Sciweavers

1801 search results - page 342 / 361
» Memory-Centric Security Architecture
Sort
View
DATE
2010
IEEE
141views Hardware» more  DATE 2010»
14 years 2 months ago
An embedded platform for privacy-friendly road charging applications
—Systems based on satellite localization are enabling new scenarios for road charging schemes by offering the possibility to charge drivers as a function of their road usage. An ...
Josep Balasch, Ingrid Verbauwhede, Bart Preneel
CCGRID
2002
IEEE
14 years 2 months ago
NEVRLATE: Scalable Resource Discovery
A scalable and expressive peer-to-peer (P2P) networking and computing framework requires efficient resource discovery services. Here we propose NEVRLATE, for Network-Efficient V...
Ajay Chander, Steven Dawson, Patrick Lincoln, Davi...
DSN
2002
IEEE
14 years 2 months ago
Generic Timing Fault Tolerance using a Timely Computing Base
Designing applications with timeliness requirements in environments of uncertain synchrony is known to be a difficult problem. In this paper, we follow the perspective of timing ...
Antonio Casimiro, Paulo Veríssimo
EDOC
2002
IEEE
14 years 2 months ago
Discretionary Enforcement of Electronic Contracts
As in traditional commerce, parties to a contract in ebusiness environments are expected to operate in good faith and comply with mutually agreed terms of contract. It may be the ...
Zoran Milosevic, Audun Jøsang, Theodosis Di...
INFOCOM
2002
IEEE
14 years 1 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...