Sciweavers

1124 search results - page 183 / 225
» Scalable Service Performance Monitoring
Sort
View
CCS
2007
ACM
15 years 8 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...
MDM
2007
Springer
106views Communications» more  MDM 2007»
15 years 8 months ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
CCGRID
2005
IEEE
15 years 7 months ago
Continuous resources allocation in Internet data centers
Internet data centers (IDCs) perform multi-customer hosting on a virtualized collection of resources while Grid computing generalizes distributed computing by focusing on large sc...
Youssef Hamadi
HOTI
2005
IEEE
15 years 7 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
MMM
2005
Springer
143views Multimedia» more  MMM 2005»
15 years 7 months ago
Color Time Petri Net for Interactive Adaptive Multimedia Objects
A composite multimedia object (cmo) is comprised of different media components such as text, video, audio and image, with a variety of constraints that must be adhered to. The con...
Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri