Sciweavers

4794 search results - page 171 / 959
» Trust-Based Mechanism Design
Sort
View
140
Voted
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
15 years 10 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan
IROS
2007
IEEE
128views Robotics» more  IROS 2007»
15 years 10 months ago
A modular robotic system using magnetic force effectors
— One of the primary impediments to building ensembles with many modular robots is the complexity and number of mechanical mechanisms used to construct the individual modules. As...
Brian T. Kirby, Burak Aksak, Jason Campbell, James...
POS
1994
Springer
15 years 8 months ago
Protection in Grasshopper: A Persistent Operating System
nt systems support a single storage abstraction in which all data may be created and manipulated in a uniform manner, regardless of its longevity. In such systems a protection mec...
Alan Dearle, Rex di Bona, James Farrow, Frans A. H...
CCS
2006
ACM
15 years 7 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
CCR
1998
90views more  CCR 1998»
15 years 3 months ago
On the generation and use of TCP acknowledgments
This paper presents a simulation study of various TCP acknowledgment generation and utilization techniques. We investigate the standard version of TCP and the two standard acknowl...
Mark Allman