Sciweavers

739 search results - page 73 / 148
» Security Challenges in Cloud Computing
Sort
View
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
15 years 9 months ago
An Experimental Study on Energy Consumption of Video Encryption for Mobile Handheld Devices
Abstract Secure video communication on mobile handheld devices is challenging mainly due to (a) the significant computational needs of both video coding and encryption algorithms ...
Kyoungwoo Lee, Nikil Dutt, Nalini Venkatasubramani...
FGCS
2008
159views more  FGCS 2008»
15 years 4 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
ICSOC
2003
Springer
15 years 9 months ago
Disconnected Operation Service in Mobile Grid Computing
Abstract. In this paper, we discuss on the extension of grid computing systems in mobile computing environments, where mobile devices can be effectively incorporated into the grid ...
Sang-Min Park, Young-Bae Ko, Jai-Hoon Kim
ICALP
1999
Springer
15 years 8 months ago
Wide Area Computation
Abstract. The last decades have seen the emergence of the sea of objects paradigm for structuring complex distributed systems on workstations and local area networks. In this appro...
Luca Cardelli
SE
2007
15 years 5 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller