Abstract--Workflow design, mashup configuration, and composite service formation are examples where the capabilities of multiple simple services combined achieve a complex function...
Sensors in ubiquitous computing provide a new opportunity to extend existing RFID capabilities to situation-awareness. This paper proposes several alternatives of the Situation-Aw...
A key challenge in ubiquitous computing is how to manage ambient information about the environment where a variety of devices appear. Traditional capability descriptions are inadeq...
For adversarial but computationally bounded models of error, we construct appealingly simple and efficient cryptographic encoding and unique decoding schemes whose error-correctio...
Silvio Micali, Chris Peikert, Madhu Sudan, David A...
The conceptual architecture of the access control system described here is based on automatic distributed acquisition and processing of knowledge about users and devices in comput...