Sciweavers

1688 search results - page 120 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
IJIT
2004
15 years 6 months ago
Rule-Based Message Passing for Collaborative Application in Distributed Environments
In this paper, we describe a rule-based message passing method to support developing collaborative applications, in which multiple users share resources in distributed environments...
Wataru Yamazaki, Hironori Hiraishi, Fumio Mizoguch...
NBIS
2007
Springer
15 years 10 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
ICAIL
2007
ACM
15 years 6 months ago
Conditions for access and use of legal document retrieval web services
Documentation is essential to daily legal practice. On-line access is current practice. The conditions imposed by an information service provider with respect to access and use of...
Martine Boonk, Frances M. T. Brazier, David de Gro...
CHI
2000
ACM
15 years 9 months ago
Jotmail: a voicemail interface that enables you to see what was said
Voicemail is a pervasive, but under-researched tool for workplace communication. Despite potential advantages of voicemail over email, current phone-based voicemail UIs are highly...
Steve Whittaker, Richard Davis, Julia Hirschberg, ...
LCN
2007
IEEE
15 years 11 months ago
Investigation of IEEE 802.11k-based Access Point Coverage Area and Neighbor Discovery
— Possessing knowledge about access point coverage areas and neighbors is of essential need for the provisioning of, e.g., location based handovers or push services. A convenient...
Sven D. Hermann, Marc Emmelmann, O. Belaifa, Adam ...