Performance of secure mobile applications
摘要:
A request for a first resource by a user is received. In response to receiving the request for a first resource, a second resource is determined based on the first resource and a resource usage pattern of the user. A response to the request for the first resource is provided. The response includes the first resource and the second resource.
公开/授权文献
信息查询
0/0