Sciweavers

829 search results - page 34 / 166
» Customizable Pervasive Applications
Sort
View
DBSEC
2007
138views Database» more  DBSEC 2007»
13 years 8 months ago
A Spatio-temporal Role-Based Access Control Model
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of su...
Indrakshi Ray, Manachai Toahchoodee
SSDBM
2003
IEEE
96views Database» more  SSDBM 2003»
14 years 20 days ago
Space Constrained Selection Problems for Data Warehouses and Pervasive Computing
Space constrained optimization problems arise in a multitude of important applications such as data warehouses and pervasive computing. A typical instance of such problems is to s...
Themistoklis Palpanas, Nick Koudas, Alberto O. Men...
WOA
2003
13 years 8 months ago
Spray Computers: Frontiers of Self-organization for Pervasive Computing
We envision a future in which clouds of microcomputers can be sprayed in an environment to provide, by spontaneously networking with each other, an endlessly range of futuristic a...
Marco Mamei, Franco Zambonelli
PERCOM
2007
ACM
14 years 7 months ago
Middleware Support for Quality of Context in Pervasive Context-Aware Systems
Middleware support for pervasive context-aware systems relieves context-aware applications from dealing with the complexity of context-specific operations such as context acquisit...
Kamran Sheikh, Maarten Wegdam, Marten van Sinderen
PERCOM
2007
ACM
14 years 7 months ago
Dynamic Context Bindings in Pervasive Middleware
Context-awareness (CA) enables the development of personalized pervasive services. Current context-aware infrastructures focus on middleware solutions to support acquisition, usag...
Tom Broens, Marten van Sinderen, Aart van Halteren...