Sciweavers

405 search results - page 7 / 81
» An Agent Construction Model for Ubiquitous Computing Devices
Sort
View
CE
2008
122views more  CE 2008»
13 years 7 months ago
Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques
The portability and immediate communication properties of mobile devices influence the learning processes in interacting with peers, accessing resources and transferring data. For...
G. D. Chen, C. K. Chang, C. Y. Wang
FGCS
2008
159views more  FGCS 2008»
13 years 7 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
MMMACNS
2005
Springer
14 years 29 days ago
Self-managed Cells for Ubiquitous Systems
Abstract. Amongst the challenges of ubiquitous computing is the need to provide management support for personal wireless devices and sensors. In this extended abstract we introduce...
Naranker Dulay, Emil C. Lupu, Morris Sloman, Joe S...
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 9 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
UML
2005
Springer
14 years 29 days ago
Capturing Common and Variable Design Aspects for Ubiquitous Computing with MB-UID
Developing user interfaces for ubiquitous environments is a challenging task. In such an environment, users can apply different devices to accomplish the same or different tasks. ...
Alexander Boedcher, Kizito Mukasa, Detlef Zuelke