-
1
-
-
46449123862
-
-
First mobile phone virus created. BBC, June 16, 2004.
-
First mobile phone virus created. BBC, June 16, 2004.
-
-
-
-
2
-
-
84885639914
-
-
A. J. et al. Detecting past and present intrusions through vulnerability-specific predicates. In SOSP, October 2005.
-
A. J. et al. Detecting past and present intrusions through vulnerability-specific predicates. In SOSP, October 2005.
-
-
-
-
3
-
-
46449092375
-
-
A. L. et al. Place Lab: Device positioning using radio beacons in the wild. In Pervasive, May 2005.
-
A. L. et al. Place Lab: Device positioning using radio beacons in the wild. In Pervasive, May 2005.
-
-
-
-
4
-
-
84860593849
-
-
D. I. et al. Sharing networked resources with brokered leases. In USENIX, June 2006.
-
D. I. et al. Sharing networked resources with brokered leases. In USENIX, June 2006.
-
-
-
-
5
-
-
46449094500
-
-
D. R. et al. Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols. In WCNC, March 2005.
-
D. R. et al. Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols. In WCNC, March 2005.
-
-
-
-
6
-
-
46449103455
-
-
D. T. et al. LLAMA: An adaptive strategy for utilizing excess energy to perform background tasks on mobile devices. In University of Massachusetts Technical Report TR-06-44, September 2006.
-
D. T. et al. LLAMA: An adaptive strategy for utilizing excess energy to perform background tasks on mobile devices. In University of Massachusetts Technical Report TR-06-44, September 2006.
-
-
-
-
7
-
-
46449092376
-
-
E. B. et al. Disco: Running commodity operating systems on scalable multiprocessors. TOCS, 15(4), 1997.
-
E. B. et al. Disco: Running commodity operating systems on scalable multiprocessors. TOCS, 15(4), 1997.
-
-
-
-
8
-
-
46449134054
-
-
G. W. D. et al. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In OSDI, December 2002.
-
G. W. D. et al. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In OSDI, December 2002.
-
-
-
-
9
-
-
46449094181
-
-
H. Z. et al. ECOSystem: Managing power as a first class operating system resource. In ASPLOS, October 2002.
-
H. Z. et al. ECOSystem: Managing power as a first class operating system resource. In ASPLOS, October 2002.
-
-
-
-
10
-
-
46449089921
-
-
J. D. et al. SIM trust parameters. In Intel Developer Update Magazine, January 2003.
-
J. D. et al. SIM trust parameters. In Intel Developer Update Magazine, January 2003.
-
-
-
-
11
-
-
46449085724
-
-
L. P. C. et al. Presence exchanges: Towards sustainable presence-sharing. In HotMobile, April 2006.
-
L. P. C. et al. Presence exchanges: Towards sustainable presence-sharing. In HotMobile, April 2006.
-
-
-
-
12
-
-
46449120860
-
-
M. R. et al. Virtual machine monitors: Current technology and future trends. In IEEE Computer Magazine, May 2005.
-
M. R. et al. Virtual machine monitors: Current technology and future trends. In IEEE Computer Magazine, May 2005.
-
-
-
-
13
-
-
33645079896
-
-
M. S. et al. Towards seamless mobility on pervasive hardware. Pervasive and Mobile Computing, 1(2), June 2005.
-
M. S. et al. Towards seamless mobility on pervasive hardware. Pervasive and Mobile Computing, 1(2), June 2005.
-
-
-
-
14
-
-
46449114239
-
-
M. V. et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm. In SOSP, October 2005.
-
M. V. et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm. In SOSP, October 2005.
-
-
-
-
15
-
-
46449107182
-
-
P. B. et al. Xen and the art of virtualization. In SOSP, October 2003.
-
P. B. et al. Xen and the art of virtualization. In SOSP, October 2003.
-
-
-
-
16
-
-
77958484343
-
-
P. S.-M. et al. Scylla: A smart virtual machine for mobile embedded systems. In WMCSA, December 2000.
-
P. S.-M. et al. Scylla: A smart virtual machine for mobile embedded systems. In WMCSA, December 2000.
-
-
-
-
17
-
-
46449103719
-
-
R. C. et al. Reincarnating PCs with portable soulpads. In MobiSys, June 2005.
-
R. C. et al. Reincarnating PCs with portable soulpads. In MobiSys, June 2005.
-
-
-
-
18
-
-
85077373727
-
-
S. T. K. et al. Debugging operating systems with time-traveling virtual machines. In USENIX, April 2005.
-
S. T. K. et al. Debugging operating systems with time-traveling virtual machines. In USENIX, April 2005.
-
-
-
-
20
-
-
85080362568
-
A Virtual Machine Introspection Based Architecture for Intrusion Detection
-
February
-
T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In NDSS, February 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
21
-
-
11244321489
-
The changing uses of a mature campus-wide wireless network
-
September
-
T. Henderson and et al. The changing uses of a mature campus-wide wireless network. In MobiCom, September 2004.
-
(2004)
MobiCom
-
-
Henderson, T.1
and et, al.2
-
22
-
-
0036953938
-
-
P. Levis and D. Culler. Maté: A tiny virtual machine for sensor networks. In ASPLOS, October 2002.
-
P. Levis and D. Culler. Maté: A tiny virtual machine for sensor networks. In ASPLOS, October 2002.
-
-
-
-
23
-
-
46449139152
-
The BlueBag: A mobile, covert blue-tooth attack and infection device
-
August
-
C. Mertoni and et al. The BlueBag: a mobile, covert blue-tooth attack and infection device. In Blackhat, August 2006.
-
(2006)
Blackhat
-
-
Mertoni, C.1
and et, al.2
-
24
-
-
33751069196
-
NetTop: Commercial Technology in High Assurance Applications
-
September
-
R. Meushaw and D. Simard. NetTop: Commercial Technology in High Assurance Applications. Tech Trend Notes, 9(4), September 2000.
-
(2000)
Tech Trend Notes
, vol.9
, Issue.4
-
-
Meushaw, R.1
Simard, D.2
-
26
-
-
46449117282
-
-
TRANGO systems
-
TRANGO systems. http://www.trango-systems.com.
-
-
-
-
27
-
-
0042014530
-
Random waypoint considered harmful
-
April
-
J. Yoon, M. Liu, and B. Noble. Random waypoint considered harmful. In INFOCOM, April 2003.
-
(2003)
INFOCOM
-
-
Yoon, J.1
Liu, M.2
Noble, B.3
|