Sciweavers

2124 search results - page 384 / 425
» Mobile Agent Organizations
Sort
View
89
Voted
ACSAC
2010
IEEE
14 years 9 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
ISLPED
2010
ACM
128views Hardware» more  ISLPED 2010»
14 years 9 months ago
Rank-aware cache replacement and write buffering to improve DRAM energy efficiency
DRAM power and energy efficiency considerations are becoming increasingly important for low-power and mobile systems. Using lower power modes provided by commodity DRAM chips redu...
Ahmed M. Amin, Zeshan Chishti
HT
2009
ACM
14 years 9 months ago
Games with a purpose for social networking platforms
The online games market has matured in recent years. It is now a multi-billion dollar business with hundreds of millions players worldwide. At the same time, social networking pla...
Walter Rafelsberger, Arno Scharl
TIFS
2010
140views more  TIFS 2010»
14 years 5 months ago
An Evaluation of Video-to-Video Face Verification
Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedd...
Norman Poh, Chi-Ho Chan, Josef Kittler, Séb...
MOBIQUITOUS
2007
IEEE
15 years 5 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra