Sciweavers

1444 search results - page 214 / 289
» The end of users
Sort
View
99
Voted
SAC
2011
ACM
14 years 3 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
152
Voted
ACMACE
2011
ACM
14 years 18 days ago
WeQuest: scalable alternate reality games through end-user content authoring
Alternate Reality Games (ARGs) are interactive narrative experiences that engage the player by layering a fictional world over the real world. Mobile ARG stories are often geo-sp...
Andrew Macvean, Sanjeet Hajarnis, Brandon Headrick...
122
Voted
ICC
2011
IEEE
269views Communications» more  ICC 2011»
14 years 6 days ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino
124
Voted
ICDE
2012
IEEE
233views Database» more  ICDE 2012»
13 years 3 months ago
Accuracy-Aware Uncertain Stream Databases
Abstract— Previous work has introduced probability distributions as first-class components in uncertain stream database systems. A lacking element is the fact of how accurate the...
Tingjian Ge, Fujun Liu
129
Voted
JUCS
2006
123views more  JUCS 2006»
15 years 17 days ago
Persian/Arabic Baffletext CAPTCHA
: Nowadays, many daily human activities such as education, trade, talks, etc are done by using the Internet. In such things as registration on Internet web sites, hackers write pro...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...