Sciweavers

1832 search results - page 312 / 367
» A Distributed Software Environment for Collaborative Web Com...
Sort
View
ICS
2003
Tsinghua U.
14 years 26 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
AVI
2008
13 years 10 months ago
Agent warp engine: formula based shape warping for networked applications
Computer visualization and networking have advanced dramatically over the last few years, partially driven by the exploding video game market. 3D hardware acceleration has reached...
Alexander Repenning, Andri Ioannidou
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 1 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
ICSE
2008
IEEE-ACM
14 years 7 months ago
Answering common questions about code
Difficulties understanding update paths while understanding code cause developers to waste time and insert bugs. A detailed investigation of these difficulties suggests that a wid...
Thomas D. LaToza
CISIS
2010
IEEE
14 years 2 months ago
CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications
— In pervasive environment, it is essential for computing applications to be context-aware. However, one of the major challenges is the establishment of a generic and dynamic con...
Zakwan Jaroucheh, Xiaodong Liu, Sally Smith