Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Abstract—In future massively distributed service-based computational systems, resources will span many locations, organisations and platforms. In such systems, the ability to all...
With the popularization of the wireless network, and the progress of mobile computing technology, the efficiency of the hand-held device is better, and its applications are wider....
Organising large-scale Web information retrieval systems into hierarchies of topic-specific search resources can improve both the quality of results and the efficient use of com...