Sciweavers

2358 search results - page 63 / 472
» A Secure Pervasive Environment
Sort
View
ICIP
2008
IEEE
14 years 10 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...
PERCOM
2008
ACM
14 years 8 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...
PERCOM
2004
ACM
14 years 8 months ago
Programming Pervasive and Mobile Computing Applications with the TOTA Middleware
Pervasive computing calls for suitable middleware and programming models to deal with large software systems dived in dynamic mobile network environments. Here we present the prog...
Marco Mamei, Franco Zambonelli
SMC
2007
IEEE
154views Control Systems» more  SMC 2007»
14 years 3 months ago
From biology to evolve-able pervasive ICT systems
Abstract— The emergence of future pervasive ICT environments, characterized by the massive proliferation of embedded electronic devices with communication and computing capabilit...
Iacopo Carreras, Daniele Miorandi, Imrich Chlamtac
BIOWIRE
2007
Springer
14 years 3 months ago
Field-Based Coordination for Pervasive Computing Applications
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli