Sciweavers

304 search results - page 53 / 61
» Trusted Computing in Mobile Action
Sort
View
WWW
2001
ACM
14 years 8 months ago
Seeing the whole in parts: text summarization for web browsing on handheld devices
We introduce five methods for summarizing parts of Web pages on handheld devices, such as personal digital assistants (PDAs), or cellular phones. Each Web page is broken into text...
Orkut Buyukkokten, Hector Garcia-Molina, Andreas P...
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
14 years 2 months ago
Decentralized cooperative collision avoidance for acceleration constrained vehicles
— Safety must be ensured in the deployment of multi-agent vehicle systems. This paper presents decentralized collision avoidance algorithms for systems with second order dynamics...
Gabriel Hoffmann, Claire J. Tomlin
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 7 months ago
Context Awareness Framework Based on Contextual Graph
- Nowadays computing becomes increasingly mobile and pervasive. One of the important steps in pervasive computing is context-awareness. Context-aware pervasive systems rely on info...
Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokj...
VIZSEC
2007
Springer
14 years 1 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
GCC
2003
Springer
14 years 25 days ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou