Sciweavers

304 search results - page 16 / 61
» Trusted Computing in Mobile Action
Sort
View
WMCSA
2008
IEEE
14 years 2 months ago
Low-bandwidth VM migration via opportunistic replay
Virtual machine (VM) migration has been proposed as a building block for mobile computing. An important challenge for VM migration is to optimize the transfer of large amounts of ...
Ajay Surie, H. Andrés Lagar-Cavilla, Eyal d...
SIGCOMM
2010
ACM
13 years 7 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
DSVIS
2008
Springer
13 years 9 months ago
Resources for Situated Actions
In recent years, advances in software tools have made it easier to analyze interactive system specifications, and the range of their possible behaviors. However, the effort involve...
Gavin J. Doherty, José Creissac Campos, Mic...
CIE
2005
Springer
13 years 7 months ago
Atomic actions -- molecular experience: theory of pervasive gaming
The attempt of this paper is to describe and analyze the formalisms of pervasive games and pervasive gaming (PG). As the title indicates, PG consists of atomic entities that never...
Bo Kampmann Walther
CASSIS
2004
Springer
14 years 1 months ago
Mobile Resource Guarantees for Smart Devices
We present the Mobile Resource Guarantees framework: a system for ensuring that downloaded programs are free from run-time violations of resource bounds. Certificates are attached...
David Aspinall, Stephen Gilmore, Martin Hofmann, D...