Sciweavers

772 search results - page 60 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
P2PKM
2004
13 years 9 months ago
Ontology-based Service Discovery in P2P Networks
The ubiquitous computing vision is to make knowledge and services easily available in our everyday environments. A wide range of devices, applications and services can be intercon...
Daniel Elenius, Magnus Ingmarsson
DAGSTUHL
2006
13 years 9 months ago
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the...
Michael Hilker, Christoph Schommer
ISICT
2003
13 years 9 months ago
Towards a natural interface to adaptive service composition
As computers become ubiquitous in our every day lives, providing a means for true user empowerment will become crucial. Techniques which allow dynamic reuse and composition of exi...
Steffen Higel, Tony O'Donnell, Vincent Wade
PERVASIVE
2006
Springer
13 years 7 months ago
The Smart Tachograph - Individual Accounting of Traffic Costs and Its Implications
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...
Vlad Coroama
CCGRID
2002
IEEE
14 years 27 days ago
Symphony - A Java-Based Composition and Manipulation Framework for Computational Grids
We introduce the Symphony framework, a software ion layer that can sit on top of grid systems. Symphony provides a unified API for grid application developers and offers a graphic...
Markus Lorch, Dennis G. Kafura