Sciweavers

187 search results - page 28 / 38
» Supporting Dynamically Changing Authorizations in Pervasive ...
Sort
View
CCS
2007
ACM
15 years 3 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
DEBS
2009
ACM
15 years 21 days ago
Event-based systems: opportunities and challenges at exascale
Streaming data models have been shown to be useful in many applications requiring high-performance data exchange. Application-level overlay networks are a natural way to realize t...
Greg Eisenhauer, Matthew Wolf, Hasan Abbasi, Karst...
IPPS
2008
IEEE
15 years 3 months ago
Heterogenous dating service with application to rumor spreading
Peer-to-Peer overlay networks have proven their efficiency for storing and retrieving data at large scale, but new services are required to take the actual performances of resour...
Olivier Beaumont, Philippe Duchon, Miroslaw Korzen...
CHI
2007
ACM
15 years 9 months ago
Multiview: improving trust in group video conferencing through spatial faithfulness
Video conferencing is still considered a poor alternative to face-to-face meetings. In the business setting, where these systems are most prevalent, the misuse of video conferenci...
David T. Nguyen, John Canny
HICSS
2005
IEEE
117views Biometrics» more  HICSS 2005»
15 years 3 months ago
Interorganizational Information Integration in the Criminal Justice Enterprise: Preliminary Lessons from State and County Initia
Traditional governmental structures have organized the capture, use, and management of information along agency lines. These “information silos” are not very useful in a dynam...
José Ramón Gil-García, Carrie...