Sciweavers

2358 search results - page 74 / 472
» A Secure Pervasive Environment
Sort
View
ITICSE
2005
ACM
14 years 2 months ago
eFuzion: development of a pervasive educational system
Established as a research project at the University of Illinois in the spring of 2002, eFuzion has proven to be a valuable and effective pedagogical set of tools. It provides the ...
Chad Peiper, David Warden, Ellick Chan, Boris Capi...
MM
2005
ACM
150views Multimedia» more  MM 2005»
14 years 2 months ago
Reading SCORM compliant multimedia courses using heterogeneous pervasive devices
The Sharable Content Object Reference Model (SCORM) provides some important representation for distance learning content and the learning behavior. In general, SCORM-Compliant lea...
Te-Hua Wang, Hsuan-Pu Chang, Yun-Long Sie, Kun-Han...
MHCI
2005
Springer
14 years 2 months ago
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Context-aware applications can better meet users’ needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this n...
Dan Hong, Mingxuan Yuan, Vincent Y. Shen
COMPSAC
2007
IEEE
14 years 3 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
PERVASIVE
2009
Springer
14 years 3 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...