Sciweavers

575 search results - page 54 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
SOSP
2007
ACM
14 years 4 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
PERCOM
2009
ACM
14 years 2 months ago
An Empirical Analysis of Wi-Fi Activity in Three Urban Scenarios
—A better understanding of people’s daily behaviors with respect to the underlying wireless network is a crucial step toward Wi-Fi based pervasive networking. Existing analyses...
Thomas Claveirole, Mathias Boc, Marcelo Dias de Am...
ISCA
2007
IEEE
217views Hardware» more  ISCA 2007»
13 years 7 months ago
Parallel Processing of High-Dimensional Remote Sensing Images Using Cluster Computer Architectures
Hyperspectral sensors represent the most advanced instruments currently available for remote sensing of the Earth. The high spatial and spectral resolution of the images supplied ...
David Valencia, Antonio Plaza, Pablo Martín...
MM
2006
ACM
115views Multimedia» more  MM 2006»
14 years 1 months ago
Human-centered computing: a multimedia perspective
Human-Centered Computing (HCC) is a set of methodologies that apply to any field that uses computers, in any form, in applications in which humans directly interact with devices o...
Alejandro Jaimes, Nicu Sebe, Daniel Gatica-Perez
DAC
2002
ACM
14 years 8 months ago
Communication architecture based power management for battery efficient system design
Communication-based power management (CBPM) is a new batterydriven system-level power management methodology in which the systemlevel communication architecture regulates the exec...
Kanishka Lahiri, Sujit Dey, Anand Raghunathan