Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Using ethnographic methods, 28 young professionals across the global cities of London, Los Angeles, and Tokyo were studied to understand in some detail what items they carried with...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
There are new challenges to us, as researchers, on how to design and evaluate new mobile applications because they give users access to powerful computing devices through small in...
In this paper, we propose an architecture to regulate the bandwidth usage of multimedia streams in networked virtual environments. In this architecture, intelligent proxies are pla...
n abstract computer virology G. Bonfante, M. Kaczmarek, and J-Y Marion Loria, Calligramme project, B.P. 239, 54506 Vandœuvre-l`es-Nancy C´edex, France, and ´Ecole Nationale Sup...