Sciweavers

158 search results - page 25 / 32
» Information Leakage Detection in Distributed Systems using S...
Sort
View
ATAL
2005
Springer
15 years 5 months ago
Formalization of a voting protocol for virtual organizations
A voting protocol for decision-making in virtual organizations is presented. In an agent-based virtual organization the functions of formation, management and dissolution of the o...
Jeremy V. Pitt, Lloyd Kamara, Marek J. Sergot, Ale...
MOBISYS
2008
ACM
15 years 11 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
IUI
2010
ACM
15 years 8 months ago
An adaptive calendar assistant using pattern mining for user preference modelling
In this paper, we present SmartCal, a calendar assistant that suggests appointment attributes, such as time, day, duration, etc., given any combination of initial user input attri...
Alfred Krzywicki, Wayne Wobcke, Anna Wong
SAC
2010
ACM
14 years 12 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
WWW
2002
ACM
16 years 13 days ago
Clustering for opportunistic communication
We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. U...
Jay Budzik, Shannon Bradshaw, Xiaobin Fu, Kristian...