The panel discusses solutions to the problem of computer security education. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: security and protection. E...
Paul De Palma, Charles Frank, Suzanne E. Gladfelte...
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
: This article presents a rule–based agent mechanism as the kernel of a ubiquitous end–user, UI–independent programming system. The underlying goal of our work is to allow en...
The notion of "pervasive computing" has traditionally been identified with a focus on what might be called "pervasive processing". This paper, in contrast, argu...