Sciweavers

1010 search results - page 163 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
ICDCS
2005
IEEE
14 years 2 months ago
Handling Asymmetry in Power Heterogeneous Ad Hoc Networks: A Cross Layer Approach
Power heterogeneous ad hoc networks are characterized by link layer asymmetry: the ability of lower power nodes to receive transmissions from higher power nodes but not vice versa...
Vasudev Shah, Srikanth V. Krishnamurthy
CSFW
2002
IEEE
14 years 2 months ago
A Privacy Policy Model for Enterprises
Privacy is an increasing concern in the marketplace. Although enterprises promise sound privacy practices to their customers, there is no technical mechanism to enforce them inter...
Günter Karjoth, Matthias Schunter
CHI
2011
ACM
13 years 20 days ago
Roboshop: multi-layered sketching interface for robot housework assignment and management
As various home robots come into homes, the need for efficient robot task management tools is arising. Current tools are designed for controlling individual robots independently, ...
Kexi Liu, Daisuke Sakamoto, Masahiko Inami, Takeo ...
JIRS
2000
144views more  JIRS 2000»
13 years 8 months ago
An Integrated Approach of Learning, Planning, and Execution
Agents (hardware or software) that act autonomously in an environment have to be able to integrate three basic behaviors: planning, execution, and learning. This integration is man...
Ramón García-Martínez, Daniel...
CHI
2006
ACM
14 years 9 months ago
Tableau machine: an alien presence in the home
Research in Ambient Intelligence and Ubiquitous Computing has put computational devices into many social settings while leaving intact much of the "task support and informati...
Mario Romero, Zachary Pousman, Michael Mateas