Sciweavers

8770 search results - page 1555 / 1754
» Named Service Networking
Sort
View
WICON
2010
14 years 9 months ago
Distributed Management of Contextual Affinities in Context-aware Systems
In context-aware computing, distributed information about entities, such as people, places and objects, is captured and made available to applications, which utilize this context....
Robert Schmohl, Uwe Baumgarten
CJ
2010
193views more  CJ 2010»
14 years 8 months ago
Energy-Efficient Cloud Computing
Energy efficiency is increasingly important for future information and communication technologies (ICT), because the increased usage of ICT, together with increasing energy costs a...
Andreas Berl, Erol Gelenbe, Marco Di Girolamo, Gio...
ISJGP
2010
14 years 8 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
CCR
2011
14 years 6 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
JOC
2010
92views more  JOC 2010»
14 years 6 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
« Prev « First page 1555 / 1754 Last » Next »