Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Ubiquitous mobile computing devices offer the opportunity to provide easy access to a rich set of information sources. Placing the display for this computing device on the user’...
Peter Hutterer, Mark T. Smith, Bruce H. Thomas, Wa...
Streaming data models have been shown to be useful in many applications requiring high-performance data exchange. Application-level overlay networks are a natural way to realize t...
Greg Eisenhauer, Matthew Wolf, Hasan Abbasi, Karst...
Some popular computing technologies, such as ubiquitous computing, grid computing and thin-client computing, bring people to a much more distributed and pervasive computing enviro...
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...