Sciweavers

412 search results - page 62 / 83
» Operating Systems Should Provide Transactions
Sort
View
IMC
2007
ACM
13 years 11 months ago
Compressed network monitoring for ip and all-optical networks
We address the problem of efficient end-to-end network monitoring of path metrics in communication networks. Our goal is to minimize the number of measurements or monitors requir...
Mark Coates, Yvan Pointurier, Michael Rabbat
OTM
2007
Springer
14 years 3 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 3 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
EMSOFT
2005
Springer
14 years 3 months ago
Centralized end-to-end flow control in a best-effort network-on-chip
Run-time communication management in a Network-on-Chip (NoC) is a challenging task. On one hand, the NoC needs to satisfy the communication requirements (e.g. throughput) of runni...
Prabhat Avasare, Vincent Nollet, Jean-Yves Mignole...
ERCIMDL
2005
Springer
99views Education» more  ERCIMDL 2005»
14 years 3 months ago
Management and Sharing of Bibliographies
Abstract. Managing bibliographic data is a requirement for many researchers, and in the group setting within which the majority of research takes place, the managing and sharing of...
Erik Wilde, Sai Anand, Petra Zimmermann