Sciweavers

2513 search results - page 480 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
IWSEC
2007
Springer
14 years 4 months ago
Batch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...
SAFECOMP
2007
Springer
14 years 4 months ago
Controller Architecture for Safe Cognitive Technical Systems
Abstract. Cognition of technical systems, as the ability to perceive situations, to learn about favorable behavior, and to autonomously generate decisions, adds new attributes to s...
Sebastian Kain, Hao Ding, Frank Schiller, Olaf Stu...
ICDE
2006
IEEE
104views Database» more  ICDE 2006»
14 years 3 months ago
Trusted CVS
The CVS (Concurrent Versions System) software is a popular method for recording modifications to data objects, in addition to concurrent access to data in a multi-user environmen...
Muthuramakrishnan Venkitasubramaniam, Ashwin Macha...
PPOPP
2006
ACM
14 years 3 months ago
Collective communication on architectures that support simultaneous communication over multiple links
Traditional collective communication algorithms are designed with the assumption that a node can communicate with only one other node at a time. On new parallel architectures such...
Ernie Chan, Robert A. van de Geijn, William Gropp,...
ACSC
2005
IEEE
14 years 3 months ago
The Effect of Context and Application Type on Mobile Usability: An Empirical Study
This paper discusses the effect of context on mobile usability, proposes an expanded model of mobile application context, and conducts an empirical study to test a number of hypot...
Caspar Ryan, Atish Gonsalves