Sciweavers

34229 search results - page 228 / 6846
» Power-aware computing systems
Sort
View
SEC
2004
15 years 5 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
145
Voted
ICAC
2005
IEEE
15 years 9 months ago
Model-Driven Placement of Compute Tasks and Data in a Networked Utility
An important problem in resource management for networked resource-sharing systems is the simultaneous allocation of multiple resources to an application. Selfoptimizing systems m...
Piyush Shivam, Adriana Iamnitchi, Aydan R. Yumeref...
EUC
2005
Springer
15 years 9 months ago
Middleware Architecture for Context Knowledge Discovery in Ubiquitous Computing
Advanced analysis of data for extracting useful knowledge is the next natural step in the world of ubiquitous computing. So far, most of the ubiquitous systems process knowledge in...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
115
Voted
HOTOS
2003
IEEE
15 years 9 months ago
Virtual Appliances in the Collective: A Road to Hassle-Free Computing
This paper describes the vision of the Collective, a compute utility which runs internet services as well as the highly interactive applications we run on desktop computers today....
Constantine P. Sapuntzakis, Monica S. Lam
EUROCRYPT
1998
Springer
15 years 8 months ago
Quorum-Based Secure Multi-party Computation
Abstract. This paper describes e cient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to...
Donald Beaver, Avishai Wool