Sciweavers

579 search results - page 8 / 116
» Access control management for ubiquitous computing
Sort
View
PDP
2008
IEEE
14 years 2 months ago
CoDaMine: Communication Data Mining for Feedback and Control in Ubiquitous Environments
In ubiquitous environments an increasing number of sensors capture information on users and an increasing number of actuators present information to users. In this paper we presen...
Tom Gross, Mirko Fetter
EUROSSC
2006
Springer
13 years 11 months ago
Toward Wide Area Interaction with Ubiquitous Computing Environments
Despite many years of ubiquitous computing (ubicomp) middleware research, deployment of such systems has not been widespread. We suggest this is in part because we lack a shared mo...
Michael Blackstock, Rodger Lea, Charles Krasic
EUROPKI
2006
Springer
13 years 11 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
MTA
2011
220views Hardware» more  MTA 2011»
13 years 3 months ago
Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration
: With the advances in a variety of software/hardware technologies and wireless networking, there is coming a need for ubiquitous collaboration which allows people to access inform...
Kangseok Kim, Geoffrey C. Fox
EUC
2004
Springer
14 years 1 months ago
Context-Aware State Management for Ubiquitous Applications
In a ubiquitous computing environment, users continuously access computing services and interact with smart spaces, while moving from one place to another. Application migration, t...
Pauline P. L. Siu, Nalini Moti Belaramani, Cho-Li ...