Sciweavers

1102 search results - page 109 / 221
» Interference and Communications among Active Network Applica...
Sort
View
DAIS
2006
15 years 2 months ago
Mobile Process Description and Execution
Abstract. Mobile devices are increasingly aware of their respective locations and vicinity and tend to communicate rather loosely with each other; therefore asynchronous communicat...
Christian P. Kunze, Sonja Zaplata, Winfried Lamers...
95
Voted
ICC
2008
IEEE
164views Communications» more  ICC 2008»
15 years 7 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
IAJIT
2010
152views more  IAJIT 2010»
14 years 10 months ago
Applicability of Telemedicine in Bangladesh: Current Status and Future Prospects
: Telemedicine refers to the use of information and communication technology to provide and support health care mainly for the purpose of providing consultation. It is also a way t...
Ahasanun Nessa, Moshaddique Al Ameen, Sana Ullah, ...
CCS
2007
ACM
15 years 6 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
95
Voted
MOBISYS
2007
ACM
16 years 7 days ago
SmartSiren: virus detection and alert for smartphones
Smartphones have recently become increasingly popular because they provide "all-in-one" convenience by integrating traditional mobile phones with handheld computing devi...
Jerry Cheng, Starsky H. Y. Wong, Hao Yang, Songwu ...