Sciweavers

262 search results - page 42 / 53
» Architecture and dialogue design for a voice operated inform...
Sort
View
CCS
2007
ACM
14 years 1 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
CORR
2010
Springer
178views Education» more  CORR 2010»
13 years 7 months ago
Automatic Recommendation for Online Users Using Web Usage Mining
A real world challenging task of the web master of an organization is to match the needs of user and keep their attention in their web site. So, only option is to capture the intu...
Dipa Dixit, Jayant Gadge
CASES
2005
ACM
13 years 9 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
SIGCOMM
2009
ACM
14 years 2 months ago
A standalone content sharing application for spontaneous communities of mobile handhelds
This demo illustrates the benefits of BitHoc, a standalone protocol for content sharing among spontaneous communities of mobile handhelds using wireless multi-hop connections. Bi...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
EUROSYS
2007
ACM
14 years 4 months ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso