Sciweavers

477 search results - page 10 / 96
» A Pervasive Computing System for the Operating Room of the F...
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
CSREAPSC
2006
13 years 9 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
EDBT
2010
ACM
147views Database» more  EDBT 2010»
14 years 2 months ago
A simple (yet powerful) algebra for pervasive environments
Querying non-conventional data is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is the ability to qu...
Yann Gripay, Frédérique Laforest, Je...
ICOIN
2001
Springer
14 years 16 min ago
Pervasive Adaptation for Mobile Computing
Mobile Computing platforms such as mobile phones, PDAs or wearable computers operate in a much more volatile and limited environment than their stationary counterparts. Such platf...
Tim Edmonds, Andy Hopper, Steve Hodges
COMPSAC
2009
IEEE
14 years 2 months ago
A Perspective on Middleware-Oriented Context-Aware Pervasive Systems
The evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this...
Zakwan Jaroucheh, Xiaodong Liu, Sally Smith