107464 research outputs found
Sort by
Ubiquitous Computing Technology for Real Time Enterprises
Ubiquitous Computing assumes that users and their computing devices are highly mobile. Because it is unlikely that mobile networks will be equally available in the same quality everywhere, there may be varying levels of connectivity, ranging from full network availability through low-bandwidth connectiv- ity, to no connection at all. As a consequence, software components in the system cannot assume that the connections between them are static and always available. The event-based style is essential for ubiquitous computing, since it offers a good decoupling of the communicating entities in terms of space, time, and program flow. This chapter starts with an introduction to the different interaction models found in distributed systems. Next, a classification of publish/subscribe-systems is presented. We then describe a formal data and filter model that allows us to precisely define the semantics of event filters. Based on this model, we discuss different routing algorithms for the efficient distribution of event notifications in a network. Finally, a number of examples for publish/subscribe systems are presented
Fine structure of the isoscalar giant quadrupole resonance in 40Ca due to Landau damping?
New Insights into the Facies Distribution of the Wajid Sandstone in its Western Outcrop-Area and Implication on Reservoir Properties.
Adhesive connections in glass structures— part I: experiments and analytics on thin structural silicone
Baukunst und Wissenschaft – Architektenausbildung um 1800 am Beispiel der Berliner Bauakademie
Mobile Platform Security
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners