Sciweavers

338 search results - page 62 / 68
» Operational Models for Reputation Servers
Sort
View
SIGUCCS
2003
ACM
14 years 23 days ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah
SACMAT
2009
ACM
14 years 2 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
DRM
2007
Springer
14 years 1 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
MOBICOM
2006
ACM
14 years 1 months ago
Localized algorithm for aggregate fairness in wireless sensor networks
For data-collection applications in sensor networks, it is important to ensure all data sources have equal (or weighted) access to network bandwidth so that the base stations rece...
Shigang Chen, Zhan Zhang
ISCA
2005
IEEE
99views Hardware» more  ISCA 2005»
14 years 1 months ago
Disk Drive Roadmap from the Thermal Perspective: A Case for Dynamic Thermal Management
The importance of pushing the performance envelope of disk drives continues to grow, not just in the server market but also in numerous consumer electronics products. One of the m...
Sudhanva Gurumurthi, Anand Sivasubramaniam, Vivek ...