Sciweavers

3471 search results - page 669 / 695
» User activity histories
Sort
View
MDM
2004
Springer
147views Communications» more  MDM 2004»
15 years 3 months ago
Mobile Agents: Can They Assist with Context Awareness?
This position paper argues that the mobile agents paradigm is a useful and important technology enabling pervasive and ubiquitous computing. Context awareness drives adaptability ...
Arkady B. Zaslavsky
SIGADA
2004
Springer
15 years 3 months ago
Information systems security engineering: a critical component of the systems engineering lifecycle
The purpose of this research paper is to illustrate the industrial and federal need for Information Systems Security Engineering (ISSE) in order to build Information Assurance (IA...
James F. Davis
VIZSEC
2004
Springer
15 years 3 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
78
Voted
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
15 years 2 months ago
Resource adaptation based on MPEG-21 usage environment descriptions
This paper addresses several aspects related to the distribution of content. The first aim is to provide an overview of the Universal Multimedia Access (UMA) concept. The primary...
Huifang Sun, Anthony Vetro, K. Asai
GROUP
2003
ACM
15 years 2 months ago
Using cursor prediction to smooth telepointer jitter
Telepointers are an important type of embodiment in real-time distributed groupware. Telepointers can increase the presence of remote participants and can provide considerable awa...
Carl Gutwin, Jeff Dyck, Jennifer Burkitt