Sciweavers

4897 search results - page 146 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
STORAGESS
2005
ACM
15 years 10 months ago
Pvault: a client server system providing mobile access to personal data
In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The maj...
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalin...
COMPSAC
1998
IEEE
15 years 8 months ago
M-base: Enduser-Initiative Application Development Based on Message Flow and Componentware
Explosive increase in enduser computing on distributed systems requires that endusers develop application software by themselves. One solution is given as a formula of "a dom...
Takeshi Chusho, Mitsuyoshi Matsumoto, Yuji Konishi
SOSP
2007
ACM
16 years 1 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
HICSS
2003
IEEE
142views Biometrics» more  HICSS 2003»
15 years 9 months ago
Evolution of a Knowledge Focused Computer Supported Learning System by Ensuring Extensibility through Generalization and Replica
If sufficient attention is not paid to the information models on which Learning Platforms are based the ability to deliver rich functionality is hindered. This paper describes the...
David White, Lesley A. Gardner, Don Sheridan
TC
2010
14 years 11 months ago
Performability Analysis of Multistate Computing Systems Using Multivalued Decision Diagrams
A distinct characteristic of multistate systems (MSS) is that the systems and/or their components may exhibit multiple performance levels (or states) varying from perfect operation...
Suprasad V. Amari, Liudong Xing, Akhilesh Shrestha...