Sciweavers

3937 search results - page 294 / 788
» Questioning Ubiquitous Computing
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
IMC
2007
ACM
15 years 6 months ago
A brief history of scanning
Incessant scanning of hosts by attackers looking for vulnerable servers has become a fact of Internet life. In this paper we present an initial study of the scanning activity obse...
Mark Allman, Vern Paxson, Jeff Terrell
WICSA
2004
15 years 6 months ago
The DiPS+ Software Architecture for Self-healing Protocol Stacks
Research domains such as active networks, ad-hoc networks, ubiquitous computing, pervasive computing, grid computing, and sensor networks, clearly show that computer networks will...
Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre...
HUC
2010
Springer
15 years 5 months ago
CastOven: a microwave oven with just-in-time video clips
In this paper, we propose a novel microwave oven called CastOven. CastOven is a microwave oven with a LCD display that enables people to enjoy videos while they are waiting for th...
Keita Watanabe, Shota Matsuda, Michiaki Yasumura, ...
COMPUTER
2007
123views more  COMPUTER 2007»
15 years 4 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar