Sciweavers

772 search results - page 15 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
SAC
2006
ACM
14 years 1 months ago
Ubiquitous presence systems
Instant messaging has become a part of our daily live. Instant communication, either with a mobile device or with a computer based application, is an increasingly used form of com...
Matthias Kranz, Paul Holleis, Albrecht Schmidt
ENTCS
2006
180views more  ENTCS 2006»
13 years 7 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
TEC
2002
166views more  TEC 2002»
13 years 7 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
HCI
2007
13 years 9 months ago
An Architecture for Adaptive and Adaptable Mobile Applications for Physically Handicapped People
Context-awareness is an important capability needed in devices in a ubiquitous computing environment. Ubiquitous computing devices use different types of sensors along with the us...
Matthias Betz, Mahmudul Huq, Volkmar Pipek, Markus...
ISM
2005
IEEE
109views Multimedia» more  ISM 2005»
14 years 1 months ago
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but cooperating mobile devices where trust relationships between entities are uncertai...
Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajja...