Sciweavers

1373 search results - page 50 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
SOUPS
2010
ACM
14 years 15 days ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
PERCOM
2010
ACM
13 years 7 months ago
BurrowView - seeing the world through the eyes of rats
—For a long time, life sciences were restricted to look at animal habitats only post-factum. Pervasive computing puts us in the novel position to gain live views. In this paper w...
Jó Ágila Bitsch Link, Gregor Fabriti...
HICSS
2007
IEEE
85views Biometrics» more  HICSS 2007»
14 years 2 months ago
Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid
The US Power Industry is in the process of overhauling the Power Grid to make it more secure, reliable, and available. The IT systems that comprise a major part of this change nee...
Himanshu Khurana, Mohammad Maifi Hasan Khan, Von W...
ECBS
2006
IEEE
126views Hardware» more  ECBS 2006»
14 years 2 months ago
Experiments and Investigations for the Personal High Performance Computing (PHPC) built on top of the 64-bit processing and clus
The motivation and objective for this paper is to demonstrate “Personal High Performance Computing (PHPC)”, which requires only a smaller number of computers, resources and sp...
Victor Chang
ICDCS
2010
IEEE
13 years 9 months ago
Efficient Workstealing for Multicore Event-Driven Systems
Many high-performance communicating systems are designed using the event-driven paradigm. As multicore platforms are now pervasive, it becomes crucial for such systems to take adva...
Fabien Gaud, Sylvain Geneves, Renaud Lachaize, Bap...