Sciweavers

241 search results - page 9 / 49
» Secure Remote Control of Field-programmable Network Devices
Sort
View
CCS
2004
ACM
15 years 2 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
MOBISYS
2008
ACM
15 years 9 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...
NN
2008
Springer
158views Neural Networks» more  NN 2008»
14 years 9 months ago
Optimal wide-area monitoring and nonlinear adaptive coordinating neurocontrol of a power system with wind power integration and
Wide-area coordinating control is becoming an important issue and a challenging problem in the power industry. This paper proposes a novel optimal wide-area coordinating neurocont...
Wei Qiao, Ganesh K. Venayagamoorthy, Ronald G. Har...
PET
2004
Springer
15 years 2 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
CBMS
2008
IEEE
15 years 4 months ago
Restoring the Patient Control over Her Medical History
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they introduce some burning issues (e.g. privacy protection, remote access to the fol...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, K&ea...