Sciweavers

2358 search results - page 65 / 472
» A Secure Pervasive Environment
Sort
View
QSIC
2006
IEEE
14 years 2 months ago
Static Slicing for Pervasive Programs
Pervasive programs should be context-aware, which means that program functions should react according to changing environmental conditions. Slicing, as an important class of code ...
Heng Lu, W. K. Chan, T. H. Tse
CSREAPSC
2006
13 years 10 months ago
A Policy-Based Location Identification Architecture for Pervasive Systems
In this paper, we present a policy-based architecture to be used in identifying the location of users within a pervasive system environment. Mobile users can define their own poli...
Sherif G. Aly
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 3 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
SOUPS
2009
ACM
14 years 3 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
SAC
2009
ACM
14 years 3 months ago
Efficient mobile reasoning for pervasive discovery
Semantic service discovery architectures that operate in mobile environments must cope with the significant challenges of finding relevant services rapidly, while facing constrain...
Luke Steller, Shonali Krishnaswamy