Sciweavers

91 search results - page 5 / 19
» Architecting Pervasive Computing Systems for Privacy: A Surv...
Sort
View
JDCTA
2010
182views more  JDCTA 2010»
13 years 3 months ago
Fusion Techniques for Reliable Information: A Survey
Information fused by multi-sensors is an important factor for obtaining reliable contextual information in smart spaces which use the pervasive and ubiquitous computing techniques...
Hyun Lee, Byoungyong Lee, Kyungseo Park, Ramez Elm...
EEMMAS
2007
Springer
14 years 2 months ago
Engineering Contextual Information for Pervasive Multiagent Systems
Multiagent systems for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises th...
Gabriella Castelli, Marco Mamei, Franco Zambonelli
EUC
2008
Springer
13 years 10 months ago
Analyzing Privacy Designs of Mobile Social Networking Applications
The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are exp...
Guanling Chen, Faruq Rahman
GD
2008
Springer
13 years 9 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
13 years 6 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier