Sciweavers

2358 search results - page 130 / 472
» A Secure Pervasive Environment
Sort
View
IAW
2003
IEEE
14 years 2 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.

Publication
819views
15 years 8 months ago
Continuous Query Processing of Spatio-temporal Data Streams in PLACE
The tremendous increase in the use of cellular phones, GPS-like devices, and RFIDs results in highly dynamic environments where objects as well as queries are continuously moving. ...
Mohamed F. Mokbel, Xiaopeng Xiong, Moustafa A. Ham...
UDM
2005
IEEE
14 years 2 months ago
Challenges and Opportunities of Context-Aware Information Access
Ubiquitous computing environments embedding a wide range of pervasive computing technologies provide a challenging and exciting new domain for information access. Individuals work...
Gareth J. F. Jones
EUC
2004
Springer
14 years 2 months ago
Context-Aware State Management for Ubiquitous Applications
In a ubiquitous computing environment, users continuously access computing services and interact with smart spaces, while moving from one place to another. Application migration, t...
Pauline P. L. Siu, Nalini Moti Belaramani, Cho-Li ...
ATAL
2008
Springer
13 years 11 months ago
Simulation of sensor-based tracking in Second Life
This paper describes "Second Life" as a novel type of testbed and simulation environment for sensor-based applications. Second Life is a popular virtual online world tha...
Boris Brandherm, Sebastian Ullrich, Helmut Prendin...