Sciweavers

373 search results - page 70 / 75
» Virtual Power Limiter System which Guarantees Stability of C...
Sort
View
WPES
2003
ACM
13 years 12 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
HICSS
2002
IEEE
91views Biometrics» more  HICSS 2002»
13 years 11 months ago
Neuroimaging Studies Give New Insight to Mental Rotation
This paper summarizes the recent findings of mental rotation studies which use neuroimaging techniques. Though many results differed, almost all the reviewed studies concurred tha...
Wendy S. Ark
MICRO
2007
IEEE
128views Hardware» more  MICRO 2007»
14 years 1 months ago
A Framework for Providing Quality of Service in Chip Multi-Processors
The trends in enterprise IT toward service-oriented computing, server consolidation, and virtual computing point to a future in which workloads are becoming increasingly diverse i...
Fei Guo, Yan Solihin, Li Zhao, Ravishankar Iyer
JFR
2007
150views more  JFR 2007»
13 years 6 months ago
Decisional autonomy of planetary rovers
To achieve the ever increasing demand for science return, planetary exploration rovers require more autonomy to successfully perform their missions. Indeed, the communication dela...
Félix Ingrand, Simon Lacroix, Solange Lemai...
CCS
2008
ACM
13 years 8 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...