Sciweavers

1723 search results - page 204 / 345
» Generalized file system dependencies
Sort
View
IDTRUST
2010
ACM
15 years 11 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
15 years 11 months ago
Towards a Methodology for Profiling Cyber Criminals
The progress of future e-business and ecommerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial p...
Leonard Kwan, Pradeep Ray, Greg Stephens
INFOCOM
2007
IEEE
15 years 11 months ago
Throughput-Optimal Scheduling in Multichannel Access Point Networks Under Infrequent Channel Measurements
—We consider the problem of uplink/downlink scheduling in a multichannel wireless access point network where channel states differ across channels as well as users, vary with tim...
Koushik Kar, Xiang Luo, Saswati Sarkar
WECWIS
2007
IEEE
95views ECommerce» more  WECWIS 2007»
15 years 11 months ago
Role-based Recommendation and Trust Evaluation
In general, in most trust evaluation systems, the evaluation of a target party under investigation relies on the trust ratings from responding peers/parties who have direct intera...
Yan Wang 0002, Vijay Varadharajan
MEMOCODE
2006
IEEE
15 years 10 months ago
802.11a transmitter: a case study in microarchitectural exploration
Hand-held devices have rigid constraints regarding power dissipation and energy consumption. Whether a new functionality can be supported often depends upon its power requirements...
Nirav Dave, Michael Pellauer, S. Gerding, Arvind