Sciweavers

266 search results - page 38 / 54
» Design of a Security Management Middleware in Ubiquitous Com...
Sort
View
SMC
2007
IEEE
154views Control Systems» more  SMC 2007»
14 years 2 months ago
From biology to evolve-able pervasive ICT systems
Abstract— The emergence of future pervasive ICT environments, characterized by the massive proliferation of embedded electronic devices with communication and computing capabilit...
Iacopo Carreras, Daniele Miorandi, Imrich Chlamtac
ISMIR
2004
Springer
176views Music» more  ISMIR 2004»
14 years 2 months ago
The International Music Information Retrieval Systems Evaluation Laboratory: Governance, Access and Security
The IMIRSEL (International Music Information Retrieval Systems Evaluation Laboratory) project provides an unprecedented platform for evaluating Music Information Retrieval (MIR) a...
J. Stephen Downie, Joe Futrelle, David K. Tcheng
SIGUCCS
2005
ACM
14 years 2 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
IEEECIT
2009
IEEE
14 years 3 months ago
Dynamic Software Product Lines for Service-Based Systems
—Ageing populations and the necessity to reduce environmental impact raise new challenges on our living buildings. Convergence of home control systems (air conditioning, light ma...
Paul Istoan, Grégory Nain, Gilles Perrouin,...
LOCA
2009
Springer
14 years 3 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima