We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group ...
Frederic Stumpf, Michael Benz, Martin Hermanowski,...
This paper is a progress report on our research, design, and implementation of a virtual reality environment where users (visitors, customers) can interact with agents that help th...
—The technique of module-threading utilizes standard DDR DRAM components to build modified memory modules. These modified modules incorporate one or more additional control signa...
As project teams become used more widely, the question of how to capitalize on the knowledge learned in these teams remains an open issue. Using previous research on transactive m...
Companies cooperating in the framework of a virtual enterprise have increasing demands for systems on which to base applications for their particular environment: groups of worker...