Sciweavers

6057 search results - page 9 / 1212
» A system architecture for pervasive computing
Sort
View
ATAL
2004
Springer
14 years 28 days ago
A Trust Analysis Methodology for Pervasive Computing Systems
Abstract. We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that des...
Stéphane Lo Presti, Michael J. Butler, Mich...
PERCOM
2004
ACM
14 years 7 months ago
Super Spaces: A Middleware for Large-Scale Pervasive Computing Environments
In previous work [1], we introduced a distributed middleware infrastructure for managing physicallybounded, standalone pervasive computing environments, which we refer to as Activ...
Jalal Al-Muhtadi, Shiva Chetan, Anand Ranganathan,...
BIRTHDAY
2006
Springer
13 years 11 months ago
Realistic Worst-Case Execution Time Analysis in the Context of Pervasive System Verification
We describe a gate level design of a FlexRay-like bus interface. An electronic control unit (ECU) is obtained by integrating this interface into the design of the verified VAMP pro...
Steffen Knapp, Wolfgang J. Paul
IPPS
2002
IEEE
14 years 13 days ago
Architecture of the Entropia Distributed Computing System
Distributed Computing, the exploitation of idle cycles on pervasive desktop PC systems offers the opportunity to increase the available computing power by orders of magnitude (10x...
Andrew A. Chien
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 9 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri