Sciweavers

8655 search results - page 1658 / 1731
» Trusted computing challenges
Sort
View
MICRO
2003
IEEE
125views Hardware» more  MICRO 2003»
14 years 3 months ago
WaveScalar
Silicon technology will continue to provide an exponential increase in the availability of raw transistors. Effectively translating this resource into application performance, how...
Steven Swanson, Ken Michelson, Andrew Schwerin, Ma...
SENSYS
2003
ACM
14 years 3 months ago
GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information
The widespread deployment of sensor networks is on the horizon. One of the main challenges in sensor networks is to process and aggregate data in the network rather than wasting e...
James Newsome, Dawn Xiaodong Song
SIGUCCS
2003
ACM
14 years 3 months ago
Deep in benchmarking: using industry standards to assess a training program
At the University of Missouri – Columbia’s Information and Access Technology (IAT) Services, InfoTech Training compares the results of their IT training program with similar t...
Joleen Pfefer
VRST
2003
ACM
14 years 3 months ago
Tele-sports and tele-dance: full-body network interaction
Researchers have had great success using motion capture tools for controlling avatars in virtual worlds. Another current of virtual reality research has focused on building collab...
Benjamin Schaeffer, Mark Flider, Hank Kaczmarski, ...
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
14 years 3 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun
« Prev « First page 1658 / 1731 Last » Next »