Sciweavers

772 search results - page 11 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
ICDCS
2002
IEEE
14 years 22 days ago
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design proces...
Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, M....
ICDCSW
2006
IEEE
14 years 1 months ago
Wearable Computer for Ubiquitous Informal Communication
The rapid progress of information technology has spurred development of various communication support systems. In particular, the importance of informal communication has lately d...
Shun'ichi Tano, Tatsuhiro Takayama, Mitsuru Iwata,...
JNW
2007
80views more  JNW 2007»
13 years 7 months ago
Providing Security Services in a Resource Discovery System
— Nowadays, portable electronic devices allow users to access available resources wherever they are. In this sense, announcement and discovering of services and resources are two...
Juan Vera del Campo, Josep Pegueroles, Miguel Sori...
IJIPT
2007
116views more  IJIPT 2007»
13 years 7 months ago
Context as autonomic intelligence in a ubiquitous computing environment
: This paper presents the ANS architecture that uses ubiquitous computing to monitor medical patients in the home. Since there is no notion of the patient carrying out maintenance ...
Markus C. Huebscher, Julie A. McCann, Asher Hoskin...
WMASH
2003
ACM
14 years 1 months ago
Challenge: ubiquitous location-aware computing and the "place lab" initiative
To be widely adopted, location-aware computing must be as effortless, familiar and rewarding as web search tools like Google. We envisage the global scale Place Lab, consisting of...
Bill N. Schilit, Anthony LaMarca, Gaetano Borriell...