Sciweavers

266 search results - page 31 / 54
» An Architecture for Privacy-Sensitive Ubiquitous Computing
Sort
View
DAC
1996
ACM
14 years 1 days ago
RTL Emulation: The Next Leap in System Verification
ion. Production use of text-based methodology has enabled designers to capture designs of hundreds of thousands of gates using graphic ESDA tools. Source: Data Quest (Verilog/VHDL ...
Sanjay Sawant, Paul Giordano
ISICT
2003
13 years 9 months ago
Towards a natural interface to adaptive service composition
As computers become ubiquitous in our every day lives, providing a means for true user empowerment will become crucial. Techniques which allow dynamic reuse and composition of exi...
Steffen Higel, Tony O'Donnell, Vincent Wade
EUC
2008
Springer
13 years 9 months ago
A Context Management System for Supporting Context-Aware Applications
This paper presents a context management system for supporting context-aware applications in a smart home. In a ubiquitous computing environment context changes dynamically and th...
Eunhoe Kim, Jaeyoung Choi
MIDDLEWARE
2007
Springer
14 years 2 months ago
A service-oriented virtual community overlay network for secure external service orchestration
The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications....
Shudong Chen, Johan J. Lukkien
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Proxy-based Hand-off of Web Sessions for User Mobility
The proliferation of different kinds of mobile devices, ranging from personal wireless devices, such as PDAs and smart phones, to small notebooks, is enabling ubiquitous personal ...
Gerardo Canfora, Giuseppe Di Santo, Gabriele Ventu...