Sciweavers

2275 search results - page 403 / 455
» A Deployment System for Pervasive Computing
Sort
View
150
Voted
WISEC
2010
ACM
15 years 4 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
109
Voted
DAC
2008
ACM
16 years 4 months ago
DVFS in loop accelerators using BLADES
Hardware accelerators are common in embedded systems that have high performance requirements but must still operate within stringent energy constraints. To facilitate short time-t...
Ganesh S. Dasika, Shidhartha Das, Kevin Fan, Scott...
148
Voted
MOBISYS
2008
ACM
16 years 3 months ago
The pothole patrol: using a mobile sensor network for road surface monitoring
This paper investigates an application of mobile sensing: detecting and reporting the surface conditions of roads. We describe a system and associated algorithms to monitor this i...
Jakob Eriksson, Lewis Girod, Bret Hull, Ryan Newto...
131
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
164
Voted
TRIDENTCOM
2008
IEEE
15 years 10 months ago
The NTP experimental platform for heterogeneous wireless sensor networks
— This paper presents the NTP experimental platform for heterogeneous wireless sensor networks (WSN), which is built on the campus of National Tsing Hua University under the supp...
Sheng-Po Kuo, Chun-Yu Lin, Yueh-Feng Lee, Hua-Wei ...