This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...
The specification of model adaptation and generation rules is a topic of great interest for the user interface development community, since there are more and more approaches supp...
The development of small wireless sensors and smart-phones, which include various sound, video, motion and location sensors have facilitated new pervasive applications. These perva...
Themistoklis Bourdenas, Morris Sloman, Emil C. Lup...
Software agents are one of the building blocks of ambient intelligence and pervasive computing. Adaptation to changes in the execution context is necessary in order to provide cont...