Sciweavers

1688 search results - page 25 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
COLCOM
2009
IEEE
14 years 1 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
ESORICS
2004
Springer
14 years 2 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
ICDCS
2008
IEEE
14 years 3 months ago
Heuristics-Based Strategies for Resolving Context Inconsistencies in Pervasive Computing Applications
Context-awareness allows pervasive applications to adapt to changeable computing environments. Contexts, the pieces of information that capture the characteristics of environments...
Chang Xu, Shing-Chi Cheung, Wing Kwong Chan, Chuny...
PUC
2010
138views more  PUC 2010»
13 years 3 months ago
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web
In this paper, we describe the design and implementation of an audio wiki application accessible via both the Public Switched Telephone Network and the Internet. The application ex...
Constantinos Kolias, Vassilis Kolias, Ioannis Anag...
PERCOM
2007
ACM
14 years 8 months ago
Achieving Flexible Cache Consistency for Pervasive Internet Access
Caching is an important technique to support pervasive Internet access. Cache consistency measures the deviation between the cached data and the source data. In mobile computing e...
Yu Huang 0002, Jiannong Cao, Zhijun Wang, Beihong ...