Sciweavers

1688 search results - page 121 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
CCS
2004
ACM
15 years 10 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
CHI
2010
ACM
15 years 11 months ago
Factors impeding Wiki use in the enterprise: a case study
Our research explored factors that impacted the use of wikis as a tool to support the dissemination of knowledge within an enterprise. Although we primarily talked to a population...
Lester J. Holtzblatt, Laurie E. Damianos, Daniel W...
COMCOM
2000
82views more  COMCOM 2000»
15 years 4 months ago
Soft handoff in a CDMA wireless ATM environment
Future wireless asynchronous transfer mode (ATM) networks present a number of mobility related challenges. Handoffs due to user mobility require network signaling to maintain the ...
Steven Lombardi, Weihua Zhuang
SASO
2008
IEEE
15 years 11 months ago
Bioinspired Environmental Coordination in Spatial Computing Systems
—Spatial computing systems are characterized by the extended physical environment in which they exist and function. Often this environment can be manipulated in various ways by t...
Justin Werfel, Yaneer Bar-Yam, Donald E. Ingber
PERVASIVE
2006
Springer
15 years 4 months ago
iCAP: Interactive Prototyping of Context-Aware Applications
Although numerous context-aware applications have been developed and there have been technological advances for acquiring contextual information, it is still difficult to develop a...
Anind K. Dey, Timothy Sohn, Sara Streng, Justin Ko...