Sciweavers

1898 search results - page 228 / 380
» About the art in this issue
Sort
View
ESORICS
2002
Springer
14 years 9 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith
MOBIHOC
2001
ACM
14 years 9 months ago
Time synchronization in ad hoc networks
Ubiquitous computing environments are typically based upon ad hoc networks of mobile computing devices. These devices may be equipped with sensor hardware to sense the physical en...
Kay Römer
ICWS
2009
IEEE
14 years 6 months ago
An Approach to Composing Web Services with Context Heterogeneity
The potential benefits of Web services composition heavily rely on semantic interoperability, i.e., the ability to exchange data meaningfully amongst Web services. Context heterog...
Xitong Li, Stuart E. Madnick, Hongwei Zhu 0002, Yu...
ICCAD
2006
IEEE
146views Hardware» more  ICCAD 2006»
14 years 6 months ago
An analytical model for negative bias temperature instability
— Negative Bias Temperature Instability (NBTI) in PMOS transistors has become a significant reliability concern in present day digital circuit design. With continued scaling, th...
Sanjay V. Kumar, Chris H. Kim, Sachin S. Sapatneka...
CSCW
2010
ACM
14 years 6 months ago
Student athletes on facebook
Student athletes at U.S. universities are bound by rules affecting their participation in their sport and are highly visible to their fellow students and a larger public of fans. ...
Cliff Lampe, Nicole Ellison