Sciweavers

439 search results - page 54 / 88
» A Location Model for Pervasive Computing Environments
Sort
View
ARCS
2004
Springer
14 years 1 months ago
Heterogenous Data Fusion via a Probabilistic Latent-Variable Model
In a pervasive computing environment, one is facing the problem of handling heterogeneous data from different sources, transmitted over heterogeneous channels and presented on het...
Kai Yu, Volker Tresp
ICDCS
1995
IEEE
13 years 11 months ago
Maintaining Consistency of Data in Mobile Distributed Environments
To deal with the frequent, foreseeable and variable disconnections that occur in a mobile environment, we introduce a exible, two-level consistency model. Semantically related or ...
Evaggelia Pitoura, Bharat K. Bhargava
DICTA
2009
13 years 5 months ago
Soft-Biometrics: Unconstrained Authentication in a Surveillance Environment
Soft biometrics are characteristics that can be used to describe, but not uniquely identify an individual. These include traits such as height, weight, gender, hair, skin and cloth...
Simon Denman, Clinton Fookes, Alina Bialkowski, Sr...
SACMAT
2009
ACM
14 years 2 months ago
Safety in discretionary access control for logic-based publish-subscribe systems
Publish-subscribe (pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the pr...
Kazuhiro Minami, Nikita Borisov, Carl A. Gunter
MSWIM
2006
ACM
14 years 1 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt