Sciweavers

168 search results - page 16 / 34
» Active Rule System for Adaptive Mobile Data Access
Sort
View
MOBISYS
2008
ACM
14 years 8 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...
NOSSDAV
2005
Springer
14 years 2 months ago
ACE: an active, client-directed method for reducing energy during web browsing
In mobile devices, the wireless network interface card (WNIC) consumes a significant portion of overall system energy. One way to reduce energy consumed by a device is to transit...
Haijin Yan, David K. Lowenthal, Kang Li
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 23 days ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
GEOINFO
2003
13 years 9 months ago
The Architecture of a Mobile Emergency Plan Deployment System
This paper describes the implementation of a workflow management system to support mobile GIS workgroup applications and highlights the design of the workflow definition language t...
Fábio Meira de Oliveira Dias, Marcelo T&iac...
CSREASAM
2006
13 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin