Introduction to algorithms
Elements of information theory
Elements of information theory
Approximate Algorithms for the 0/1 Knapsack Problem
Journal of the ACM (JACM)
ACM Computing Surveys (CSUR)
A fast string searching algorithm
Communications of the ACM
Efficient string matching: an aid to bibliographic search
Communications of the ACM
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
IEEE Micro
A String Matching Algorithm Fast on the Average
Proceedings of the 6th Colloquium, on Automata, Languages and Programming
Payments and banking with mobile personal devices
Communications of the ACM - Wireless networking security
Symbian OS C++ for Mobile Phones
Symbian OS C++ for Mobile Phones
Data Mining Methods for Detection of New Malicious Executables
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Fast Content-Based Packet Handling for Intrusion Detection
Fast Content-Based Packet Handling for Intrusion Detection
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Efficient randomized pattern-matching algorithms
IBM Journal of Research and Development - Mathematics and computing
Implementation Results of Bloom Filters for String Matching
FCCM '04 Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines
Gigabit Rate Packet Pattern-Matching Using TCAM
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Mobile Phones as Computing Devices: The Viruses are Coming!
IEEE Pervasive Computing
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense
An efficient signature representation and matching method for mobile devices
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
Avfs: an on-access anti-virus file system
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Evolution of wireless data services: IS-95 to cdma2000
IEEE Communications Magazine
The future generations of mobile communications based on broadband access technologies
IEEE Communications Magazine
The design and implementation of tamper resistance for mobile game service
Mobile Information Systems - Mobile and Wireless Networks
Recovery of flash memories for reliable mobile storages
Mobile Information Systems
SplitScreen: enabling efficient, distributed malware detection
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
A multi-hop advertising discovery and delivering protocol for multi administrative domain MANET
Mobile Information Systems
Hi-index | 0.00 |
Presently, the wireless mobile networks and devices are becoming increasingly popular to provide users the access anytime and anywhere. The mobile systems are based on cellular approach and the area is covered by cells that overlap each other. In mobile ...