Sciweavers

8770 search results - page 1672 / 1754
» Named Service Networking
Sort
View
CCS
2006
ACM
15 years 2 months ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...
EEE
2004
IEEE
15 years 2 months ago
A Methodology to Find Web Site Keywords
For many companies and/or institutions it is no longer sufficient to have a web site and high quality products or services. What in many cases makes the difference between success...
Juan D. Velásquez, Richard Weber, Hiroshi Y...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 2 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
DAWAK
2006
Springer
15 years 2 months ago
Providing Persistence for Sensor Data Streams by Remote WAL
Rapidly changing environments such as robots, sensor networks, or medical services are emerging. To deal with them, DBMS should persist sensor data streams instantaneously. To achi...
Hideyuki Kawashima, Michita Imai, Yuichiro Anzai
ECTEL
2006
Springer
15 years 2 months ago
An Example of Participatory Design Methodology in a Project which Aims at Developing Individual and Organisational Learning in C
The experience described in this paper is being developed in the framework of the PALETTE1 project by two teams of researchers involved in collecting information from some Communi...
Amaury Daele, Martin Erpicum, Liliane Esnault, Fab...
« Prev « First page 1672 / 1754 Last » Next »