Sciweavers

1020 search results - page 190 / 204
» Clustering-based location in wireless networks
Sort
View
PERCOM
2005
ACM
14 years 9 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
PERCOM
2005
ACM
14 years 9 months ago
Towards seamless mobility on pervasive hardware
Preserving one's uniquely customized computing environment as one moves to different locations is an enduring challenge in mobile computing. We examine why this capability is...
Mahadev Satyanarayanan, Michael Kozuch, Casey Helf...
PERCOM
2005
ACM
14 years 9 months ago
PICASSO: Pervasive Information Chronicling, Access, Search, and Sharing for Organizations
Several researchers have pointed out and begun to demonstrate that it is now possible to digitize an entire lifetime of experiences into a pocket-sized storage device, and thus to...
Gopal Pingali, Mark Podlaseck, Sinem Güven
PERCOM
2005
ACM
14 years 9 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
MOBISYS
2004
ACM
14 years 9 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay