Sciweavers

1081 search results - page 38 / 217
» Challenges: an application model for pervasive computing
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
16 years 4 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
AUIC
2005
IEEE
15 years 9 months ago
Lightweight User Interfaces for Watch Based Displays
Ubiquitous mobile computing devices offer the opportunity to provide easy access to a rich set of information sources. Placing the display for this computing device on the user’...
Peter Hutterer, Mark T. Smith, Bruce H. Thomas, Wa...
DEBS
2009
ACM
15 years 7 months ago
Event-based systems: opportunities and challenges at exascale
Streaming data models have been shown to be useful in many applications requiring high-performance data exchange. Application-level overlay networks are a natural way to realize t...
Greg Eisenhauer, Matthew Wolf, Hasan Abbasi, Karst...
GCC
2006
Springer
15 years 7 months ago
Redar: A Remote Desktop Architecture for the Distributed Virtual Personal Computing
Some popular computing technologies, such as ubiquitous computing, grid computing and thin-client computing, bring people to a much more distributed and pervasive computing enviro...
Yuedong Zhang, Zhenhua Song, Dingju Zhu, Zhuan Che...
PERVASIVE
2011
Springer
14 years 6 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...