This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
: Medical practice today still entails sorting through scattered information on a specific patient. Making things more difficult, the EU, in bringing its member states closer toget...
Dario Cerizza, Emanuele Della Valle, Doug Foxvog, ...
In this paper the term implicit human computer interaction is defined. It is discussed how the availability of processing power and advanced sensing technology can enable a shift ...
Abstract. In order to realise complex service-based applications on system platforms for context-aware ubiquitous computing environments, mobile processes have been introduced to s...
Christian P. Kunze, Sonja Zaplata, Mirwais Turjale...