Sciweavers

2468 search results - page 343 / 494
» Aggregation operators 2003
Sort
View
HOTOS
2003
IEEE
14 years 2 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh
HOTOS
2003
IEEE
14 years 2 months ago
Why Events Are a Bad Idea (for High-Concurrency Servers)
Event-based programming has been highly touted in recent years as the best way to write highly concurrent applications. Having worked on several of these systems, we now believe t...
J. Robert von Behren, Jeremy Condit, Eric A. Brewe...
HOTOS
2003
IEEE
14 years 2 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
HOTOS
2003
IEEE
14 years 2 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
ICAT
2003
IEEE
14 years 2 months ago
Wearable Telepresence System using Multi-modal Communication with Humanoid Robot
This paper presents a new type of wearable telepresence system that is applicable to the control of a humanoid robot. The system consists of self-contained computing hardware with...
Yongho Seo, Heonyoung Park, Hyun Seung Yang