Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
After many years of prefetching research, most commercially available systems support only two types of prefetching: software-directed prefetching and hardware-based prefetchers u...
Context-aware applications can better meet users’ needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this n...
The current World Wide Web is essentially a network of documents, a continuously evolving information universe. But the potential of internetworking goes far beyond information ac...
Abstract E-commerce, web-based booking systems, and on-line auction systems are only a few examples that demonstrate how WWW sites are evolving from hypermedia information reposito...