Sciweavers

68 search results - page 6 / 14
» Remote storage with byzantine servers
Sort
View
EUSAI
2004
Springer
14 years 3 months ago
Remote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization p...
João Nuno Silva, Paulo Ferreira
TKDE
2008
111views more  TKDE 2008»
13 years 9 months ago
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, and so forth)...
Francesc Sebé, Josep Domingo-Ferrer, Antoni...
NLDB
2001
Springer
14 years 2 months ago
"Where Are the Christmas Decorations?": A Memory Assistant for Storage Locations
At Hewlett-Packard Laboratories we want to know how inexpensive it can be to endow mobile personal assistants with the ability to speak naturally with their users. To this end, we ...
Lewis G. Creary, Michael VanHilst
SAINT
2005
IEEE
14 years 3 months ago
Trace System of iSCSI Storage Access
In this paper, an IP-SAN access trace method is proposed and its implementation is presented. IP-SAN and iSCSI are expected to remedy problems of Fibre Channel (FC)-based SAN. Bec...
Saneyasu Yamaguchi, Masato Oguchi, Masaru Kitsureg...
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
13 years 7 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier