Sciweavers

1229 search results - page 147 / 246
» Trusted Computing
Sort
View
EWSN
2009
Springer
14 years 10 months ago
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node...
Wen Hu, Peter I. Corke, Wen Chan Shih, Leslie Over...
PERCOM
2007
ACM
14 years 9 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
ICPR
2008
IEEE
14 years 4 months ago
Improvement on Mean Shift based tracking using second-order information
Object tracking based on Mean Shift (MS) algorithm has been very successful and thus receives significant research interests. Unfortunately, traditional MS based tracking only ut...
Lijuan Xiao, Peihua Li
SWS
2004
ACM
14 years 3 months ago
Security in WebCom: addressing naming issues for a web services architecture
Supporting security in distributed systems is becoming more important with the ongoing work in grids, distributed middlewares and web services. Decentralised security architecture...
Thomas B. Quillinan, Simon N. Foley
GCC
2004
Springer
14 years 3 months ago
Reliable Accounting in Grid Economic Transactions
In the Grid computing model a remote service is provided by a resource owner to a client. The resource owner executes a client job and charges the client for a corresponding fee. I...
Luigi Catuogno, Pompeo Faruolo, Umberto Ferraro Pe...