Sciweavers

2358 search results - page 41 / 472
» A Secure Pervasive Environment
Sort
View
CCS
2007
ACM
14 years 3 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
PERCOM
2007
ACM
14 years 8 months ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang
SEFM
2009
IEEE
14 years 3 months ago
Implementation Correctness of a Real-Time Operating System
—In the modern car, electronic devices are even employed for safety-critical missions like brake control, where failures might cost human lives. Among various approaches to incre...
Matthias Daum, Norbert Schirmer, Mareike Schmidt
EUROSSC
2008
Springer
13 years 10 months ago
On the Evaluation of Quality of Context
Abstract. High quality context information plays a vital role in adapting a system to the rapidly changing situations. However, the diversity of the sources of context information ...
Atif Manzoor, Hong Linh Truong, Schahram Dustdar
CORR
2011
Springer
181views Education» more  CORR 2011»
13 years 3 months ago
Lightweight Service Oriented Architecture for Pervasive Computing
Pervasive computing appears like a new computing era based on networks of objects and devices evolving in a real world, radically different from distributed computing, based on ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...