Sciweavers

1627 search results - page 168 / 326
» On context in authorization policy
Sort
View
MOBISYS
2011
ACM
13 years 1 months ago
Odessa: enabling interactive perception applications on mobile devices
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video....
Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padman...
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
12 years 21 days ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
14 years 5 months ago
Celebrating Diversity in Volunteer Computing
The computing resources in a volunteer computing system are highly diverse in terms of software and hardware type, speed, availability, reliability, network connectivity, and othe...
David P. Anderson, Kevin Reed
CDC
2008
IEEE
14 years 4 months ago
On event-triggered and self-triggered control over sensor/actuator networks
— Event-triggered and self-triggered control have been recently proposed as an alternative to the more traditional periodic execution of control tasks. The possibility of reducin...
Manuel Mazo Jr., Paulo Tabuada
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
14 years 4 months ago
A TeleMedicine Transfer Model for Sub-Saharan Africa
1 : Given the documented benefits of telemedicine, especially in resource-constrained health-care contexts, we empirically examine the factors they contribute to successful transfe...
Mengistu Kifle, Victor Wacham A. Mbarika, Clive Ts...