Sciweavers

739 search results - page 115 / 148
» Information Flow in Credential Systems
Sort
View
DAC
2007
ACM
14 years 8 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
CASES
2006
ACM
13 years 11 months ago
Efficient architectures through application clustering and architectural heterogeneity
Customizing architectures for particular applications is a promising approach to yield highly energy-efficient designs for embedded systems. This work explores the benefits of arc...
Lukasz Strozek, David Brooks
JCDL
2009
ACM
128views Education» more  JCDL 2009»
14 years 2 months ago
Mobility, digital libraries and a rural indian village
Millions of people in developed countries routinely create and share digital content; but what about the billions of others in on the wrong side of what has been called the ‘glo...
Matt Jones, Emma Thom, David Bainbridge, David Fro...
IFIP
2007
Springer
14 years 1 months ago
Global Supply Chain Control
The operation of global manufacturing network is challenging due to the complexity in product and information flow, diversity in sites, localization and processes and the informati...
Heidi C. Dreyer, Ottar Bakås, Erlend Alfnes,...
ACMSE
2005
ACM
14 years 1 months ago
Towards a "humans-first" computer science curriculum
Traditionally, computer science education has considered “objects-first” or “imperative-first” approaches, with the focus of the course on teaching design of programs star...
D. Scott McCrickard, Charles J. Fowler, Christa M....