Sciweavers

948 search results - page 130 / 190
» An Open Architecture for Pervasive Systems
Sort
View
CCS
2007
ACM
14 years 2 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
IWSEC
2010
Springer
13 years 6 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis
MOBISYS
2004
ACM
14 years 7 months ago
Impromptu: Managing Networked Audio Applications for Mobile Users
This paper discusses the software architecture of Impromptu, a mobile IP-based audio computing platform, with an associated set of network-based applications and services. Impromp...
Chris Schmandt, Kwan Hong Lee, Jang Kim, Mark S. A...
CIA
2004
Springer
14 years 1 months ago
Reasoning About Communication - A Practical Approach Based on Empirical Semantics
Given a specification of communication rules in a multiagent system (in the form of protocols, ACL semantics, etc.), the question of how to design appropriate agents that can oper...
Felix A. Fischer, Michael Rovatsos
IDA
1999
Springer
14 years 8 days ago
Knowledge-Based Visualization to Support Spatial Data Mining
Data mining methods are designed for revealing significant relationships and regularities in data collections. Regarding spatially referenced data, analysis by means of data minin...
Gennady L. Andrienko, Natalia V. Andrienko