Sciweavers

764 search results - page 70 / 153
» An e-contracting reference architecture
Sort
View
145
Voted
SACMAT
2005
ACM
15 years 10 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
CODES
2005
IEEE
15 years 10 months ago
Power-smart system-on-chip architecture for embedded cryptosystems
In embedded cryptosystems, sensitive information can leak via timing, power, and electromagnetic channels. We introduce a novel power-smart system-on-chip architecture that provid...
Radu Muresan, Haleh Vahedi, Y. Zhanrong, Stefano G...
143
Voted
ATAL
2010
Springer
14 years 11 months ago
Directing value: driven artificial characters
In this paper we introduce the notion of character's values to mediate between agents and story direction in storytelling systems. By relating characters' goals with the...
Rossana Damiano, Vincenzo Lombardo
HPCA
2007
IEEE
16 years 4 months ago
Extending Multicore Architectures to Exploit Hybrid Parallelism in Single-thread Applications
Chip multiprocessors with multiple simpler cores are gaining popularity because they have the potential to drive future performance gains without exacerbating the problems of powe...
Hongtao Zhong, Steven A. Lieberman, Scott A. Mahlk...
GLOBECOM
2009
IEEE
15 years 11 months ago
PreDA: Predicate Routing for DTN Architectures over MANET
—We consider a Delay Tolerant Network (DTN) whose users (nodes) are connected by an underlying Mobile Ad hoc Network (MANET) substrate. Users can declaratively express high-level...
Flavio Esposito, Ibrahim Matta