Sciweavers

81 search results - page 7 / 17
» Sentient Processes - Process-based Applications in Pervasive...
Sort
View
CCS
2007
ACM
14 years 2 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
EUC
2004
Springer
14 years 1 months ago
Context-Aware State Management for Ubiquitous Applications
In a ubiquitous computing environment, users continuously access computing services and interact with smart spaces, while moving from one place to another. Application migration, t...
Pauline P. L. Siu, Nalini Moti Belaramani, Cho-Li ...
PERVASIVE
2010
Springer
13 years 10 months ago
Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones
Abstract. Continuous sensing applications (e.g., mobile social networking applications) are appearing on new sensor-enabled mobile phones such as the Apple iPhone, Nokia and Androi...
Mirco Musolesi, Mattia Piraccini, Kristof Fodor, A...
ICIP
2006
IEEE
14 years 9 months ago
Improved Multiplexed Image Reconstruction Performance Through Optical System Diversity Design
Multiplexed image reconstruction, estimating high resolution images from multiple low resolution images with highly overlapped fields of view, is improved when the magnification o...
Sally L. Wood, Hsueh-Ban Lan, Dinesh Rajan, Marc P...
ARITH
2001
IEEE
13 years 11 months ago
Computer Arithmetic-A Processor Architect's Perspective
The Instruction Set Architecture (ISA) of a programmable processor is the native languageof the machine. It defines the set of operations and resourcesthat are optimized for that ...
Ruby B. Lee