Sciweavers

2358 search results - page 213 / 472
» A Secure Pervasive Environment
Sort
View
COLCOM
2009
IEEE
14 years 2 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
ECOOPW
1999
Springer
14 years 1 months ago
Piccola - A Small Composition Language
Moore’s Law is pushing us inevitably towards a world of pervasive, wireless, spontaneously networked computing devices. Whatever these devices do, they will have to talk to and n...
Oscar Nierstrasz
IEEESCC
2010
IEEE
14 years 1 months ago
Using Complex Event Processing for Dynamic Business Process Adaptation
—As the amount of data generated by today’s pervasive environments increases exponentially, there is a stronger need to decipher the important information that is hidden among ...
Gabriel Hermosillo, Lionel Seinturier, Laurence Du...
INTERACT
2007
13 years 10 months ago
Recognising Erroneous and Exploratory Interactions
A better understanding of “human error” is needed to help overcome problems of people assuming they are to blame for their inability to use poorly designed technology. In order...
Jonathan Back, Ann Blandford, Paul Curzon
ITSSA
2006
97views more  ITSSA 2006»
13 years 9 months ago
Service Evolution in Bio-Inspired Communication Systems
: An autonomic network must work unsupervised, therefore must be able to respond to unpredictable situations. The BIONETS project is working towards resilient network services that...
Daniele Miorandi, Lidia Yamamoto, Paolo Dini