Sciweavers

722 search results - page 134 / 145
» Offering Mobile Security as a Service
Sort
View
WOWMOM
2009
ACM
146views Multimedia» more  WOWMOM 2009»
14 years 1 months ago
Optimization of WiMax modulation scheme with a cross layer erasure code
WIMAX (Worldwide Interoperability for Microwave Access) is a promising new networking technology that potentially offers high speed and wide area wireless access services that com...
Lei Zhang, Patrick Sénac, Roksana Boreli, M...
ICNP
2002
IEEE
14 years 9 days ago
pTCP: An End-to-End Transport Layer Protocol for Striped Connections
The TCP transport layer protocol is designed for connections that traverse a single path between the sender and receiver. However, there are several environments in which multiple...
Hung-Yun Hsieh, Raghupathy Sivakumar
ICSE
1999
IEEE-ACM
13 years 11 months ago
A Cooperative Approach to Support Software Deployment Using the Software Dock
Software deployment is an evolving collection of interrelated processes such as release, install, adapt, reconfigure, update, activate, deactivate, remove, and retire. The connect...
Richard S. Hall, Dennis Heimbigner, Alexander L. W...
FLAIRS
2003
13 years 8 months ago
Spatially-Aware Information Retrieval with Graph-Based Qualitative Reference Models
Geo-referenced information is used by a growing number of “spatially-aware” tools in different application areas, including tourism, marketing, environmental management, and m...
Thomas Vögele, Christoph Schlieder
TRUST
2010
Springer
14 years 13 days ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...