Sciweavers

829 search results - page 14 / 166
» Customizable Pervasive Applications
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 8 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
MONET
2007
194views more  MONET 2007»
13 years 6 months ago
Pervasive Healthcare and Wireless Health Monitoring
With an increasingly mobile society and the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many current and emerging healthcare appli...
Upkar Varshney
EEE
2005
IEEE
14 years 10 days ago
Flexible Application Rights Management in a Pervasive Environment
The development and wider use of wireless networks and mobile devices has led to novel pervasive computing environments which pose new problems for software rights management and ...
Ivana Dusparic, Dominik Dahlem, Jim Dowling
CAISE
2006
Springer
13 years 10 months ago
Context-aware Applications with Distributed Ontologies
This paper presents a framework for context-aware applications, with a particular focus on collaboration and pervasiveness. The framework relies on distributed ontologies, which ar...
Flavio De Paoli, Marco Loregian
OHS
2000
Springer
13 years 10 months ago
Weaving the Pervasive Information Fabric
As the pervasive computing infrastructure emerges, we consider the impact on information applications and their middleware requirements
Mark K. Thompson, David De Roure, Danius T. Michae...