Sciweavers

3424 search results - page 396 / 685
» Building Diverse Computer Systems
Sort
View
137
Voted
UIC
2009
Springer
15 years 10 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 4 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
138
Voted
CEC
2009
IEEE
15 years 10 months ago
Evolutionary market agents and heterogeneous service providers: Achieving desired resource allocations
Abstract—In future massively distributed service-based computational systems, resources will span many locations, organisations and platforms. In such systems, the ability to all...
Peter R. Lewis, Paul Marrow, Xin Yao
144
Voted
WMTE
2008
IEEE
15 years 10 months ago
Context-Aware Writing in Ubiquitous Learning Environments
With the popularization of the wireless network, and the progress of mobile computing technology, the efficiency of the hand-held device is better, and its applications are wider....
Tzung-Shi Chen, Cheng-Sian Chang, Jeng-Shian Lin, ...
WIDM
2004
ACM
15 years 9 months ago
Specialisation dynamics in federated web search
Organising large-scale Web information retrieval systems into hierarchies of topic-specific search resources can improve both the quality of results and the efficient use of com...
Rinat Khoussainov, Nicholas Kushmerick