Sciweavers

223 search results - page 13 / 45
» A Trust-Based Access Control Model for Pervasive Computing A...
Sort
View
PERVASIVE
2004
Springer
14 years 1 months ago
Context Cube: Flexible and Effective Manipulation of Sensed Context Data
In an effort to support the development of context-aware applications that use archived sensor data, we introduce the concept of the Context Cube based on techniques of data wareho...
Lonnie D. Harvel, Ling Liu, Gregory D. Abowd, Yu-X...
AUIC
2005
IEEE
14 years 2 months ago
Lightweight User Interfaces for Watch Based Displays
Ubiquitous mobile computing devices offer the opportunity to provide easy access to a rich set of information sources. Placing the display for this computing device on the user’...
Peter Hutterer, Mark T. Smith, Bruce H. Thomas, Wa...
IADIS
2003
13 years 10 months ago
Service Capabilities Model for Next Generation Ad Hoc Networks
Next generation networks are commonly associated with open service creation environments such as OSA, Parlay or JAIN. These environments make the capabilities provided by telecomm...
Mario Muñoz
AINA
2007
IEEE
13 years 10 months ago
Phygital Map: Accessing Digital Multimedia from Physical Map
— We present an augmented map interface called Phygital (physical, digital) Map that enables users to access digital multimedia stored in various off-the-shelf devices from physi...
Jin Nakazawa, Hideyuki Tokuda
CODASPY
2011
13 years 5 days ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong