Sciweavers

734 search results - page 38 / 147
» Computer Virus Propagation Models
Sort
View
MOBISYS
2003
ACM
15 years 9 months ago
Collaboration and Multimedia Authoring on Mobile Devices
This paper introduces adaptation-aware editing and progressive update propagation, two novel mechanisms that enable authoring multimedia content and collaborative work on mobile d...
Eyal de Lara, Rajnish Kumar, Dan S. Wallach, Willy...
ICDCS
2010
IEEE
15 years 1 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
BIOCOMP
2006
14 years 11 months ago
Basic Reproductive Rate of a Spatial Epidemic Seir Model using Computer Algebra Software
The use of computer algebra software has many applications in diverse fields like epidemiology. This work pretends to show how computer algebra software applications for symbolic ...
Sebastian Guzmán, Juan Fernando Ospina
PERCOM
2004
ACM
15 years 9 months ago
Programming Pervasive and Mobile Computing Applications with the TOTA Middleware
Pervasive computing calls for suitable middleware and programming models to deal with large software systems dived in dynamic mobile network environments. Here we present the prog...
Marco Mamei, Franco Zambonelli
DBSEC
2008
136views Database» more  DBSEC 2008»
14 years 11 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri