Sciweavers

69 search results - page 4 / 14
» Trusted Storage: Focus on Use Cases
Sort
View
ICICS
2005
Springer
14 years 27 days ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
SENSYS
2003
ACM
14 years 19 days ago
An evaluation of multi-resolution storage for sensor networks
Wireless sensor networks enable dense sensing of the environment, offering unprecedented opportunities for observing the physical world. Centralized data collection and analysis a...
Deepak Ganesan, Ben Greenstein, Denis Perelyubskiy...
RTS
2008
131views more  RTS 2008»
13 years 6 months ago
A constant-time dynamic storage allocator for real-time systems
Dynamic memory allocation has been used for decades. However, it has seldom been used in real-time systems since the worst case of spatial and temporal requirements for allocation ...
Miguel Masmano, Ismael Ripoll, Patricia Balbastre,...
ECIS
2001
13 years 8 months ago
The golden circle: A case study of organizational change at the London Ambulance Service
This paper analyzes the way in which the London Ambulance Service (LAS) recovered from the events of October 1992, when it implemented a computer aided despatch system (LASCAD) th...
Kathy McGrath
IIWAS
2007
13 years 8 months ago
User Data Privacy in Web Services Context Using Semantic Desktop - SemanticLIFE Case Study
The growing number of Web Services technologies and their use have revolutionized the web. Web Services will play an important role in the next web generation (i.e. Semantic Web) ...
Mansoor Ahmed, Amin Andjomshoaa, A. Min Tjoa