Sciweavers

1631 search results - page 315 / 327
» Mobility Management
Sort
View
97
Voted
ICS
2003
Tsinghua U.
15 years 2 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
SIGCOMM
2012
ACM
13 years 4 days ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang
70
Voted
JCDL
2004
ACM
116views Education» more  JCDL 2004»
15 years 3 months ago
Lost in memories: interacting with photo collections on PDAs
We developed two browsers to support large personal photo collections on PDAs. Our first browser is based on a traditional, folder-based layout that utilizes either the user’s m...
Susumu Harada, Mor Naaman, Yee Jiun Song, QianYing...
TKDE
2010
274views more  TKDE 2010»
14 years 8 months ago
Ranked Query Processing in Uncertain Databases
—Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to “certain” data, the ...
Xiang Lian, Lei Chen 0002
ECCC
2010
80views more  ECCC 2010»
14 years 9 months ago
Regret Minimization for Online Buffering Problems Using the Weighted Majority Algorithm
Suppose a decision maker has to purchase a commodity over time with varying prices and demands. In particular, the price per unit might depend on the amount purchased and this pri...
Melanie Winkler, Berthold Vöcking, Sascha Geu...