Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
Context-awareness has become a desired key feature of today’s mobile systems, yet, its realization still remains a challenge. On the one hand, mobile computing provides great po...
Lukasz Juszczyk, Harald Psaier, Atif Manzoor, Scha...
In ubiquitous computing, behavior routine learning is the process of mining the context-aware data to find interesting rules on the user’s behavior, while preference learning tri...
Service-based systems have many applications, such as collaborative research and development, e-business, health care, military applications, and homeland security. In dynamic ser...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
Mobile devices make ideal personal ambient information systems given their ubiquitous adoption by users and their rich context knowledge of users’ activity. However, we believe ...