Sciweavers

2358 search results - page 72 / 472
» A Secure Pervasive Environment
Sort
View
PERCOM
2003
ACM
14 years 2 months ago
Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile
Passive RFID technology and unobtrusive Bluetoothenabled active tags are means to augment products and everyday objects with information technology invisible to human users. This ...
Frank Siegemund, Christian Floerkemeier
ICDCS
2002
IEEE
14 years 1 months ago
Balancing Performance, Energy, and Quality in Pervasive Computing
We describe Spectra, a remote execution system for batterypowered clients used in pervasive computing. Spectra enables applications to combine the mobility of small devices with t...
Jason Flinn, SoYoung Park, Mahadev Satyanarayanan
ICOIN
2001
Springer
14 years 1 months ago
Pervasive Adaptation for Mobile Computing
Mobile Computing platforms such as mobile phones, PDAs or wearable computers operate in a much more volatile and limited environment than their stationary counterparts. Such platf...
Tim Edmonds, Andy Hopper, Steve Hodges
ODRL
2004
13 years 10 months ago
A Pervasive Application Rights Management Architecture (PARMA) based on ODRL
Software license management is currently expanding from its traditional desktop environment into the mobile application space, but software vendors are still applying old licensing...
Dominik Dahlem, Ivana Dusparic, Jim Dowling
MMNS
2003
135views Multimedia» more  MMNS 2003»
13 years 10 months ago
Pervasive Accounting of Resource Consumption for Wireless Services with Adaptive QoS
Wireless communications and device miniaturization are enabling pervasive scenarios where the limited resource availability and the wide heterogeneity of access terminals make cruc...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi