-
1
-
-
84926427148
-
Survey of virtual machine research
-
R.P. Goldberg, "Survey of Virtual Machine Research", IEEE Computer Magazine, pp.34-45, 1974.
-
(1974)
IEEE Computer Magazine
, pp. 34-45
-
-
Goldberg, R.P.1
-
2
-
-
20344383743
-
Virtual machine monitors: Current technology and future trends
-
DOI 10.1109/MC.2005.176
-
M. Rosenblom and T. Garfinkel, "Virtual Machine Monitors:Current Technology and Future Trends", IEEE Computer, Vol.38, No.5, pp.39-47, 2005. (Pubitemid 40784341)
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 39-47
-
-
Rosenblum, M.1
Garfinkel, T.2
-
3
-
-
63149097189
-
Virtualization as an enabler for security in mobile devices
-
J. Brakensiek, A. Droge, H. Hartig, A. lackorzynski, and M. Botteck, "Virtualization as an Enabler for Security in Mobile Devices", In Proc. of the 1st Workshop on Isolation and Integration in Embedded systems, pp.17-22, 2008.
-
(2008)
Proc. of the 1st Workshop on Isolation and Integration in Embedded Systems
, pp. 17-22
-
-
Brakensiek, J.1
Droge, A.2
Hartig, H.3
Lackorzynski, A.4
Botteck, M.5
-
4
-
-
33750733586
-
-
Scientific American
-
M. Hypponen, "Malware Goes Mobile", Scientific American, Vol.295, No.5, pp.70-77, 2006.
-
(2006)
Malware Goes Mobile
, vol.295
, Issue.5
, pp. 70-77
-
-
Hypponen, M.1
-
6
-
-
77956578816
-
-
Grundig Mobile U900, http://linuxfordevices.com/c/a/News/Singlecore- Linux-phone-hitsthemarket.
-
Grundig Mobile U900
-
-
-
9
-
-
51949098506
-
Xen on ARM: System virtualization using xen hypervisor for ARM based secure mobile phones
-
J. Hwang, S. Suh, S. Heo, C. Park, J. Ryu, S. Park, and C. Kim, "Xen on ARM:System Virtualization using Xen Hypervisor for ARMbased Secure Mobile Phones", In Consumer Communications and Networking conference 2008(CCNC 2008), pp257-261, 2008.
-
(2008)
Consumer Communications and Networking Conference 2008(CCNC 2008)
, pp. 257-261
-
-
Hwang, J.1
Suh, S.2
Heo, S.3
Park, C.4
Ryu, J.5
Park, S.6
Kim, C.7
-
11
-
-
77956585248
-
MyAV: An all round virtual machine monitor for mobile environments
-
E. Ryu, I. Kim, J. Kim, Y. Eom, "MyAV:An All round virtual Machine Monitor for Mobile Environments", In Proc. of the 8th IEEE International Conference on Industrial Informatics 2010(INDIN 2010), pp.657-662, 2010.
-
(2010)
Proc. of the 8th IEEE International Conference on Industrial Informatics 2010(INDIN 2010)
, pp. 657-662
-
-
Ryu, E.1
Kim, I.2
Kim, J.3
Eom, Y.4
-
12
-
-
80051627330
-
-
Guidewire group, http://www.guidewiregroup.com.
-
Guidewire Group
-
-
-
13
-
-
68249093677
-
Social media change the rules
-
Angelo Fernando, "Social media change the rules", Communication world, Vol.24, No.1, pp.9-10, 2007.
-
(2007)
Communication World
, vol.24
, Issue.1
, pp. 9-10
-
-
Fernando, A.1
-
14
-
-
33751119820
-
Distributed trust infrastructure and trust-security articulation: Application to heterogeneous networks
-
DOI 10.1109/AINA.2006.150, 1620349, Proceedings - 20th International Conference on Advanced Information Networking and Applications
-
C. Tchepnda, M. Riguidel, "Distributed Trust Infrastructure and Trust-Security articulation:Application to Heterogeneous networks", Advanced Information Networking and Applications(AINA '06), Vol.2, pp.33-38, 2006. (Pubitemid 44761297)
-
(2006)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
, vol.2
, pp. 33-38
-
-
Tchepnda, C.1
Riguidel, M.2
-
16
-
-
36348937959
-
Social media and search
-
DOI 10.1109/MIC.2007.130
-
Junghoo Cho, Andrew Tomkins, "Social Media and Search", IEEE Internet Computing, Vol.11, No. 6, pp.13-15, 2007. (Pubitemid 350148359)
-
(2007)
IEEE Internet Computing
, vol.11
, Issue.6
, pp. 13-15
-
-
Junghoo, C.1
Tomkins, A.2
-
18
-
-
60249091497
-
Fuzzy computational models for trust and reputation systems
-
Kamal K. Bharadwaj, and Mohammad Yahya H.Al-Shamri, "Fuzzy computational models for trust and reputation systems", Electronic Commerce Research and Applications, Vol.8, No.1, pp.37-47, 2009.
-
(2009)
Electronic Commerce Research and Applications
, vol.8
, Issue.1
, pp. 37-47
-
-
Bharadwaj, K.K.1
Al-Shamri, M.Y.H.2
-
19
-
-
80051615024
-
A CRM insider's views on social media, facebook and web 2.0
-
David Sims., "A CRM Insider's Views on Social Media, Facebook and Web 2.0", Customer Interaction Solutions.Vol. 27, no.5; pp.2, 2008.
-
(2008)
Customer Interaction Solutions
, vol.27
, Issue.5
, pp. 2
-
-
Sims, D.1
-
20
-
-
53749089032
-
The information ecology of social media and online communities
-
Tim Finin, Anupam Joshi, Pranam Kolari, Akshay Java, et al, "The Information Ecology of Social Media and Online Communities", AI Magazine, Vol.29, no.3, pp.77-92, 2008.
-
(2008)
AI Magazine
, vol.29
, Issue.3
, pp. 77-92
-
-
Finin, T.1
Joshi, A.2
Kolari, P.3
Java, A.4
-
21
-
-
36348969572
-
Social information processing in news aggregation
-
DOI 10.1109/MIC.2007.136
-
Kristina Lerman, "Social Information Processing in News Aggregation", IEEE Internet Computing, Vol.11. No.6, pp.16-28, 2007. (Pubitemid 350148360)
-
(2007)
IEEE Internet Computing
, vol.11
, Issue.6
, pp. 16-28
-
-
Lerman, K.1
-
23
-
-
42949138243
-
Finding high-quality content in social media
-
E. Agichtein, C. Castillo, D. Donato, A. Gionis, G. Mishne, "Finding High-Quality Content in Social Media", Web Search and Data Mining 2008, pp.183-194, 2008.
-
(2008)
Web Search and Data Mining 2008
, pp. 183-194
-
-
Agichtein, E.1
Castillo, C.2
Donato, D.3
Gionis, A.4
Mishne, G.5
-
24
-
-
78649792377
-
Artificially intelligent conversational agents in libraries
-
V.L. Rubin and Y. Chen, "Artificially intelligent conversational agents in libraries", Library Hi Tech, Vol.28, No.4, pp. 496-522, 1983.
-
(1983)
Library Hi Tech
, vol.28
, Issue.4
, pp. 496-522
-
-
Rubin, V.L.1
Chen, Y.2
-
25
-
-
51349138737
-
A model of sharing based multi-agent to support adaptive service in ubiquitous environment
-
H. Yoon, E. Kim, M. Lee, J. Lee, T.M. Gatton, "A Model of Sharing Based Multi-Agent to Support Adaptive Service in Ubiquitous Environment", Proceedings of the 2008 International Conference on Information Security and Assurance(isa 2008), p.332- 337, 2008.
-
(2008)
Proceedings of the 2008 International Conference on Information Security and Assurance(isa 2008)
, pp. 332-337
-
-
Yoon, H.1
Kim, E.2
Lee, M.3
Lee, J.4
Gatton, T.M.5
|