Sciweavers

829 search results - page 149 / 166
» Customizable Pervasive Applications
Sort
View
USS
2010
13 years 5 months ago
Cling: A Memory Allocator to Mitigate Dangling Pointers
Use-after-free vulnerabilities exploiting so-called dangling pointers to deallocated objects are just as dangerous as buffer overflows: they may enable arbitrary code execution. U...
Periklis Akritidis
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 4 months ago
Information Delivery System through Bluetooth in Ubiquitous Networks
------------------------------------------------------ABSTRACT-------------------------------------------------------Ubiquitous and pervasive computing (UPC) is a popular paradigm ...
D. Asha Devi, M. Suresh Bab, V. L. Pavani, N. Geet...
CDC
2010
IEEE
294views Control Systems» more  CDC 2010»
13 years 2 months ago
Adaptive self-triggered control over IEEE 802.15.4 networks
The communication protocol IEEE 802.15.4 is becoming pervasive for low power and low data rate wireless sensor networks (WSNs) applications, including control and automation. Never...
Ubaldo Tiberi, Carlo Fischione, Karl Henrik Johans...
TDSC
2011
13 years 2 months ago
An Obfuscation-Based Approach for Protecting Location Privacy
—The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the phys...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
JAISE
2010
182views Algorithms» more  JAISE 2010»
13 years 2 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson