Sciweavers

1597 search results - page 268 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
MOBICOM
2006
ACM
14 years 1 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
IVA
2009
Springer
14 years 2 months ago
Teaching Computers to Conduct Spoken Interviews: Breaking the Realtime Barrier with Learning
Abstract. Several challenges remain in the effort to build software capable of conducting realtime dialogue with people. Part of the problem has been a lack of realtime flexibili...
Gudny Ragna Jonsdottir, Kristinn R. Thóriss...
PERCOM
2005
ACM
14 years 7 months ago
TinyLIME: Bridging Mobile and Sensor Networks through Middleware
In the rapidly developing field of sensor networks, bridging the gap between the applications and the hardware presents a major challenge. Although middleware is one solution, it ...
Carlo Curino, Matteo Giani, Marco Giorgetta, Aless...
EL
2002
181views more  EL 2002»
13 years 7 months ago
Aspects of networking in multiplayer computer games
Distributed, real-time multiplayer computer games (MCGs) are in the vanguard of utilizing the networking possibilities. Although related research have been done in military simulat...
Jouni Smed, Timo Kaukoranta, Harri Hakonen