Sciweavers

391 search results - page 68 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
WISEC
2010
ACM
15 years 6 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
USS
2004
15 years 1 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
SWS
2006
ACM
15 years 5 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
DAGSTUHL
2007
15 years 1 months ago
Logical Particle Filtering
Abstract. In this paper, we consider the problem of filtering in relational hidden Markov models. We present a compact representation for such models and an associated logical par...
Luke S. Zettlemoyer, Hanna M. Pasula, Leslie Pack ...
PERCOM
2010
ACM
15 years 3 months ago
Tuning to your position: FM radio based indoor localization with spontaneous recalibration
—Position of mobile users has become highly important information in pervasive computing environments. Indoor localization systems based on Wi-Fi signal strength fingerprinting t...
Aleksandar Matic, Andrei Papliatseyeu, Venet Osman...