Sciweavers

811 search results - page 98 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
SSR
2001
104views more  SSR 2001»
13 years 10 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
SAC
2006
ACM
14 years 2 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
PERCOM
2005
ACM
14 years 8 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
OOPSLA
1999
Springer
14 years 1 months ago
Reducing Transfer Delay Using Java Class File Splitting and Prefetching
The proliferation of the Internet is fueling the development of mobile computing environments in which mobile code is executed on remote sites. In such environments, the end user ...
Chandra Krintz, Brad Calder, Urs Hölzle
TROB
2002
120views more  TROB 2002»
13 years 8 months ago
DPAC: an object-oriented distributed and parallel computing framework for manufacturing applications
Parallel and distributed computing infrastructure are increasingly being embraced in the context of manufacturing applications, including real-time scheduling. In this paper, we pr...
N. R. Srinivasa Raghavan, Tanmay Waghmare