Sciweavers

1490 search results - page 194 / 298
» Monitoring Mobile Code
Sort
View
106
Voted
PDPTA
2003
15 years 4 months ago
Load Balancing Voice Applications with Piranha
In this paper, we investigate the load balancing problem among a cluster of mobile and fixed devices in a voice enabled interface. We consider a design approach. The voice interfa...
Mustapha Hadim, Pierre Manneback, Michel Bagein, P...
137
Voted
ADHOC
2007
131views more  ADHOC 2007»
15 years 2 months ago
Perceptive admission control for wireless network quality of service
As wireless networks become more widely used, there is a growing need to support advanced services, such as multimedia streaming and voice over IP. Traditional approaches to guara...
Ian D. Chakeres, Elizabeth M. Belding-Royer, Josep...
119
Voted
RE
2002
Springer
15 years 2 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
224
Voted
TDSC
2011
14 years 9 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
115
Voted
PLDI
2009
ACM
15 years 9 months ago
Language-based security on Android
In this paper, we initiate a formal study of security on Android: Google’s new open-source platform for mobile devices. Specifically, we present a core typed language to descri...
Avik Chaudhuri