Sciweavers

1412 search results - page 254 / 283
» Experience Prototyping
Sort
View
SIGCOMM
1998
ACM
14 years 8 days ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
ACSAC
2007
IEEE
14 years 2 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
RAID
2007
Springer
14 years 2 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
DAIS
2008
13 years 9 months ago
Brokering Planning Metadata in a P2P Environment
In self-adaptive systems, metadata about resources in the system (e.g., services, nodes) must be dynamically published, updated, and discarded. Current adaptive middleware approach...
Johannes Oudenstad, Romain Rouvoy, Frank Eliassen,...
JNW
2007
81views more  JNW 2007»
13 years 8 months ago
A Ubiquitous Care-Support Service based on Agent-oriented Multiple-Context Coordination
Abstract— This paper presents a gentle system for supervising care-support services that fulfill users’ actual requirements based on their physical locations and statuses of s...
Hideyuki Takahashi, Yoshikazu Tokairin, Kazuhiro Y...