Ubiquitous computing and communication environments connect systems and people in unprecedented ways, but also fundamentally challenge the mindset of traditional systems engineeri...
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...
Real-time frequent pattern mining for business intelligence systems are currently in the focal area of research. In a number of areas of doing business, especially in the arena of...
Novel ubiquitous computing applications such as intelligent vehicles, smart buildings, and traffic management require special properties that traditional computing applications d...
Context-sensitive middleware-based software is an emerging kind of ubiquitous computing application. The components of such software communicate proactively among themselves accor...
T. H. Tse, Stephen S. Yau, W. K. Chan, Heng Lu, Ts...