Sciweavers

337 search results - page 65 / 68
» Security enhanced mobile agents
Sort
View
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
14 years 11 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
WMASH
2004
ACM
15 years 2 months ago
Smart edge server: beyond a wireless access point
Wireless access at cafes, airports, homes and businesses have proliferated all over the globe with several different Wireless Internet Service Providers. Similarly, digital media ...
Geetha Manjunath, Tajana Simunic, Venkatesh Krishn...
ISPA
2004
Springer
15 years 2 months ago
A Peer-to-Peer Mechanism for Resource Location and Allocation Over the Grid
Abstract. Recent advances in P2P lookup overlays provide an appealing solution for distributed search without relying on a single database server. In addition to performing resourc...
Hung-Chang Hsiao, Mark Baker, Chung-Ta King
PDP
2008
IEEE
15 years 3 months ago
Privacy Protection in Context Transfer Protocol
In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
Giorgos Karopoulos, Georgios Kambourakis, Stefanos...
AICS
2009
14 years 7 months ago
SceneMaker: Intelligent Multimodal Visualisation of Natural Language Scripts
Abstract. Producing plays, films or animations is a complex and expensive process involving various professionals and media. Our proposed software system, SceneMaker, aims to facil...
Eva Hanser, Paul McKevitt, Tom Lunney, Joan Condel...