Sciweavers

790 search results - page 101 / 158
» Designated Confirmer Signatures
Sort
View
NSDI
2008
14 years 16 days ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
CASES
2008
ACM
14 years 6 days ago
Execution context optimization for disk energy
Power, energy, and thermal concerns have constrained embedded systems designs. Computing capability and storage density have increased dramatically, enabling the emergence of hand...
Jerry Hom, Ulrich Kremer
CCS
2008
ACM
14 years 6 days ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
CHI
2005
ACM
14 years 5 days ago
A closed-loop tactor frequency control system for vibrotactile feedback
In this paper, we address the problem of maintaining a precise frequency in vibrating motors for use as vibrotactile cueing devices. Our solution utilizes a piezoelectric film sen...
Justin Cohen, Masataka Niwa, Robert W. Lindeman, H...
EDCC
2008
Springer
13 years 12 months ago
SONDe, a Self-Organizing Object Deployment Algorithm in Large-Scale Dynamic Systems
We present the design, correctness, and analysis of SONDe, a simple fully decentralized object deployment algorithm for highly requested systems. Given an object (service or data)...
Vincent Gramoli, Anne-Marie Kermarrec, Erwan Le Me...