Sciweavers

7262 search results - page 210 / 1453
» Reversible Computer Hardware
Sort
View
170
Voted
SASN
2006
ACM
15 years 8 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
142
Voted
SIGMETRICS
2005
ACM
100views Hardware» more  SIGMETRICS 2005»
15 years 8 months ago
On AS-level path inference
The ability to discover the AS-level path between two end-points is valuable for network diagnosis, performance optimization, and reliability enhancement. Virtually all existing t...
Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang
CHES
2005
Springer
85views Cryptology» more  CHES 2005»
15 years 8 months ago
Secure Data Management in Trusted Computing
Abstract. In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software updat...
Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahm...
ICDCSW
2005
IEEE
15 years 8 months ago
IASO - An Activity-Based Computing Platform for Wearable Computing
Displaying and navigating complex information on wearable computers is very different from accessing the same information while sitting at your desk. Limitations in hardware, scre...
Jakob E. Bardram, Jonathan Bunde-Pedersen
127
Voted
HOTOS
2009
IEEE
15 years 6 months ago
Computer Meteorology: Monitoring Compute Clouds
Cloud computing environments allow customers to execute arbitrary code on hardware owned by a cloud provider. While cloud providers use virtualization to ensure isolation between ...
Lionel Litty, H. Andrés Lagar-Cavilla, Davi...