Sciweavers

202 search results - page 30 / 41
» Managing Pervasive Environment Privacy Using the
Sort
View
ESORICS
2003
Springer
14 years 27 days ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
ISI
2006
Springer
13 years 7 months ago
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
Ragib Hasan, Marianne Winslett
OOPSLA
1999
Springer
13 years 12 months ago
Mostly-copying Reachability-based Orthogonal Persistence
We describe how reachability-based orthogonal persistence can be supported even in uncooperative implementations of languages such as C++ and Modula-3, and without modification t...
Antony L. Hosking, Jiawan Chen
ICPP
2007
IEEE
14 years 2 months ago
FlexFetch: A History-Aware Scheme for I/O Energy Saving in Mobile Computing
Extension of battery lifetime has always been a major issue for mobile computing. While more and more data are involved in mobile computing, energy consumption caused by I/O opera...
Feng Chen, Song Jiang, Weisong Shi, Weikuan Yu
OOPSLA
2005
Springer
14 years 1 months ago
Constructing a metacircular Virtual machine in an exploratory programming environment
Can virtual machine developers benefit from religiously observing the principles more often embraced for exploratory programming? To find out, we are concurrently constructing two...
David Ungar, Adam Spitz, Alex Ausch