Sciweavers

6861 search results - page 96 / 1373
» Security for Ubiquitous Computing
Sort
View
JDCTA
2008
128views more  JDCTA 2008»
13 years 10 months ago
Specifying a WS-ECA Working Framework for Ubiquitous Web Services in Object-Process Methodology
The Web Services-Event-Condition-Action (WSECA) framework is designed to enable the heterogeneous communication devices in Ubiquitous Computing Environments to achieve inter-opera...
Haining Lee, Jaeil Park, Peom Park, Dongmin Shin
CSCW
1992
ACM
14 years 2 months ago
Ubiquitous Audio: Capturing Spontaneous Collaboration
Although talkhtg is an integral part of collaborative activity, there has been little computer support for acquiring and accessing the contents of conversations. Our approach has ...
Debby Hindus, Chris Schmandt
APNOMS
2006
Springer
14 years 2 months ago
Autonomic Management of Scalable Load-Balancing for Ubiquitous Networks
In ubiquitous networks, a lot of sensors and RFID readers will be connected to the networks as well as PCs and mobile phones are connected, and huge numbers of transactions are exp...
Toshio Tonouchi, Yasuyuki Beppu
SAC
2010
ACM
14 years 5 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
IMC
2007
ACM
14 years 7 days ago
A brief history of scanning
Incessant scanning of hosts by attackers looking for vulnerable servers has become a fact of Internet life. In this paper we present an initial study of the scanning activity obse...
Mark Allman, Vern Paxson, Jeff Terrell