Sciweavers

706 search results - page 112 / 142
» Configuration Management
Sort
View
ESORICS
2002
Springer
14 years 7 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith
PERCOM
2004
ACM
14 years 7 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
HICSS
2009
IEEE
123views Biometrics» more  HICSS 2009»
14 years 2 months ago
Towards Conceptual Metamodeling of IT Governance Frameworks Approach - Use - Benefits
Up to now, there has been little academic support for the challenges of IT governance/IT management. As a reaction, various best practice frameworks - like COBIT or CMMI - were de...
Matthias Goeken, Stefanie Alter
ICMCS
2008
IEEE
144views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Enabling access to sound archives through integration, enrichment and retrieval
Many digital sound archives still suffer from tremendous problems concerning access. Materials are often in different formats, with related media in separate collections, and with...
Ivan Damnjanovic, Josh Reiss, Dan Barry
DATE
2007
IEEE
81views Hardware» more  DATE 2007»
14 years 1 months ago
Improving utilization of reconfigurable resources using two dimensional compaction
Partial reconfiguration allows parts of the reconfigurable chip area to be configured without affecting the rest of the chip. This allows placement of tasks at run time on the rec...
Ahmed A. El Farag, Hatem M. El-Boghdadi, Samir I. ...