Sciweavers

487 search results - page 62 / 98
» Enabling new mobile applications with location proofs
Sort
View
ACMACE
2005
ACM
14 years 1 months ago
Rendezvous: supporting real-time collaborative mobile gaming in high latency environments
Despite the ever increasing popularity of handheld, networked gaming consoles, fully interactive real-time, multiplayer games designed for these platforms have yet to become a rea...
Angie Chandler, Joe Finney
PERCOM
2010
ACM
13 years 2 months ago
Using Wi-Fi to save energy via P2P remote execution
Abstract-- Mobile devices are becoming increasingly powerful with regards to processing speed, networking capabilities, storage capacity etc. While these improvements open up new p...
Mads Darø Kristensen, Niels Olof Bouvin
PLDI
2005
ACM
14 years 1 months ago
Path slicing
We present a new technique, path slicing, that takes as input a possibly infeasible path to a target location, and eliminates all the operations that are irrelevant towards the re...
Ranjit Jhala, Rupak Majumdar
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 9 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
INFOCOM
2003
IEEE
14 years 1 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson