Sciweavers

2358 search results - page 28 / 472
» A Secure Pervasive Environment
Sort
View
GI
2007
Springer
14 years 1 months ago
A Semantic Approach for Description and Ranked Matching of Services in Pervasive Environments
: With the recent developments in technology, new and diverse devices are being introduced into the pervasive world. This has raised new challenges for the discovery of devices and...
Ayomi Bandara, Terry R. Payne, David De Roure, Tim...
PERVASIVE
2007
Springer
14 years 1 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...
INTERSENSE
2006
ACM
14 years 1 months ago
Addressing network heterogeneity in pervasive application environments
— Pervasive computing applications typically involve rich interactions and heterogeneous network types; e.g. involving the collation of data from a sensor network into a replicat...
Paul Grace, Geoff Coulson, Gordon S. Blair, Barry ...
KES
2005
Springer
14 years 1 months ago
User Preference Learning for Multimedia Personalization in Pervasive Computing Environment
Pervasive computing environment and users’ demand for multimedia personalization precipitate a need for personalization tools to help people access desired multimedia content at ...
Zhiwen Yu, Daqing Zhang, Xingshe Zhou, Changde Li
OTM
2005
Springer
14 years 1 months ago
Timely Provisioning of Mobile Services in Critical Pervasive Environments
Timeliness in conventional real-time systems is addressed by employing well-known scheduling techniques that guarantee the execution of a number of tasks within certain deadlines. ...
Filippos Papadopoulos, Apostolos Zarras, Evaggelia...