Sciweavers

772 search results - page 20 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
SAC
2004
ACM
14 years 1 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
SIES
2007
IEEE
14 years 2 months ago
Architecture and Implementation of an Embedded Wormhole
Abstract— Recent advances in wireless communication technology have opened the way for mobile services and applications. This paper describes ongoing work in the context of the H...
Hugo Ortiz, Antonio Casimiro, Paulo Veríssi...
WETICE
2003
IEEE
14 years 1 months ago
Coordination in Pervasive Computing Environments
Computer science and engineering nowadays appears to be challenged (and driven) by technological progress and quantitative growth. Among the technological progress challenges are ...
Alois Ferscha
EUC
2005
Springer
14 years 1 months ago
Ubiquitous Learning on Pocket SCORM
With advanced technologies, computer devices have become smaller and powerful. As a result, many people enjoy ubiquitous learning using mobile devices such as Pocket PCs. Pocket PC...
Hsuan-Pu Chang, Wen-Chih Chang, Yun-Long Sie, Nige...
IPPS
2002
IEEE
14 years 22 days ago
Architecture of the Entropia Distributed Computing System
Distributed Computing, the exploitation of idle cycles on pervasive desktop PC systems offers the opportunity to increase the available computing power by orders of magnitude (10x...
Andrew A. Chien