Sciweavers

388 search results - page 63 / 78
» Promoting the development of secure mobile agent application...
Sort
View
MOBISYS
2008
ACM
13 years 11 months ago
MobiVMM: a virtual machine monitor for mobile phones
Mobile phones have evolved into complex systems as they have more and more new applications built-in. As a result, they are less reliable and less secure than before. Virtual Mach...
See-hwan Yoo, Yunxin Liu, Cheol-Ho Hong, Chuck Yoo...
W4A
2006
ACM
14 years 2 months ago
Personalizable edge services for web accessibility
Web Content Accessibility guidelines by W3C [29] provide several suggestions for Web designers on how to author Web pages in order to make them accessible to everyone. In this con...
Gennaro Iaccarino, Delfina Malandrino, Vittorio Sc...
AMKM
2003
Springer
14 years 1 months ago
Agentized, Contextualized Filters for Information Management
Every time a user engaged in work reads or writes, the user spontaneously generates new information needs: to understand the text he or she is reading or to supply more substance ...
David A. Evans, Gregory Grefenstette, Yan Qu, Jame...
ATAL
2010
Springer
13 years 9 months ago
MagneBike: toward multi climbing robots for power plant inspection
An ever-growing infrastructure, including existing and newly built power plants, as well as a rising environmental awareness in society call for inspection and maintenance systems...
Andreas Breitenmoser, Fabien Tâche, Gilles C...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 10 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...