Sciweavers

126 search results - page 2 / 26
» A scheme of service discovery and control on ubiquitous devi...
Sort
View
HUC
2007
Springer
14 years 1 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
SIGOPSE
2004
ACM
14 years 11 days ago
Energy-efficient cluster-based service discovery for Ubiquitous Computing
: Service discovery in Ubiquitous Computing is a task which has to be done frequently due to dynamically changing environments. The limited battery power of mobile devices requires...
Gregor Schiele, Christian Becker, Kurt Rothermel
DAIS
2010
13 years 8 months ago
Service Discovery in Ubiquitous Feedback Control Loops
Abstract. Nowadays, context-aware applications can discovery and interact with services in ubiquitous environments in order to customize their behavior. In general, these providers...
Daniel Romero 0002, Romain Rouvoy, Lionel Seinturi...
PERVASIVE
2005
Springer
14 years 13 days ago
Service Discovery in TinyObj: Strategies and Approaches
In this paper, we describe TinyObj service discovery model, which uses short wireless packet broadcasts for service discovery within a user’s vicinity. We present a prototype im...
Pavel Poupyrev, Takahiro Sasao, Shunsuke Saruwatar...
MIDDLEWARE
2004
Springer
14 years 9 days ago
Adaptive resource discovery for ubiquitous computing
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
Rae Harbird, Stephen Hailes, Cecilia Mascolo