Sciweavers

514 search results - page 44 / 103
» Flexible OS Support and Applications for Trusted Computing
Sort
View
DAC
1999
ACM
15 years 5 months ago
Distributed Application Development with Inferno
Distributed computing has taken a new importance in order to meet the requirements of users demanding information “anytime, anywhere.” Inferno facilitates the creation and sup...
Ravi Sharma
ICCSA
2004
Springer
15 years 6 months ago
A Market-Based Scheduler for JXTA-Based Peer-to-Peer Computing System
Peer-to-Peer (P2P) computing is said to be the next wave of computing after client-server and web-based computing. It provides an opportunity to harness a lot of idle peer-resource...
Tan Tien Ping, Gian Chand Sodhy, Chan Huah Yong, F...
HPCA
1998
IEEE
15 years 5 months ago
Address Translation Mechanisms In Network Interfaces
Good network hardware performance is often squandered by overheads for accessing the network interface (NI) within a host. NIs that support user-level messaging avoid frequent ope...
Ioannis Schoinas, Mark D. Hill
CHI
2005
ACM
16 years 1 months ago
Life on the edge: supporting collaboration in location-based experiences
We study a collaborative location-based game in which groups of `lions' hunt together on a virtual savannah that is overlaid on an open playing field. The game implements a s...
Steve Benford, Duncan Rowland, Martin Flintham, Ad...
FC
2009
Springer
84views Cryptology» more  FC 2009»
15 years 5 months ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha