso Kassinen, Timo Koskela, Erkki Harjula, Jussi ...