Sciweavers

304 search results - page 55 / 61
» Trusted Computing in Mobile Action
Sort
View
NEUROSCIENCE
2001
Springer
14 years 1 days ago
Modularity and Specialized Learning: Mapping between Agent Architectures and Brain Organization
This volume is intended to help advance the field of artificial neural networks along the lines of complexity present in animal brains. In particular, we are interested in examin...
Joanna Bryson, Lynn Andrea Stein
IWAN
1999
Springer
13 years 12 months ago
Policy Specification for Programmable Networks
There is a need to be able to program network components to adapt to application requirements for quality of service, specialised application dependent routing, to increase effici...
Morris Sloman, Emil Lupu
PERCOM
2009
ACM
14 years 8 months ago
Video Ads Dissemination through WiFi-Cellular Hybrid Networks
In this paper, we propose a method for video ads dissemination through a hybrid network consisting of WiFi and cellular networks, in order to provide timely delivery of video ads w...
Hiroshi Hanano, Yoshihiro Murata, Naoki Shibata, K...
ICS
2003
Tsinghua U.
14 years 25 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
AI
2011
Springer
13 years 2 months ago
Bounded approximate decentralised coordination via the max-sum algorithm
In this paper we propose a novel approach to decentralised coordination, that is able to efficiently compute solutions with a guaranteed approximation ratio. Our approach is base...
Alex Rogers, Alessandro Farinelli, Ruben Stranders...