Sciweavers

1081 search results - page 9 / 217
» Challenges: an application model for pervasive computing
Sort
View
FIRBPERF
2005
IEEE
235views Algorithms» more  FIRBPERF 2005»
14 years 1 months ago
Performance Model Building of Pervasive Computing
Performance model building is essential to predict the ability of an application to satisfy given levels of performance or to support the search for viable alternatives. Using aut...
Andrea D'Ambrogio, Giuseppe Iazeolla
ECUMN
2007
Springer
14 years 1 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...
IFM
2010
Springer
132views Formal Methods» more  IFM 2010»
13 years 5 months ago
From Operating-System Correctness to Pervasively Verified Applications
Though program verification is known and has been used for decades, the verification of a complete computer system still remains a grand challenge. Part of this challenge is the in...
Matthias Daum, Norbert Schirmer, Mareike Schmidt
PERCOM
2005
ACM
14 years 7 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
EEE
2005
IEEE
14 years 1 months ago
Flexible Application Rights Management in a Pervasive Environment
The development and wider use of wireless networks and mobile devices has led to novel pervasive computing environments which pose new problems for software rights management and ...
Ivana Dusparic, Dominik Dahlem, Jim Dowling