Performance of secure mobile applications
Abstract:
A request for a first resource by a user is received. In response to receiving the request for a first resource, a second resource is determined based on the first resource and a resource usage pattern of the user. A response to the request for the first resource is provided. The response includes the first resource and the second resource.
Public/Granted literature
Information query
Patent Agency Ranking
0/0