Sciweavers

636 search results - page 95 / 128
» Remote control for videoconferencing
Sort
View
86
Voted
CCS
2009
ACM
15 years 8 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
96
Voted
DSN
2009
IEEE
15 years 8 months ago
Data management mechanisms for embedded system gateways
It is becoming increasingly common to connect traditional embedded system networks to the Internet for remote monitoring, high-level control and integration. It is necessary to pr...
Justin Ray, Philip Koopman
123
Voted
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 8 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
IROS
2009
IEEE
180views Robotics» more  IROS 2009»
15 years 8 months ago
HELIOS system: A team of tracked robots for special urban search and rescue operations
Abstract— Fire brigades and special agencies are often demanded to operate for search and aid of human lives in extremely dangerous scenarios. It is very important to first veri...
Michele Guarnieri, Ryo Kurazume, Hiroshi Masuda, T...
107
Voted
ARCS
2009
Springer
15 years 8 months ago
Ultra-Fast Downloading of Partial Bitstreams through Ethernet
Abstract. In this paper we present a partial bitstreams ultra-fast downloading process through a standard Ethernet network. These Virtex-based and partially reconfigurable systems...
Pierre Bomel, Jeremie Crenne, Linfeng Ye, Jean-Phi...