Sciweavers

2354 search results - page 200 / 471
» DRM as a layered system
Sort
View
CCS
2009
ACM
14 years 2 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
INFOCOM
2006
IEEE
14 years 2 months ago
Resource Allocation for Multicast Services in Multicarrier Wireless Communications
— We consider a multicast resource allocation problem for the downlink in OFDM-based wireless cellular network systems. In a conventional multicast system, to accommodate users w...
Changho Suh, Jeonghoon Mo
BTW
2005
Springer
107views Database» more  BTW 2005»
14 years 1 months ago
DBMS Architecture - Still an Open Problem
More than two decades ago, DB researchers faced up to the question of how to design a data-independent database management system (DBMS), that is, a DBMS which offers an appropriat...
Theo Härder
SFM
2005
Springer
243views Formal Methods» more  SFM 2005»
14 years 1 months ago
Hermes: Agent-Based Middleware for Mobile Computing
Hermes is a middleware system for design and execution of activity-based applications in distributed environments. It supports mobile computation as an application implementation s...
Flavio Corradini, Emanuela Merelli
VR
2003
IEEE
141views Virtual Reality» more  VR 2003»
14 years 1 months ago
Device Independence and Extensibility in Gesture Recognition
Gesture recognition techniques often suffer from being highly device-dependent and hard to extend. If a system is trained using data from a specific glove input device, that syst...
Jacob Eisenstein, Shahram Ghandeharizadeh, Leana G...