Sciweavers

5446 search results - page 309 / 1090
» Mobile computing
Sort
View
118
Voted
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 5 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
IH
2001
Springer
15 years 8 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
ECEH
2006
101views Healthcare» more  ECEH 2006»
15 years 5 months ago
Towards European Patient Summaries based on Triple Space Computing
: Medical practice today still entails sorting through scattered information on a specific patient. Making things more difficult, the EU, in bringing its member states closer toget...
Dario Cerizza, Emanuele Della Valle, Doug Foxvog, ...
PUC
2000
107views more  PUC 2000»
15 years 3 months ago
Implicit Human Computer Interaction Through Context
In this paper the term implicit human computer interaction is defined. It is discussed how the availability of processing power and advanced sensing technology can enable a shift ...
Albrecht Schmidt
BIS
2008
120views Business» more  BIS 2008»
15 years 5 months ago
Enabling Context-Based Cooperation: A Generic Context Model and Management System
Abstract. In order to realise complex service-based applications on system platforms for context-aware ubiquitous computing environments, mobile processes have been introduced to s...
Christian P. Kunze, Sonja Zaplata, Mirwais Turjale...