Sciweavers

1124 search results - page 183 / 225
» Scalable Service Performance Monitoring
Sort
View
CCS
2007
ACM
15 years 10 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...
MDM
2007
Springer
106views Communications» more  MDM 2007»
15 years 10 months ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
CCGRID
2005
IEEE
15 years 9 months ago
Continuous resources allocation in Internet data centers
Internet data centers (IDCs) perform multi-customer hosting on a virtualized collection of resources while Grid computing generalizes distributed computing by focusing on large sc...
Youssef Hamadi
160
Voted
HOTI
2005
IEEE
15 years 9 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
MMM
2005
Springer
143views Multimedia» more  MMM 2005»
15 years 9 months ago
Color Time Petri Net for Interactive Adaptive Multimedia Objects
A composite multimedia object (cmo) is comprised of different media components such as text, video, audio and image, with a variety of constraints that must be adhered to. The con...
Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri