Sciweavers

1373 search results - page 200 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
AINA
2009
IEEE
15 years 2 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
CORR
2010
Springer
208views Education» more  CORR 2010»
14 years 10 months ago
MapReduce for Integer Factorization
Abstract. Integer factorization is a very hard computational problem. Currently no ecient algorithm for integer factorization is publicly known. However, this is an important probl...
Javier Tordable
INFOCOM
2005
IEEE
15 years 3 months ago
Network localization in partially localizable networks
— Knowing the positions of the nodes in a network is essential to many next generation pervasive and sensor network functionalities. Although many network localization systems ha...
David Kiyoshi Goldenberg, Arvind Krishnamurthy, W....
PVLDB
2008
160views more  PVLDB 2008»
14 years 9 months ago
BayesStore: managing large, uncertain data repositories with probabilistic graphical models
Several real-world applications need to effectively manage and reason about large amounts of data that are inherently uncertain. For instance, pervasive computing applications mus...
Daisy Zhe Wang, Eirinaios Michelakis, Minos N. Gar...
ACSAC
2002
IEEE
15 years 2 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson