Sciweavers

1555 search results - page 269 / 311
» When the implication is not to design (technology)
Sort
View
DAC
2005
ACM
16 years 24 days ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
CCS
2009
ACM
15 years 6 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
INFOCOM
2009
IEEE
15 years 6 months ago
iPASS: Incentivized Peer-Assisted System for Asynchronous Streaming
Abstract— As an efficient distribution mechanism, peer-topeer technology has become a tremendously attractive solution to offload servers in large scale video streaming applica...
Chao Liang, Zhenghua Fu, Yong Liu, Chai Wah Wu
DAMON
2009
Springer
15 years 6 months ago
Join processing for flash SSDs: remembering past lessons
Flash solid state drives (SSDs) provide an attractive alternative to traditional magnetic hard disk drives (HDDs) for DBMS applications. Naturally there is substantial interest in...
Jaeyoung Do, Jignesh M. Patel
COOPIS
2002
IEEE
15 years 4 months ago
Discovering Emergent Virtual Work Processes in Collaborative Systems
The design of virtual workplaces that can support virtual work processes has traditionally been either ad-hoc, or has been influenced by the top-down approaches, such as ‘virtua...
Simeon J. Simoff, Robert P. Biuk-Aghai