Sciweavers

3276 search results - page 5 / 656
» Data Management for Pervasive Computing
Sort
View
FGCS
2008
159views more  FGCS 2008»
13 years 7 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
PERVASIVE
2007
Springer
13 years 7 months ago
Physical Access Control for Captured RFID Data
Travis Kriplean, Evan Welbourne, Nodira Khoussaino...
CSREAPSC
2006
13 years 9 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
DSL
2009
13 years 5 months ago
A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications
Abstract. Various forms of pervasive computing environments are being deployed in an increasing number of areas including healthcare, home automation, and military. This evolution ...
Zoé Drey, Julien Mercadal, Charles Consel
ICDCS
2005
IEEE
14 years 1 months ago
Systems Support for Pervasive Query Processing
Database queries, in particular, event-driven continuous queries, are useful for many pervasive computing applications, such as video surveillance. In order to enable these applic...
Wenwei Xue, Qiong Luo, Lionel M. Ni