Sciweavers

1462 search results - page 55 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
ICECCS
2008
IEEE
168views Hardware» more  ICECCS 2008»
15 years 8 months ago
Ubiquitous Service Regulation Based on Dynamic Rules
Ubiquitous computing systems can be regarded as open systems where heterogeneous and previously unknown entities may spontaneously interact, due to intrinsic mobility of users and...
José Viterbo Filho, Markus Endler, Jean-Pie...
GECCO
2003
Springer
108views Optimization» more  GECCO 2003»
15 years 7 months ago
Evolutionary Testing of Flag Conditions
Evolutionary Testing (ET) has been shown to be very successful in testing real world applications [16]. However, it has been pointed out [11], that further research is necessary if...
André Baresel, Harmen Sthamer
WCRE
1999
IEEE
15 years 6 months ago
A Tool for Securely Integrating Legacy Systems into a Distributed Environment
Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a...
Timothy S. Souder, Spiros Mancoridis
MOBIHOC
2010
ACM
14 years 11 months ago
Fine-grained mobility characterization: steady and transient state behaviors
Recent popularization of personal hand-held mobile devices makes it important to characterize the mobility pattern of mobile device users, so as to accurately predict user mobilit...
Wei Gao, Guohong Cao
COMCOM
2000
95views more  COMCOM 2000»
15 years 1 months ago
Countermeasures for mobile agent security
: Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in...
Wayne A. Jansen