Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
This paper describes a middleware architecture with its location inference service (LIS), and an application for context-aware mobile collaboration which is based on this architec...
Hana K. Rubinsztejn, Markus Endler, Vagner Sacrame...
This paper investigates how emotions, in this case fear, affect behaviour. We consider deer and sheep as exemplary flocking mammals. The paper also describes and applies a mechanis...
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...