Sciweavers

1229 search results - page 155 / 246
» Trusted Computing
Sort
View
DAC
2006
ACM
14 years 22 days ago
IMPRES: integrated monitoring for processor reliability and security
Security and reliability in processor based systems are concerns requiring adroit solutions. Security is often compromised by code injection attacks, jeopardizing even `trusted so...
Roshan G. Ragel, Sri Parameswaran
ACMDIS
2008
ACM
13 years 11 months ago
Games for virtual team building
Distributed teams are increasingly common in today's workplace. For these teams, face-to-face meetings where members can most easily build trust are rare and often cost-prohi...
Jason B. Ellis, Kurt Luther, Katherine Bessi&egrav...
CSREASAM
2003
13 years 10 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
SEC
2001
13 years 10 months ago
On Securely Scheduling a Meeting
Abstract When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas pr...
T. Herlea, Joris Claessens, Bart Preneel, Gregory ...
AAAI
1998
13 years 10 months ago
Cooperating with people: the Intelligent Classroom
People frequently complain that it is too difficult to figure out how to get computers to do what they want. However, with a computer system that actually tries to understand what...
David Franklin