Sciweavers

772 search results - page 10 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
ICCCI
2010
Springer
13 years 5 months ago
An Ontology-Supported Ubiquitous Interface Agent for Cloud Computing - Example on Zigbee Technique
An ontology-supported ubiquitous interface agent and its interaction diagram with the backend information agent system, i.e., OntoIAS, in cloud computing environments were proposed...
Sheng-Yuan Yang, Dong-Liang Lee, Chun-Liang Hsu
PET
2004
Springer
14 years 1 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
ICDE
2008
IEEE
134views Database» more  ICDE 2008»
14 years 2 months ago
Managing primary context through web services
— The emergence of wireless sensor networks (WSN) and RFID technology are starting to make the ubiquitous computing vision a reality, as they provide the means to obtain informat...
Edgardo Avilés-López, J. Antonio Gar...
SOUPS
2009
ACM
14 years 2 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
EUC
2005
Springer
14 years 1 months ago
ANTS: An Evolvable Network of Tiny Sensors
As a promising technology that enables ubiquitous computing and leads IT industries of next generation, sensor networks (SN) are foreseen to expand and populate the globe in such a...
Daeyoung Kim, Tomás López, Seongeun ...